laboratory

AppWizard
January 17, 2026
Players in the Quarantine Zone can undertake the quest "Modern Prometheus," which involves a survivor named Stuart who arrives with a zombified head and requests additional zombie body parts for an experiment. To complete the quest, players must reach day 20, allow Stuart entry into the survivor block, ensure his safety, confiscate body parts from survivor baggage, and engage in conversation with him after collecting four parts. After admitting Stuart, players must protect him from threats while sourcing the necessary zombie body parts, which cannot be obtained from liquidation or the laboratory. Once all four parts are collected, players discuss the experiment with Stuart, who ultimately meets his demise, leading to a small outbreak of zombies in the survivor base. Players must then eliminate the zombies and can collect a reward of 0 and a severed head collectible from Stuart's belongings.
Winsage
January 12, 2026
A new tool named EDRStartupHinder was unveiled on January 11, 2026, which allows attackers to inhibit the launch of antivirus and endpoint detection and response (EDR) solutions during the Windows startup process. Developed by security researcher Two Seven One Three, it targets Windows Defender and various commercial security products on Windows 11 25H2 systems by redirecting essential system DLLs during boot using the Windows Bindlink API and Protected Process Light (PPL) security mechanisms. The tool employs a four-step attack chain that includes creating a malicious service with higher priority than the targeted security services, redirecting critical DLLs to attacker-controlled locations, and modifying a byte in the PE header of the DLLs to cause PPL-protected processes to refuse loading them. This results in the termination of the security software. EDRStartupHinder has been tested successfully against Windows Defender and other unnamed antivirus products, demonstrating its effectiveness in preventing these security solutions from launching. The source code for EDRStartupHinder is publicly available on GitHub, raising concerns about its potential misuse. Security teams are advised to monitor for Bindlink activity, unauthorized service creation, and registry modifications related to service groups and startup configurations to detect this attack vector. Microsoft has not yet issued any statements regarding patches or mitigations for this technique.
AppWizard
December 16, 2025
Google is testing a new feature called “Tailor your feed” within its Search Labs, which allows users to customize their Discover content by articulating their preferences in plain language. Users can specify what they want or do not want to see, enhancing the personalization of their feed. This feature goes beyond the current basic customization options available in Google Discover, enabling more detailed requests, such as focusing on specific dietary recipes or desired content vibes. To use this feature, users must enroll in Search Labs and activate it through a new icon in the Google app.
AppWizard
November 20, 2025
Livly Island is a mobile game developed by cocone ONE corporation where users can adopt and nurture creatures called Livlies. There are over 70 species of Livlies, which can change color based on their diet and produce jewels for in-game purchases. Players can customize their avatars and decorate their islands. The game includes features like nurturing magical trees to transform Livlies using a potion called Neobelmin. Additionally, players can work part-time at the Livly Reboot Laboratory to earn rewards.
AppWizard
September 2, 2025
Researchers from Citizen Lab discovered that over 20 popular Android VPN applications, collectively downloaded 700 million times, are interconnected through undisclosed ownership ties. These applications, marketed as independent privacy solutions, share codebases, servers, and encryption vulnerabilities. The VPN providers are categorized into three families linked to a Russian entity, a Chinese company, and another with ambiguous origins. Apps like Turbo VPN, X-VPN, and UFO VPN share cryptographic keys and backdoors, increasing the risk of man-in-the-middle attacks. Many applications use outdated encryption methods, making it easy for attackers to decrypt user traffic. Some apps route user data through servers in jurisdictions with lax privacy regulations, exposing sensitive information. The investigation revealed identical backend infrastructures among different apps, despite claims of no-log policies, breaching user trust. Hidden trackers within the apps contradict their privacy assurances. Regulators are beginning to respond, with Google removing problematic apps and the EU considering stricter data access regulations. Experts recommend choosing vetted, paid VPN services that undergo independent audits to ensure better security.
Tech Optimizer
August 25, 2025
Doctor Web’s antivirus laboratory has identified a sophisticated Android backdoor malware named Android.Backdoor.916.origin, which has been evolving since January 2025. This spyware primarily targets Russian businesses through focused attacks, disseminated via private messages as a fake antivirus application called “GuardCB.” The app's icon resembles the Central Bank of the Russian Federation's emblem and is presented in Russian. Variants of the malware include names like “SECURITY_FSB” and “FSB,” falsely claiming to be security tools linked to Russian law enforcement. Upon execution, the malware simulates an antivirus scan, requesting extensive system permissions for surveillance and data exfiltration, including access to geolocation, audio recording, SMS, contacts, call logs, media files, and camera functions. It establishes connections to command-and-control servers, allowing attackers to send and receive sensitive data, initiate audio and video feeds, and execute commands. The malware employs keylogger functionality to intercept keystrokes and monitor specific applications for content theft. Doctor Web has notified domain registrars to disrupt the malware's infrastructure and confirms that all known variants are detected and neutralized by their antivirus solutions. Organizations are advised to enforce strict APK sideloading policies and verify app authenticity to counter such threats.
Tech Optimizer
August 9, 2025
A team from Kyoto University has developed a light source that emits single photons, enhanced in brightness by a small magnetic field, which can be used for secure quantum communications. This technology relies on the principles of quantum mechanics, making it difficult for eavesdroppers to replicate or measure the quantum states without detection. The researchers used a one-atom-thick semiconductor sheet, WSe₂, creating traps for excitons that emit photons when relaxed. Current limitations include the need for cryogenic temperatures for operation, but advancements in materials may allow for room-temperature single-photon emission. The technology has potential applications in secure communications for sensitive transactions and could evolve into compact modules for practical use. Recent studies have demonstrated successful quantum key distribution (QKD) using true single-photon sources, indicating progress in integrating quantum technology into real-world networking.
AppWizard
June 17, 2025
FBC: Firebreak is a co-op shooting game that falls short of expectations, despite having amusing enemy designs and quirky objectives. The gameplay quickly becomes mundane, focusing on shooting enemies and grinding for gear. In contrast, SCP: Secret Laboratory offers a chaotic and engaging experience with randomly assigned roles and unpredictable scenarios, fostering memorable moments and camaraderie among players. SCP: Secret Laboratory features a variety of tools and items that enhance gameplay, such as powerful weapons and whimsical gadgets, which contribute to its dynamic atmosphere. Firebreak lacks the wild energy and unpredictability that characterize SCP: Secret Laboratory.
Search