In January, Jake Lee and I wrote an article about the merits of using 17 U.S.C. § 1201 to sue video game hack developers.[1] Importantly, § 1201 can be asserted separately from traditional copyright ...
A hacker has compromised a little-known, but popular 2.4MB software package that's downloaded over 100 million times per week and is widely used across apps. The IT security community is sounding the ...
Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy ...
Self-propagating npm worm steals tokens via postinstall hooks, impacting six packages and expanding supply chain attacks.
Matthew is a journalist in the news department at GameRant. He holds a Bachelor's degree in journalism from Kent State University and has been an avid gamer since 1985. Matthew formerly served as a ...
A core developer working for Solana-based (CRYPTO: SOL) decentralized exchange, Cypher, admitted to misappropriating funds worth more than $300 million meant to compensate victims of a sensational ...
Breach tied to compromised AI tool may have exposed credentials used by app frontends, the user-facing layer that connects ...
A widely used PyPI package, 'elementary-data', was compromised through a malicious update that inserted infostealer code via a GitHub Actions workflow. The breach potentially exposed SSH keys, cloud ...
A potential security crisis was narrowly avoided after a hacker exploited a developer's access token to inject malicious code into a key toolkit used by applications on the XRP Ledger. The ...
Hackers release data about Grand Theft Auto 6 developer Rockstar Games, following initial reports about a breach occurring at the studio.
If you were a maturing technology company, where would you look to recruit top-tier engineering talent? College campuses? Craigslist? LinkedIn? Try the hacker world. George Hotz, 21, isn’t only the ...