exploits

Winsage
February 11, 2026
Microsoft's February 2026 Patch Tuesday addressed 59 vulnerabilities in Windows 11, with six confirmed as actively exploited. The most critical vulnerability is CVE-2026-21510, a Windows Shell security feature bypass with a CVSS rating of 8.8, allowing attackers to evade warnings by tricking users into opening malicious files. Another significant vulnerability, CVE-2026-21513, also rated at 8.8, affects MSHTML and allows remote attackers to bypass execution prompts through malicious code in HTML or shortcut files. CVE-2026-21514 impacts Microsoft Word and enables adversaries to disable OLE mitigations, posing risks through document-based attacks. Two local privilege escalation vulnerabilities are CVE-2026-21519 in Desktop Window Manager and CVE-2026-21533 in Windows Remote Desktop Services, with CVSS scores of 7.8. CVE-2026-21525 is a denial-of-service vulnerability in Remote Access Connection Manager. The update includes 53 additional vulnerabilities across various Microsoft products and services, with CVE-2026-21531 in Azure SDK rated at 9.8 and CVE-2026-20841 affecting Windows Notepad rated at 8.8. The cumulative update for Windows 11 (KB5077181) also includes enhancements and resolves WPA3 Wi-Fi connectivity issues. Microsoft reminded users of the June 2026 expiration of Secure Boot certificates, which requires timely updates to ensure secure booting. Users can install the updates via Windows Update.
AppWizard
January 31, 2026
A new speedrunning technique for the PC version of GTA: San Andreas allows players to complete the game in under an hour using a method called the Arbitrary Jump in Script (AJS) skip. This technique involves approximately 30 precise steps and was detailed by Reddit user Vitosi4ek. The AJS skip enables speedrunners to execute a JUMP instruction that leads directly to the game's conclusion. The discovery comes 21 years after the game's release, reflecting its lasting popularity and the innovative efforts of the speedrunning community.
Tech Optimizer
January 30, 2026
Bitdefender and McAfee are both established antivirus solutions that achieve similar lab test scores, often earning 18 points in assessments by AV-Test and AV-Comparatives. Bitdefender offers a more economical pricing structure, with its Antivirus Plus plan priced between .99 and .99 per year for three devices, while McAfee's plans start at .99 for one device. In real-world malware protection tests, Bitdefender achieved a 99.8% protection rate, compared to McAfee's 99.3%. McAfee includes firewall protection at the antivirus level, while Bitdefender reserves its firewall for higher-tier plans but offers better exploit protection. Bitdefender successfully thwarted 11 out of 12 ransomware attacks in controlled tests, while McAfee's ransomware protection is less reliable. Both offer limited VPN services, with Bitdefender providing 200MB per day and McAfee offering between 250MB and 500MB per month. McAfee completes scans more quickly but uses more CPU, while Bitdefender is more thorough. Bitdefender includes additional security features like anti-tracker and secure browser, whereas McAfee's features are more limited.
Winsage
January 28, 2026
Google has raised concerns about ongoing cyberattacks exploiting a critical vulnerability in WinRAR, identified as CVE-2025-8088. This vulnerability allows malicious actors to deploy malware and espionage tools on unpatched systems. Users are advised to update WinRAR to the latest version, regularly check for software updates, employ comprehensive security solutions, and stay informed about cybersecurity threats.
AppWizard
January 28, 2026
Valve is facing a legal battle over allegations of imposing excessive commissions on publishers using its Steam platform, with potential damages reaching £656 million. The lawsuit, initiated in June 2024, represents the interests of up to 14 million UK consumers who purchased games via Steam since 2018. Vicki Shotbolt leads the case, claiming Valve restricts publishers from offering lower prices on competing platforms and locks customers into its ecosystem. Valve's commission is reportedly as high as 30 percent. The London Competition Appeal Tribunal has allowed the case to proceed, despite Valve's objections. This is not the first scrutiny Valve has faced; a previous antitrust lawsuit from Wolfire Games was dismissed in late 2021 but was refiled and merged with another claim in 2022, gaining class action status by November 2024.
Tech Optimizer
January 27, 2026
The term “not a virus” is used by antivirus software to indicate that a file does not match known malware signatures but still triggers a detection. This means the file is not automatically blocked or confirmed as a threat; the alert highlights something unusual, leaving the decision to the user. Alerts typically arise when software exhibits behavior associated with increased risk, despite lacking clear evidence of malicious intent. Malware is specifically designed to inflict harm, while files labeled “not a virus” may perform actions that raise security concerns but are not classified as harmful. Antivirus programs identify threats through signature detection and heuristic behavior-based detection. Legitimate programs, such as system utilities, download managers, and game cheats, can inadvertently trigger “not a virus” alerts. Common types of detections include adware, riskware, and potentially unwanted applications (PUA). The primary security risk of “not a virus” files is exposure rather than direct attacks, and privacy concerns often arise from data collection by these programs. If an antivirus detects “not a virus,” users should identify the file, review recent changes, compare detections, and decide whether to keep or remove it. To reduce unwanted alerts, users should download from official sources, use custom installation options, and remove unused software.
Tech Optimizer
January 22, 2026
A large-scale campaign is exploiting the truesight.sys Windows security driver from Adlice Software’s RogueKiller antivirus to disable endpoint detection and response (EDR) and antivirus solutions, facilitating the deployment of ransomware and remote access malware. This attack utilizes over 2,500 validly signed variants of the driver, allowing attackers to manipulate legacy driver signing rules to load pre-2015 signed drivers on Windows 11 machines. The vulnerable TrueSight driver exposes an IOCTL command that enables attackers to terminate security processes, providing them with kernel-level access to bypass user-mode protections. The infection chain typically starts with phishing emails or compromised sites, leading to the installation of a downloader that retrieves additional malicious components. The malware establishes persistence and deploys an EDR killer module targeting nearly 200 security products. Once defenses are disabled, the final payload, often a remote access trojan or ransomware, executes with minimal visibility, completing the attack in as little as 30 minutes.
Search