Skip to content
Wildcat Cyber Patrol
Free Download

Author: Mash

Recently Addressed PHP RCE Vulnerability Exploited By Unknown Hackers

Attackers deployed the Msupedge backdoor on a university's Windows systems in Taiwan by exploiting a recently patched PHP vulnerability (CVE-2024-4577), [...]
  • News
Posted on August 22, 2024 by Mash

Recent Critical SolarWinds RCE Vulnerability Actively Abused, CISA Warns

CISA issued a warning about active exploitation of a critical vulnerability in SolarWinds' Web Help Desk (WHD) software, used by [...]
  • News
Posted on August 18, 2024 by Mash

Microsoft Warns Users Of Critical TCP/IP Vulnerability Affecting IPv6 Systems

Microsoft issued a critical warning on Tuesday urging users to patch a TCP/IP vulnerability affecting all default IPv6-enabled Windows systems. [...]
  • News
Posted on August 16, 2024 by Mash

Chinese Hacking Groups Are Targeting Russian IT Companies In Recent Cyberattacks

Since late July 2024, a series of precise cyberattacks has targeted numerous systems within Russian government agencies and IT firms. [...]
  • News
Posted on August 13, 2024 by Mash

New Malware Campaign Installs Malicious Chrome and Edge Extensions

A persistent and extensive malware operation has been forcibly installing malicious extensions for Google Chrome and Microsoft Edge browsers across [...]
  • News
Posted on August 12, 2024 by Mash

Self-Spreading Worm CMoon Steals Data from Russian Users and Companies

Since early July 2024, a newly identified self-spreading worm named 'CMoon' has been circulating in Russia through a compromised website [...]
  • News
Posted on August 9, 2024 by Mash

Samsung's New Bounty Program Offers Big Payouts for RCE Vulnerabilities

Samsung has introduced a new bug bounty program for its mobile devices, offering rewards up to $1,000,000 for reports demonstrating [...]
  • News
Posted on August 8, 2024 by Mash

Hackers Abusing Windows Smart App Control and SmartScreen Vulnerability Since 2018

A design flaw in Windows Smart App Control and SmartScreen allows attackers to launch programs without triggering security warnings, a [...]
  • News
Posted on August 6, 2024 by Mash

Hunters International Hacking Group Uses SharpRhino Malware in Cyberattacks Targeting IT Industry

Hunters International, using the SharpRhino C# RAT, targets IT workers to breach corporate networks by initiating infections, elevating privileges, executing [...]
  • News
Posted on August 6, 2024 by Mash

StormBamboo Hacking Group Hacked an ISP to Inject Malware into Software Updates

The Chinese hacking group StormBamboo has compromised an ISP to inject malware into automatic software updates. Also known as Evasive [...]
  • News
Posted on August 5, 2024 by Mash

Unknown Charges from Shopify-charge.com Reported Worldwide

People worldwide are reporting mysterious $1 or $0 charges from Shopify-charge.com on their credit card bills, even without making any [...]
  • News
Posted on August 2, 2024 by Mash

Hackers Abusing Misconfiguration In Selenium Grid To Mine Cryptocurrency

Threat actors exploit a Selenium Grid misconfiguration to deploy a modified XMRig tool for mining Monero. Selenium Grid, an open-source [...]
  • News
Posted on July 31, 2024 by Mash

French Police Distribute "Disinfection Solution" For the PlugX Malware

French police and Europol, assisted by cybersecurity firm Sekoia, are deploying a "disinfection solution" in France to remove PlugX malware [...]
  • News
Posted on July 28, 2024 by Mash

Evasive Panda Hacking Group Using New Macma macOS Backdoor

The Chinese hacking group 'Evasive Panda' has been observed deploying new versions of the Macma backdoor and Nightdoor Windows malware. [...]
  • News
Posted on July 25, 2024 by Mash

WinPE Recovery Tool For CrowdStrike Drivers Removal Released By Microsoft

Microsoft has launched a WinPE recovery tool to automate removal of the faulty CrowdStrike update, which crashed an estimated 8.5 [...]
  • News
Posted on July 23, 2024 by Mash

Microsoft Rolls Out SMTP DANE with DNSSEC For Exchange Online

Microsoft has launched Inbound SMTP DANE with DNSSEC for Exchange Online in public preview, enhancing email integrity and security. SMTP [...]
  • News
Posted on July 19, 2024 by Mash

Facebook Pages and Ads For Fake Windows Themes Distribute Malware

Cybercriminals are exploiting Facebook business pages and ads to promote counterfeit Windows themes that infect unsuspecting users with SYS01 password-stealing [...]
  • News
Posted on July 17, 2024 by Mash

AT&T Suffers Massive Data Breach

AT&T has reported a major data breach affecting around 109 million customers, where call logs were stolen from its Snowflake [...]
  • News
Posted on July 14, 2024 by Mash

Actively Exploited MHTML Zero-day Fixed By Microsoft

Microsoft addressed a Windows zero-day vulnerability that had been exploited in attacks for eighteen months to execute malicious scripts, circumventing [...]
  • News
Posted on July 12, 2024 by Mash

Shopify Denies Claims Of Data Breach

Shopify has refuted claims of a data breach despite allegations from a threat actor selling purported customer data allegedly taken [...]
  • News
Posted on July 9, 2024 by Mash

