virtual machine

BetaBeacon
May 5, 2026
ScarCruft compromised a video game platform in a supply chain attack, trojanizing its components with a backdoor called BirdCall to target ethnic Koreans residing in China. The attack enabled the threat actors to target both Windows and Android devices, turning it into a multi-platform threat. The campaign targeted sqgame[.]net, a gaming platform used by ethnic Koreans in China, known as a transit point for North Korean defectors. BirdCall has features like screenshot capture, keystroke logging, and data gathering, and relies on legitimate cloud services for command-and-control. The Android variant collects various data and has seen active development.
Winsage
May 3, 2026
Microsoft has integrated artificial intelligence into Windows 11 with features like Copilot and Windows Recall, but user reception has been mixed due to security and privacy concerns. Users can disable or uninstall certain features, leading to a demand for a more streamlined operating system. NTLite, a Windows customization tool, allows users to enhance their control over Windows 11, offering faster multi-threaded extraction and the ability to remove AI tools from Windows 11 25H2 images, thus simplifying the user experience and reducing installation sizes. NTLite supports various Windows Image files and live editing, enabling modifications without a complete reinstall. It includes an AI Component Management option for greater control over AI features. While some components are critical and cannot be safely removed, users are advised to test ISO files in a virtual machine and create restore points before making significant changes.
Winsage
April 28, 2026
Windows 11 updates have significantly increased in size, with monthly cumulative updates often exceeding 4GB and some approaching 5GB. One update can expand to nearly 9GB when extracted. Microsoft has shifted to delivering Latest Cumulative Updates (LCUs), which include all previous fixes, leading to larger update sizes over time. The introduction of Checkpoint Cumulative Updates aims to reduce this growth by establishing periodic baselines, but the effectiveness has been mixed. The May 2025 cumulative update saw a size increase from approximately 6.5GB to nearly 9GB, with new MSIX files related to semantic search and on-device AI contributing to this growth. Windows Update uses applicability logic to minimize download sizes for users, but enterprises must download full packages, resulting in increased storage costs. The average yearly storage cost for enterprises rose from about 11 GB in 2024 to 52 GB by 2026. Users can check their actual download sizes through the Windows Update settings and Event Viewer logs.
Winsage
March 11, 2026
Microsoft's Hyper-V is a hardware virtualization platform integrated into Windows 11 Professional, Enterprise, and Education editions, allowing users to host multiple virtual machines (VMs) on a single computer. It operates using a type 1 hypervisor directly on hardware, enabling VMs to share resources like CPU, memory, and storage. Hyper-V includes features such as dynamic memory allocation, software-defined networking, and saved checkpoints. IT administrators may need to disable Hyper-V due to compatibility issues with third-party virtualization software, high-precision applications, or driver conflicts. Disabling Hyper-V can also affect security features reliant on it, such as virtualization-based security (VBS) and Device Guard. Methods to disable Hyper-V include: 1. Using the Windows Features dialog. 2. Executing a PowerShell command: Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All, HypervisorPlatform, VirtualMachinePlatform. 3. Running a DISM command: dism /Online /Disable-Feature /FeatureName:Microsoft-Hyper-V-All /FeatureName:HypervisorPlatform /FeatureName:VirtualMachinePlatform. 4. Using the bcdedit command: bcdedit /set hypervisorlaunchtype off. 5. Modifying Group Policy to disable VBS. 6. Editing the Windows Registry to disable VBS or Credential Guard. For multiple managed computers, administrators can create and execute a PowerShell script or use Group Policy Objects to streamline the process. Testing in a controlled environment is recommended to ensure desired outcomes without compromising security or functionality.
Winsage
March 11, 2026
Windows 11 Pro includes features such as BitLocker, Smart App Control, Dynamic Lock, Controlled Folder Access, Windows Sandbox, Hyper-V, Group Policy, Assigned Access, and Remote Desktop, which enhance security and management for users, especially in hybrid work environments. - BitLocker encrypts drives to protect files if a device is lost or storage is removed. - Smart App Control blocks untrusted or unsigned applications before they run. - Dynamic Lock automatically locks the device when a paired phone moves out of range. - Controlled Folder Access protects files in designated folders from unauthorized modifications. - Windows Sandbox provides a temporary, isolated environment for testing software without affecting the main system. - Hyper-V allows users to run virtual machines and test different operating systems. - Group Policy Editor offers advanced settings for managing updates and security protocols. - Assigned Access restricts a device to a single application for shared-use scenarios. - Remote Desktop enables users to access their main PC remotely from other devices. Recommended features to enable for enhanced security and workflow include BitLocker, Controlled Folder Access, Dynamic Lock, and Remote Desktop. Windows Sandbox is suggested for users dealing with unknown files, while Hyper-V is for advanced users. Group Policy and Assigned Access are beneficial for specific management needs.
AppWizard
March 11, 2026
Advanced Browsing Protection (ABP) in Messenger enhances user privacy by warning users about potentially harmful links shared in end-to-end encrypted communications. It analyzes links using on-device models and a dynamic watchlist of millions of potentially malicious sites, utilizing cryptographic techniques to maintain user privacy. ABP is based on a cryptographic primitive called private information retrieval (PIR), which minimizes the information a server learns from client queries. The system also employs oblivious pseudorandom functions (OPRFs) and manages URL queries through a privacy-preserving URL-matching scheme. The server groups links by domain, allowing clients to request a single bucket for domain-specific path components, and generates a ruleset to balance bucket sizes. To safeguard client queries, AMD's SEV-SNP technology creates a confidential virtual machine (CVM) that processes hash prefixes securely, generating attestation reports for integrity verification. The use of Oblivious RAM and Oblivious HTTP (OHTTP) enhances privacy by preventing exposure of memory access patterns and stripping identifying information from client requests. The lifecycle of an ABP request includes pre-processing phases where the server updates the URL database and computes rulesets, followed by client requests that involve calculating bucket identifiers, sending encrypted requests through a proxy, and checking for unsafe URLs based on server responses.
Search