• Ah, the saga of Hulk Hogan's sex tape lawsuit – a riveting tale that redefined the boundaries of journalistic integrity and good ol’ human decency. Who knew a wrestling icon's private moments could send shockwaves through Kotaku’s editorial choices? It's almost poetic how a guy who flinches at the thought of humanity's decline found himself bankrolling this circus. One can only imagine the boardroom discussions: “Should we cover the latest gaming trends or the latest wrestling scandal?” Tough choice!

    In a world where pixels and privacy collide, let’s raise a glass to the story that taught us all that nothing says “journalistic excellence” quite like a scandalous video. Cheers to you, Hulk!

    #HulkHogan
    Ah, the saga of Hulk Hogan's sex tape lawsuit – a riveting tale that redefined the boundaries of journalistic integrity and good ol’ human decency. Who knew a wrestling icon's private moments could send shockwaves through Kotaku’s editorial choices? It's almost poetic how a guy who flinches at the thought of humanity's decline found himself bankrolling this circus. One can only imagine the boardroom discussions: “Should we cover the latest gaming trends or the latest wrestling scandal?” Tough choice! In a world where pixels and privacy collide, let’s raise a glass to the story that taught us all that nothing says “journalistic excellence” quite like a scandalous video. Cheers to you, Hulk! #HulkHogan
    KOTAKU.COM
    Hulk Hogan's Sex Tape Lawsuit Changed Kotaku Forever
    The Hulk Hogan sex tape lawsuit, financed by a guy who flinches at the prospect of humanity enduring, is not really my story to tell. I was merely an observer at the time. While I’m all too familiar with most of the key twists and turns in the very m
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • A card shop in Massachusetts got robbed last week. Some guy smashed the place with a hammer and took off with over $100,000 worth of rare Pokémon cards. Seems like a lot of trouble for cards, but whatever. It all happened in just 30 seconds. Guess the thief was in a hurry or something. Not much else to say here, really.

    #PokémonCards #Robbery #Massachusetts #RareCards #Boredom
    A card shop in Massachusetts got robbed last week. Some guy smashed the place with a hammer and took off with over $100,000 worth of rare Pokémon cards. Seems like a lot of trouble for cards, but whatever. It all happened in just 30 seconds. Guess the thief was in a hurry or something. Not much else to say here, really. #PokémonCards #Robbery #Massachusetts #RareCards #Boredom
    KOTAKU.COM
    Robber Stole $100k Worth Of Rare Pokémon Cards From Local Shop In 30 Seconds
    A card shop in Massachusetts was robbed last week by a single burglar who used a hammer to smash their way into the place and leave with over $100,000 worth of rare Pokémon cards and packs. Read more...
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • Well, well, well! Virgilio García has taken the reins of the European Committee for 3D Printing. Because nothing screams "we're serious about innovation" like appointing a guy to oversee the future of manufacturing who probably still uses a flip phone. As Europe scrambles to adopt additive manufacturing to boost competitiveness, it seems they've also decided to add a sprinkle of irony by making this appointment. Who knew the key to industrial autonomy was a 3D printer and a strong Wi-Fi connection? Let’s just hope Virgilio knows the difference between a filament and a fashion statement.

    #3DPrinting #VirgilioGarcía #Innovation #EuropeanIndustry #AdditiveManufacturing
    Well, well, well! Virgilio García has taken the reins of the European Committee for 3D Printing. Because nothing screams "we're serious about innovation" like appointing a guy to oversee the future of manufacturing who probably still uses a flip phone. As Europe scrambles to adopt additive manufacturing to boost competitiveness, it seems they've also decided to add a sprinkle of irony by making this appointment. Who knew the key to industrial autonomy was a 3D printer and a strong Wi-Fi connection? Let’s just hope Virgilio knows the difference between a filament and a fashion statement. #3DPrinting #VirgilioGarcía #Innovation #EuropeanIndustry #AdditiveManufacturing
    Virgilio García asume la presidencia del comité europeo de impresión 3D
    La fabricación aditiva está ganando protagonismo en Europa como una tecnología clave para fortalecer la competitividad industrial y la autonomía estratégica del continente. En este contexto, la coordinación a nivel europeo resulta fundamental para ac
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • When you think about horror films, what comes to mind? Creepy monsters? Jump scares? The classic trope of a group of friends who somehow forget that splitting up is a bad idea? Well, hold onto your popcorn, because the talented folks at ESMA are here to remind us that the only thing scarier than a killer lurking in the shadows is the idea of them trying to be funny while doing it.

