web browser

Winsage
March 1, 2026
Cybercriminals are exploiting a legacy feature in Windows File Explorer, specifically the WebDAV protocol, to distribute malware and bypass traditional security measures. Despite Microsoft deprecating native WebDAV support in November 2023, it remains active on many systems. Attackers use WebDAV to deceive victims into executing malicious payloads by sending links that connect File Explorer directly to remote servers, avoiding web browsers and their security warnings. They employ methods such as direct linking, URL shortcut files, and LNK shortcut files to deliver exploits. The primary objective of these campaigns, which surged in late 2024, is to deploy Remote Access Trojans (RATs), with 87% of Active Threat Reports involving multiple RATs like XWorm RAT, Async RAT, and DcRAT. These campaigns predominantly target corporate networks in Europe, with many phishing emails written in German and English. Attackers use short-lived WebDAV servers hosted on Cloudflare Tunnel demo accounts to obscure their infrastructure. Security analysts are advised to monitor unusual network activity from Windows Explorer and educate users to verify addresses in File Explorer.
Winsage
February 22, 2026
Windows 11 operates on nearly 70% of the world's desktops. It features native extraction for compressed files, allowing users to extract files directly from the context menu without third-party applications. The introduction of tabbed browsing in File Explorer helps manage files more effectively, reducing clutter. Snap assist offers layout options for window arrangement, facilitating multitasking. Users can create separate virtual desktops, each customizable with unique wallpapers, to organize different workspaces. Windows 11 includes native screen recording capabilities and an optical character recognition (OCR) feature for extracting text from images and screenshots.
AppWizard
February 17, 2026
A sophisticated Android malware named Keenadu has been discovered embedded in the firmware of various device brands, compromising all installed applications and granting unrestricted control over infected devices. It employs multiple distribution methods, including compromised firmware images delivered over-the-air, access via backdoors, embedding in system applications, modified applications from unofficial channels, and infiltration through apps on Google Play. As of February 2026, Keenadu has been confirmed on approximately 13,000 devices, primarily in Russia, Japan, Germany, Brazil, and the Netherlands. The firmware-integrated variant remains dormant if the device's language or timezone is associated with China and ceases to function without the Google Play Store and Play Services. While currently focused on ad fraud, Keenadu has extensive capabilities for data theft and risky actions on compromised devices. A variant embedded in system applications has limited functionality but elevated privileges to install apps without user notification. The malware has been detected in the firmware of Android tablets from various manufacturers, including the Alldocube iPlay 50 mini Pro. Kaspersky has detailed how Keenadu compromises the libandroid_runtime.so component, making it difficult to remove with standard Android OS tools. Users are advised to seek clean firmware versions or consider replacing compromised devices with products from trusted vendors.
AppWizard
February 15, 2026
In a recent poll, 20% of respondents favored mainstream applications, while 80% preferred underdog alternatives. Vivaldi is a web browser that prioritizes user privacy and offers extensive customization options, built on a Chromium foundation for compatibility with Chrome extensions. Anytype is an offline-first application that combines features of Notion and Obsidian, focusing on privacy and security. Deezer is highlighted as a superior music streaming service compared to Spotify, with an extensive library and a user-friendly interface that includes a personalized music recommendation feature called Flow. Perplexity is an AI platform that provides verified sources and a user-friendly interface, offering access to multiple AI models through a single subscription. Superlist is a to-do list application developed by the creators of Wunderlist, featuring natural language input, AI-driven task organization, and a free version with a Pro subscription for expanded features.
AppWizard
February 12, 2026
Russia has announced steps to block WhatsApp, part of a broader initiative to control foreign technology while promoting its own messaging app, MAX. WhatsApp has about 100 million users in Russia and 3 billion globally, and has expressed commitment to keeping users connected amid these challenges. Russian regulators have also imposed restrictions on Meta's platforms, including Facebook and Instagram, as well as international media outlets. Kremlin spokesperson Dmitry Peskov noted that Meta could resume operations in Russia if it complies with local laws. Russian authorities have removed WhatsApp from an online directory managed by communications regulator Roskomnadzor. Additionally, users of Telegram in Russia reported slow traffic and potential restrictions, with the app's founder asserting a commitment to freedom and privacy despite government pressure.
Winsage
February 11, 2026
Microsoft has released updates addressing over 50 vulnerabilities in its Windows operating systems and applications, including six critical zero-day vulnerabilities. 1. CVE-2026-21510: A security feature bypass in Windows Shell that allows execution of malicious content via a single click on a link, affecting all supported Windows versions. 2. CVE-2026-21513: Targets MSHTML, the web browser engine in Windows. 3. CVE-2026-21514: A security feature bypass in Microsoft Word. 4. CVE-2026-21533: Allows local attackers to gain SYSTEM level access in Windows Remote Desktop Services. 5. CVE-2026-21519: An elevation of privilege flaw in the Desktop Window Manager (DWM). 6. CVE-2026-21525: A potential denial-of-service threat in the Windows Remote Access Connection Manager. Additionally, the updates include fixes for remote code execution vulnerabilities affecting GitHub Copilot and various IDEs, specifically CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256, which arise from a command injection flaw. Security experts emphasize the importance of safeguarding developers due to their access to sensitive data and recommend applying least-privilege principles.
Search