• Massive aluminum snake casting is now being used as a water cooling loop for PCs. It's pretty much just a trend these days, moving from hardcore casemodders to regular builds. Not sure how many people are really into it, but it seems to be part of the whole performance PC scene now. Water cooling has become pretty routine, I guess.

    Anyway, if you're into this kind of stuff, you might find it interesting. Or not. Just another day in the world of PCs.

    #WaterCooling #PCBuilding #AluminumCasting #TechTrends #PerformancePC
    Massive aluminum snake casting is now being used as a water cooling loop for PCs. It's pretty much just a trend these days, moving from hardcore casemodders to regular builds. Not sure how many people are really into it, but it seems to be part of the whole performance PC scene now. Water cooling has become pretty routine, I guess. Anyway, if you're into this kind of stuff, you might find it interesting. Or not. Just another day in the world of PCs. #WaterCooling #PCBuilding #AluminumCasting #TechTrends #PerformancePC
    HACKADAY.COM
    Massive Aluminum Snake Casting Becomes Water Cooling Loop For PC
    Water cooling was once only the preserve of hardcore casemodders and overclockers. Today, it’s pretty routinely used in all sorts of performance PC builds. However, few are using large artistic …read more
    Like
    Love
    Wow
    Sad
    Angry
    124
    1 Комментарии 0 Поделились 0 предпросмотр
  • So, 3D printing is the new miracle of the age, right? I mean, who wouldn’t want to create a wobbly masterpiece that may or may not serve a purpose? Enter “Bearing Witness: Measuring the Wobbles in Rotary Build,” where we’re not just printing – we’re measuring the fine art of uncertainty! Because nothing screams innovation like a printer that might just produce a paperweight instead of a prototype.

    Shoutout to BubsBuilds on YouTube for diving into the riveting world of reliability—because who needs a dependable product when you can have the thrill of suspense? Tune in to see if your next creation holds up or crumbles under the slightest pressure!

    #3DPrinting #Wobb
    So, 3D printing is the new miracle of the age, right? I mean, who wouldn’t want to create a wobbly masterpiece that may or may not serve a purpose? Enter “Bearing Witness: Measuring the Wobbles in Rotary Build,” where we’re not just printing – we’re measuring the fine art of uncertainty! Because nothing screams innovation like a printer that might just produce a paperweight instead of a prototype. Shoutout to BubsBuilds on YouTube for diving into the riveting world of reliability—because who needs a dependable product when you can have the thrill of suspense? Tune in to see if your next creation holds up or crumbles under the slightest pressure! #3DPrinting #Wobb
    HACKADAY.COM
    Bearing Witness: Measuring the Wobbles in Rotary Build
    3D printing has simplified the creation of many things, but part of making something is knowing just how much you can rely on it. On the [BubsBuilds] YouTube channel, he …read more
    Like
    Love
    Wow
    Sad
    Angry
    46
    1 Комментарии 0 Поделились 0 предпросмотр
  • SIGGRAPH 2025, French Pavilion, Cap Digital, CNC, Vancouver, summer events, tech conferences, French companies, digital creativity, animation and graphics

    ## Introduction

    As summer approaches, excitement builds for one of the most anticipated events in the tech and digital creative industries: SIGGRAPH 2025! This year, from August 10 to 14, Vancouver will transform into a vibrant hub of innovation and creativity, bringing together professionals from around the globe. Here’s where the magic h...
    SIGGRAPH 2025, French Pavilion, Cap Digital, CNC, Vancouver, summer events, tech conferences, French companies, digital creativity, animation and graphics ## Introduction As summer approaches, excitement builds for one of the most anticipated events in the tech and digital creative industries: SIGGRAPH 2025! This year, from August 10 to 14, Vancouver will transform into a vibrant hub of innovation and creativity, bringing together professionals from around the globe. Here’s where the magic h...
    SIGGRAPH 2025: This Summer, Showcase at the French Pavilion!
    SIGGRAPH 2025, French Pavilion, Cap Digital, CNC, Vancouver, summer events, tech conferences, French companies, digital creativity, animation and graphics ## Introduction As summer approaches, excitement builds for one of the most anticipated events in the tech and digital creative industries: SIGGRAPH 2025! This year, from August 10 to 14, Vancouver will transform into a vibrant hub of...
    Like
    Love
    Wow
    Sad
    Angry
    444
    1 Комментарии 0 Поделились 0 предпросмотр
  • Time Complexity of Sorting Algorithms in Python, Java, and C++

    Posted on : June 13, 2025

    By

    Tech World Times

    Development and Testing 

    Rate this post

    Sorting helps organize data in a specific order. It is used in search, reports, and efficient storage. Different sorting algorithms offer different performance. In this article, we will explain the Time Complexity of Sorting Algorithms in simple words. We will cover Python, Java, and C++ examples.
    1. What Is Time Complexity?
    Time complexity tells how fast an algorithm runs. It measures the number of steps as input grows. It is written in Big-O notation. For example, Omeans steps grow with the square of inputs.
    2. Types of Time Complexity
    Here are common types:

    O: Constant time
    O: Linear time
    O: Log-linear time
    O: Quadratic time

    We will now apply these to sorting.
    3. Bubble Sort
    Bubble Sort compares two numbers and swaps them if needed. It repeats until the list is sorted.
    Time Complexity:

    Best Case: OAverage Case: OWorst Case: OPython Example:
    pythonCopyEditdef bubble_sort:
    n = lenfor i in range:
    for j in range:
    if arr> arr:
    arr, arr= arr, arrJava Example:
    javaCopyEditvoid bubbleSort{
    int n = arr.length;
    forforif{
    int temp = arr;
    arr= arr;
    arr= temp;
    }
    }

    C++ Example:
    cppCopyEditvoid bubbleSort{
    forforifswap;
    }

    4. Selection Sort
    This sort picks the smallest number and places it at the front.
    Time Complexity:

    Best Case: OAverage Case: OWorst Case: OPython Example:
    pythonCopyEditdef selection_sort:
    for i in range):
    min_idx = i
    for j in range):
    if arr< arr:
    min_idx = j
    arr, arr= arr, arr5. Insertion Sort
    This algorithm builds the final list one item at a time.
    Time Complexity:

    Best Case: OAverage Case: OWorst Case: OJava Example:
    javaCopyEditvoid insertionSort{
    for{
    int key = arr;
    int j = i - 1;
    while{
    arr= arr;
    j = j - 1;
    }
    arr= key;
    }
    }

    6. Merge Sort
    Merge Sort splits the array into halves and merges them back in order.
    Time Complexity of Sorting Algorithms like Merge Sort is usually better.

    Best Case: OAverage Case: OWorst Case: OPython Example:
    pythonCopyEditdef merge_sort:
    if len> 1:
    mid = len// 2
    left = arrright = arrmerge_sortmerge_sorti = j = k = 0
    while i < lenand j < len:
    if left< right:
    arr= lefti += 1
    else:
    arr= rightj += 1
    k += 1

    arr= left+ right7. Quick Sort
    Quick Sort picks a pivot and places smaller numbers before it.
    Time Complexity:

    Best Case: OAverage Case: OWorst Case: OC++ Example:
    cppCopyEditint partition{
    int pivot = arr;
    int i = low - 1;
    for{
    if{
    i++;
    swap;
    }
    }
    swap;
    return i + 1;
    }

    void quickSort{
    if{
    int pi = partition;
    quickSort;
    quickSort;
    }
    }

    8. Built-in Sort Methods
    Languages have built-in sort functions. These are well-optimized.

    Python: sortedor list.sortuses TimSort

    Time Complexity: OJava: Arrays.sortuses Dual-Pivot QuickSort

    Time Complexity: OC++: std::sortuses IntroSort

    Time Complexity: OThese are better for most real-world tasks.
    9. Time Complexity Comparison Table
    AlgorithmBestAverageWorstStableBubble SortOOOYesSelection SortOOONoInsertion SortOOOYesMerge SortOOOYesQuick SortOOONoTimSortOOOYesIntroSortOOONo
    10. How to Choose the Right Algorithm?

    Use Merge Sort for large stable data.
    Use Quick Sort for faster average speed.
    Use Insertion Sort for small or nearly sorted lists.
    Use built-in sort functions unless you need control.