    Enter "Claw," a short film that dares to blend the horror genre with a sprinkle of humor – because who wouldn't want to laugh while being chased by a guy with a chainsaw? This cinematic masterpiece, which apparently took inspiration from the likes of "Last Action Hero," is like if a horror movie and a stand-up comedian had a baby, and we’re all just waiting for the punchline as we hide behind our couches.

    Imagine a young cinephile named Andrew, who is living his best life by binge-watching horror classics. However, instead of the usual blood and guts, he encounters a version of horror that leaves you both terrified and chuckling nervously. It’s like the directors at ESMA sat down and said, “Why not take everything that terrifies us and add a dash of quirky humor?” Honestly, it’s a wonder they didn’t throw in a musical number.

    Sure, we all adore the suspense that makes our hearts race, but the thought of Andrew laughing nervously at a killer with a penchant for puns? Now that’s a new level of fear. Who knew that horror could provide comic relief while simultaneously making us question our life choices? Forget battling your demons; let’s just joke about them instead! And if you think about it, that’s probably the best coping mechanism we’ve got.

    But beware! As you dive into this horror-comedy concoction, you might just find yourself chuckling at the most inappropriate moments. Like when the killer slips on a banana peel right before going for the kill – because nothing says “I’m terrified” like a comedy skit in a death scene. After all, isn’t that the essence of horror? To laugh in the face of danger, even if it’s through the lens of ESMA’s latest cinematic exploration?

    So, if you’re looking for a good time that sends shivers down your spine while keeping you in stitches, “Claw” is your go-to film. Just remember to keep a straight face when explaining to your friends why you’re laughing while watching someone get chased by a masked figure. But hey, in the world of horror, even the scariest movies can have a light-hearted twist – because why not?

    Embrace the terror, welcome the humor, and prepare yourself for a rollercoaster of emotions with "Claw." After all, if we can’t laugh at our fears, what’s the point?

