growing threat

AppWizard
March 22, 2026
Mojang Studios announced Minecraft Dungeons 2 during the Minecraft Live 2026 event, showcasing a world filled with adventure and loot. The game is set for release later this year on multiple platforms, including PC, Xbox Series X|S, Xbox Game Pass, PS5, Nintendo Switch, and Nintendo Switch 2. However, it will not be available for the original Switch, PS4, or Xbox One. The game's Steam page indicates a growing threat in the world, and players will face high-stakes challenges and explore new locations. Minecraft Dungeons 2 will feature cooperative gameplay for up to four players, emphasizing loot collection. The original Minecraft Dungeons attracted over 25 million players by April 2024, making it the most successful spin-off in the franchise.
Tech Optimizer
March 16, 2026
A crypto miner virus, or cryptojacking malware, secretly uses a device’s CPU or GPU to mine cryptocurrency for an attacker, leading to increased electricity costs and potential hardware damage for the victim. It typically infects devices through phishing emails, pirated software, compromised websites, and malicious browser extensions. Monero is the preferred cryptocurrency for mining due to its efficiency on standard CPUs and privacy features. Signs of infection include overheating, high CPU usage, and increased electricity bills. Detection involves monitoring system performance and running antivirus scans. Prevention includes using antivirus software, keeping systems updated, and avoiding pirated software. Notable incidents include attacks on a European water utility and the Los Angeles Times website.
AppWizard
February 19, 2026
Cybersecurity researchers have identified a new Android trojan named Massiv, designed for device takeover attacks targeting financial theft. It disguises itself as IPTV applications and poses risks to mobile banking users by allowing operators to remotely control infected devices for fraudulent transactions. The malware was first detected in campaigns targeting users in Portugal and Greece, with features including screen streaming, keylogging, SMS interception, and fake overlays for credential theft. One campaign specifically targeted the gov.pt application to deceive users into providing sensitive information. Massiv can execute various malicious actions, such as altering device settings, sending device information, and downloading malicious files. It is distributed through dropper applications that mimic IPTV services, often via SMS phishing. The malware operates in the background while the dropper appears as a legitimate app. Recent campaigns have focused on regions like Spain, Portugal, France, and Turkey, indicating a growing threat landscape. The operators of Massiv are developing it further, suggesting intentions to offer it as a Malware-as-a-Service.
AppWizard
November 27, 2025
Tim Sweeney, CEO of Epic Games, believes that AI disclosure tags in gaming marketplaces like Steam should be removed, arguing that AI will be involved in nearly all future game production. He expressed optimism about AI empowering smaller development teams to create expansive game worlds. However, he acknowledged that AI's reputation is often negative due to its use as a means of creative replacement rather than enhancement, leading to layoffs in the industry. Major companies like King and Ubisoft have reduced their workforce in part due to AI advancements. Steam had previously introduced guidelines requiring developers to disclose AI usage, with nearly 8,000 games reported to have incorporated generative AI. The actual number is likely higher, as seen in the disappointment over the number of demos using the technology during Steam Next Fest.
AppWizard
November 3, 2025
Researchers from Zimperium zLabs have identified over 760 Android applications exploiting Near-Field Communication (NFC) and Host Card Emulation (HCE) technologies to illegally acquire payment data. Since April 2024, there has been a significant increase in NFC relay fraud, affecting banks, payment services, and government portals globally, including Russian banks and various European financial institutions. The malware operates as paired “scanner/tapper” toolchains or standalone data collectors, exfiltrating sensitive EMV data and transmitting it to Telegram channels. Operators control these applications via command-and-control (C2) servers, allowing for fraudulent transactions with minimal user involvement. More than 70 C2 servers and numerous Telegram bots have targeted over 20 institutions worldwide, primarily focusing on Russian banks. The rise of “Tap-to-Pay” transactions has made NFC a target for cybercriminals, with harmful applications exploiting Android’s NFC permissions to steal payment data. Zimperium has provided Indicators of Compromise (IOCs) related to this campaign for safeguarding systems.
Search