Search results: game development

EA’s Source: It’s in the Game (and in Hackers’ Hands)

EA’s Source: It’s in the Game (and in Hackers’ Hands)

Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools ...
Security Boulevard

Operation ShadowHammer: Hackers planted malware code in video games

Hackers targeted Asian video game software houses by poisoning developer tools that left game players with trojanised code running on their computers. The post Operation ShadowHammer: Hackers planted malware code in video ...
quantum computing, AI, DigiCert encryption,QKD quantum

The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords

Cybersecurity professionals will finally have the chance to harness AI for good, and more efficiently and effectively than attackers ...
Security Boulevard
Protecting Business from the Inside Out: A Layered Approach to Cybersecurity

Protecting Business from the Inside Out: A Layered Approach to Cybersecurity

Learn how taking an internal, layered approach to cybersecurity – including training staff, controlling access, monitoring activity, and incident planning – helps protect valuable company data and resources from compromise ...
vishing, businesses, deepfake, misinformation, AI, deepfake technology

Congress Responds to Deepfake Nudes

Whenever there is a new problem—like AI-generated deepfake nudes—regulators and legislators look for new solutions ...
Security Boulevard
geenrative AI, data security, AI, data security, AI-driven

Generative AI: Adopted on Both Sides of the Data Security Battle

In cybersecurity, generative AI and large language models (LLMs) have sparked optimism and concern in almost equal measure ...
Security Boulevard
generative AI, cybersecurity, ProtectAI generative AI ASPM CSPM SIEM cybersecurity application Palo Alto Networks OT CISO

The AI Paradox: Balancing Generative AI Adoption With Cybersecurity Risks

As AI models become more sophisticated, the potential for misuse or unintended consequences grows, emphasizing the need for robust oversight and a proactive approach to governance ...
Security Boulevard
ransomware, zero-trust,

IBM: New Gootloader Variant Moves Laterally and Is Harder to Detect

The operators of the Gootloader malware that is used to gain a foothold in enterprises now have a new weapon in the form of a variant that can more easily move laterally ...
Security Boulevard

Secure Guardrails