    Conclusion
    The Time Complexity of Sorting Algorithms helps us pick the right tool. Bubble, Selection, and Insertion Sort are simple but slow. Merge and Quick Sort are faster and used often. Built-in functions are highly optimized. Python, Java, and C++ each have their strengths.
    Understand your problem and input size. Then pick the sorting method. This ensures better speed and performance in your code.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #time #complexity #sorting #algorithms #python
    Time Complexity of Sorting Algorithms in Python, Java, and C++
    Posted on : June 13, 2025 By Tech World Times Development and Testing  Rate this post Sorting helps organize data in a specific order. It is used in search, reports, and efficient storage. Different sorting algorithms offer different performance. In this article, we will explain the Time Complexity of Sorting Algorithms in simple words. We will cover Python, Java, and C++ examples. 1. What Is Time Complexity? Time complexity tells how fast an algorithm runs. It measures the number of steps as input grows. It is written in Big-O notation. For example, Omeans steps grow with the square of inputs. 2. Types of Time Complexity Here are common types: O: Constant time O: Linear time O: Log-linear time O: Quadratic time We will now apply these to sorting. 3. Bubble Sort Bubble Sort compares two numbers and swaps them if needed. It repeats until the list is sorted. Time Complexity: Best Case: OAverage Case: OWorst Case: OPython Example: pythonCopyEditdef bubble_sort: n = lenfor i in range: for j in range: if arr> arr: arr, arr= arr, arrJava Example: javaCopyEditvoid bubbleSort{ int n = arr.length; forforif{ int temp = arr; arr= arr; arr= temp; } } C++ Example: cppCopyEditvoid bubbleSort{ forforifswap; } 4. Selection Sort This sort picks the smallest number and places it at the front. Time Complexity: Best Case: OAverage Case: OWorst Case: OPython Example: pythonCopyEditdef selection_sort: for i in range): min_idx = i for j in range): if arr< arr: min_idx = j arr, arr= arr, arr5. Insertion Sort This algorithm builds the final list one item at a time. Time Complexity: Best Case: OAverage Case: OWorst Case: OJava Example: javaCopyEditvoid insertionSort{ for{ int key = arr; int j = i - 1; while{ arr= arr; j = j - 1; } arr= key; } } 6. Merge Sort Merge Sort splits the array into halves and merges them back in order. Time Complexity of Sorting Algorithms like Merge Sort is usually better. Best Case: OAverage Case: OWorst Case: OPython Example: pythonCopyEditdef merge_sort: if len> 1: mid = len// 2 left = arrright = arrmerge_sortmerge_sorti = j = k = 0 while i < lenand j < len: if left< right: arr= lefti += 1 else: arr= rightj += 1 k += 1 arr= left+ right7. Quick Sort Quick Sort picks a pivot and places smaller numbers before it. Time Complexity: Best Case: OAverage Case: OWorst Case: OC++ Example: cppCopyEditint partition{ int pivot = arr; int i = low - 1; for{ if{ i++; swap; } } swap; return i + 1; } void quickSort{ if{ int pi = partition; quickSort; quickSort; } } 8. Built-in Sort Methods Languages have built-in sort functions. These are well-optimized. Python: sortedor list.sortuses TimSort Time Complexity: OJava: Arrays.sortuses Dual-Pivot QuickSort Time Complexity: OC++: std::sortuses IntroSort Time Complexity: OThese are better for most real-world tasks. 9. Time Complexity Comparison Table AlgorithmBestAverageWorstStableBubble SortOOOYesSelection SortOOONoInsertion SortOOOYesMerge SortOOOYesQuick SortOOONoTimSortOOOYesIntroSortOOONo 10. How to Choose the Right Algorithm? Use Merge Sort for large stable data. Use Quick Sort for faster average speed. Use Insertion Sort for small or nearly sorted lists. Use built-in sort functions unless you need control. Conclusion The Time Complexity of Sorting Algorithms helps us pick the right tool. Bubble, Selection, and Insertion Sort are simple but slow. Merge and Quick Sort are faster and used often. Built-in functions are highly optimized. Python, Java, and C++ each have their strengths. Understand your problem and input size. Then pick the sorting method. This ensures better speed and performance in your code. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #time #complexity #sorting #algorithms #python
    TECHWORLDTIMES.COM
    Time Complexity of Sorting Algorithms in Python, Java, and C++
    Posted on : June 13, 2025 By Tech World Times Development and Testing  Rate this post Sorting helps organize data in a specific order. It is used in search, reports, and efficient storage. Different sorting algorithms offer different performance. In this article, we will explain the Time Complexity of Sorting Algorithms in simple words. We will cover Python, Java, and C++ examples. 1. What Is Time Complexity? Time complexity tells how fast an algorithm runs. It measures the number of steps as input grows. It is written in Big-O notation. For example, O(n²) means steps grow with the square of inputs. 2. Types of Time Complexity Here are common types: O(1): Constant time O(n): Linear time O(n log n): Log-linear time O(n²): Quadratic time We will now apply these to sorting. 3. Bubble Sort Bubble Sort compares two numbers and swaps them if needed. It repeats until the list is sorted. Time Complexity: Best Case: O(n) (if already sorted) Average Case: O(n²) Worst Case: O(n²) Python Example: pythonCopyEditdef bubble_sort(arr): n = len(arr) for i in range(n): for j in range(n - i - 1): if arr[j] > arr[j+1]: arr[j], arr[j+1] = arr[j+1], arr[j] Java Example: javaCopyEditvoid bubbleSort(int arr[]) { int n = arr.length; for (int i = 0; i < n-1; i++) for (int j = 0; j < n-i-1; j++) if (arr[j] > arr[j+1]) { int temp = arr[j]; arr[j] = arr[j+1]; arr[j+1] = temp; } } C++ Example: cppCopyEditvoid bubbleSort(int arr[], int n) { for (int i = 0; i < n-1; i++) for (int j = 0; j < n-i-1; j++) if (arr[j] > arr[j+1]) swap(arr[j], arr[j+1]); } 4. Selection Sort This sort picks the smallest number and places it at the front. Time Complexity: Best Case: O(n²) Average Case: O(n²) Worst Case: O(n²) Python Example: pythonCopyEditdef selection_sort(arr): for i in range(len(arr)): min_idx = i for j in range(i+1, len(arr)): if arr[j] < arr[min_idx]: min_idx = j arr[i], arr[min_idx] = arr[min_idx], arr[i] 5. Insertion Sort This algorithm builds the final list one item at a time. Time Complexity: Best Case: O(n) Average Case: O(n²) Worst Case: O(n²) Java Example: javaCopyEditvoid insertionSort(int arr[]) { for (int i = 1; i < arr.length; i++) { int key = arr[i]; int j = i - 1; while (j >= 0 && arr[j] > key) { arr[j + 1] = arr[j]; j = j - 1; } arr[j + 1] = key; } } 6. Merge Sort Merge Sort splits the array into halves and merges them back in order. Time Complexity of Sorting Algorithms like Merge Sort is usually better. Best Case: O(n log n) Average Case: O(n log n) Worst Case: O(n log n) Python Example: pythonCopyEditdef merge_sort(arr): if len(arr) > 1: mid = len(arr) // 2 left = arr[:mid] right = arr[mid:] merge_sort(left) merge_sort(right) i = j = k = 0 while i < len(left) and j < len(right): if left[i] < right[j]: arr[k] = left[i] i += 1 else: arr[k] = right[j] j += 1 k += 1 arr[k:] = left[i:] + right[j:] 7. Quick Sort Quick Sort picks a pivot and places smaller numbers before it. Time Complexity: Best Case: O(n log n) Average Case: O(n log n) Worst Case: O(n²) C++ Example: cppCopyEditint partition(int arr[], int low, int high) { int pivot = arr[high]; int i = low - 1; for (int j = low; j < high; j++) { if (arr[j] < pivot) { i++; swap(arr[i], arr[j]); } } swap(arr[i+1], arr[high]); return i + 1; } void quickSort(int arr[], int low, int high) { if (low < high) { int pi = partition(arr, low, high); quickSort(arr, low, pi - 1); quickSort(arr, pi + 1, high); } } 8. Built-in Sort Methods Languages have built-in sort functions. These are well-optimized. Python: sorted() or list.sort() uses TimSort Time Complexity: O(n log n) Java: Arrays.sort() uses Dual-Pivot QuickSort Time Complexity: O(n log n) C++: std::sort() uses IntroSort Time Complexity: O(n log n) These are better for most real-world tasks. 9. Time Complexity Comparison Table AlgorithmBestAverageWorstStableBubble SortO(n)O(n²)O(n²)YesSelection SortO(n²)O(n²)O(n²)NoInsertion SortO(n)O(n²)O(n²)YesMerge SortO(n log n)O(n log n)O(n log n)YesQuick SortO(n log n)O(n log n)O(n²)NoTimSort (Python)O(n)O(n log n)O(n log n)YesIntroSort (C++)O(n log n)O(n log n)O(n log n)No 10. How to Choose the Right Algorithm? Use Merge Sort for large stable data. Use Quick Sort for faster average speed. Use Insertion Sort for small or nearly sorted lists. Use built-in sort functions unless you need control. Conclusion The Time Complexity of Sorting Algorithms helps us pick the right tool. Bubble, Selection, and Insertion Sort are simple but slow. Merge and Quick Sort are faster and used often. Built-in functions are highly optimized. Python, Java, and C++ each have their strengths. Understand your problem and input size. Then pick the sorting method. This ensures better speed and performance in your code. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    Like
    Love
    Wow
    Sad
    Angry
    570
    2 Комментарии 0 Поделились 0 предпросмотр
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Комментарии 0 Поделились 0 предпросмотр
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Комментарии 0 Поделились 0 предпросмотр
  • Tony Hawk’s Pro Skater 3 + 4 — Returning Skaters

