actor

AppWizard
May 24, 2026
Alasdair Beckett-King began his gaming journey with a second-hand ZX Spectrum and the game Dizzy. He has transitioned to PC gaming and explored titles like The Secret of Monkey Island and Full Throttle. Beckett-King is a YouTube sketch creator, actor, writer, podcaster, and adventure game designer, currently on a UK comedy tour called King of Crumbs. He has a nostalgic preference for classic games, recently revisiting the remaster of Broken Sword, and has completed Myst and Riven. He enjoys modern indie titles such as Obra Dinn and The Case of the Golden Idol. His highest playtime on Steam is 266 hours for The Witcher 3: Wild Hunt, where he prefers normal difficulty for narrative enjoyment but found hard mode enhanced his engagement. He is hesitant to uninstall Silksong due to his mixed feelings about finishing it. Beckett-King relies on Blender 3D for his creative video production but admits to having a chaotic desktop filled with disorganized icons and folders.
Winsage
May 21, 2026
In April 2026, two zero-day vulnerabilities, RedSun and UnDefend, were discovered in Microsoft Defender, affecting Windows 10, Windows 11, and Windows Server platforms. These vulnerabilities allow attackers to escalate privileges to SYSTEM and bypass Defender’s protections. RedSun exploits a flaw in Defender's remediation process, enabling low-privileged users to overwrite critical system files. UnDefend allows attackers to disrupt Defender’s updates, keeping it outdated and ineffective. Both vulnerabilities are actively being exploited, with attackers leveraging them to gain persistent access and deploy ransomware. The primary targets are organizations using Windows systems with Defender enabled, particularly in sectors like finance, healthcare, and government. Mitigation strategies include applying updates for related vulnerabilities, monitoring for suspicious activities, and implementing additional security measures.
Winsage
May 20, 2026
Bitdefender's research highlights the use of Microsoft's MSHTA utility in malware attacks, noting its default activation in Windows systems. Cybercriminals exploit MSHTA to execute malicious scripts under the guise of legitimate processes, linking it to various malware families like LummaStealer and PurpleFox. The study reports a rise in MSHTA-related detections, indicating a shift towards "living-off-the-land" tactics that utilize legitimate tools to evade security alerts. Social engineering is identified as a common entry point for attacks, employing deceptive methods such as fake software downloads and phishing links. MSHTA can retrieve and execute additional payloads through multi-stage chains, complicating detection efforts. The attacks target sensitive information, including credentials and financial data, and the continued presence of MSHTA poses risks as it allows threat actors to conceal malicious actions. To mitigate these threats, organizations are advised to restrict or disable legacy scripting tools and exercise caution with untrusted downloads. The report emphasizes the challenge of detecting unusual behaviors associated with legitimate utilities in the context of cyber threats.
AppWizard
May 20, 2026
Cybersecurity researchers have identified an ad fraud and malvertising operation called Trapdoor, targeting Android users with 455 malicious applications and 183 command-and-control domains. Users often download these disguised apps, which initiate malvertising campaigns and lead to further downloads of malicious applications. At its peak, Trapdoor generated 659 million bid requests daily, with over 24 million downloads of the associated apps, primarily from the United States. The operation exploits install attribution tools to activate malicious activities only for users acquired through fraudulent ad campaigns, while suppressing such behavior for organic downloads. Trapdoor employs advanced evasion techniques, including obfuscation and impersonation of legitimate software, to avoid detection. Google has removed the identified malicious apps from the Play Store in response to the threat.
AppWizard
May 15, 2026
Filming for A Minecraft Movie 2 is currently underway, with production confirmed by actor Kirsten Dunst, who will portray Alex. The sequel follows the original film's success, which grossed nearly a billion dollars at the box office. Directed by Jard Hess, the film features a cast that includes Jack Black, Jason Momoa, Danielle Brooks, Matt Berry, and Jennifer Coolidge. A Minecraft Movie 2 is scheduled for release on July 23, 2027.
AppWizard
May 15, 2026
Filming for A Minecraft Movie 2 has begun, featuring a cast that includes Jack Black as Steve, Kirsten Dunst as Alex, Jason Momoa as Garett Garrison, Danielle Brooks as Dawn, Matt Berry as Nitwit, and Jennifer Coolidge as Vice Principal Marlene. Most of the original cast members are returning, and Dunst's character, Alex, is set to deepen the narrative as Steve's romantic interest. The film will explore the Overworld with new dynamics introduced by the cast.
AppWizard
May 8, 2026
On April 1, indie game studio New Blood launched a tip line for fans to share their thoughts and ideas, which remains active a month later. The studio has received over 1,000 voicemails, including suggestions and inquiries. Highlights include the latest layer of Ultrakill called "Fraud," featuring innovative 3D rendering techniques, and the announcement of Scavengers, a roguelike DLC for Blood West, set to release on June 3.
BetaBeacon
May 5, 2026
APT37, also known as ScarCruft and Ricochet Chollima, has developed an Android version of the backdoor BirdCall, which serves as spyware in addition to a backdoor. The malware was delivered through a Chinese website that hosts games for Android, iOS, and Windows, targeting only Android and Windows systems. The Android variant of BirdCall has capabilities such as extracting IP geolocation information, collecting contact lists, call logs, SMS data, device information, taking screenshots, recording audio, and exfiltrating files. Users are advised to download software only from official marketplaces and trusted publisher sites to protect against malware infections.
AppWizard
May 5, 2026
A North Korean hacking group has targeted a digital gaming platform popular among the Korean ethnic enclave in China, using a sophisticated strategy to infiltrate Android applications. Researchers from Eset discovered that an app on the platform contained a backdoor known as BirdCall, linked to North Korea. The official website for the gaming platform hosted the same suspicious APK file. A second Android file associated with another game on the same site was also found to contain the BirdCall backdoor. This supply-chain attack was attributed to the threat actor ScarCruft (APT37), active in Asia and extending into Europe and the Middle East since late 2024. The hackers likely compromised the web server to recompile original APKs with the backdoor, which can collect sensitive information such as contacts, SMS messages, call logs, documents, media files, and private keys, and can take screenshots and record audio. The malware disguises its command and control traffic among regular internet traffic, primarily using Zoho WorkDrive for operations.
Search