language model

AppWizard
March 19, 2026
Cybersecurity researchers have identified a new family of Android malware called Perseus, designed for device takeovers and financial fraud. It utilizes Accessibility-based remote sessions for real-time monitoring and interaction with infected devices, particularly targeting Turkey and Italy. Perseus monitors user notes to extract personal or financial information and is distributed through dropper applications via phishing websites. It expands on the codebase of previous malware like Phoenix and employs disguises as IPTV services to reduce user suspicion. Once operational, it performs overlay attacks and captures keystrokes to steal credentials from financial applications. The malware allows operators to issue commands through a command-and-control panel, enabling various malicious actions, including capturing note content and initiating remote visual streams. Perseus also conducts environment checks to evade detection and ensure it operates on legitimate devices.
Winsage
March 16, 2026
The March 2026 Patch Tuesday update, KB5079473, is not causing significant issues like BSODs or reboot loops, according to Microsoft. Reports of an inaccessible C: drive and application malfunctions on Samsung PCs are linked to a recent update of the Galaxy Connect app, not the Windows update. Microsoft confirmed no known connections between the March update and major system failures. The update includes over a dozen security fixes and introduces new features, such as improvements to the File Explorer search bar and a Bing-based Internet speed test tool. Specific Samsung models are experiencing C drive accessibility issues due to the Galaxy Connect app, which has disrupted permissions.
AppWizard
March 12, 2026
Cybersecurity researchers have identified six new families of Android malware designed to extract sensitive data and facilitate financial fraud. Notable threats include: - PixRevolution: Targets Brazil's Pix payment platform, activates during Pix transfers, and uses real-time monitoring to intervene in transactions. Victims are tricked into installing malicious apps from counterfeit Google Play Store listings, which enable accessibility services for the malware to capture screens and overlay fake interfaces to reroute funds. - BeatBanker: Spreads through phishing attacks disguised as legitimate Google Play Store pages. It uses an inaudible audio loop for persistence, functions as a banking trojan, and includes a cryptocurrency miner. It creates deceptive overlays for platforms like Binance and Trust Wallet to divert funds and can monitor web browsers and execute remote commands. - TaxiSpy RAT: Exploits accessibility services to gather sensitive information such as SMS messages and call logs, targeting banking and cryptocurrency applications with overlays for credential theft. It employs advanced evasion techniques like native library encryption and real-time remote control. - Mirax: A private malware-as-a-service (MaaS) offering with a subscription model that provides tools for banking overlays and information gathering, including keystrokes and SMS. - Oblivion: Another Android RAT available at a competitive price, featuring capabilities to bypass security measures on various devices. - SURXRAT: Distributed through a Telegram-based MaaS ecosystem, it uses accessibility permissions for persistent control and communicates with a Firebase-based command-and-control infrastructure. Some samples incorporate a large language model component, indicating experimentation with AI by threat actors.
TrendTechie
March 12, 2026
Meta is facing a class-action lawsuit from authors over the use of pirated books for training its Llama language model, arguing that the distribution of these books via BitTorrent constitutes fair use. The company used shadow libraries like Anna's Archive to gather text, and a California court has partially ruled that using pirated books for training large language models falls under fair use, although the issue of copyright infringement related to downloading and distribution via BitTorrent remains unresolved. The plaintiffs claim Meta has not previously indicated a fair use defense regarding file-sharing, while Meta asserts that authors have not shown evidence of their works being reproduced by the Llama model. The judge will ultimately decide on the admissibility of Meta's defense.
AppWizard
February 10, 2026
Google Translate’s new AI-powered Advanced mode can engage in conversation rather than just translating text due to "prompt injection," which causes the model to struggle with distinguishing between translation requests and instructions. Users have found that this mode, based on a Gemini-based large language model, can respond to inquiries rather than providing straightforward translations. The older Classic mode remains a reliable option for consistent translations without unexpected interactions.
AppWizard
December 30, 2025
A recent survey by Google Cloud found that 90% of game developers are exploring generative AI. Millennium Whisper, a dating sim by Parable Studios, is the first game on Steam to run a large language model entirely on-device, avoiding cloud-based inference. This approach allows for unique in-game conversations and addresses ethical data usage, as actors retain ownership of their data and receive royalties. The game uses actor-led role-play sessions for character behavior, ensuring high-quality data. Running AI locally enhances energy efficiency and sustainability, contrasting with traditional server-based models that incur ongoing costs. Millennium Whisper received grant funding from Innovate UK and is currently in Early Access. Ambrose Robinson, the founder of Parable Studios, emphasizes the importance of energy savings and the sustainability of their AI approach.
Winsage
December 11, 2025
Microsoft's December Patch Tuesday update addresses three critical zero-day vulnerabilities and a total of 56 bugs, including: - 28 elevation-of-privilege vulnerabilities - 19 remote-code-execution vulnerabilities - 4 information-disclosure vulnerabilities - 3 denial-of-service vulnerabilities - 2 spoofing vulnerabilities Three remote code execution flaws are classified as "critical." One zero-day vulnerability, CVE-2025-62221, allows attackers to gain SYSTEM privileges through the Windows Cloud Files Mini Filter Driver. The other two vulnerabilities fixed are: - CVE-2025-64671: A remote code execution vulnerability in GitHub Copilot for Jetbrains, exploitable via Cross Prompt Injection. - CVE-2025-54100: A PowerShell remote code execution vulnerability that can execute scripts from a webpage using Invoke-WebRequest. CVE-2025-62221 is attributed to MSTIC and MSRC, CVE-2025-64671 was disclosed by Ari Marzuk, and CVE-2025-54100 was identified by multiple security researchers.
Winsage
December 10, 2025
Microsoft released a significant update addressing 56 security vulnerabilities across its Windows operating systems and supported software. This update includes a patch for a zero-day exploit, CVE-2025-62221, a privilege escalation vulnerability affecting Windows 10 and later versions. Throughout 2025, Microsoft has patched a total of 1,129 vulnerabilities, marking an 11.9% increase from the previous year. Three vulnerabilities were classified as critical: CVE-2025-62554 and CVE-2025-62557 related to Microsoft Office, and CVE-2025-62562 related to Microsoft Outlook. Several non-critical privilege escalation vulnerabilities were identified as likely to be exploited, including CVE-2025-62458, CVE-2025-62470, CVE-2025-62472, CVE-2025-59516, and CVE-2025-59517. Another vulnerability, CVE-2025-64671, was found in the Github Copilot Plugin for Jetbrains, allowing remote code execution. Additionally, CVE-2025-54100 is a remote code execution bug in Windows Powershell affecting Windows Server 2008 and later.
AppWizard
December 8, 2025
The AI VTuber Neuro-Sama, created by streamer Vedal987, is attempting to conquer Minecraft Hardcore mode, which features permadeath. She collaborates with fellow VTubers Crelly and Filian, aiming to defeat the Ender Dragon. Neuro's gameplay has been marked by impulsive decisions leading to frequent resets and amusing blunders, including reckless encounters with mobs and environmental hazards. Notable incidents include her falling into lava while building a bridge and attacking a Villager, which provoked an Iron Golem's attack. Crelly, acting as Neuro's caretaker, has expressed frustration over the AI's repeated mistakes. As of attempt number 83, Neuro has died 47 times, while her teammates have recorded 14, 13, and 10 deaths respectively. The team plans to resume their attempts on December 8.
Search