espionage

AppWizard
February 23, 2026
A demo for Zero Parades: For Dead Spies has been released, available exclusively on PC until March 16, 2026, as part of the Steam Next Fest. Players assume the role of Hershel Wilk, a spy whose reputation has been tarnished, and experience the game's isometric art style and dialogue system. The demo features modified or omitted elements to preserve surprises for the full release. The complete game is set to launch on PlayStation 5 and PC later this year.
AppWizard
February 23, 2026
The author reflects on their gaming journey, noting a significant shift after experiencing Disco Elysium. They find that Citizen Sleeper is the closest game to evoke similar engagement, despite its different gameplay. The upcoming February 2026 Steam Next Fest will showcase two games of interest: Zero Parades, a successor to Disco Elysium, and Esoteric Ebb, which combines Disco Elysium-like mechanics with a Dungeons and Dragons aesthetic. Zero Parades promises a narrative of espionage, while Esoteric Ebb features a reimagined Thought Cabinet using D&D attributes. The author expresses excitement for both titles and encourages fans of Disco Elysium to explore these upcoming games.
Tech Optimizer
February 16, 2026
A cyber-espionage campaign is utilizing the XWorm Remote Access Trojan (RAT) to infiltrate systems via phishing emails and a Microsoft Office vulnerability (CVE-2018-0802). XWorm, first detected in 2022, allows attackers remote control over infected computers for surveillance and data theft. The campaign uses business-oriented phishing emails with malicious Excel attachments that exploit the vulnerability to execute a fileless attack. The malware connects to a command-and-control server, encrypting communications and transmitting system details. XWorm features a plugin architecture with over 50 modules for various malicious activities, including credential theft and DDoS attacks. Security experts highlight the ongoing risk of legacy software vulnerabilities and recommend patching outdated components.
AppWizard
February 12, 2026
A demo for Spy Drops Gaiden has launched on PC via Steam during the Steam Next Fest. The game, developed by Dadako and published by Rainy Frog, is a 2D stealth action title set in the Spy Drops universe. Players take on the role of special agent Ripley, tasked with infiltrating enemy bases on an island off the coast of Japan. The gameplay emphasizes stealth, with missions involving rescuing prisoners, gathering intelligence, and executing drone strikes. The demo features eight missions with rank-based performance goals, weather effects, and mission-specific gadgets. The game has a Game Boy-inspired aesthetic, with monochrome visuals and chiptune soundtracks.
AppWizard
January 28, 2026
Developer Hoothanes, in collaboration with publisher 4Divinity, is creating a single-player first-person shooter titled The Defiant, set during China's War of Resistance against Japan in World War II. The game utilizes Unreal Engine 5 and features diverse gameplay mechanics, including stealth infiltration, close-quarters firefights, sniping, urban espionage, code-breaking operations, vehicular combat, and large-scale assaults. The developers prioritize historical accuracy, treating weapons as historical artifacts and exploring settings such as occupied villages, frozen forests, fortified supply routes, and enemy-controlled urban zones. The game is available for wishlisting on Steam.
Winsage
January 28, 2026
Google has raised concerns about ongoing cyberattacks exploiting a critical vulnerability in WinRAR, identified as CVE-2025-8088. This vulnerability allows malicious actors to deploy malware and espionage tools on unpatched systems. Users are advised to update WinRAR to the latest version, regularly check for software updates, employ comprehensive security solutions, and stay informed about cybersecurity threats.
AppWizard
January 27, 2026
Senator James Lankford has requested the White House to consider banning WeChat from U.S. app stores due to concerns about its use by Chinese criminal organizations for activities like drug trafficking and money laundering. WeChat, owned by Tencent Holdings Ltd., has been identified as a key tool for coordinating these criminal networks. U.S. law enforcement currently lacks access to WeChat's encrypted communications, complicating investigations. This request follows a previous attempt by the Trump administration to ban WeChat, which was deemed unconstitutional. The Biden administration has since conducted a national security assessment and enacted the Protecting Americans from Foreign Adversary Controlled Applications Act, which allows the president to blacklist Chinese applications like WeChat. The Pentagon has already blacklisted Tencent for its ties to Chinese military companies. Recent criminal activities linked to WeChat include a case where a Chinese national was charged with murder on an illegal marijuana farm. Lankford urges the designation of WeChat as a "covered company" to enhance U.S. national security and assist law enforcement against Chinese criminal networks.
Tech Optimizer
January 19, 2026
PDFSIDER is a sophisticated backdoor malware that bypasses modern endpoint detection and response systems. It is distributed through targeted spear-phishing campaigns that exploit vulnerabilities in legitimate PDF software. The malware is delivered via spear-phishing emails containing ZIP archives with a trojanized executable disguised as the PDF24 App. When executed, it uses DLL side-loading to load a malicious DLL (cryptbase.dll) alongside the legitimate PDF24.exe, allowing attackers to execute code without detection. PDFSIDER establishes encrypted command-and-control channels using the Botan 3.0.0 cryptographic library with AES-256 in GCM mode and operates mainly in memory to minimize detectable artifacts. It collects system information and executes commands through hidden cmd.exe processes. The malware employs advanced techniques to evade detection in sandbox and virtual machine environments, including checks for available RAM and debugger presence. Indicators of compromise include the malicious file cryptbase.dll and various clean files associated with the legitimate PDF24 application. Organizations are advised to enforce strict controls on executable files, provide user awareness training, and monitor DNS queries and encrypted traffic to detect PDFSIDER communications. The malware's behavior aligns with tactics used in state-sponsored espionage rather than financially motivated cybercrime.
Search