    The roster of skaters originally featured in Tony Hawk’s™ Pro Skater™ 3 and Tony Hawk’s™ Pro Skater™ 4 helped to further catapult skateboarding culture into the mainstream as big names like Bob Burnquist, Steve Caballero, Elissa Steamer, and Chad Muska joined Tony Hawk in a stacked roster of award-winning pro skaters capable of shredding in and out of the game.
    In this feature, following the Demo announcement and the full soundtrack reveal, we’re proud to share the full roster of returning skaters in the upcoming Tony Hawk’s™ Pro Skater™ 3 + 4arriving on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, Nintendo Switch 2, and PC.
    Tony Hawk’s Pro Skater 3 + 4 launches on July 11.
    THPS 3 + 4: Returning Skaters

    From gold medalists to progenitors of some of today’s most iconic skateboarding tricks, these classic skaters were instrumental in bringing skateboarding culture to a wider audience. Mixing courage, creativity, and an iron will, they’re more than ready to tackle any obstacle put before them.
    “Being in the original games was epic!” shares Elissa Steamer, who was the first playable female skater in the original Tony Hawk’s Pro Skater game. “It was semi-life changing. I can’t say enough about how stoked I was – and am now! – to be in the games.”
    “From the moment Tony asked, it was an honor, yet I had no idea of what it would come to mean,” says Rodney Mullen, originator of the kickflip and largely considered one of the most influential skaters in the sport. “The first time I showed up on tour after the release of the game, I recall ‘em shop owners having to put me on top of the tour van roof to manage so that I could sign things in all the madness. The crowd was rocking the van back and forth!blew my mind, the impact it had.”
    “The game attracted such a broader group of skaters, which has elevated our community in layered ways: from tricks to societal acceptance to the respect we get from people who often thought otherwise, like parents discouraging their kids who were simply outsiders looking for a place to belong,” Mullen continues. “Skating is integrated with a culture, a way of being, more than pretty much any other sport I can think of. The way Tony’s game shows that via the music, art, and vibe batted this home. It’s cool to be understood.”
     When Tony Hawk’s Pro Skater 3 + 4 launches this July, here are the returning skaters ready to hit the pavement once again, including skaters featured in the original Tony Hawk’s Pro Skater 3 and Tony Hawk’s Pro Skater 4 games plus other titles in the series.
    Tony Hawk

    San Diego, California
    Style: Vert / Stance: Goofy
    Tony Hawk made history by landing the first ever 900 at the 1999 X Games, skyrocketing the sport into the mainstream. Today he remains the sport’s most iconic figure.
    Bob Burnquist

    Rio de Janeiro, Brazil
    Style: Vert / Stance: Regular
    Bob Burnquist shocked the skateboarding world when he landed the first Fakie 900. His iconic “Dreamland” skatepark is home to a permanent Mega Ramp.
    Bucky Lasek

    Baltimore, Maryland
    Style: Vert / Stance: Regular
    Known for his vert skills, Bucky has won 10 gold medals at the X Games and is one of only two vert skateboarders to have won three gold medals consecutively.
    Steve Caballero

    San Jose, California
    Style: Vert / Stance: Goofy
    An iconic skateboarder responsible for inventing various vert tricks. He holds the record for the highest air ever achieved on a halfpipe.
    Kareem Campbell

    Harlem, New York
    Style: Street / Stance: Regular
    Called the godfather of smooth street style, Kareem left his mark by popularizing the skateboard trick, “The Ghetto Bird,” and founded City Stars Skateboards.
    Geoff Rowley

    Liverpool, England
    Style: Street / Stance: Regular
    Geoff Joseph Rowley Jr. is an English skateboarder and owner of Civilware Service Corporation. In 2000 he was crowned “Skater of the Year” by Thrasher Magazine.
    Andrew Reynolds

    North Hollywood, California
    Style: Street / Stance: Regular
    Co-founder and owner of Baker Skateboards, Andrew Reynolds turned pro in 1995 and won Thrasher Magazine’s “Skater of the Year” award just three years later.
    Elissa Steamer

    San Francisco, California
    Style: Street / Stance: Regular
    Elissa is a four-time X Games gold medalist, the first female skateboarder to go pro, and the first woman ever inducted into the Skateboarding Hall of Fame.
    Chad Muska

    Los Angeles, California
    Style: Street / Stance: Regular
    Artist, musician, and entrepreneur. Described by the Transworld Skateboarding editor-in-chief as “one of the most marketable pros skateboarding has ever seen.”
    Eric Koston

    Los Angeles, California
    Style: Street / Stance: Goofy
    Co-founder of Fourstar Clothing and the skate brand The Berrics, Eric is a master of street skateboarding and a two-time X Games gold medalist.
    Rodney Mullen

    Gainesville, Florida
    Style: Freestyle / Stance: Regular
    One of the most influential skateboarders of all time, Rodney Mullen is the progenitor of the Flatground Ollie, Kickflip, Heelflip, and dozens of other iconic tricks.
    Jamie Thomas

    Dothan, Alabama
    Style: Street / Stance: Regular
    Nicknamed “The Chief,” Jamie is the owner and founder of Zero Skateboards. He helped film 1996’s “Welcome to Hell,” one of the most iconic skate videos ever made.
    Rune Glifberg

    Copenhagen, Denmark
    Style: Vert / Stance: Regular
    Nicknamed “The Danish Destroyer,” Rune Glifberg is one of three skaters to have competed at every X Games, amassing over 12 medals at the competition.
    Aori Nishimura

    Tokyo, Japan
    Style: Street / Stance: Regular
    Born in Edogawa, Tokyo in Japan, Aori Nishimura started skateboarding at the age of 7 and went on to become the first athlete from Japan to win gold at the X Games.
    Leo Baker

    Brooklyn, New York
    Style: Street / Stance: Goofy
    Leo is the first non-binary and transgender professional skateboarder in the Pro Skater™ series and has won three gold medals, placing in over 32 competitions. 
    Leticia Bufoni

    São Paulo, Brazil
    Style: Street / Stance: Goofy
    Multiple world record holder and six-time gold medalist. Named the #1 women’s street skateboarder by World Cup of Skateboarding four years in a row.
    Lizzie Armanto

    Santa Monica, California
    Style: Park / Stance: Regular
    A member of the Birdhouse skate team, Lizzie has amassed over 30 skateboarding awards and was the first female skater to complete “The Loop,” a 360-degree ramp.
    Nyjah Huston

    Laguna Beach, California
    Style: Street / Stance: Goofy
    One of skateboarding’s biggest stars, Nyjah has earned over 12 X Games gold medals, 6 Championship titles, and a bronze medal at the 2024 Summer of Olympics.
    Riley Hawk

    San Diego, California
    Style: Street / Stance: Goofy
    Riley Hawk decided to turn pro on his 21st birthday and became Skateboarder Magazine’s 2013 Amateur of the Year later that same day.
    Shane O’Neill

    Melbourne, Australia
    Style: Street / Stance: Goofy
    Australian skateboarder who is one of only a few skateboarders to win gold in all four major skateboarding contests, including the X Games and SLS.
    Tyshawn Jones

    Bronx, New York
    Style: Street / Stance: Regular
    A New York City native and two-time Thrasher Magazine “Skate of the Year” winner, Tyshawn Jones is the youngest skateboarder to ever achieve that accolade.

