Skip to content
Wildcat Cyber Patrol
Free Download

Category: News

Critical Zero-Day Flaws in PTZ Cameras Exploited by Hackers

Hackers are exploiting two zero-day vulnerabilities, CVE-2024-8956 and CVE-2024-8957, in PTZOptics pan-tilt-zoom cameras used widely in industries like healthcare, government, [...]
  • News
Posted on November 2, 2024 by Mash

North Korean Hackers Tied to Play Ransomware Operations to Evade Sanctions

North Korea's state-sponsored hacking group, Andariel, has been linked to the Play ransomware, potentially acting as an affiliate or initial [...]
  • News
Posted on November 1, 2024 by Mash

Zero-Day Bug in Windows Themes Enables NTLM Credential Theft

A zero-day vulnerability in Windows Themes enables attackers to steal NTLM credentials, exposing users to credential theft risks. Acros Security’s [...]
  • News
Posted on November 1, 2024 by Mash

Russian Espionage Campaign Leverages RDP Files in Large-Scale Phishing Attack

A massive phishing campaign by Russia's foreign intelligence agency, SVR, is in its second week, targeting sectors like government, NGOs, [...]
  • News
Posted on November 1, 2024 by Mash

Researcher Unveils Tool to Circumvent Chrome’s New Cookie Protection

A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
  • News
Posted on October 30, 2024 by Mash

Fog and Akira Ransomware Target SonicWall VPNs to Infiltrate Corporate Networks

The Fog and Akira ransomware groups are actively exploiting a critical vulnerability (CVE-2024-40766) in SonicWall VPNs to gain entry into [...]
  • News
Posted on October 29, 2024 by Mash

New Windows Downgrade Flaw Lets Attackers Bypass Security and Install Rootkits

A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
  • News
Posted on October 28, 2024 by Mash

Amazon Seizes Malicious Domains Used by APT29 in Global Credential-Theft Campaign

Amazon has taken control of domains used by APT29, a Russian state-backed hacking group, to launch targeted phishing attacks on [...]
  • News
Posted on October 27, 2024 by Mash

Apple Launches Virtual Research Environment for Private Cloud Compute Security Testing

Apple has introduced a Virtual Research Environment (VRE) to allow public access to its Private Cloud Compute (PCC) for security [...]
  • News
Posted on October 26, 2024 by Mash

New Qilin.B Ransomware Strain: Enhanced Encryption and Evasion Tactics

The latest Qilin ransomware variant, known as Qilin.B, has emerged, utilizing Rust-based code for stronger encryption and improved evasion from [...]
  • News
Posted on October 26, 2024 by Mash

Cryptomining Malware Targets Docker Remote API Servers Again

Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
  • News
Posted on October 24, 2024 by Mash

Google Introduces Curated Chrome Web Stores for Businesses

Google will soon allow organizations to create their own curated "Enterprise Web Store" for Chrome and ChromeOS extensions, focusing on [...]
  • News
Posted on October 24, 2024 by Mash

North Korean Lazarus Group Exploits Chrome Zero-Day with Fake DeFi Game

The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
  • News
Posted on October 24, 2024 by Mash

Google Chrome to Phase Out Popular Ad Blockers Like uBlock Origin Amid Manifest V2 Deprecation

Google's Chrome Web Store is warning users that uBlock Origin and other extensions using the Manifest V2 specification may soon [...]
  • News
Posted on October 15, 2024 by Mash

Ivanti Addressed Actively Exploited CSA Zero-day Vulnerabilities

Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
  • News
Posted on October 10, 2024 by Mash

Hackers Are Doing 'Pig Butchering' Scams Using Fake Trading Apps

Fake trading apps on Google Play and Apple's App Store have lured victims into "pig butchering" scams with global reach. [...]
  • News
Posted on October 6, 2024 by Mash

Vulnerabilities In Kia's Dealer Portal Can Be Abused To Steal Cars

Researchers found flaws in Kia's dealer portal, allowing hackers to locate and steal cars made after 2013 using only the [...]
  • News
Posted on September 29, 2024 by Mash

Chrome's App-Bound Encryption Feature Bypased By Infostealer Malware

Infostealer malware developers have updated their tools to claim they can bypass Google Chrome's App-Bound Encryption, which protects sensitive data [...]
  • News
Posted on September 26, 2024 by Mash

"Marko Polo" Hacking Group Targets Various Users In Enormous Data Stealing Operation

A sprawling infostealer malware operation, led by the cybercriminal group "Marko Polo," has been uncovered. Thirty campaigns have targeted diverse [...]
  • News
Posted on September 24, 2024 by Mash

Apple's New macOS 'Sequoia' Causes Network Connection Problems When Running VPN or EDR Software

Users of macOS 15 'Sequoia' are experiencing network connection problems linked to certain endpoint detection and response (EDR) and VPN [...]
  • News
Posted on September 22, 2024 by Mash

Recently Fixed Windows Vulnerability Was Previously Exploited By Hackers To Install Info Stealers

The recently patched "Windows MSHTML spoofing vulnerability" (CVE-2024-43461) has been reclassified as previously exploited by the Void Banshee APT group. [...]
  • News
Posted on September 17, 2024 by Mash

TDSSKiller Tool Used By Hackers To Disable EDR Software

The RansomHub ransomware group has utilized TDSSKiller, a legitimate tool developed by Kaspersky, to deactivate endpoint detection and response (EDR) [...]
  • News
Posted on September 13, 2024 by Mash