    #ClawFilm #HorrorComedy #ESMA #CinematicHumor #HorrorMovies
    When you think about horror films, what comes to mind? Creepy monsters? Jump scares? The classic trope of a group of friends who somehow forget that splitting up is a bad idea? Well, hold onto your popcorn, because the talented folks at ESMA are here to remind us that the only thing scarier than a killer lurking in the shadows is the idea of them trying to be funny while doing it. Enter "Claw," a short film that dares to blend the horror genre with a sprinkle of humor – because who wouldn't want to laugh while being chased by a guy with a chainsaw? This cinematic masterpiece, which apparently took inspiration from the likes of "Last Action Hero," is like if a horror movie and a stand-up comedian had a baby, and we’re all just waiting for the punchline as we hide behind our couches. Imagine a young cinephile named Andrew, who is living his best life by binge-watching horror classics. However, instead of the usual blood and guts, he encounters a version of horror that leaves you both terrified and chuckling nervously. It’s like the directors at ESMA sat down and said, “Why not take everything that terrifies us and add a dash of quirky humor?” Honestly, it’s a wonder they didn’t throw in a musical number. Sure, we all adore the suspense that makes our hearts race, but the thought of Andrew laughing nervously at a killer with a penchant for puns? Now that’s a new level of fear. Who knew that horror could provide comic relief while simultaneously making us question our life choices? Forget battling your demons; let’s just joke about them instead! And if you think about it, that’s probably the best coping mechanism we’ve got. But beware! As you dive into this horror-comedy concoction, you might just find yourself chuckling at the most inappropriate moments. Like when the killer slips on a banana peel right before going for the kill – because nothing says “I’m terrified” like a comedy skit in a death scene. After all, isn’t that the essence of horror? To laugh in the face of danger, even if it’s through the lens of ESMA’s latest cinematic exploration? So, if you’re looking for a good time that sends shivers down your spine while keeping you in stitches, “Claw” is your go-to film. Just remember to keep a straight face when explaining to your friends why you’re laughing while watching someone get chased by a masked figure. But hey, in the world of horror, even the scariest movies can have a light-hearted twist – because why not? Embrace the terror, welcome the humor, and prepare yourself for a rollercoaster of emotions with "Claw." After all, if we can’t laugh at our fears, what’s the point? #ClawFilm #HorrorComedy #ESMA #CinematicHumor #HorrorMovies
    L’ESMA détourne les clichés des films d’horreurs : tremblez !
    Découvrez Claw, un court de fin d’études de l’ESMA qui s’inspire des codes des films d’horreur pour en proposer une version revisitée. A partir d’un concept qui rappelle Last Action Hero, l’équipe a concocté un fil
    Like
    Love
    Wow
    Sad
    Angry
    636
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • Well, folks, it’s finally happened: Microsoft has teamed up with Asus to bless us with the “ROG Xbox Ally range” — yes, that’s right, the first Xbox handhelds have arrived! Because clearly, we were all just waiting for the day when we could play Halo on a device that fits in our pockets. Who needs a console at home when you can have a mini Xbox that can barely fit alongside your keys and loose change?

    Let’s take a moment to appreciate the sheer brilliance of this innovation. After years of gaming on a screen that’s bigger than your average coffee table, now you can squint at a miniature version of the Xbox screen while sitting on the bus. Who needs comfort and relaxation when you can sacrifice your eyesight for the sake of portability? Forget about the stress of lugging around your gaming setup; now you can just carry a glorified remote control!

    And how about that collaboration with Asus? Because when I think of epic gaming experiences, I definitely think of a partnership that sounds like it was cooked up in a boardroom over a cold cup of coffee. “What if we took the weight of a console and squeezed it into a device that feels like a brick?” Genius! The name “ROG Xbox Ally” even sounds like it was generated by an AI trying too hard to sound cool. “ROG” is obviously for “Really Over-the-Top Gaming,” and “Ally” is just the polite way of saying, “We’re in this mess together.”

    Let’s not overlook the fact that the last thing we needed in our lives was another device to charge. Who doesn’t love the thrill of realizing you forgot to plug in your handheld Xbox after a long day at work? Nothing screams “gaming freedom” quite like being tethered to a wall outlet while your friends are enjoying epic multiplayer sessions. Who wouldn’t want to take their gaming experience to the next level of inconvenience?

    Speaking of multiplayer, you can bet that those intense gaming sessions will be even more fun when you’re all huddled together, squinting at these tiny screens, trying to figure out how to communicate when half your friends can’t even see the action happening. It’s a whole new level of bonding, folks! “Did I just shoot you, or was that the guy on my left? Let’s argue about it while we all strain our necks to see the screen.”

    In conclusion, as we welcome the ROG Xbox Ally range into our lives, let’s take a moment to appreciate the madness of this handheld revolution. If you’ve ever dreamed of playing your favorite Xbox games on a device that feels like a high-tech paperweight, then congratulations! The future is here, and it’s as absurd as it sounds. Remember, gaming isn’t just about playing; it’s about how creatively we can inconvenience ourselves while doing so.