    The above skaters are far from the only icons you’ll encounter in the game’s large roster. Keep your eyes on the Tony Hawk’s Pro Skater blog found here for more info on Tony Hawk’s Pro Skater 3 + 4 as we approach its July 11 release date, including the full reveal of new skaters joining in on the fun. 

    Tony Hawk’s Pro Skater 3 + 4 rebuilds the original games from the ground up with classic and new skaters, parks, tricks, tracks, and more. Skate through a robust Career mode taking on challenges across two tours, chase high scores in Single Sessions and Speedruns, or go at your own pace in Free Skate.
    Get original with enhanced creation tools, go big in New Game+, and skate with your friends in cross-platform online multiplayer* supporting up to eight skaters at a time. New to the series? Hit up the in-game tutorial led by Tony Hawk himself to kick off your skating journey with tips on Ollies, kick flips, vert tricks, reverts, manuals, special tricks, and more.

    Don’t miss the Foundry Demo, available now, featuring playable skaters, two parks, and a selection of songs from the soundtrack. Pre-order Tony Hawk’s Pro Skater 3 + 4 on select platforms* for access to the demo and find more info here.

    Purchase the Digital Deluxe Edition and gain Early Access*** to play Tony Hawk’s™ Pro Skater™ 3 + 4 three days before the official July 11 launch date.
    Shred the parks and spread fear as the Doom Slayer and Revenant skaters plus get extra music, skate decks, and Create-A-Skater gear:

    Doom Slayer: Play as Doom Slayer, featuring a Standard and Retro outfit plus two unique special tricks and the Unmaykr Hoverboard.
    Revenant: Get evil with the Revenant, including two unique special tricks.
    Additional Music: Headbang to a selection of classic and modern music tracks added to the in-game soundtrack.
    Skate Decks: Access additional skate decks including Doom Slayer and Revenant themed designs.
    Create-A-Skater Items: Kit out your skater with additional apparel items.

