Connect with us


PewDiePie wins hilarious bet against Dr Disrespect in Fall Guys showdown – Dexerto



Popular streamer Dr Disrespect was hilariously forced into a bet by Felix ‘PewDiePie’ Kjellberg after losing to the Swede in their Fall Guys showdown broadcast on August 14.

Dr Disrespect made his return to streaming on August 7 with a broadcast that pulled in over 520k viewers. The Two-Time Champion made his comeback on YouTube in a massive way.


To celebrate his new home, the star collaborated with the platform’s biggest individual content creator PewDiePie for an epic showdown in the party battle royale Fall Guys.

YouTube: Dr Disrespect

The pair brawled it out in Fall Guys.

PewDiePie defends his YouTube crown against Dr Disrespect

To finish out his first full week on YouTube, Dr Disrespect challenged PewDiePie to a showdown in Fall Guys. Combined, the two stars brought in over 340k viewers who tuned in to watch them duke it out in the battle royale.


While Doc got off to a rocky start in their best of five contests, the streamer became neck and neck with the Swedish creator. However, his attempt to troll Pewds by grabbing onto him backfired which resulted in him getting eliminated.

The Two-Time hilariously jumped up and yelled after his aggressive move didn’t pan out the way he intended. “No! No! Noooo!” he screamed. PewDiePie jokingly asked “What happened?” after he won the round.

[embedded content]

While being down at the half way point, Doc addressed his fans in an epic locker room speech. “How are we losing, Champions Club? Huh? To this guy all the way in Sweden who drives in a Volvo and takes him seven hours to go to the liquor store?”


[embedded content]

Pewds ended up coming out victorious in the end, narrowly beating the 38-year-old 5–3 in the final round. To punish the popular streamer, the Swede made him watch his most disliked video on his channel.

In 2016, Kjellberg went viral when he asked his fans to push him to a million dislikes. Watching the video, Dr Disrespect joked, “I am so glad we joined YouTube!” Laughing, the YouTuber replied, “Right? This is what is ahead of you! If you need any tips, I got you.”

[embedded content]

Despite winning, PewDiePie congratulated his friend on his return to streaming and said that he was “excited” for him to be on YouTube. Dr Disrespect then suggested they do an IRL stream together in the future, which the 30-year-old agreed to.


The two gaming giants pulled off an entertaining show that brought both of their massive audiences together. The stream even saw the Two-Time having to learn about the Floor Gang meme. Whenever the personalties decide to collaborate again, it’s sure to be a must-watch event.

Let’s block ads! (Why?)

Source link

Continue Reading


What's new on Xbox Game Pass for console, PC, Android in first half of October – MobileSyrup



Every month, Microsoft adds new games to its Xbox Game Pass on-demand subscription service for Console and PC.

Normally, these roll out in two waves, and now, the company has revealed October’s first batch of new Game Pass titles.

It’s important to note that Xbox Game Pass Ultimate’s game streaming option launched on September 15th on Android. As a result, Microsoft is now highlighting Android-specific Game Pass titles on top of those for Console and PC.

See below for the full list of incoming games:

  • Doom Eternal (Android and Console) — October 1st (coming to Game Pass for PC, release TBA 2020)
  • Drake Hollow (PC) — October 1st
  • Brütal Legend (Console) — October 8th
  • Forza Motorsport 7 (Console, PC and Android) — October 8th
  • Ikenfell (Console and PC) — October 8th

Additionally, Xbox has revealed the latest Game Pass Ultimate Perks, which subscribers get for the following games at no additional cost:

  • Black Desert — claim the ‘Special Gift Bundle’
  • Funimation — get two months of anime service Funimation’s ad-free Premium Plus subscription for free
  • Phantasy Star Online 2 — ‘Episode 5 Update Bonus’
  • Vigor — ‘Armed Outlander Bundle’

Meanwhile, here’s what’s leaving Game Pass on October 15th:

  • Felix the Reaper (Console and PC)
  • Metro 2033 Redux (Console and PC)
  • Minit (Console and PC)
  • Saints Row IV Re-Elected (PC)
  • State of Mind (PC)

As always, Game Pass subscribers can purchase any game in the catalogue with a member-exclusive 20 percent discount to keep playing once they leave the service.

Finally, it’s worth noting that Xbox also just confirmed that EA Play will be coming to Game Pass Ultimate on November 10th alongside the launch of the Xbox Series X and S.

This means that console and PC players will be able to access an additional 60-plus games — as well as other exclusive perks like full-game trials and discounts — through Electronic Arts’ service, all at no additional cost. A yet-to-be-confirmed selection of games from the EA Play catalogue will also be available for streaming on Android through Game Pass Ultimate.

