web browser

Winsage
March 12, 2026
Microsoft has begun rolling out its March 2026 update for Windows 11, which includes security enhancements and a new feature that allows users to test internet speed. This feature is accessible via a “Perform speed test” option when right-clicking the WiFi or Ethernet icon in the taskbar. Selecting this option directs users to their default web browser, opening a speed test page on Bing with the search query “internet speed test.” The feature serves as a shortcut to a webpage rather than a fully integrated application. It respects the system's default browser setting, allowing users to open the speed test in their preferred browser. The speed test utilizes technology from Ookla, moving away from Microsoft's previous Azure-based tool for better accuracy and reliability.
Winsage
March 1, 2026
Cybercriminals are exploiting a legacy feature in Windows File Explorer, specifically the WebDAV protocol, to distribute malware and bypass traditional security measures. Despite Microsoft deprecating native WebDAV support in November 2023, it remains active on many systems. Attackers use WebDAV to deceive victims into executing malicious payloads by sending links that connect File Explorer directly to remote servers, avoiding web browsers and their security warnings. They employ methods such as direct linking, URL shortcut files, and LNK shortcut files to deliver exploits. The primary objective of these campaigns, which surged in late 2024, is to deploy Remote Access Trojans (RATs), with 87% of Active Threat Reports involving multiple RATs like XWorm RAT, Async RAT, and DcRAT. These campaigns predominantly target corporate networks in Europe, with many phishing emails written in German and English. Attackers use short-lived WebDAV servers hosted on Cloudflare Tunnel demo accounts to obscure their infrastructure. Security analysts are advised to monitor unusual network activity from Windows Explorer and educate users to verify addresses in File Explorer.
Winsage
February 22, 2026
Windows 11 operates on nearly 70% of the world's desktops. It features native extraction for compressed files, allowing users to extract files directly from the context menu without third-party applications. The introduction of tabbed browsing in File Explorer helps manage files more effectively, reducing clutter. Snap assist offers layout options for window arrangement, facilitating multitasking. Users can create separate virtual desktops, each customizable with unique wallpapers, to organize different workspaces. Windows 11 includes native screen recording capabilities and an optical character recognition (OCR) feature for extracting text from images and screenshots.
AppWizard
February 17, 2026
A sophisticated Android malware named Keenadu has been discovered embedded in the firmware of various device brands, compromising all installed applications and granting unrestricted control over infected devices. It employs multiple distribution methods, including compromised firmware images delivered over-the-air, access via backdoors, embedding in system applications, modified applications from unofficial channels, and infiltration through apps on Google Play. As of February 2026, Keenadu has been confirmed on approximately 13,000 devices, primarily in Russia, Japan, Germany, Brazil, and the Netherlands. The firmware-integrated variant remains dormant if the device's language or timezone is associated with China and ceases to function without the Google Play Store and Play Services. While currently focused on ad fraud, Keenadu has extensive capabilities for data theft and risky actions on compromised devices. A variant embedded in system applications has limited functionality but elevated privileges to install apps without user notification. The malware has been detected in the firmware of Android tablets from various manufacturers, including the Alldocube iPlay 50 mini Pro. Kaspersky has detailed how Keenadu compromises the libandroid_runtime.so component, making it difficult to remove with standard Android OS tools. Users are advised to seek clean firmware versions or consider replacing compromised devices with products from trusted vendors.
Search