    Pre-orders are now available for Tony Hawk’s Pro Skater 3 + 4 on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, and PC. For more information, visit tonyhawkthegame.com.
    * Activision account and internet required for online multiplayer and other features. Platform gaming subscription may be required for multiplayer and other features.
    **Foundry demo available on PlayStation 4 and 5, Xbox Series X|S, Xbox One, and PC. Not available on Nintendo Switch. Foundry Demo availability and launch datesubject to change. Internet connection required.
    *** Actual play time subject to possible outages and applicable time zone differences.
    #tony #hawks #pro #skater #returning
    Tony Hawk’s Pro Skater 3 + 4 — Returning Skaters
    The roster of skaters originally featured in Tony Hawk’s™ Pro Skater™ 3 and Tony Hawk’s™ Pro Skater™ 4 helped to further catapult skateboarding culture into the mainstream as big names like Bob Burnquist, Steve Caballero, Elissa Steamer, and Chad Muska joined Tony Hawk in a stacked roster of award-winning pro skaters capable of shredding in and out of the game. In this feature, following the Demo announcement and the full soundtrack reveal, we’re proud to share the full roster of returning skaters in the upcoming Tony Hawk’s™ Pro Skater™ 3 + 4arriving on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, Nintendo Switch 2, and PC. Tony Hawk’s Pro Skater 3 + 4 launches on July 11. THPS 3 + 4: Returning Skaters From gold medalists to progenitors of some of today’s most iconic skateboarding tricks, these classic skaters were instrumental in bringing skateboarding culture to a wider audience. Mixing courage, creativity, and an iron will, they’re more than ready to tackle any obstacle put before them. “Being in the original games was epic!” shares Elissa Steamer, who was the first playable female skater in the original Tony Hawk’s Pro Skater game. “It was semi-life changing. I can’t say enough about how stoked I was – and am now! – to be in the games.” “From the moment Tony asked, it was an honor, yet I had no idea of what it would come to mean,” says Rodney Mullen, originator of the kickflip and largely considered one of the most influential skaters in the sport. “The first time I showed up on tour after the release of the game, I recall ‘em shop owners having to put me on top of the tour van roof to manage so that I could sign things in all the madness. The crowd was rocking the van back and forth!blew my mind, the impact it had.” “The game attracted such a broader group of skaters, which has elevated our community in layered ways: from tricks to societal acceptance to the respect we get from people who often thought otherwise, like parents discouraging their kids who were simply outsiders looking for a place to belong,” Mullen continues. “Skating is integrated with a culture, a way of being, more than pretty much any other sport I can think of. The way Tony’s game shows that via the music, art, and vibe batted this home. It’s cool to be understood.”  When Tony Hawk’s Pro Skater 3 + 4 launches this July, here are the returning skaters ready to hit the pavement once again, including skaters featured in the original Tony Hawk’s Pro Skater 3 and Tony Hawk’s Pro Skater 4 games plus other titles in the series. Tony Hawk San Diego, California Style: Vert / Stance: Goofy Tony Hawk made history by landing the first ever 900 at the 1999 X Games, skyrocketing the sport into the mainstream. Today he remains the sport’s most iconic figure. Bob Burnquist Rio de Janeiro, Brazil Style: Vert / Stance: Regular Bob Burnquist shocked the skateboarding world when he landed the first Fakie 900. His iconic “Dreamland” skatepark is home to a permanent Mega Ramp. Bucky Lasek Baltimore, Maryland Style: Vert / Stance: Regular Known for his vert skills, Bucky has won 10 gold medals at the X Games and is one of only two vert skateboarders to have won three gold medals consecutively. Steve Caballero San Jose, California Style: Vert / Stance: Goofy An iconic skateboarder responsible for inventing various vert tricks. He holds the record for the highest air ever achieved on a halfpipe. Kareem Campbell Harlem, New York Style: Street / Stance: Regular Called the godfather of smooth street style, Kareem left his mark by popularizing the skateboard trick, “The Ghetto Bird,” and founded City Stars Skateboards. Geoff Rowley Liverpool, England Style: Street / Stance: Regular Geoff Joseph Rowley Jr. is an English skateboarder and owner of Civilware Service Corporation. In 2000 he was crowned “Skater of the Year” by Thrasher Magazine. Andrew Reynolds North Hollywood, California Style: Street / Stance: Regular Co-founder and owner of Baker Skateboards, Andrew Reynolds turned pro in 1995 and won Thrasher Magazine’s “Skater of the Year” award just three years later. Elissa Steamer San Francisco, California Style: Street / Stance: Regular Elissa is a four-time X Games gold medalist, the first female skateboarder to go pro, and the first woman ever inducted into the Skateboarding Hall of Fame. Chad Muska Los Angeles, California Style: Street / Stance: Regular Artist, musician, and entrepreneur. Described by the Transworld Skateboarding editor-in-chief as “one of the most marketable pros skateboarding has ever seen.” Eric Koston Los Angeles, California Style: Street / Stance: Goofy Co-founder of Fourstar Clothing and the skate brand The Berrics, Eric is a master of street skateboarding and a two-time X Games gold medalist. Rodney Mullen Gainesville, Florida Style: Freestyle / Stance: Regular One of the most influential skateboarders of all time, Rodney Mullen is the progenitor of the Flatground Ollie, Kickflip, Heelflip, and dozens of other iconic tricks. Jamie Thomas Dothan, Alabama Style: Street / Stance: Regular Nicknamed “The Chief,” Jamie is the owner and founder of Zero Skateboards. He helped film 1996’s “Welcome to Hell,” one of the most iconic skate videos ever made. Rune Glifberg Copenhagen, Denmark Style: Vert / Stance: Regular Nicknamed “The Danish Destroyer,” Rune Glifberg is one of three skaters to have competed at every X Games, amassing over 12 medals at the competition. Aori Nishimura Tokyo, Japan Style: Street / Stance: Regular Born in Edogawa, Tokyo in Japan, Aori Nishimura started skateboarding at the age of 7 and went on to become the first athlete from Japan to win gold at the X Games. Leo Baker Brooklyn, New York Style: Street / Stance: Goofy Leo is the first non-binary and transgender professional skateboarder in the Pro Skater™ series and has won three gold medals, placing in over 32 competitions.  Leticia Bufoni São Paulo, Brazil Style: Street / Stance: Goofy Multiple world record holder and six-time gold medalist. Named the #1 women’s street skateboarder by World Cup of Skateboarding four years in a row. Lizzie Armanto Santa Monica, California Style: Park / Stance: Regular A member of the Birdhouse skate team, Lizzie has amassed over 30 skateboarding awards and was the first female skater to complete “The Loop,” a 360-degree ramp. Nyjah Huston Laguna Beach, California Style: Street / Stance: Goofy One of skateboarding’s biggest stars, Nyjah has earned over 12 X Games gold medals, 6 Championship titles, and a bronze medal at the 2024 Summer of Olympics. Riley Hawk San Diego, California Style: Street / Stance: Goofy Riley Hawk decided to turn pro on his 21st birthday and became Skateboarder Magazine’s 2013 Amateur of the Year later that same day. Shane O’Neill Melbourne, Australia Style: Street / Stance: Goofy Australian skateboarder who is one of only a few skateboarders to win gold in all four major skateboarding contests, including the X Games and SLS. Tyshawn Jones Bronx, New York Style: Street / Stance: Regular A New York City native and two-time Thrasher Magazine “Skate of the Year” winner, Tyshawn Jones is the youngest skateboarder to ever achieve that accolade. The above skaters are far from the only icons you’ll encounter in the game’s large roster. Keep your eyes on the Tony Hawk’s Pro Skater blog found here for more info on Tony Hawk’s Pro Skater 3 + 4 as we approach its July 11 release date, including the full reveal of new skaters joining in on the fun.  Tony Hawk’s Pro Skater 3 + 4 rebuilds the original games from the ground up with classic and new skaters, parks, tricks, tracks, and more. Skate through a robust Career mode taking on challenges across two tours, chase high scores in Single Sessions and Speedruns, or go at your own pace in Free Skate. Get original with enhanced creation tools, go big in New Game+, and skate with your friends in cross-platform online multiplayer* supporting up to eight skaters at a time. New to the series? Hit up the in-game tutorial led by Tony Hawk himself to kick off your skating journey with tips on Ollies, kick flips, vert tricks, reverts, manuals, special tricks, and more. Don’t miss the Foundry Demo, available now, featuring playable skaters, two parks, and a selection of songs from the soundtrack. Pre-order Tony Hawk’s Pro Skater 3 + 4 on select platforms* for access to the demo and find more info here. Purchase the Digital Deluxe Edition and gain Early Access*** to play Tony Hawk’s™ Pro Skater™ 3 + 4 three days before the official July 11 launch date. Shred the parks and spread fear as the Doom Slayer and Revenant skaters plus get extra music, skate decks, and Create-A-Skater gear: Doom Slayer: Play as Doom Slayer, featuring a Standard and Retro outfit plus two unique special tricks and the Unmaykr Hoverboard. Revenant: Get evil with the Revenant, including two unique special tricks. Additional Music: Headbang to a selection of classic and modern music tracks added to the in-game soundtrack. Skate Decks: Access additional skate decks including Doom Slayer and Revenant themed designs. Create-A-Skater Items: Kit out your skater with additional apparel items. Pre-orders are now available for Tony Hawk’s Pro Skater 3 + 4 on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, and PC. For more information, visit tonyhawkthegame.com. * Activision account and internet required for online multiplayer and other features. Platform gaming subscription may be required for multiplayer and other features. **Foundry demo available on PlayStation 4 and 5, Xbox Series X|S, Xbox One, and PC. Not available on Nintendo Switch. Foundry Demo availability and launch datesubject to change. Internet connection required. *** Actual play time subject to possible outages and applicable time zone differences. #tony #hawks #pro #skater #returning