Newcomers can sign up for their first month of Game Pass Ultimate for $1 CAD. This includes Game Pass for both Console and PC, as well as an Xbox Live Gold subscription. Otherwise, Game Pass Ultimate costs $16.99 CAD/month.

Alternatively, Game Pass for Console and Game Pass for PC each cost $11.99/month.

September’s second wave of new Game Pass titles can be found here.

Image credit: Bethesda

Source: Xbox

Let’s block ads! (Why?)

Source link

Continue Reading


Cyberpunk 2077 Publisher Orders 6-Day Weeks Ahead of Game Debut – Bloomberg



Polish video game developer CD Projekt Red told employees on Monday that six-day work weeks will be mandatory leading up to the November release of the highly anticipated Cyberpunk 2077, reneging on an earlier promise to not force overtime on the project.

Red, a subsidiary of Poland’s biggest gaming company CD Projekt SA, has been criticized previously for engaging in “crunch,” an industry term for excessive overtime in game development. The practice often lasts for weeks and can stretch out for months or even years. CD Projekt Red co-chief executive officer Marcin Iwinski last year told gaming website Kotaku that the company would be avoiding mandatory crunch and was “committed” to allowing employees to work without overtime.

But an account from a CD Projekt Red employee recently as well as an email to staff earlier this week indicate that the company hasn’t lived up to its word. The employee, who asked not to be named discussing private information, said some staff had already been putting in nights and weekends for more than a year.

In the email, CD Projekt Red studio head Adam Badowski wrote that he was optimistic about the state of Cyberpunk 2077, which stars Keanu Reeves, and that they had just sent the game to be certified for release on Sony Corp.’s PlayStation and Microsoft Corp.’s Xbox. Now, he wrote, it was time to fix the game’s many lingering bugs and glitches.

“Starting today, the entire (development) studio is in overdrive,” Badowski wrote, elaborating that this meant “your typical amount of work and one day of the weekend.” The extra work would be paid, as required by Polish labor laws. Many other video game studios don’t pay for overtime.

“I take it upon myself to receive the full backlash for the decision,” he wrote. “I know this is in direct opposition to what we’ve said about crunch. It’s also in direct opposition to what I personally grew to believe a while back — that crunch should never be the answer. But we’ve extended all other possible means of navigating the situation.”

CD Projekt Red didn’t immediately respond to a request for comment.

Last year, Iwinski and Badowski told Kotaku that they were looking to make CD Projekt Red a more “humane” place to work.

“We are known for treating gamers with respect,” Iwinski said. “I actually would [like] for us to also be known for treating developers with respect.”

    Let’s block ads! (Why?)

    Source link

    Continue Reading


    Microsoft: Some ransomware attacks take less than 45 minutes – ZDNet



    Image: Microsoft

    For many years, the Microsoft Security Intelligence Report has been the gold standard in terms of providing a yearly overview of all the major events and trends in the cyber-security and threat intelligence landscape.

    While Microsoft unceremoniously retired the old SIR reports back in 2018, the OS maker appears to have realized its mistake, and has brought it back today, rebranded as the new Microsoft Digital Defense Report.

    Just like the previous SIR reports, Microsoft has yet again delivered.

    Taking advantage of its vantage points over vast swaths of the desktop, server, enterprise, and cloud ecosystems, Microsoft has summarized the biggest threats companies deal with today in the face of cybercrime and nation-state attackers.

    The report is 88 pages long, includes data from July 2019 and June 2020, and some users might not have the time to go through it in its entirety. Below is a summary of the main talking points, Microsoft’s main findings, and general threat landscape trends.


    2020 will, without a doubt, be remembered for the COVID-19 (coronavirus) pandemic. While some cybercrime groups used COVID-19 themes to lure and infect users, Microsoft says these operations were only a fraction of the general malware ecosystem, and the pandemic appears to have played a minimal role in this year’s malware attacks.

    Email phishing in the enterprise sector has also continued to grow and has become a dominant vector. Most phishing lures center around Microsoft and other SaaS providers, and the Top 5 most spoofed brands include Microsoft, UPS, Amazon, Apple, and Zoom.

    Microsoft said it blocked over 13 billion malicious and suspicious mails in 2019, and out of these, more than 1 billion contained URLs that have been set up for the explicit purpose of launching a credential phishing attack.

    Successful phishing operations are also often used as the first step in Business Email Compromise (BEC) scams. Microsoft said that crooks gain access to an executive’s email inbox, watch email communications, and then spring in to trick the hacked users’ business partners into paying invoices into wrong bank accounts.


    Image: Microsoft

    Per Microsoft, the most targeted accounts in BEC scams were the ones for C-suites and accounting and payroll employees.

