exploits

AppWizard
May 22, 2026
An experiment by Professor Marcus Carter's team found that children quickly converted gift cards into Robux on Roblox, raising concerns about the platform's monetization strategies, which include deceptive practices in 14 of the top 15 games. Tactics like "near miss" visuals and countdown timers encourage spending, while many children reported being scammed through item swaps and gem-doubling schemes. Complaints to the Federal Trade Commission from organizations like Fairplay and the National Centre on Sexual Exploitation highlight how Roblox's design exploits children's developmental vulnerabilities, particularly impulse control. One case involved a 10-year-old girl who spent over ,000 in two months despite parental attempts to limit purchases. Critics argue that Roblox prioritizes profit over user well-being, with features designed to maximize engagement rather than genuine enjoyment. Experts advocate for legislative changes to address these issues, warning that without intervention, Roblox will continue to exploit young users.
Winsage
May 21, 2026
In April 2026, two zero-day vulnerabilities, RedSun and UnDefend, were discovered in Microsoft Defender, affecting Windows 10, Windows 11, and Windows Server platforms. These vulnerabilities allow attackers to escalate privileges to SYSTEM and bypass Defender’s protections. RedSun exploits a flaw in Defender's remediation process, enabling low-privileged users to overwrite critical system files. UnDefend allows attackers to disrupt Defender’s updates, keeping it outdated and ineffective. Both vulnerabilities are actively being exploited, with attackers leveraging them to gain persistent access and deploy ransomware. The primary targets are organizations using Windows systems with Defender enabled, particularly in sectors like finance, healthcare, and government. Mitigation strategies include applying updates for related vulnerabilities, monitoring for suspicious activities, and implementing additional security measures.
AppWizard
May 20, 2026
A player approached Fortnite to test the Steam Controller while focusing on competitive shooters. They encountered a Mandalorian-themed event that included a watch party for an upcoming movie. The game featured a vibrant introduction with Mandalorian and Grogu, leading to a battle against Stormtroopers on Nevarro. Players watched a short clip from the movie, described as exhilarating with AT-AT-like walkers and explosions, which reignited the player's interest in the Star Wars franchise. However, the player's experience with the Steam Controller was disappointing, as the gyro feature needed adjustments and many buttons did not map correctly, leading them to prefer traditional thumbsticks and aim assist.
AppWizard
May 20, 2026
Cybersecurity researchers have identified an ad fraud and malvertising operation called Trapdoor, targeting Android users with 455 malicious applications and 183 command-and-control domains. Users often download these disguised apps, which initiate malvertising campaigns and lead to further downloads of malicious applications. At its peak, Trapdoor generated 659 million bid requests daily, with over 24 million downloads of the associated apps, primarily from the United States. The operation exploits install attribution tools to activate malicious activities only for users acquired through fraudulent ad campaigns, while suppressing such behavior for organic downloads. Trapdoor employs advanced evasion techniques, including obfuscation and impersonation of legitimate software, to avoid detection. Google has removed the identified malicious apps from the Play Store in response to the threat.
AppWizard
May 18, 2026
Star Citizen, developed by Cloud Imperium Games, has faced challenges including a problematic in-game economy due to the duplication of valuable items by players. The studio announced a partial server wipe with patch 4.8 to reset players' bank balances and resources, but excluded ships obtained through trading with Wikelo, leading to player discontent. In response, a full reset of the game's universe will occur, wiping all player progress except for blueprints and items bought with real money. The upcoming patch aims to implement safeguards against exploits, though details are unclear. Alpha 4.8 will introduce a new endgame mission called "Tactical Strike Group," enhancements to player flight suits, improvements to refueling missions, and new infantry weapons. The completion of Star Citizen is projected to extend to 2028, while the single-player component, Squadron 42, is expected to release this year, though its timely launch remains uncertain.
Winsage
May 16, 2026
On May 14, Pwn2Own Berlin 2026 began, where researchers earned ,000 for 24 unique zero-day vulnerabilities. Cheng-Da Tsai, also known as Orange Tsai, achieved a significant Edge sandbox escape, earning ,000, and later exploited Microsoft Exchange for remote code execution, earning an additional ,000. Tsai accumulated 17.5 Master of Pwn points, contributing to DEVCORE's lead with ,000 in total earnings. Other researchers, including Angelboy and TwinkleStar03, earned ,000 for an Improper Access Control vulnerability, while Marcin Wiązowski and Kentaro Kawane also contributed successful exploits. By the end of Day One, DEVCORE led with ,000, and the event featured a prize pool exceeding ,000,000 across 31 targets. As of Day Two, a total of ,750 had been awarded for 39 unique vulnerabilities, with DEVCORE leading at 40.5 points and ,000 in earnings.
AppWizard
May 15, 2026
A security vulnerability in Android 16 allows malicious applications to expose a user's real IP address, even with "Always-On VPN" and "Block connections without VPN" features activated. Discovered by security researcher 0x33c0unt and disclosed on April 30, 2026, the flaw exploits the registerQuicConnectionClosePayload feature, which lacks permission checks. This vulnerability has been verified on a Pixel 8 with Proton VPN active. Google has not released a patch, but users can disable the feature via ADB commands.
Winsage
May 15, 2026
Windows systems are threatened by a vulnerability in the Windows DNS Client, identified as CVE-2026-41096, which allows remote code execution without user intervention. It has a CVSS base score of 9.8, indicating high severity. The flaw is a heap-based buffer overflow in the dnsapi.dll component, enabling unauthenticated remote attackers to execute arbitrary code. Exploitation requires sending a specially crafted DNS response to a vulnerable system, potentially leading to complete control over the host. Affected systems include supported versions of Windows 11 and Windows Server 2022/2025. Microsoft released security updates on May 12, 2026, and administrators are advised to apply these patches and reboot systems. Despite the severity, Microsoft currently classifies exploitation as “Exploitation Unlikely,” with no known public exploits or in-the-wild attacks.
Search