    WWW.TONYHAWKTHEGAME.COM
    Tony Hawk’s Pro Skater 3 + 4 — Returning Skaters
    The roster of skaters originally featured in Tony Hawk’s™ Pro Skater™ 3 and Tony Hawk’s™ Pro Skater™ 4 helped to further catapult skateboarding culture into the mainstream as big names like Bob Burnquist, Steve Caballero, Elissa Steamer, and Chad Muska joined Tony Hawk in a stacked roster of award-winning pro skaters capable of shredding in and out of the game. In this feature, following the Demo announcement and the full soundtrack reveal, we’re proud to share the full roster of returning skaters in the upcoming Tony Hawk’s™ Pro Skater™ 3 + 4arriving on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, Nintendo Switch 2, and PC (Battle.net, Steam, Microsoft PC Store). Tony Hawk’s Pro Skater 3 + 4 launches on July 11. THPS 3 + 4: Returning Skaters From gold medalists to progenitors of some of today’s most iconic skateboarding tricks, these classic skaters were instrumental in bringing skateboarding culture to a wider audience. Mixing courage, creativity, and an iron will, they’re more than ready to tackle any obstacle put before them. “Being in the original games was epic!” shares Elissa Steamer, who was the first playable female skater in the original Tony Hawk’s Pro Skater game. “It was semi-life changing. I can’t say enough about how stoked I was – and am now! – to be in the games.” “From the moment Tony asked, it was an honor, yet I had no idea of what it would come to mean,” says Rodney Mullen, originator of the kickflip and largely considered one of the most influential skaters in the sport. “The first time I showed up on tour after the release of the game, I recall ‘em shop owners having to put me on top of the tour van roof to manage so that I could sign things in all the madness. The crowd was rocking the van back and forth! [It] blew my mind, the impact it had.” “The game attracted such a broader group of skaters, which has elevated our community in layered ways: from tricks to societal acceptance to the respect we get from people who often thought otherwise, like parents discouraging their kids who were simply outsiders looking for a place to belong,” Mullen continues. “Skating is integrated with a culture, a way of being, more than pretty much any other sport I can think of. The way Tony’s game shows that via the music, art, and vibe batted this home. It’s cool to be understood.”  When Tony Hawk’s Pro Skater 3 + 4 launches this July, here are the returning skaters ready to hit the pavement once again, including skaters featured in the original Tony Hawk’s Pro Skater 3 and Tony Hawk’s Pro Skater 4 games plus other titles in the series. Tony Hawk San Diego, California Style: Vert / Stance: Goofy Tony Hawk made history by landing the first ever 900 at the 1999 X Games, skyrocketing the sport into the mainstream. Today he remains the sport’s most iconic figure. Bob Burnquist Rio de Janeiro, Brazil Style: Vert / Stance: Regular Bob Burnquist shocked the skateboarding world when he landed the first Fakie 900. His iconic “Dreamland” skatepark is home to a permanent Mega Ramp. Bucky Lasek Baltimore, Maryland Style: Vert / Stance: Regular Known for his vert skills, Bucky has won 10 gold medals at the X Games and is one of only two vert skateboarders to have won three gold medals consecutively. Steve Caballero San Jose, California Style: Vert / Stance: Goofy An iconic skateboarder responsible for inventing various vert tricks. He holds the record for the highest air ever achieved on a halfpipe. Kareem Campbell Harlem, New York Style: Street / Stance: Regular Called the godfather of smooth street style, Kareem left his mark by popularizing the skateboard trick, “The Ghetto Bird,” and founded City Stars Skateboards. Geoff Rowley Liverpool, England Style: Street / Stance: Regular Geoff Joseph Rowley Jr. is an English skateboarder and owner of Civilware Service Corporation. In 2000 he was crowned “Skater of the Year” by Thrasher Magazine. Andrew Reynolds North Hollywood, California Style: Street / Stance: Regular Co-founder and owner of Baker Skateboards, Andrew Reynolds turned pro in 1995 and won Thrasher Magazine’s “Skater of the Year” award just three years later. Elissa Steamer San Francisco, California Style: Street / Stance: Regular Elissa is a four-time X Games gold medalist, the first female skateboarder to go pro, and the first woman ever inducted into the Skateboarding Hall of Fame. Chad Muska Los Angeles, California Style: Street / Stance: Regular Artist, musician, and entrepreneur. Described by the Transworld Skateboarding editor-in-chief as “one of the most marketable pros skateboarding has ever seen.” Eric Koston Los Angeles, California Style: Street / Stance: Goofy Co-founder of Fourstar Clothing and the skate brand The Berrics, Eric is a master of street skateboarding and a two-time X Games gold medalist. Rodney Mullen Gainesville, Florida Style: Freestyle / Stance: Regular One of the most influential skateboarders of all time, Rodney Mullen is the progenitor of the Flatground Ollie, Kickflip, Heelflip, and dozens of other iconic tricks. Jamie Thomas Dothan, Alabama Style: Street / Stance: Regular Nicknamed “The Chief,” Jamie is the owner and founder of Zero Skateboards. He helped film 1996’s “Welcome to Hell,” one of the most iconic skate videos ever made. Rune Glifberg Copenhagen, Denmark Style: Vert / Stance: Regular Nicknamed “The Danish Destroyer,” Rune Glifberg is one of three skaters to have competed at every X Games, amassing over 12 medals at the competition. Aori Nishimura Tokyo, Japan Style: Street / Stance: Regular Born in Edogawa, Tokyo in Japan, Aori Nishimura started skateboarding at the age of 7 and went on to become the first athlete from Japan to win gold at the X Games. Leo Baker Brooklyn, New York Style: Street / Stance: Goofy Leo is the first non-binary and transgender professional skateboarder in the Pro Skater™ series and has won three gold medals, placing in over 32 competitions.  Leticia Bufoni São Paulo, Brazil Style: Street / Stance: Goofy Multiple world record holder and six-time gold medalist. Named the #1 women’s street skateboarder by World Cup of Skateboarding four years in a row. Lizzie Armanto Santa Monica, California Style: Park / Stance: Regular A member of the Birdhouse skate team, Lizzie has amassed over 30 skateboarding awards and was the first female skater to complete “The Loop,” a 360-degree ramp. Nyjah Huston Laguna Beach, California Style: Street / Stance: Goofy One of skateboarding’s biggest stars, Nyjah has earned over 12 X Games gold medals, 6 Championship titles, and a bronze medal at the 2024 Summer of Olympics. Riley Hawk San Diego, California Style: Street / Stance: Goofy Riley Hawk decided to turn pro on his 21st birthday and became Skateboarder Magazine’s 2013 Amateur of the Year later that same day. Shane O’Neill Melbourne, Australia Style: Street / Stance: Goofy Australian skateboarder who is one of only a few skateboarders to win gold in all four major skateboarding contests, including the X Games and SLS. Tyshawn Jones Bronx, New York Style: Street / Stance: Regular A New York City native and two-time Thrasher Magazine “Skate of the Year” winner, Tyshawn Jones is the youngest skateboarder to ever achieve that accolade. The above skaters are far from the only icons you’ll encounter in the game’s large roster. Keep your eyes on the Tony Hawk’s Pro Skater blog found here for more info on Tony Hawk’s Pro Skater 3 + 4 as we approach its July 11 release date, including the full reveal of new skaters joining in on the fun.  Tony Hawk’s Pro Skater 3 + 4 rebuilds the original games from the ground up with classic and new skaters, parks, tricks, tracks, and more. Skate through a robust Career mode taking on challenges across two tours, chase high scores in Single Sessions and Speedruns, or go at your own pace in Free Skate. Get original with enhanced creation tools, go big in New Game+, and skate with your friends in cross-platform online multiplayer* supporting up to eight skaters at a time. New to the series? Hit up the in-game tutorial led by Tony Hawk himself to kick off your skating journey with tips on Ollies, kick flips, vert tricks, reverts, manuals, special tricks, and more. Don’t miss the Foundry Demo, available now, featuring playable skaters, two parks, and a selection of songs from the soundtrack. Pre-order Tony Hawk’s Pro Skater 3 + 4 on select platforms* for access to the demo and find more info here. Purchase the Digital Deluxe Edition and gain Early Access*** to play Tony Hawk’s™ Pro Skater™ 3 + 4 three days before the official July 11 launch date. Shred the parks and spread fear as the Doom Slayer and Revenant skaters plus get extra music, skate decks, and Create-A-Skater gear: Doom Slayer: Play as Doom Slayer, featuring a Standard and Retro outfit plus two unique special tricks and the Unmaykr Hoverboard. Revenant: Get evil with the Revenant, including two unique special tricks. Additional Music: Headbang to a selection of classic and modern music tracks added to the in-game soundtrack. Skate Decks: Access additional skate decks including Doom Slayer and Revenant themed designs. Create-A-Skater Items: Kit out your skater with additional apparel items. Pre-orders are now available for Tony Hawk’s Pro Skater 3 + 4 on PlayStation 4 and 5, Xbox Series X|S, Xbox One, Nintendo Switch, and PC. For more information, visit tonyhawkthegame.com. * Activision account and internet required for online multiplayer and other features. Platform gaming subscription may be required for multiplayer and other features (sold separately). **Foundry demo available on PlayStation 4 and 5, Xbox Series X|S, Xbox One, and PC. Not available on Nintendo Switch. Foundry Demo availability and launch date(s) subject to change. Internet connection required. *** Actual play time subject to possible outages and applicable time zone differences.
    Like
    Love
    Wow
    Sad
    Angry
    526
    2 Комментарии 0 Поделились 0 предпросмотр
  • Building an Architectural Visualization Community: The Case for Physical Gatherings

