[ad_1] An unknown hacker has leaked the entirety of Twitch’s source code among a 128 GB trove of data released this week. The hack, first reported by Video Games Chronicle and confirmed by multiple sources, includes: The entirety of twitch.tv, with commit history going back to its early beginnings Mobile, desktop and console Twitch clients
[ad_1] Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for
[ad_1] Volexity, a cyber security company based in the US, recently reported through a blog post that it had observed malicious code on Daily NK’s website from “at least late March 2021 until early June 2021.” Daily NK discovered signs of what the cyber security company had found in late 2020. Following the discovery, Daily
[ad_1] Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for July 2021. Researchers report that while Trickbot is still the most prevalent malware, Snake Keylogger, which was first detected in November 2020,
[ad_1] Canadian cybersecurity teams face a wide range of threats, but the most common vulnerability exploit type is remote code execution (RCE), according to a report from Check Point Software Technologies. In its annual mid-year attack trends report, which uses data from customers, the company said that in 61 per cent of attacks against Canadian
[ad_1] Online forum posts reviewed by CNN Business and vetted by an independent cybersecurity expert show that on June 6, hackers claimed to have obtained 780 gigabytes of data from EA (EA), including the Frostbite source code, which is the game engine that powers the FIFA, Madden, and Battlefield series of video games, among others.
[ad_1] An infosec firm accidentally published a proof-of-concept exploit for a critical Windows print spooler vulnerability that can be abused by rogue users to compromise Active Directory domain controllers. How this happened is a little messy. Rewind to June 8’s Patch Tuesday, and Microsoft issued a fix for CVE-2021-1675, which was labeled a privilege-escalation vulnerability.