The Google Play Store is testing a redesigned Games tab that includes genre-specific shortcut bubbles like Simulation, Puzzle, and Life to streamline the user experience and make it easier for gamers to navigate and explore games.
Team17 announced on April 16, 2026, that playtest signups for Hell Let Loose: Vietnam are now open for PC users. The game features six expansive maps, 50 vs 50 battles, and emphasizes teamwork and strategy. Players will have access to historically accurate weapons, vehicles, and tactical options, including US aerial units with helicopters, NVA forces with tunnel networks, and patrol boats for river navigation. A new trailer showcasing intense combat scenes was released during the Galaxies Showcase. Team17 Digital, founded in 1990, is a prominent developer and video games label, while Expression Games, established in 2022, is leading the development of the Hell Let Loose franchise.
Google has released Android 17 beta 4, the final beta version before the anticipated mid-2026 launch. This update, with build number CP21.260330.008, is available for Pixel devices from Pixel 6 to Pixel 10 and focuses on stability rather than new features. A key addition is 'App memory limits' to manage RAM usage and improve performance, particularly for foldable phones and tablets. Developers are required to optimize apps for Android 17, ensuring compatibility with new features. The beta update is rolling out via the Android Beta Program, with stable Android 17 expected later this year. Users can sideload the update or manually flash the factory image if they haven't received it.
Cloudflare has deepened its partnership with PlanetScale to enhance the developer experience by providing Cloudflare Workers with access to Postgres and MySQL databases. Users will be able to create PlanetScale databases directly from the Cloudflare dashboard and API, with billing handled through their Cloudflare accounts. Cloudflare credits can be applied towards PlanetScale databases. The integration allows developers to link their PlanetScale accounts and create Postgres databases from the Cloudflare dashboard. Starting next month, new PlanetScale databases will be billed directly to Cloudflare accounts. The integration uses Hyperdrive for database connectivity, managing connection pools and query caching. PlanetScale offers performance and reliability, allowing developers to choose between Postgres and Vitess MySQL. Cloudflare users can deploy PlanetScale databases directly from Cloudflare, with features like query insights and usage breakdowns included. A single node on PlanetScale Postgres starts at a specified monthly rate. Developers can configure Workers to minimize latency by placing them near the primary database, with future plans to automate this process. Currently, billing for existing PlanetScale databases is processed through PlanetScale, but new databases will be billed through Cloudflare starting next month. Further enhancements and API integration are planned, with community feedback encouraged.
A malware campaign is utilizing counterfeit Proton VPN websites and other deceptive tactics to distribute a Windows infostealer known as NWHStealer. This malware extracts sensitive information, including browser credentials and cryptocurrency wallet details, and operates stealthily by injecting itself into legitimate processes. Two primary infection vectors have been identified: malicious ZIP archives on a free web hosting platform and trojanized installers from fake Proton VPN sites. The malware employs DLL hijacking and can exfiltrate data to a command-and-control server while ensuring persistence through scheduled tasks and disguising payloads as legitimate system processes. It also exploits the Windows cmstp.exe utility to bypass User Account Control. Users are advised to avoid downloading software from unofficial sources and to verify file signatures and publisher information.
A shooting incident at a school in Zakarpattia has been classified as a terrorist act by authorities. A 15-year-old student discharged several rounds from a modified blank gun, injuring a classmate, who received prompt medical attention and is not in critical condition. Preliminary investigations indicate that the teenager acted under duress from unidentified individuals who threatened harm to his relatives if he did not comply with their demands. The shooter fled but was apprehended by patrol police shortly after. The Uzhhorod District Prosecutor's Office is overseeing the pre-trial investigation, which falls under Part 1 of Article 258 of the Criminal Code of Ukraine.
Aspiring developers can now use advanced AI tools like ChatGPT, Claude, and Gemini to generate code for Android applications with minimal coding expertise. However, AI-generated apps may rely on outdated information, leading to inefficiencies and bugs. In response, Google is providing AI coding agents with access to current Android developer resources and introducing tools like a new Android Command Line Interface (CLI) and task-specific skills to improve app development. This initiative aims to ensure that apps follow the latest guidelines and practices. Additionally, Google is streamlining the process for scaling applications across various Android devices, which will benefit end-users by delivering better-optimized AI-generated applications.
Google has updated its Google Play policies to enhance user privacy and protect businesses from fraud. Starting in October, developers will have access to Play policy insights in Android Studio to help comply with new features. On October 27, the Play Console will implement pre-review checks for contact and location permissions. The Android Contact Picker will be the standard for accessing contacts, requiring apps to use it or privacy-focused alternatives. Developers must update their apps to use the picker and submit a Play Developer Declaration for ongoing contact access. A new location button will be introduced for precise location requests, and apps must use it for one-time access. Developers should review their location data requests and include the onlyForLocationButton flag if targeting Android 17 and above. The Play Console will also introduce an official account transfer feature for ownership changes, effective May 27, with a mandatory 7-day security cool-down period for transfers. Unofficial transfers are prohibited.
Microsoft is investigating an issue with the installation of the KB5082063 security update on Windows Server 2025 systems, where users are encountering the 0x800F0983 error code during the deployment of April 2026 cumulative updates. A service alert indicated that a limited number of servers may experience installation failures with this error. Additionally, some Windows Server 2025 devices may unexpectedly boot into BitLocker recovery mode after the update, requiring a BitLocker key, although this is unlikely to affect home users. Microsoft has also resolved a long-standing bug that caused Windows Server 2019 and 2022 systems to upgrade to Windows Server 2025 unexpectedly. Furthermore, Microsoft has released several emergency updates this year to address various security vulnerabilities, including issues with the Routing and Remote Access Service, Bluetooth device visibility, Microsoft account sign-ins, and installation challenges related to the March 2026 non-security preview update.
Researchers at Cyble Research and Intelligence Labs (CRIL) have discovered an Android malware framework called MiningDropper, which is being used in various campaigns to distribute malicious payloads such as cryptocurrency miners, infostealers, Remote Access Trojans (RATs), and banking malware. Over 1,500 MiningDropper samples were detected in one month, with many showing minimal antivirus detection.
MiningDropper operates as a multi-stage delivery framework that employs techniques like XOR-based obfuscation and AES encryption to evade detection. A recent variant uses a trojanized version of the Lumolight application as the initial infection vector, often spread through phishing links and fraudulent websites. The malware executes a series of stages, starting with decrypting an embedded asset and loading additional payloads, including a counterfeit Google Play update interface to deceive users.
Two main campaign clusters have been identified: an infostealer campaign targeting Indian users by impersonating trusted entities, and a global campaign distributing the BTMOB RAT, which enables credential theft and device takeover. The final payload capabilities include extracting sensitive data, enabling full device compromise, facilitating financial fraud, and unauthorized cryptocurrency mining. MiningDropper's modularity allows it to adapt and scale across various campaigns while maintaining low detection rates.