    But Microsoft also says that phishing isn’t the only way into these accounts. Hackers are also starting to adopt password reuse and password spray attacks against legacy email protocols such as IMAP and SMTP. These attacks have been particularly popular in recent months as it allows attackers to also bypass multi-factor authentication (MFA) solutions, as logging in via IMAP and SMTP doesn’t support this feature.

    Furthermore, Microsoft says it’s also seeing cybercrime groups that are increasingly abusing public cloud-based services to store artifacts used in their attacks, rather than using their own servers. Further, groups are also changing domains and servers much faster nowadays, primarily to avoid detection and remain under the radar.

    Ransomware groups

    But, by far, the most disruptive cybercrime threat of the past year have been ransomware gangs. Microsoft said that ransomware infections had been the most common reason behind the company’s incident response (IR) engagements from October 2019 through July 2020.

    And of all ransomware gangs, it’s the groups known as “big game hunters” and “human-operated ransomware” that have given Microsoft the most headaches. These are groups that specifically target select networks belonging to large corporations or government organizations, knowing they stand to receive larger ransom payments.

    Most of these groups operate either by using malware infrastructure provided by other cybercrime groups or by mass-scanning the internet for newly-disclosed vulnerabilities.


    Image: Microsoft

    In most cases, groups gain access to a system and maintain a foothold until they’re ready to launch their attacks. However, Microsoft says that this year, these ransomware gangs have been particularly active and have reduced the time they need to launch attacks, and especially during the COVID-19 pandemic.

    “Attackers have exploited the COVID-19 crisis to reduce their dwell time within a victim’s system – compromising, exfiltrating data and, in some cases, ransoming quickly – apparently believing that there would be an increased willingness to pay as a result of the outbreak,” Microsoft said today.

    “In some instances, cybercriminals went from initial entry to ransoming the entire network in under 45 minutes.”

    Supply-chain security

    Another major trend that Microsoft chose to highlight was the increased targeting of supply chains in recent months, rather than attacking a target directly.

    This allows a threat actor to hack one target and then use the target’s own infrastructure to attack all of its customers, either one by one, or all at the same time.

    “Through its engagements in assisting customers who have been victims of cybersecurity intrusions, the Microsoft Detection and Response Team has observed an uptick in supply chain attacks between July 2019 and March 2020,” Microsoft said.

    But Microsoft noted that while “there was an increase, supply chain attacks represented a relatively small percentage of DART engagements overall.”

    Nonetheless, this doesn’t diminish the importance of protecting the supply chain against possible compromises. Here, Microsoft highlights dangers coming from the networks of Managed Service Providers (MSPs, third-parties that provide a very specific service and are allowed to access a company’s network), IoT devices (often installed and forgotten on a company’s network), and open-source software libraries (which make up most of a company’s software these days).

    Nation-state groups

    As for nation-state hacking groups (also known as APTs, or advanced persistent threats), Microsoft said this year has been quite busy.

    Microsoft said that between July 2019 and June 2020, it sent out more than 13,000 nation-state notification (NSN) to its customers via email.

    According to Microsoft, most were sent for hacking operations linked back to Russian state-sponsored groups, while most of the victims were located in the US.


    Image: Microsoft

    These email notifications were sent for email phishing attacks against its customers. Microsoft said it tried to counter some of these attacks by using court orders to seize domains used in these attacks.

    Over the past year, Microsoft seized domains previously operated by nation-state groups like Strontium (Russia), Barium (China), Phosphorus (Iran), and Thallium (North Korea).

    Another interesting finding of the Microsoft Digital Defense Report is that the primary targets of APT attacks have been non-governmental organizations and the services industry.

    This particular finding goes against the grain. Most industry experts often warn that APT groups prefer to target critical infrastructure, but Microsoft says its findings tell a different story.

    “Nation state activity is more likely to target organizations outside of the critical infrastructure sectors by a significant measure, with over 90% of notifications served outside of these sectors,” Microsoft said.

    As for the techniques that have been preferred this past year (July 2019 to June 2020) by nation-state groups, Microsoft noted several interesting developments, with the rise of:

    • Password spraying (Phosphorus, Holmium, and Strontium)
    • Use of penetration testing tools (Holmium)
    • The use of ever-more-complex spear-phishing (Thallium)
    • The use of web shells to backdoor servers (Zinc, Krypton, Gallium)
    • The use of exploits targeting VPN servers (Manganese)

    Image: Microsoft

    All in all, Microsoft concludes that criminal groups have evolved their techniques over the past year to increase the success rates of their campaigns, as defenses have gotten better at blocking their past attacks.

    Just like in years prior, the entire cybersecurity landscape appears to be sitting on a giant merry-go-round, and constant learning and monitoring is required from defenders to keep up with the ever-evolving attackers, may them be financially-motivated or nation-sponsored groups.

    Let’s block ads! (Why?)

    Source link

    Continue Reading