Skip to content
Wildcat Cyber Patrol
Free Download

Category: News

Hackers gained remote control over the chastity belts devices using ransomware

The source code for the ChasityLock ransomware has become publicly available for research purposes after the attack that targeted male [...]
  • News
Posted on January 11, 2021 by Mash

Hackers behind the SolarWinds breach used password guessing

The US Cybersecurity and Infrastructure Security Agency (CISA) has stated that the hackers behind the SolarWinds attack has used password [...]
  • News
  • SolarWinds
Posted on January 9, 2021 by Mash

Nissan NA source code leaked due to exposed Git server with default admin credentials

The entire collection of Nissan North America source code got leaked because of the exposed Git server, protected with default [...]
  • News
Posted on January 9, 2021 by Mash

Ezuri crypter used by Linux threat actors to avoid detection

According to AT&T Alien Labs report, multiple malware authors are using Ezuri crypter to improve the antidetection of their malware. [...]
  • News
  • Ezuri
  •  
  • Linux
Posted on January 8, 2021 by Mash

WhatsApp Privacy Police update forces users to share their data with Facebook

Recent WhatsApp Privacy Policy update has faced its users with an ultimatum, either they accept sharing their data with Facebook, [...]
  • News
  • Facebook
  •  
  • WhatsApp
Posted on January 8, 2021 by Mash

Windows Core Polaris dev build has been leaked

Recent leak of Microsoft's Windows Core Polaris has proofed a series of rumors about Microsoft developing an OS for low [...]
  • News
  • Micosoft
  •  
  • Windows
Posted on January 4, 2021 by Mash

Google Chrome fixes a file locking bug on Windows 10 systems

Google Chrome has fixed a bug that caused Windows 10 antivirus to lock the newly created files, by not allowing [...]
  • News
  • Google Chrome
Posted on January 4, 2021 by Mash

Backdoor account found in Zyxel firewall

Zyxel has released a patch, fixing a critical vulnerability, tracked as CVE-2020-29583, concerning a hardcoded undocumented secret account, that could [...]
  • News
  • Zyxel
Posted on January 2, 2021 by Mash

CISA releases Sparrow - a compromised apps' detection tool Azure and Microsoft 365 environments

The new tool named Sparrow released by the Cybersecurity and Infrastructure Security Agency (CISA) as an answer to the recent [...]
  • News
  • Azure
  •  
  • Microsoft 365
Posted on December 29, 2020 by Mash

New GitHub based malware uses Word files and Imgur images to decode a Cobalt Strike script

A new type of malware using Word files with macros to download a PowerShell script from GitHub, has been discovered [...]
  • News
  • CobaltStrike
Posted on December 29, 2020 by Mash

SolarWinds released updated advisory for SUPERNOVA malware

SolarWinds has suffered a cyberattack, which made attackers capable of modifying a legitimate SolarWinds Orion BusinessLayer DLL file to include [...]
  • News
  • SolarWinds
  •  
  • SUNBURST
  •  
  • SUPERNOVA
Posted on December 27, 2020 by Mash

Threat actors unsuccessfully attempted to read CrowdStrike emails

Cybersecurity company CrowdStrike was warned by Microsoft team that hackers tried to read the company's emails using a compromised Microsoft [...]
  • News
  • Azure
  •  
  • CrowdStrike
Posted on December 26, 2020 by Mash

How to enable NVIDIA's new Ultra Low Latency Mod for Windows 10

Ultra Low Latency mode allows frames to be submitted into the render queue before GPU needs them, which helps to [...]
  • guide-how-to
  • How-to
  • News
  • NVIDIA
Posted on December 25, 2020 by Mash

Israeli cybersecurity company Cellebrite claims to decrypt Signal messages

Signal is one of the most popular highly encrypted messaging apps, especially valued by people who want to protect their [...]
  • News
  • Cellebrite
  •  
  • Signal
Posted on December 24, 2020 by Mash

Old fixed Windows vulnerability is abused again

The vulnerability CVE-2020-0986 was exploited as a zero-day in May and was presumably fixed since then, however, the security researchers [...]
  • News
  • Microsoft
  •  
  • Windows
Posted on December 24, 2020 by Mash

SUPERNOVA backdoor found in SolarWinds cyberattack, likely from a second threat actor

SUPERNOVA is a webshell planted in the code of the Orion network and apps monitoring the platform, enabling adversaries to [...]
  • News
  • SolarWinds
  •  
  • SUPERNOVA
Posted on December 22, 2020 by Mash

Hackers use network of mobile device emulators to steal millions from online bank accounts

IBM Trusteer researchers have uncovered a massive fraud operation that leveraged a network of mobile device emulators to steal millions [...]
  • News
Posted on December 21, 2020 by Mash

Gitpaste-12 worm botnet is back with new tricks

Gitpaste-12 is a recently discovered worm botnet, that was known to host malicious payload on Pastebin and was spreading using [...]
  • News
  • Gitpaste-12
Posted on December 20, 2020 by Mash

Russian state-sponsored hacking group breached US think tank three time in a row

A recent attack via trojanized update for SolarWinds network was not the first successful attempt on compromising U.S. internal network [...]
  • News
  • Dark Halo
  •  
  • SolarWinds
Posted on December 19, 2020 by Mash

Top browser makers ban MitM HTTPS certificate

Google, Apple, Microsoft and Mozilla has agreed to ban MitM certificate, used by Kazakhstan government to spy on their citizens [...]
  • News
  • Apple
  •  
  • Google
  •  
  • Microsoft
  •  
  • Mozilla
Posted on December 19, 2020 by Mash

