techniques

Winsage
May 21, 2026
In April 2026, two zero-day vulnerabilities, RedSun and UnDefend, were discovered in Microsoft Defender, affecting Windows 10, Windows 11, and Windows Server platforms. These vulnerabilities allow attackers to escalate privileges to SYSTEM and bypass Defender’s protections. RedSun exploits a flaw in Defender's remediation process, enabling low-privileged users to overwrite critical system files. UnDefend allows attackers to disrupt Defender’s updates, keeping it outdated and ineffective. Both vulnerabilities are actively being exploited, with attackers leveraging them to gain persistent access and deploy ransomware. The primary targets are organizations using Windows systems with Defender enabled, particularly in sectors like finance, healthcare, and government. Mitigation strategies include applying updates for related vulnerabilities, monitoring for suspicious activities, and implementing additional security measures.
TrendTechie
May 21, 2026
The game 007 First Light is set to launch on May 27, but there are concerns about it being leaked onto torrent sites before its release. Players who pre-order the game can start playing 24 hours earlier than the general public, increasing the risk of piracy. Recent trends show an increase in fully functional pirated versions of major games appearing before their official launches, including titles like Pragmata and Death Stranding 2. There is no confirmed information about the use of the anti-piracy system Denuvo on Steam, and even with such protections, hackers have been able to bypass them. Factors contributing to early availability of game builds to hackers include failures in pre-loading systems and actions by reviewers. Even if a game avoids leaks initially, it is likely to be pirated eventually.
Winsage
May 20, 2026
Bitdefender's research highlights the use of Microsoft's MSHTA utility in malware attacks, noting its default activation in Windows systems. Cybercriminals exploit MSHTA to execute malicious scripts under the guise of legitimate processes, linking it to various malware families like LummaStealer and PurpleFox. The study reports a rise in MSHTA-related detections, indicating a shift towards "living-off-the-land" tactics that utilize legitimate tools to evade security alerts. Social engineering is identified as a common entry point for attacks, employing deceptive methods such as fake software downloads and phishing links. MSHTA can retrieve and execute additional payloads through multi-stage chains, complicating detection efforts. The attacks target sensitive information, including credentials and financial data, and the continued presence of MSHTA poses risks as it allows threat actors to conceal malicious actions. To mitigate these threats, organizations are advised to restrict or disable legacy scripting tools and exercise caution with untrusted downloads. The report emphasizes the challenge of detecting unusual behaviors associated with legitimate utilities in the context of cyber threats.
AppWizard
May 20, 2026
Cybersecurity researchers have identified an ad fraud and malvertising operation called Trapdoor, targeting Android users with 455 malicious applications and 183 command-and-control domains. Users often download these disguised apps, which initiate malvertising campaigns and lead to further downloads of malicious applications. At its peak, Trapdoor generated 659 million bid requests daily, with over 24 million downloads of the associated apps, primarily from the United States. The operation exploits install attribution tools to activate malicious activities only for users acquired through fraudulent ad campaigns, while suppressing such behavior for organic downloads. Trapdoor employs advanced evasion techniques, including obfuscation and impersonation of legitimate software, to avoid detection. Google has removed the identified malicious apps from the Play Store in response to the threat.
Winsage
May 18, 2026
Throaty Mumbo successfully ran Windows CE 2.11 on the Nintendo 64 by leveraging the shared architecture of both systems, which are based on the MIPS R4000 processor family. The project involved a month of reverse engineering, using Microsoft toolchains, custom hardware modifications, and debugging techniques. An EverDrive flash cartridge was used to load custom ROMs, and a USB connection facilitated uploads from a PC. Challenges included crashes with the initial EverDrive cartridge, which were resolved by upgrading to the EverDrive-64 X7. A custom kernel clone was created to troubleshoot issues with the stock Windows CE kernel, ultimately allowing the project to revert to the unmodified version. The Nintendo 64 controller was repurposed as a mouse, and standard Windows CE applications could be launched from the desktop. Comprehensive build details are available on GitHub.
Tech Optimizer
May 16, 2026
O’Brien Technologies has launched a program called “Educate and Protect” to improve cybersecurity for businesses by addressing the human factor in breaches. They highlight that many cyber threats arise from human errors, such as clicking phishing links or misunderstanding data storage protocols. The company points out that cloud services do not automatically protect files without robust backup systems and that small businesses are often more vulnerable due to a lack of comprehensive security measures. They stress the inadequacy of relying solely on outdated tools like firewalls and antivirus software and advocate for a multi-layered cybersecurity approach. O’Brien Technologies recommends regular employee training, staying informed about threats, and ongoing commitment to cybersecurity. They offer tailored guidance for businesses looking to enhance their cybersecurity. Interested parties can contact them at 661-432-1301 or visit obrienmsp.com.
AppWizard
May 15, 2026
The Crimson Desert update version 1.0.7 introduces several new features and enhancements, including expanded unarmed combat capabilities for characters Kliff and Damiane, new unarmed skills for Damiane, and new techniques for Kliff such as the Blinding Flash Finisher. The update allows players to encounter a broader array of mount types and re-encounter several bosses, adding five new boss encounters: Muskan, Corrupted Caliburn, Goyen, Draven, and Clockwork White Horn. Additionally, new wolf and bear types have been added as permanent mounts, along with extra reins for rideable creatures. Various bug fixes and tweaks have also been implemented.
Winsage
May 14, 2026
The transition to Windows on ARM devices is increasing across various sectors, with organizations drawn to their performance, efficiency, and battery life. However, there are concerns about securing these devices without introducing vulnerabilities. Windows on ARM security involves safeguarding ARM64-based Windows devices with endpoint security solutions optimized for ARM architecture. The lack of native ARM64 endpoint protection can leave devices vulnerable. Windows on ARM devices operate on ARM64 architecture, differing from traditional x86/x64 systems, which can lead to incomplete protection, performance issues, and compatibility challenges with legacy security tools. This creates security gaps, making ARM-based devices attractive targets for threats like ransomware. To secure ARM-based Windows endpoints effectively, organizations need native ARM64 endpoint protection that ensures optimal performance, consistent protection across all devices, and centralized policy management. Morphisec offers native ARM64 endpoint protection, focusing on preventing threats before execution and providing seamless deployment and management. Without native support, organizations risk fragmented security tools, an expanded attack surface, and operational inefficiencies. Implementing native ARM64 endpoint protection allows for standardized security, simplified processes, and enhanced resilience against advanced threats.
Search