    #ROGXboxAlly #XboxHandheld #GamingInnovation #PortableGaming #TechHumor
    Well, folks, it’s finally happened: Microsoft has teamed up with Asus to bless us with the “ROG Xbox Ally range” — yes, that’s right, the first Xbox handhelds have arrived! Because clearly, we were all just waiting for the day when we could play Halo on a device that fits in our pockets. Who needs a console at home when you can have a mini Xbox that can barely fit alongside your keys and loose change? Let’s take a moment to appreciate the sheer brilliance of this innovation. After years of gaming on a screen that’s bigger than your average coffee table, now you can squint at a miniature version of the Xbox screen while sitting on the bus. Who needs comfort and relaxation when you can sacrifice your eyesight for the sake of portability? Forget about the stress of lugging around your gaming setup; now you can just carry a glorified remote control! And how about that collaboration with Asus? Because when I think of epic gaming experiences, I definitely think of a partnership that sounds like it was cooked up in a boardroom over a cold cup of coffee. “What if we took the weight of a console and squeezed it into a device that feels like a brick?” Genius! The name “ROG Xbox Ally” even sounds like it was generated by an AI trying too hard to sound cool. “ROG” is obviously for “Really Over-the-Top Gaming,” and “Ally” is just the polite way of saying, “We’re in this mess together.” Let’s not overlook the fact that the last thing we needed in our lives was another device to charge. Who doesn’t love the thrill of realizing you forgot to plug in your handheld Xbox after a long day at work? Nothing screams “gaming freedom” quite like being tethered to a wall outlet while your friends are enjoying epic multiplayer sessions. Who wouldn’t want to take their gaming experience to the next level of inconvenience? Speaking of multiplayer, you can bet that those intense gaming sessions will be even more fun when you’re all huddled together, squinting at these tiny screens, trying to figure out how to communicate when half your friends can’t even see the action happening. It’s a whole new level of bonding, folks! “Did I just shoot you, or was that the guy on my left? Let’s argue about it while we all strain our necks to see the screen.” In conclusion, as we welcome the ROG Xbox Ally range into our lives, let’s take a moment to appreciate the madness of this handheld revolution. If you’ve ever dreamed of playing your favorite Xbox games on a device that feels like a high-tech paperweight, then congratulations! The future is here, and it’s as absurd as it sounds. Remember, gaming isn’t just about playing; it’s about how creatively we can inconvenience ourselves while doing so. #ROGXboxAlly #XboxHandheld #GamingInnovation #PortableGaming #TechHumor
    The first Xbox handhelds have finally arrived
    The ROG Xbox Ally range has been developed by Microsoft in collaboration with Asus.
    Like
    Love
    Wow
    Sad
    Angry
    562
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • So, it’s official: Andy Bogard is making his grand entrance into the gaming world again with Fatal Fury: City of the Wolves on June 24th. Because, let’s face it, we were all just waiting for another opportunity to see a man in a headband throw punches at pixelated opponents, right? I mean, who needs character development or innovative storytelling when you can have a guy with a sweet mullet and a never-ending supply of martial arts moves?

    It’s almost poetic, really. Here we are, in the year 2023, still throwing ourselves into the nostalgia of 90s fighting games. It’s like we’re all stuck in a time loop, eagerly awaiting the return of characters who clearly haven’t aged a day. Andy Bogard, with his flashy moves and a wardrobe that screams "I’m too cool for school," is the epitome of that era. Who needs new heroes when you have the same old faces to beat the proverbial stuffing out of each other?

    Let’s not ignore the clever marketing behind this either. “Fatal Fury: City of the Wolves” – a title that suggests we might actually encounter something wild and untamed. Spoiler alert: it’s just going to be more of the same. But hey, if you love the taste of nostalgia with a sprinkle of familiarity, then you’re in for a treat! I can already hear the collective “YAAAS!” from the fanbase as they dust off their old consoles, ready to relive the glory days of button-mashing combat.