New Quad7 Botnet Opeartion Targeting VPN Routers and Media Servers

The Quad7 botnet expands its targets to include Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers, alongside previously [...]
  • News
Posted on September 11, 2024 by Mash

Docker-OSX Open-Source Project Removed from Docker Hub due to DMCA from Apple

The Docker-OSX project, an open-source initiative by Sick.Codes, enabling macOS virtualization on non-Apple hardware, was recently removed from Docker Hub [...]
  • News
Posted on September 3, 2024 by Mash

Corona Mirai Botnet Exploiting RCE Zero-Day in AVTECH IP Cameras To Spread

The Corona Mirai-based malware botnet exploits a 5-year-old zero-day in discontinued AVTECH IP cameras (CVE-2024-7029). This high-severity issue (CVSS v4 [...]
  • News
Posted on August 31, 2024 by Mash

Chinese Hacking Group Volt Typhoon Attacks ISPs, MSPs by Exploiting Versa Director Vulnerability

The Chinese state-backed hacking group Volt Typhoon exploited a zero-day flaw (CVE-2024-39717) in Versa Director, a platform used by ISPs [...]
  • News
Posted on August 29, 2024 by Mash

Recently Discovered Linux Malware 'sedexp' Has Been Active For 2 Years

A Linux malware called 'sedexp' has remained undetected since 2022 by employing a stealthy persistence technique not currently listed in [...]
  • News
Posted on August 26, 2024 by Mash

Attackers Using AppDomain Manager Injection Technique In Recent Cyberattacks

Since July 2024, a series of attacks using AppDomain Manager Injection, a less common technique, have targeted Microsoft .NET applications [...]
  • News
Posted on August 25, 2024 by Mash

SolarWinds Addresses Critical Web Help Desk Vulnerability

SolarWinds released a critical hotfix for Web Help Desk (WHD) to fix a vulnerability (CVE-2024-28987) allowing attackers to exploit hardcoded [...]
  • News
Posted on August 24, 2024 by Mash

Recently Addressed PHP RCE Vulnerability Exploited By Unknown Hackers

Attackers deployed the Msupedge backdoor on a university's Windows systems in Taiwan by exploiting a recently patched PHP vulnerability (CVE-2024-4577), [...]
  • News
Posted on August 22, 2024 by Mash

Recent Critical SolarWinds RCE Vulnerability Actively Abused, CISA Warns

CISA issued a warning about active exploitation of a critical vulnerability in SolarWinds' Web Help Desk (WHD) software, used by [...]
  • News
Posted on August 18, 2024 by Mash

Microsoft Warns Users Of Critical TCP/IP Vulnerability Affecting IPv6 Systems

Microsoft issued a critical warning on Tuesday urging users to patch a TCP/IP vulnerability affecting all default IPv6-enabled Windows systems. [...]
  • News
Posted on August 16, 2024 by Mash

Chinese Hacking Groups Are Targeting Russian IT Companies In Recent Cyberattacks

Since late July 2024, a series of precise cyberattacks has targeted numerous systems within Russian government agencies and IT firms. [...]
  • News
Posted on August 13, 2024 by Mash

New Malware Campaign Installs Malicious Chrome and Edge Extensions

A persistent and extensive malware operation has been forcibly installing malicious extensions for Google Chrome and Microsoft Edge browsers across [...]
  • News
Posted on August 12, 2024 by Mash

Self-Spreading Worm CMoon Steals Data from Russian Users and Companies

Since early July 2024, a newly identified self-spreading worm named 'CMoon' has been circulating in Russia through a compromised website [...]
  • News
Posted on August 9, 2024 by Mash

Samsung's New Bounty Program Offers Big Payouts for RCE Vulnerabilities

Samsung has introduced a new bug bounty program for its mobile devices, offering rewards up to $1,000,000 for reports demonstrating [...]
  • News
Posted on August 8, 2024 by Mash

Hackers Abusing Windows Smart App Control and SmartScreen Vulnerability Since 2018

A design flaw in Windows Smart App Control and SmartScreen allows attackers to launch programs without triggering security warnings, a [...]
  • News
Posted on August 6, 2024 by Mash

Hunters International Hacking Group Uses SharpRhino Malware in Cyberattacks Targeting IT Industry

Hunters International, using the SharpRhino C# RAT, targets IT workers to breach corporate networks by initiating infections, elevating privileges, executing [...]
  • News
Posted on August 6, 2024 by Mash

StormBamboo Hacking Group Hacked an ISP to Inject Malware into Software Updates

The Chinese hacking group StormBamboo has compromised an ISP to inject malware into automatic software updates. Also known as Evasive [...]
  • News
Posted on August 5, 2024 by Mash

Unknown Charges from Shopify-charge.com Reported Worldwide

People worldwide are reporting mysterious $1 or $0 charges from Shopify-charge.com on their credit card bills, even without making any [...]
  • News
Posted on August 2, 2024 by Mash

Posts navigation

Older posts
Newer posts
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
For full details read our   Cookie Policy

Categories

  • Apps
  • Chrome
  • Firefox
  • guide-how-to
  • Guides
  • How to Remove
  • How-to
  • Lessons
  • Microsoft Edge
  • News
  • Security
  • Security Tools
  • Tracing Tools
  • UnHackMe
  • Virus Tricks
  • Windows
  • Windows Defender
  • Windows Updates

© 2026 Greatis Software