    Barbara Betlejewska is a PR consultant and manager with extensive experience in architecture and real estate, currently involved with World Visualization Festival, a global event bringing together CGI and digital storytelling professionals for 3 days of presentations, workshops, and networking in Warsaw, Poland, this October.
    Over the last twenty years, visualization and 3D rendering have evolved from supporting tools to become central pillars of architectural storytelling, design development, and marketing across various industries. As digital technologies have advanced, the landscape of creative work has changed dramatically. Artists can now collaborate with clients worldwide without leaving their homes, and their careers can flourish without ever setting foot in a traditional studio.
    In this hyper-connected world, where access to knowledge, clients, and inspiration is just a click away, do we still need to gather in person? Do conferences, festivals and meetups in the CGI and architectural visualization world still carry weight?

    The People Behind the Pixels
    Professionals from the visualization industry exchanging ideas at WVF 2024.
    For a growing number of professionals — especially those in creative and tech-driven fields — remote work has become the norm. The shift to digital workflows, accelerated by the pandemic, has brought freedom and flexibility that many are reluctant to give up. It’s easier than ever to work for clients in distant cities or countries, to build a freelance career from a laptop, or to pursue the lifestyle of a digital nomad.
    On the surface, it is a broadening of horizons. But for many, the freedom of remote work comes with a cost: isolation. For visualization artists, the reality often means spending long hours alone, rarely interacting face-to-face with peers or collaborators. And while there are undeniable advantages to independent work, the lack of human connection can lead to creative stagnation, professional burnout, and a sense of detachment from the industry as a whole.
    Despite being a highly technical and often solitary craft, visualization and CGI thrive on the exchange of ideas, feedback and inspiration. The tools and techniques evolve rapidly, and staying relevant usually means learning not just from tutorials but from honest conversations with others who understand the nuances of the field.

    A Community in the Making
    Professionals from the visualization industry exchanging ideas at WVF 2024.
    That need for connection is what pushed Michał Nowak, a Polish visualizer and founder of Nowak Studio, to organize Poland’s first-ever architectural visualization meetup in 2017. With no background in event planning, he wasn’t sure where to begin, but he knew something was missing. The Polish Arch Viz scene lacked a shared space for meetings, discussions, and idea exchange. Michał wanted more than screen time; he wanted honest conversations, spontaneous collaboration and a chance to grow alongside others in the field.
    What began as a modest gathering quickly grew into something much bigger. That original meetup evolved into what is now the World Visualization Festival, an international event that welcomes artists from across Europe and beyond.
    “I didn’t expect our small gathering to grow into a global festival,” Michał says. “But I knew I wanted a connection. I believed that through sharing ideas and experiences, we could all grow professionally, creatively, and personally. And that we’d enjoy the journey more.”
    The response was overwhelming. Each year, more artists from across Poland and Europe join the event in Wrocław, located in south-western Poland. Michał also traveled to other festivals in countries like Portugal and Austria, where he observed the same thing: a spirit of openness, generosity, and shared curiosity. No matter the country or the maturity of the market, the needs were the same — people wanted to connect, learn and grow.
    And beyond the professional side, there was something else: joy. These events were simply fun. They were energizing. They gave people a reason to step away from their desks and remember why they love what they do.

    The Professional Benefits
    Hands-on learning at the AI-driven visualization workshop in Warsaw, October 2024.
    The professional benefits of attending industry events are well documented. These gatherings provide access to mentorship, collaboration and knowledge that can be challenging to find online. Festivals and industry meetups serve as platforms for emerging trends, new tools and fresh workflows — often before they hit the mainstream. They’re places where ideas collide, assumptions are challenged and growth happens.
    The range of topics covered at such events is broad, encompassing everything from portfolio reviews and in-depth discussions of particular rendering engines to discussions about pricing your work and building a sustainable business. At the 2024 edition of the World Visualization Festival, panels focused on scaling creative businesses and navigating industry rates drew some of the biggest crowds, proving that artists are hungry for both artistic and entrepreneurial insights.
    Being part of a creative community also shapes professional identity. It’s not just about finding clients — it’s about finding your place. In a field as fast-moving and competitive as Arch Viz, connection and conversation aren’t luxuries. They’re tools for survival.
    There’s also the matter of building your social capital. Online interactions can only go so far. Meeting someone in person builds relationships that stick. The coffee-break conversations, the spontaneous feedback — these are the moments that cement a community and have the power to spark future projects or long-lasting partnerships. This usually doesn’t happen in Zoom calls.
    And let’s not forget the symbolic power of events like industry awards, such as the Architizer’s Vision Awards or CGArchitect’s 3D Awards. These aren’t just celebrations of talent; they’re affirmations of the craft itself. They contribute to the growth and cohesion of the industry while helping to establish and promote best practices. These events clearly define the role and significance of CGI and visualization as a distinct profession, positioned at the intersection of architecture, marketing, and sales. They advocate for the field to be recognized on its own terms, not merely as a support service, but as an independent discipline. For its creators, they bring visibility, credit, and recognition — elements that inspire growth and fuel motivation to keep pushing the craft forward. Occasions like these remind us that what we do has actual value, impact and meaning.

