block

AppWizard
February 10, 2026
Google has issued a warning to Android users about a dangerous malware called Arsink Malware, which is a Remote Access Trojan (RAT) capable of stealing personal information and taking control of infected devices. It spreads through apps that appear legitimate, often masquerading as "Mod" or "Premium" versions of popular applications. Arsink malware typically infiltrates devices via Telegram channels, Discord posts, third-party websites, and suspicious download links. Google has confirmed that no versions of Arsink are available on the Play Store and that devices with Google Play Protect enabled are automatically safeguarded against such threats. Google is also working with researchers to dismantle the infrastructure associated with this malware. To stay safe, users are advised to download apps only from the official Google Play Store, avoid 'Mod' or 'Premium' versions of apps, refrain from clicking on suspicious links, carefully check app permissions, keep Google Play Protect enabled, and regularly update their devices for security patches.
AppWizard
February 10, 2026
Russia's internet regulatory body, Roskomnadzor, is throttling Telegram for alleged national law violations, part of a broader strategy to promote a controlled domestic online service. The Russian government threatens internet platforms with slowdowns or bans for non-compliance with laws that require Russian user data to be stored domestically and prevent use for "criminal and terrorist purposes." Critics view these regulations as a means for increased state control and surveillance. Roskomnadzor plans to introduce phased restrictions on Telegram, which is widely used in Russia. Moscow is promoting a state-backed competitor, Max, that offers additional services. Users experienced slow traffic on Telegram following the announcement. Pavel Durov, Telegram's founder, has faced tension with Russian authorities and legal troubles in France related to allegations against Telegram, although travel restrictions were lifted in July 2025.
AppWizard
February 1, 2026
Trust Me, I Nailed It is a turn-based strategy game that allows players to create video edits transforming a warrior into a legendary monster slayer. The game features a fictional software called World Movie Weaver, reminiscent of Windows Movie Maker, where players manage enemy attack patterns on a grid-based battlefield. Players can orchestrate movements, execute attacks, and block damage using clips, with modifiers allowing for teleportation and invulnerability. The narrative unfolds through emails and posts on the Mana Scroll Network, enhancing player engagement. The game will be available for free on February 6th.
AppWizard
January 31, 2026
Google has dismantled the IPIDEA residential proxy network, which had exploited millions of devices for cybercrime. This operation resulted in the liberation of approximately nine million Android devices and the removal of hundreds of compromised applications. IPIDEA's infrastructure was integrated into various software development kits (SDKs), allowing it to covertly enlist devices into its proxy pool. Google updated its Play Protect system to identify and eliminate affected applications and collaborated with partners to disrupt the network's underlying systems. The efforts led to a significant decrease in hijacked devices available for exploitation.
Winsage
January 30, 2026
Microsoft will disable the NTLM authentication protocol by default in the next major Windows Server release and associated Windows client versions. NTLM, introduced in 1993, has been vulnerable to various cyberattacks, including NTLM relay and pass-the-hash attacks. The transition plan includes three phases: enhanced auditing tools in Windows 11 24H2 and Windows Server 2025, new features like IAKerb and a Local Key Distribution Center in late 2026, and eventually disabling network NTLM by default in future releases. NTLM will remain in the operating system but will not be used automatically. Microsoft deprecated NTLM authentication in July 2024 and has encouraged developers to transition to Kerberos or Negotiation authentication.
AppWizard
January 30, 2026
The Indian government has taken action against the Wingo app, a cyber fraud network that sent fraudulent SMS messages from users' devices without consent. The app's digital infrastructure has been blocked, and four associated Telegram channels with 153,000 users have been shut down. Over 53 related videos have been removed from YouTube. The Wingo app lured users with promises of quick financial gains, encouraging them to deposit funds for minor tasks or investments, but then either shut down or blocked accounts after receiving money. Payments were made through UPI or personal wallets, complicating traceability. Users were asked for access to personal data and provided with fake customer care numbers. Android users are advised to avoid apps promising guaranteed profits, verify app legitimacy, and refrain from granting unnecessary permissions. The government recommends uninstalling suspicious apps and reporting them, as well as contacting the cybercrime helpline at 1930 for assistance.
AppWizard
January 30, 2026
Mörk Borg Heresy Supreme released a demo on January 23, featuring a dark Gothic aesthetic and punishing gameplay. The game retains the essence of the original tabletop RPG while transforming it into an arcade-style hack-and-slash adventure. Character creation includes randomly generated heroes, with an option to re-roll for a better build. The tutorial introduces mechanics gradually, but can feel incomplete. The map is accessed via the M key, which is crucial for navigation, and the control layout is considered unintuitive. Quick reflexes are essential due to the game's high difficulty, with players facing immediate character deaths. The game displays a "FAILURE" message upon death, indicating survival time. The full release is expected in Q1 2026, and the visuals and soundtrack pay homage to the RPG's heavy metal roots.
Tech Optimizer
January 29, 2026
A supply chain breach has affected MicroWorld Technologies' eScan antivirus product, allowing malicious actors to use the vendor's update infrastructure to spread malware. Discovered on January 20, 2026, by Morphisec, the attack involved a trojanized update package that deployed multi-stage malware on enterprise and consumer endpoints globally. The initial compromise occurred through a malicious update replacing the legitimate Reload.exe binary, which was digitally signed with a valid eScan certificate. This led to the execution of a downloader (CONSCTLX.exe) and further malware stages that evaded defenses and disabled security features. The malware obstructs automatic updates by altering system configurations, including the hosts file and registry keys. Indicators of compromise include specific file names and SHA-256 hashes for the trojanized update and downloader. Network administrators are advised to block traffic to identified command and control domains and IPs. Affected organizations should verify their systems for signs of compromise and contact MicroWorld Technologies for a manual patch.
Search