interaction

Winsage
April 30, 2026
Attackers are exploiting CVE-2026-32202, a zero-click vulnerability in Windows Shell, allowing authentication of victims' systems without user interaction. This vulnerability stems from an incomplete patch for CVE-2026-21510 and has been used by the APT28 group with weaponized LNK files to bypass Windows security. Although Microsoft addressed these vulnerabilities in February 2026, the risk remains as opening a folder with a malicious LNK file can still connect victims' machines to the attacker's server, initiating an NTLM authentication handshake that exposes the victim’s Net-NTLMv2 hash. This affects various versions of Windows 10, 11, and Windows Server. Microsoft released a patch for CVE-2026-32202 on April 14, 2026, but did not label it as actively exploited until more than two weeks later, leaving security teams unaware of its urgency. Organizations are advised to apply the patch and consider blocking outbound SMB traffic to mitigate risks.
AppWizard
April 29, 2026
“Pixel Glow” is a forthcoming feature for future Pixel phones that will use subtle light and color on the back of the device to notify users of significant notifications while the phone is face down. It will be compatible with Gemini and will notify users of calls from favorite contacts. The Pixel Diagnostics app includes a “Color LED Check” to test the functionality of the LEDs, which will illuminate in red, green, and blue hues. Google is incorporating eight LEDs for the “Pixel Glow” feature, with a system designed to detect hardware failures. An animation has been discovered that shows an LED strip along the inner edge of an upcoming Pixel laptop, potentially illuminating in colors similar to the Gemini interface.
AppWizard
April 29, 2026
Google has released an updated version of its Quick Share application for Windows, version 1.0.2555.1. The update features a redesigned home screen with a more intuitive interface, the ability to modify file selections during an ongoing transfer, and refreshed visual elements that align with Android's aesthetic.
AppWizard
April 29, 2026
Routine is an indie horror game that has been in development since its announcement in 2012 and is now available. It features claustrophobic hallways and a lurking predator, creating a tense atmosphere similar to Alien Isolation. The game emphasizes stealth and has a tight level design that encourages a slow, deliberate approach. Players take on the role of a basic worker in a sci-fi universe, with environmental storytelling replacing a traditional narrative. Routine includes elements inspired by SOMA, such as terminals and puzzles, and features menacing foes like Type-05 security robots. Critics have praised the game, with a review rating of 9/10, and it has been included in Game of the Year 2025 lists. Routine is currently available for .74 at Fanatical, the lowest price to date.
AppWizard
April 29, 2026
In Minecraft 26.2 Snapshot 5, Mojang introduced explosive Sulfur Cubes that can absorb TNT blocks, transforming into volatile entities. When ignited by fire or Redstone, they have a 6-second fuse, while explosions can trigger a random fuse time of 0.75 to 3 seconds. Once primed, they are immune to damage, and the TNT block cannot be harvested with shears. Additionally, Potent Sulfur blocks can interact with water and magma to produce geysers that launch water particles and nearby entities into the air. Hoglins have been reclassified as hostile and will no longer spawn in Peaceful mode. New sound effects accompany the geysers and Sulfur Spikes. To create an Explosive Sulfur Cube, a Sulfur Cube must absorb a TNT block, and geysers are produced when a Potent Sulfur block is placed above a Magma block or submerged under 1-4 water source blocks within a Sulfur Pool.
Winsage
April 28, 2026
Microsoft is facing a significant security vulnerability in its Windows operating system known as PhantomRPC, which allows for privilege escalation. Cybersecurity experts have expressed concern over the company's delayed response in issuing a patch for this flaw. The vulnerability resides within the Windows Remote Procedure Call (RPC) architecture and enables processes with impersonation privileges to elevate their permissions to SYSTEM level. Researcher Haidar Kabibo identified five distinct paths for exploitation, which require user interaction, coercion, or compromise of background services. Despite disclosing the vulnerability to Microsoft in September 2025, the company categorized it as moderately severe and did not issue a patch or a Common Vulnerabilities and Exposures (CVE) listing. Microsoft stated that the technique requires an already-compromised machine and emphasized the importance of following security best practices. Experts have criticized Microsoft's lack of action, arguing that it is operationally negligent and places the burden of risk management on users. In the absence of a patch, security professionals recommend focusing on access control and environmental hygiene to mitigate the risks associated with the vulnerability.
AppWizard
April 28, 2026
Starting in the first week of May, Google will remove "phone actions and automations" from its Nest devices, which include features like checking battery levels, toggling Do Not Disturb settings, and adjusting phone volume. While these phone-related actions will be phased out, core home automations will remain functional. Google has introduced a new feature for its Gemini platform called "Continued Conversations," allowing users to engage in extended dialogues without repeating context. Additionally, some Nest Hub users are experiencing a glitch where alarms set for PM are announced as AM.
Winsage
April 28, 2026
A new vulnerability in Microsoft Windows, designated as CVE-2026-32202, has been discovered due to an incomplete security patch for a previous flaw (CVE-2026-21510). This new vulnerability allows attackers to execute zero-click attacks by processing specially crafted shortcut files, enabling automatic authentication requests without user interaction. The vulnerabilities are linked to another flaw (CVE-2026-21513) in Microsoft’s MSHTML framework, and cybercriminals, specifically the APT28 group, have exploited these issues in attacks against Ukraine and the European Union. Microsoft has released a fix for the new vulnerability in its April 2026 security updates.
Search