    The Energy We Take Home
    The WVF 2024 afterparty provided a vibrant space for networking and celebration in Warsaw.
    Many artists describe the post-event glow: a renewed sense of purpose, a fresh jolt of energy, an eagerness to get back to work. Sometimes, new projects emerge, new clients appear, or long-dormant ideas finally gain momentum. These events aren’t just about learning — they’re about recharging.
    One of the most potent moments of last year’s WVF was a series of talks focused on mental health and creative well-being. Co-organized by Michał Nowak and the Polish Arch Viz studio ELEMENT, the festival addressed the emotional realities of the profession, including burnout, self-doubt, and the pressure to constantly produce. These conversations resonated deeply because they were real.
    Seeing that others face the same struggles — and come through them — is profoundly reassuring. Listening to someone share a business strategy that worked, or a failure they learned from, turns competition into camaraderie. Vulnerability becomes strength. Shared experiences become the foundation of resilience.

    Make a Statement. Show up!
    Top industry leaders shared insights during presentations at WVF 2024
    In an era when nearly everything can be done online, showing up in person is a powerful statement. It says: I want more than just efficiency. I want connection, creativity and conversation.
    As the CGI and visualization industries continue to evolve, the need for human connection hasn’t disappeared — it’s grown stronger. Conferences, festivals and meetups, such as World Viz Fest, remain vital spaces for knowledge sharing, innovation and community building. They give us a chance to reset, reconnect and remember that we are part of something bigger than our screens.
    So, yes, despite the tools, the bandwidth, and the ever-faster workflows, we still need to meet in person. Not out of nostalgia, but out of necessity. Because, no matter how far technology takes us, creativity remains a human endeavor.
    Architizer’s Vision Awards are back! The global awards program honors the world’s best architectural concepts, ideas and imagery. Start your entry ahead of the Final Entry Deadline on July 11th. 
    The post Building an Architectural Visualization Community: The Case for Physical Gatherings appeared first on Journal.
    #building #architectural #visualization #community #case
    Building an Architectural Visualization Community: The Case for Physical Gatherings
    Barbara Betlejewska is a PR consultant and manager with extensive experience in architecture and real estate, currently involved with World Visualization Festival, a global event bringing together CGI and digital storytelling professionals for 3 days of presentations, workshops, and networking in Warsaw, Poland, this October. Over the last twenty years, visualization and 3D rendering have evolved from supporting tools to become central pillars of architectural storytelling, design development, and marketing across various industries. As digital technologies have advanced, the landscape of creative work has changed dramatically. Artists can now collaborate with clients worldwide without leaving their homes, and their careers can flourish without ever setting foot in a traditional studio. In this hyper-connected world, where access to knowledge, clients, and inspiration is just a click away, do we still need to gather in person? Do conferences, festivals and meetups in the CGI and architectural visualization world still carry weight? The People Behind the Pixels Professionals from the visualization industry exchanging ideas at WVF 2024. For a growing number of professionals — especially those in creative and tech-driven fields — remote work has become the norm. The shift to digital workflows, accelerated by the pandemic, has brought freedom and flexibility that many are reluctant to give up. It’s easier than ever to work for clients in distant cities or countries, to build a freelance career from a laptop, or to pursue the lifestyle of a digital nomad. On the surface, it is a broadening of horizons. But for many, the freedom of remote work comes with a cost: isolation. For visualization artists, the reality often means spending long hours alone, rarely interacting face-to-face with peers or collaborators. And while there are undeniable advantages to independent work, the lack of human connection can lead to creative stagnation, professional burnout, and a sense of detachment from the industry as a whole. Despite being a highly technical and often solitary craft, visualization and CGI thrive on the exchange of ideas, feedback and inspiration. The tools and techniques evolve rapidly, and staying relevant usually means learning not just from tutorials but from honest conversations with others who understand the nuances of the field. A Community in the Making Professionals from the visualization industry exchanging ideas at WVF 2024. That need for connection is what pushed Michał Nowak, a Polish visualizer and founder of Nowak Studio, to organize Poland’s first-ever architectural visualization meetup in 2017. With no background in event planning, he wasn’t sure where to begin, but he knew something was missing. The Polish Arch Viz scene lacked a shared space for meetings, discussions, and idea exchange. Michał wanted more than screen time; he wanted honest conversations, spontaneous collaboration and a chance to grow alongside others in the field. What began as a modest gathering quickly grew into something much bigger. That original meetup evolved into what is now the World Visualization Festival, an international event that welcomes artists from across Europe and beyond. “I didn’t expect our small gathering to grow into a global festival,” Michał says. “But I knew I wanted a connection. I believed that through sharing ideas and experiences, we could all grow professionally, creatively, and personally. And that we’d enjoy the journey more.” The response was overwhelming. Each year, more artists from across Poland and Europe join the event in Wrocław, located in south-western Poland. Michał also traveled to other festivals in countries like Portugal and Austria, where he observed the same thing: a spirit of openness, generosity, and shared curiosity. No matter the country or the maturity of the market, the needs were the same — people wanted to connect, learn and grow. And beyond the professional side, there was something else: joy. These events were simply fun. They were energizing. They gave people a reason to step away from their desks and remember why they love what they do. The Professional Benefits Hands-on learning at the AI-driven visualization workshop in Warsaw, October 2024. The professional benefits of attending industry events are well documented. These gatherings provide access to mentorship, collaboration and knowledge that can be challenging to find online. Festivals and industry meetups serve as platforms for emerging trends, new tools and fresh workflows — often before they hit the mainstream. They’re places where ideas collide, assumptions are challenged and growth happens. The range of topics covered at such events is broad, encompassing everything from portfolio reviews and in-depth discussions of particular rendering engines to discussions about pricing your work and building a sustainable business. At the 2024 edition of the World Visualization Festival, panels focused on scaling creative businesses and navigating industry rates drew some of the biggest crowds, proving that artists are hungry for both artistic and entrepreneurial insights. Being part of a creative community also shapes professional identity. It’s not just about finding clients — it’s about finding your place. In a field as fast-moving and competitive as Arch Viz, connection and conversation aren’t luxuries. They’re tools for survival. There’s also the matter of building your social capital. Online interactions can only go so far. Meeting someone in person builds relationships that stick. The coffee-break conversations, the spontaneous feedback — these are the moments that cement a community and have the power to spark future projects or long-lasting partnerships. This usually doesn’t happen in Zoom calls. And let’s not forget the symbolic power of events like industry awards, such as the Architizer’s Vision Awards or CGArchitect’s 3D Awards. These aren’t just celebrations of talent; they’re affirmations of the craft itself. They contribute to the growth and cohesion of the industry while helping to establish and promote best practices. These events clearly define the role and significance of CGI and visualization as a distinct profession, positioned at the intersection of architecture, marketing, and sales. They advocate for the field to be recognized on its own terms, not merely as a support service, but as an independent discipline. For its creators, they bring visibility, credit, and recognition — elements that inspire growth and fuel motivation to keep pushing the craft forward. Occasions like these remind us that what we do has actual value, impact and meaning. The Energy We Take Home The WVF 2024 afterparty provided a vibrant space for networking and celebration in Warsaw. Many artists describe the post-event glow: a renewed sense of purpose, a fresh jolt of energy, an eagerness to get back to work. Sometimes, new projects emerge, new clients appear, or long-dormant ideas finally gain momentum. These events aren’t just about learning — they’re about recharging. One of the most potent moments of last year’s WVF was a series of talks focused on mental health and creative well-being. Co-organized by Michał Nowak and the Polish Arch Viz studio ELEMENT, the festival addressed the emotional realities of the profession, including burnout, self-doubt, and the pressure to constantly produce. These conversations resonated deeply because they were real. Seeing that others face the same struggles — and come through them — is profoundly reassuring. Listening to someone share a business strategy that worked, or a failure they learned from, turns competition into camaraderie. Vulnerability becomes strength. Shared experiences become the foundation of resilience. Make a Statement. Show up! Top industry leaders shared insights during presentations at WVF 2024 In an era when nearly everything can be done online, showing up in person is a powerful statement. It says: I want more than just efficiency. I want connection, creativity and conversation. As the CGI and visualization industries continue to evolve, the need for human connection hasn’t disappeared — it’s grown stronger. Conferences, festivals and meetups, such as World Viz Fest, remain vital spaces for knowledge sharing, innovation and community building. They give us a chance to reset, reconnect and remember that we are part of something bigger than our screens. So, yes, despite the tools, the bandwidth, and the ever-faster workflows, we still need to meet in person. Not out of nostalgia, but out of necessity. Because, no matter how far technology takes us, creativity remains a human endeavor. Architizer’s Vision Awards are back! The global awards program honors the world’s best architectural concepts, ideas and imagery. Start your entry ahead of the Final Entry Deadline on July 11th.  The post Building an Architectural Visualization Community: The Case for Physical Gatherings appeared first on Journal. #building #architectural #visualization #community #case
    ARCHITIZER.COM
    Building an Architectural Visualization Community: The Case for Physical Gatherings
    Barbara Betlejewska is a PR consultant and manager with extensive experience in architecture and real estate, currently involved with World Visualization Festival, a global event bringing together CGI and digital storytelling professionals for 3 days of presentations, workshops, and networking in Warsaw, Poland, this October. Over the last twenty years, visualization and 3D rendering have evolved from supporting tools to become central pillars of architectural storytelling, design development, and marketing across various industries. As digital technologies have advanced, the landscape of creative work has changed dramatically. Artists can now collaborate with clients worldwide without leaving their homes, and their careers can flourish without ever setting foot in a traditional studio. In this hyper-connected world, where access to knowledge, clients, and inspiration is just a click away, do we still need to gather in person? Do conferences, festivals and meetups in the CGI and architectural visualization world still carry weight? The People Behind the Pixels Professionals from the visualization industry exchanging ideas at WVF 2024. For a growing number of professionals — especially those in creative and tech-driven fields — remote work has become the norm. The shift to digital workflows, accelerated by the pandemic, has brought freedom and flexibility that many are reluctant to give up. It’s easier than ever to work for clients in distant cities or countries, to build a freelance career from a laptop, or to pursue the lifestyle of a digital nomad. On the surface, it is a broadening of horizons. But for many, the freedom of remote work comes with a cost: isolation. For visualization artists, the reality often means spending long hours alone, rarely interacting face-to-face with peers or collaborators. And while there are undeniable advantages to independent work, the lack of human connection can lead to creative stagnation, professional burnout, and a sense of detachment from the industry as a whole. Despite being a highly technical and often solitary craft, visualization and CGI thrive on the exchange of ideas, feedback and inspiration. The tools and techniques evolve rapidly, and staying relevant usually means learning not just from tutorials but from honest conversations with others who understand the nuances of the field. A Community in the Making Professionals from the visualization industry exchanging ideas at WVF 2024. That need for connection is what pushed Michał Nowak, a Polish visualizer and founder of Nowak Studio, to organize Poland’s first-ever architectural visualization meetup in 2017. With no background in event planning, he wasn’t sure where to begin, but he knew something was missing. The Polish Arch Viz scene lacked a shared space for meetings, discussions, and idea exchange. Michał wanted more than screen time; he wanted honest conversations, spontaneous collaboration and a chance to grow alongside others in the field. What began as a modest gathering quickly grew into something much bigger. That original meetup evolved into what is now the World Visualization Festival (WVF), an international event that welcomes artists from across Europe and beyond. “I didn’t expect our small gathering to grow into a global festival,” Michał says. “But I knew I wanted a connection. I believed that through sharing ideas and experiences, we could all grow professionally, creatively, and personally. And that we’d enjoy the journey more.” The response was overwhelming. Each year, more artists from across Poland and Europe join the event in Wrocław, located in south-western Poland. Michał also traveled to other festivals in countries like Portugal and Austria, where he observed the same thing: a spirit of openness, generosity, and shared curiosity. No matter the country or the maturity of the market, the needs were the same — people wanted to connect, learn and grow. And beyond the professional side, there was something else: joy. These events were simply fun. They were energizing. They gave people a reason to step away from their desks and remember why they love what they do. The Professional Benefits Hands-on learning at the AI-driven visualization workshop in Warsaw, October 2024. The professional benefits of attending industry events are well documented. These gatherings provide access to mentorship, collaboration and knowledge that can be challenging to find online. Festivals and industry meetups serve as platforms for emerging trends, new tools and fresh workflows — often before they hit the mainstream. They’re places where ideas collide, assumptions are challenged and growth happens. The range of topics covered at such events is broad, encompassing everything from portfolio reviews and in-depth discussions of particular rendering engines to discussions about pricing your work and building a sustainable business. At the 2024 edition of the World Visualization Festival, panels focused on scaling creative businesses and navigating industry rates drew some of the biggest crowds, proving that artists are hungry for both artistic and entrepreneurial insights. Being part of a creative community also shapes professional identity. It’s not just about finding clients — it’s about finding your place. In a field as fast-moving and competitive as Arch Viz, connection and conversation aren’t luxuries. They’re tools for survival. There’s also the matter of building your social capital. Online interactions can only go so far. Meeting someone in person builds relationships that stick. The coffee-break conversations, the spontaneous feedback — these are the moments that cement a community and have the power to spark future projects or long-lasting partnerships. This usually doesn’t happen in Zoom calls. And let’s not forget the symbolic power of events like industry awards, such as the Architizer’s Vision Awards or CGArchitect’s 3D Awards. These aren’t just celebrations of talent; they’re affirmations of the craft itself. They contribute to the growth and cohesion of the industry while helping to establish and promote best practices. These events clearly define the role and significance of CGI and visualization as a distinct profession, positioned at the intersection of architecture, marketing, and sales. They advocate for the field to be recognized on its own terms, not merely as a support service, but as an independent discipline. For its creators, they bring visibility, credit, and recognition — elements that inspire growth and fuel motivation to keep pushing the craft forward. Occasions like these remind us that what we do has actual value, impact and meaning. The Energy We Take Home The WVF 2024 afterparty provided a vibrant space for networking and celebration in Warsaw. Many artists describe the post-event glow: a renewed sense of purpose, a fresh jolt of energy, an eagerness to get back to work. Sometimes, new projects emerge, new clients appear, or long-dormant ideas finally gain momentum. These events aren’t just about learning — they’re about recharging. One of the most potent moments of last year’s WVF was a series of talks focused on mental health and creative well-being. Co-organized by Michał Nowak and the Polish Arch Viz studio ELEMENT, the festival addressed the emotional realities of the profession, including burnout, self-doubt, and the pressure to constantly produce. These conversations resonated deeply because they were real. Seeing that others face the same struggles — and come through them — is profoundly reassuring. Listening to someone share a business strategy that worked, or a failure they learned from, turns competition into camaraderie. Vulnerability becomes strength. Shared experiences become the foundation of resilience. Make a Statement. Show up! Top industry leaders shared insights during presentations at WVF 2024 In an era when nearly everything can be done online, showing up in person is a powerful statement. It says: I want more than just efficiency. I want connection, creativity and conversation. As the CGI and visualization industries continue to evolve, the need for human connection hasn’t disappeared — it’s grown stronger. Conferences, festivals and meetups, such as World Viz Fest, remain vital spaces for knowledge sharing, innovation and community building. They give us a chance to reset, reconnect and remember that we are part of something bigger than our screens. So, yes, despite the tools, the bandwidth, and the ever-faster workflows, we still need to meet in person. Not out of nostalgia, but out of necessity. Because, no matter how far technology takes us, creativity remains a human endeavor. Architizer’s Vision Awards are back! The global awards program honors the world’s best architectural concepts, ideas and imagery. Start your entry ahead of the Final Entry Deadline on July 11th.  The post Building an Architectural Visualization Community: The Case for Physical Gatherings appeared first on Journal.
    Like
    Love
    Wow
    Sad
    Angry
    532
    2 Комментарии 0 Поделились 0 предпросмотр
CGShares https://cgshares.com