leak

AppWizard
March 7, 2026
Several posts on X suggest that a large amount of Minecraft Dungeons content is available for download, accompanied by screenshots with obscured details. The file linked to these claims is named spice.tar.bz2 and is 73.8 GB in size, leading to speculation that it contains significant content. The term "spice" is associated with "Project Spicewood," a potential follow-up to Minecraft Dungeons, although Mojang has not confirmed any such project. A recent Reddit post referenced a leaked developer mockup test mentioning both Dungeons and Spicewood materials. Additionally, a YouTube video based on leaked source code from 2016 and 2017 has gained significant views. These developments come shortly after reports of DMCA takedowns related to other Minecraft leaks. The authenticity of the latest file remains unverified, and caution is advised when encountering unofficial files due to potential security risks.
AppWizard
March 4, 2026
The source code for Minecraft's PlayStation 3 version has been leaked online, revealing internal development files and the source code for Minecraft Pocket Edition. This version was optimized for the PlayStation 3's 256MB of RAM and was developed in C++. The leak includes features that were not included in the final release, such as early sky island world generation, prototype waterfall code, and initial designs for villager houses. Enthusiasts have managed to run the PS3 build on PC with functional multiplayer capabilities. The leak may aid researchers in identifying vulnerabilities, although significant security concerns are likely addressed in newer updates. The leak contributes to preservation efforts, allowing the community to explore Minecraft's development during its console era.
AppWizard
March 3, 2026
The source code for the Minecraft legacy console edition has been leaked, sparking excitement among longtime players. The leak focuses on older console builds distinct from the current Bedrock and Java editions, featuring unique menus and world generation. The files first appeared on the forum 4chan and have since spread to various archive sites. Players have expressed enthusiasm on social media, noting that the older versions work well on lower-end PCs and include multiplayer functionality. This leak is considered one of the most significant in Minecraft's history due to its scale and historical value, reviving nostalgia for players who experienced the game on PS3 and Xbox 360.
AppWizard
February 26, 2026
Android 17 Beta 2 introduces a new windowing mode that expands the concept of "bubbles" beyond messaging apps to include floating windows for non-messaging applications. This feature allows users to interact with multiple applications simultaneously. The term "bubbles" now refers to both the traditional messaging mode and the new floating windows, which can be resized and moved, similar to multitasking features from other manufacturers. Any Android device can utilize these floating app bubbles, but foldables and tablets will have a shortcut for launching windowed apps from the taskbar. Developers are advised to follow existing multi-window mode guidelines for compatibility with the new feature.
Tech Optimizer
February 24, 2026
A cyber operation is targeting users of Huorong Security antivirus software through a typosquatted domain, huoronga[.]com, which mimics the legitimate site huorong.cn. Users who mistakenly visit the counterfeit site may download a file named BR火绒445[.]zip, which contains a trojanized installer that leads to the installation of ValleyRAT, a remote access trojan. The malware employs various techniques to evade detection, including using an intermediary domain for downloads, creating Windows Defender exclusions, and establishing a scheduled task for persistence. The backdoor facilitates activities such as keylogging and credential access while disguising its operations within legitimate processes like rundll32.exe. Attribution points to the Silver Fox APT group, and there has been a significant increase in ValleyRAT samples documented in recent months. Security measures include ensuring software downloads are from the official site and monitoring for specific malicious activities.
AppWizard
February 21, 2026
Many unregulated or inadequately secured AI applications on platforms like the Google Play store pose significant privacy risks to users. A specific Android application, "Video AI Art Generator & Maker," linked to a data leak, compromised 1.5 million user images, over 385,000 videos, and millions of AI-generated media files due to a misconfiguration in a Google Cloud Storage bucket. Another app, IDMerit, exposed sensitive know-your-customer data from users in 25 countries, including full names, addresses, birthdates, IDs, and contact information, totaling a terabyte of data. Both developers addressed the vulnerabilities after being alerted by researchers. However, cybersecurity experts warn that lax security among AI applications is a widespread issue, with 72 percent of analyzed Google Play apps exhibiting security flaws, including the practice of "hardcoding secrets" in their source code.
AppWizard
February 19, 2026
A privacy breach involving the "Video AI Art Generator & Maker" app has exposed millions of private user files due to a misconfigured Google Cloud Storage bucket lacking authentication. Since June 2023, approximately 8.27 million media files, including nearly 2 million original user-uploaded files, have become publicly accessible. This includes over 1.57 million private images, more than 385,000 personal videos, and millions of AI-generated assets. The app's developer, Codeway Dijital Hizmetler Anonim Sirketi, has fixed the configuration issue, but users remain at risk for phishing attacks, identity theft, and misuse of their private content. Legal experts suggest the app's privacy documentation may not comply with international standards like GDPR. Additionally, Codeway has a history of similar issues, as another app they developed also faced a security breach exposing 300 million messages from over 25 million users.
Winsage
February 11, 2026
The Global Group ransomware operates in a mute mode, executing all activities locally on the compromised system without communicating with a command and control server. It generates the encryption key directly on the host machine, meaning no data is exfiltrated despite claims in its ransom note. This method streamlines the attack process, minimizes detection risks, and allows for quicker execution of attacks, targeting more victims while making data exfiltration unnecessary for compelling ransom payments.
Winsage
February 11, 2026
The Global Group ransomware operates entirely in silent mode, executing all activities locally on the compromised system without relying on a command and control server. It generates the encryption key directly on the host machine, resulting in no actual data exfiltration despite claims in its ransom note. This approach allows for quicker attacks, targeting a broader range of victims while reducing detection risk. The act of encryption alone can compel payment due to significant operational downtime for affected organizations.
Search