Magecart malware dropper leaks list of targeted stores

Threat actors used dropper to deploy RAT (remote access trojan) on a compromised store websites, that are used to regain [...]
  • News
  • Magecart
Posted on December 19, 2020 by Mash

Malicious Chrome and Edge extensions hit over 3,000,000 installs

Malware-laced extensions, found by Avast Threat Intelligence researchers and disguised as a helper add-ons for Instagram, Facebook and Vimeo have [...]
  • News
  • Edge
  •  
  • Google Chrome
Posted on December 17, 2020 by Mash

Microsoft, FireEye, and GoDaddy to collaborate to create kill switch for SolarWinds SUNBURST backdoor

Recent FireEye report has revealed that Russian-state sponsored hackers breached SolarWinds and added malicious code to Windows DLL file used [...]
  • News
  • SolarWinds
  •  
  • SUNBURST
Posted on December 17, 2020 by Mash

SystemBC malware used by ransomware gangs to automate payload delivery

SystemBC was first discovered in 2018 and was previously used in several campaigns in 2019 as a virtual private network, [...]
  • News
  • Egregor
  •  
  • Ryuk
  •  
  • SystemBC
Posted on December 17, 2020 by Mash

Attacker leverages SolarWinds supply chain with SUNNURST backdoor

FireEye has discovered a widespread campaign, tracked as UNC2452. The campaign started this Spring and is targeting organizations across the [...]
  • News
  • SolarWind
  •  
  • SUNBURST
Posted on December 15, 2020 by Mash

Molerats cyberespionage group abuses Google and Facebook services in phishing campaign

Molerats hacking group was noticed to use the fresh version of the SharpStage malware, relying on Dropbox, Google Drive, and [...]
  • News
  • DropBook
  •  
  • Molerats
  •  
  • SharpStage
Posted on December 15, 2020 by Mash

Google Chrome to block ads using a lot of system resources

Some of the modern ads are known to be intrusive and to use a lot of system resources, being able [...]
  • News
  • ads
  •  
  • Google
  •  
  • Google Chrome
Posted on December 15, 2020 by Mash

UK Subway marketing system hacked to send TrickBot phishing emails

Subway UK has stated that a hacked system used for marketing campaigns is responsible for the malware phishing emails sent [...]
  • News
  • TrickBot
Posted on December 14, 2020 by Mash

Chrome 88 update will prevent uBlock Origin and other adblockers from working

Chrome 88 will feature Manifest V3 support for the Declarative Net Request API, which brings a number of restrictions to [...]
  • News
  • ad
  •  
  • Google
Posted on December 13, 2020 by Mash

Facebook reveals the identity of APT32 hacking group

This Thursday Facebook revealed the true identity of APT32 group, as an answer to them using the platform to spread [...]
  • News
  • Facebook
Posted on December 12, 2020 by Mash

Qbot malware uses new stealthy autostart method

Qbot is a banking trojan used by threat actors to steal banking credentials and personal information. The new method that [...]
  • News
Posted on December 11, 2020 by Mash

PlayStation Now security vulnerabilities allow site run malicious code on Windows PCs

Microsoft issued guidance on mitigation of the DNS cache poisoning bug, exploiting which allows threat actors to use modified DNS [...]
  • News
  • PlayStation
Posted on December 10, 2020 by Mash

Russian state-sponsored threat actors exploit new VMware vulnerability to steal data

The National Security Agency (NSA) has stated a warning about Russian hackers exploiting recently patched VMware vulnerability. NSA didn't publicly [...]
  • News
  • VMware
Posted on December 8, 2020 by Mash

Microsoft introducing 'Windows Feature Experience Packs' to replace scheduled updates

According to Microsoft's recent blog post, Windows Feature Experience Packs will be used to quickly deliver improvements and bug fixes [...]
  • News
  • Microsoft
  •  
  • Windows 10
Posted on December 8, 2020 by Mash

MetaMask phishing steals crypto wallets with fake Google ads

MetaMask has a community of over a million users, that offers an Ethereum wallet via browser extension that lets distributed [...]
  • News
  • crypto
  •  
  • MetaMask
Posted on December 7, 2020 by Mash

Credit card stealing malware disguises itself as media share icons

Recently discovered new web skimming malware is capable to disguise itself as social media buttons to inject the payment card [...]
  • News
  • Credit Card
Posted on December 6, 2020 by Mash

CLOP ransomware claims to have stolen 2 million credit cards from E-Land Retail in a year

E-Land retail operates several retail clothing stores, such as New Core and NC Department Store. Last month E-Land Retail has [...]
  • News
  • CLOP
  •  
  • E-Land
Posted on December 4, 2020 by Mash

Hacker-for-hire group DeathStalker develops backdoor malware

DeathStalker group, previously known as Deceptikons, is a long-time active threat actor, known for using a large variety of malware [...]
  • News
  • PowerPepper
Posted on December 4, 2020 by Mash

The critical remote code execution (RCE) vulnerability is abused by DarkIRC botnet

DarkIRC botnet is actively exploiting the vulnerability tracked as CVE-2020-14882 to target a large number of exposed Oracle WebLogic servers. [...]
  • News
  • DarkIRC
  •  
  • Oracle
Posted on December 3, 2020 by Mash

Gootkit trojan and REvil ransomware are targeting Germany in the new campaign

Gootkit Trojan is Javascript-based malware, that gets remote access for threat actors alongside other malicious actions, such as password and [...]
  • News
  • Gootkit
  •  
  • malware
  •  
  • REvil
Posted on December 3, 2020 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2025 Greatis Software