Malware and Cryptominers Distributed Via HFS Servers

Hackers are actively targeting older versions of Rejetto's HTTP File Server (HFS) to distribute malware and cryptocurrency mining software. According [...]
  • News
Posted on July 6, 2024 by Mash

Google Reward Program kvmCTF Offers Bounties For KVM Exploits

Google introduced kvmCTF in October 2023, offering $250,000 bounties for full VM escape exploits in the Kernel-based Virtual Machine (KVM) [...]
  • News
Posted on July 3, 2024 by Mash

New Command Execution Method 'GrimResource' Allows Attackers To Execute Code Via Microsoft Management Console

A novel command execution technique called 'GrimResource' leverages crafted MSC files and an unpatched Windows XSS flaw to execute code [...]
  • News
Posted on June 26, 2024 by Mash

Recently Discovered Phoenix UEFI Bug Allows Code Execution On Affected Devices

A vulnerability in Phoenix SecureCore UEFI firmware, CVE-2024-0762, impacts devices with many Intel CPUs, prompting Lenovo to release new firmware [...]
  • News
Posted on June 22, 2024 by Mash

AMD Investigating Possible Data Breach After Hacker Attempted To Sell Allegedly Stolen Data Online

AMD is investigating a potential cyberattack after a threat actor claimed to have stolen employee information, financial documents, and confidential [...]
  • News
Posted on June 21, 2024 by Mash

Windows Search Protocol Abused By Hackers In Phishing Campaign

A new phishing campaign uses HTML attachments that exploit the Windows search protocol (search-ms URI) to distribute malware via remote [...]
  • News
Posted on June 13, 2024 by Mash

Critical RCE Vulnerability In Windows PHP Fixed

A new remote code execution (RCE) vulnerability in PHP for Windows has been disclosed, affecting all versions since 5.x and [...]
  • News
Posted on June 10, 2024 by Mash

Recently Launched 'Fog' Ransomware Campaign Targets US Education Sector

A new ransomware operation named 'Fog' emerged in early May 2024, targeting the networks of educational organizations in the U.S. [...]
  • News
Posted on June 8, 2024 by Mash

Hugging Face Spaces Platform Compromised, Secret Data Stolen

Hugging Face reported a breach in its Spaces platform, exposing authentication secrets of its members. The company has revoked compromised [...]
  • News
Posted on June 4, 2024 by Mash

LightSpy Data Stealer Now Also Targets macOS

LightSpy, previously known for targeting Android and iOS devices, has now been found on macOS. This surveillance framework steals data [...]
  • News
Posted on June 2, 2024 by Mash

Hackers Disguise Themselves As StackOverflow Users To Distribute Malware Via Answers

Cybercriminals are exploiting Stack Overflow to spread malware by answering questions with a link to a malicious PyPi package that [...]
  • News
Posted on May 31, 2024 by Mash

Critical Vulnerability In TP-Link C5400X Router Addressed

The TP-Link Archer C5400X gaming router has security vulnerabilities that could allow an unauthenticated, remote attacker to execute commands on [...]
  • News
Posted on May 29, 2024 by Mash

The Restoring Images Bug Wasn't Caused by iCloud

Security researchers have reverse-engineered Apple's iOS 17.5.1 update, discovering that a recent bug causing deleted images to reappear was due [...]
  • News
Posted on May 25, 2024 by Mash

Future Windows 11 Default Wallpaper Leaked

May 20 will mark the launch of next-gen Windows on ARM PCs powered by Qualcomm's latest Snapdragon X Series processors. [...]
  • News
Posted on May 21, 2024 by Mash

Cuttlefish Malware Stealing Data And Credentials By Infecting Routers

The new malware 'Cuttlefish' infects enterprise and SOHO routers, stealing data and authentication info. Black Lotus Labs found it creates [...]
  • News
Posted on May 4, 2024 by Mash

Muddling Meerkat Hacking Group Probed Networks Using China's Great Firewall

A recent surge in cyber operations, dubbed "Muddling Meerkat," is suspected to be orchestrated by a Chinese state-sponsored threat actor. [...]
  • News
Posted on May 2, 2024 by Mash

Chrome's Quantum Resistant Encapsulation Feature Causes Connection Issues For Some Users

Google Chrome 124's release last week introduced a quantum-resistant X25519Kyber768 encapsulation, causing connectivity issues for some users. Google has rolled [...]
  • News
Posted on April 30, 2024 by Mash

Dev Popper Campaign Targets Software Developers, Attempting To Infect Their Systems With Python Backdoor

"Dev Popper" campaign lures developers with fake job interviews to install Python RAT. Tasks mimic interview process, prompting downloads from [...]
  • News
Posted on April 28, 2024 by Mash

Two Cisco Zero-days Actively Exploited To Breach Goverment Networks

Cisco warned today of a state-backed hacking group exploiting two zero-day vulnerabilities in ASA and FTD firewalls since November 2023, [...]
  • News
Posted on April 26, 2024 by Mash

Ransomware Operator Target Child Exploiters In Extortion Campaign

Since 2012, malicious actors have been crafting a slew of malware and ransomware disguising themselves as government agencies. They deceive [...]
  • News
Posted on April 24, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software