security warnings

AppWizard
March 20, 2026
Google will introduce a new Android developer verification process later this year to enhance user security and accommodate power users. This will include an "advanced flow" that allows users to disable the verification requirement and install software from unverified developers. Users must activate Developer mode, confirm they are not being guided by a malicious actor, restart their device, and undergo a mandatory one-day "Security wait" period for identity verification through biometric authentication or a device PIN. After this, they can install apps from unverified developers indefinitely, with a temporary option for seven days. Users will still receive a warning when installing apps from unverified developers but can choose to proceed. The rollout is set for August, alongside new developer verification requirements. Additionally, Google will offer limited distribution accounts for developers to share apps with up to 20 users without registration fees or government ID.
AppWizard
March 6, 2026
Google has submitted proposed modifications to its Android app store operations to a federal court in San Francisco in response to Epic Games' antitrust lawsuit from August 2020. The proposed changes include a revised fee structure that lowers baseline commissions on subscriptions and e-commerce transactions, offers app developers an alternative payment processing option, and allows developers to use payment systems outside of Google's ecosystem. Consumers will be able to download applications from alternative app stores that meet a certification process. These changes require judicial approval and are part of a broader overhaul mandated by a federal judge in October 2024. Google has requested a hearing on April 9 to clarify questions regarding the proposed changes and plans for a global rollout, initially focusing on the United States, the United Kingdom, and the European Union, pending regulatory approvals.
Winsage
March 1, 2026
Cybercriminals are exploiting a legacy feature in Windows File Explorer, specifically the WebDAV protocol, to distribute malware and bypass traditional security measures. Despite Microsoft deprecating native WebDAV support in November 2023, it remains active on many systems. Attackers use WebDAV to deceive victims into executing malicious payloads by sending links that connect File Explorer directly to remote servers, avoiding web browsers and their security warnings. They employ methods such as direct linking, URL shortcut files, and LNK shortcut files to deliver exploits. The primary objective of these campaigns, which surged in late 2024, is to deploy Remote Access Trojans (RATs), with 87% of Active Threat Reports involving multiple RATs like XWorm RAT, Async RAT, and DcRAT. These campaigns predominantly target corporate networks in Europe, with many phishing emails written in German and English. Attackers use short-lived WebDAV servers hosted on Cloudflare Tunnel demo accounts to obscure their infrastructure. Security analysts are advised to monitor unusual network activity from Windows Explorer and educate users to verify addresses in File Explorer.
Winsage
February 13, 2026
Security researcher Wietze Beukema revealed vulnerabilities in Windows LK shortcut files at the Wild West Hackin' Fest, which could allow attackers to deploy harmful payloads. He identified four undocumented techniques that manipulate these shortcut files, obscuring malicious targets from users. The vulnerabilities exploit inconsistencies in how Windows Explorer handles conflicting target paths, allowing for deceptive file properties. One technique involves using forbidden Windows path characters to create misleading paths, while another manipulates LinkTargetIDList values. The most sophisticated method alters the EnvironmentVariableDataBlock structure to present a false target in the properties window while executing malicious commands in the background. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, stating that exploitation requires user interaction and does not breach security boundaries. They emphasized that Windows recognizes shortcut files as potentially dangerous and provides warnings when opening them. However, Beukema noted that users often ignore these warnings. The vulnerabilities share similarities with CVE-2025-9491, which has been exploited by various state-sponsored and cybercrime groups. Microsoft initially did not address CVE-2025-9491 but later modified LNK files to mitigate the vulnerability after it was widely exploited.
Search