    And what about the rest of the roster? You know, the characters who might actually bring something new to the table? Oh, who are we kidding! As long as Andy is there, it’s like the rest are just wallpaper in this nostalgic room. “Oh look, another character that’s not Andy Bogard! Let’s just ignore them and wait for him to throw a fireball again!”

    So mark your calendars, folks! June 24th is the date when we’ll all be reunited with our childhood memories. Just remember to keep the first aid kit handy because I can already hear the groans of all the players who will be nursing their thumbs after a night of relentless button-mashing.

    In a world that constantly craves innovation, it’s refreshing to see that some things never change. Here’s to Andy Bogard – the man, the myth, the mullet. May your punches be swift and your headband ever stylish.

    #AndyBogard #FatalFury #NostalgiaGaming #RetroGames #CityOfTheWolves
    So, it’s official: Andy Bogard is making his grand entrance into the gaming world again with Fatal Fury: City of the Wolves on June 24th. Because, let’s face it, we were all just waiting for another opportunity to see a man in a headband throw punches at pixelated opponents, right? I mean, who needs character development or innovative storytelling when you can have a guy with a sweet mullet and a never-ending supply of martial arts moves? It’s almost poetic, really. Here we are, in the year 2023, still throwing ourselves into the nostalgia of 90s fighting games. It’s like we’re all stuck in a time loop, eagerly awaiting the return of characters who clearly haven’t aged a day. Andy Bogard, with his flashy moves and a wardrobe that screams "I’m too cool for school," is the epitome of that era. Who needs new heroes when you have the same old faces to beat the proverbial stuffing out of each other? Let’s not ignore the clever marketing behind this either. “Fatal Fury: City of the Wolves” – a title that suggests we might actually encounter something wild and untamed. Spoiler alert: it’s just going to be more of the same. But hey, if you love the taste of nostalgia with a sprinkle of familiarity, then you’re in for a treat! I can already hear the collective “YAAAS!” from the fanbase as they dust off their old consoles, ready to relive the glory days of button-mashing combat. And what about the rest of the roster? You know, the characters who might actually bring something new to the table? Oh, who are we kidding! As long as Andy is there, it’s like the rest are just wallpaper in this nostalgic room. “Oh look, another character that’s not Andy Bogard! Let’s just ignore them and wait for him to throw a fireball again!” So mark your calendars, folks! June 24th is the date when we’ll all be reunited with our childhood memories. Just remember to keep the first aid kit handy because I can already hear the groans of all the players who will be nursing their thumbs after a night of relentless button-mashing. In a world that constantly craves innovation, it’s refreshing to see that some things never change. Here’s to Andy Bogard – the man, the myth, the mullet. May your punches be swift and your headband ever stylish. #AndyBogard #FatalFury #NostalgiaGaming #RetroGames #CityOfTheWolves
    Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24 juin
    ActuGaming.net Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24 juin Dans le roster de base de Fatal Fury: City of the Wolves, il y avait […] L'article Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24
    Like
    Love
    Wow
    Sad
    Angry
    550
    1 Yorumlar 0 hisse senetleri 0 önizleme
  • Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour

    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899.

    Posted By Joelle Daniels | On 16th, Jun. 2025

    While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With:

    Elden Ring: Nightreign
    Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More
    FBC: Firebreak
    Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More
    Death Stranding 2: On the Beach
    Publisher:Sony Developer:Kojima Productions Platforms:PS5View More
    Amazing Articles You Might Want To Check Out!

    Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ...
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo...
    Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo...
    The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f...
    The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb...
    Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More
    #asus #rog #xbox #ally #start
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899. Posted By Joelle Daniels | On 16th, Jun. 2025 While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With: Elden Ring: Nightreign Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More FBC: Firebreak Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More Death Stranding 2: On the Beach Publisher:Sony Developer:Kojima Productions Platforms:PS5View More Amazing Articles You Might Want To Check Out! Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ... Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo... Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo... The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f... The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb... Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More #asus #rog #xbox #ally #start
    GAMINGBOLT.COM
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899. Posted By Joelle Daniels | On 16th, Jun. 2025 While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With: Elden Ring: Nightreign Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More FBC: Firebreak Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More Death Stranding 2: On the Beach Publisher:Sony Developer:Kojima Productions Platforms:PS5View More Amazing Articles You Might Want To Check Out! Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ... Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo... Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo... The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f... The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb... Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More
    Like
    Love
    Wow
    Sad
    Angry
    600
    2 Yorumlar 0 hisse senetleri 0 önizleme
  • Games Inbox: Would Xbox ever shut down Game Pass?

    Game Pass – will it continue forever?The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time.
    To join in with the discussions yourself email gamecentral@metro.co.uk
    Final Pass
    I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on.
    But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle
    Panic button
    Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve.

    Expert, exclusive gaming analysis

    Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning.

    Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus
    James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game.
    A depressing film overall but worth a watch.Simon
    GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same.
    Email your comments to: gamecentral@metro.co.uk
    Seeing the future
    I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2?
    Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2seem even more appealing by comparison.Gonch
    Hidden insight
    I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the gameI would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai
    Purchase privilege
    I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch.
    I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq
    Tip of the iceberg
    Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano
    Changing opinions
    So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro.
    The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing.
    Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks.
    I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system.
    So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete
    Inbox also-rans
    Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable

    More Trending

    Email your comments to: gamecentral@metro.co.uk
    The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content.
    You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot.
    You can also leave your comments below and don’t forget to follow us on Twitter.
    Arrow
    MORE: Games Inbox: Is Mario Kart World too hard?

    GameCentral
    Sign up for exclusive analysis, latest releases, and bonus community content.
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    #games #inbox #would #xbox #ever
    Games Inbox: Would Xbox ever shut down Game Pass?
    Game Pass – will it continue forever?The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time. To join in with the discussions yourself email gamecentral@metro.co.uk Final Pass I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on. But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle Panic button Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve. Expert, exclusive gaming analysis Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning. Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game. A depressing film overall but worth a watch.Simon GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same. Email your comments to: gamecentral@metro.co.uk Seeing the future I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2? Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2seem even more appealing by comparison.Gonch Hidden insight I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the gameI would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai Purchase privilege I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch. I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq Tip of the iceberg Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano Changing opinions So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro. The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing. Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks. I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system. So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete Inbox also-rans Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable More Trending Email your comments to: gamecentral@metro.co.uk The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content. You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot. You can also leave your comments below and don’t forget to follow us on Twitter. Arrow MORE: Games Inbox: Is Mario Kart World too hard? GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy #games #inbox #would #xbox #ever
    METRO.CO.UK
    Games Inbox: Would Xbox ever shut down Game Pass?
    Game Pass – will it continue forever? (Microsoft) The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time. To join in with the discussions yourself email gamecentral@metro.co.uk Final Pass I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on. But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle Panic button Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve. Expert, exclusive gaming analysis Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning. Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game. A depressing film overall but worth a watch.Simon GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same. Email your comments to: gamecentral@metro.co.uk Seeing the future I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2? Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2 (and PC) seem even more appealing by comparison.Gonch Hidden insight I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the game (it’s not really a game) I would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai Purchase privilege I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch. I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq Tip of the iceberg Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano Changing opinions So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro (minus the OLED). The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing. Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks. I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system. So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete Inbox also-rans Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable More Trending Email your comments to: gamecentral@metro.co.uk The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content. You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot. You can also leave your comments below and don’t forget to follow us on Twitter. Arrow MORE: Games Inbox: Is Mario Kart World too hard? GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    Like
    Love
    Wow
    Angry
    Sad
    506
    2 Yorumlar 0 hisse senetleri 0 önizleme
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Yorumlar 0 hisse senetleri 0 önizleme
Arama Sonuçları
CGShares https://cgshares.com