GameDev Pulse
4.07K subscribers
5.25K photos
981 videos
31 files
3.71K links
Game Development News, Lessons, Books, Assets and many more. Godot, Unreal Engine, Unity, Blender. Our Website is https://gameunion.tv/en
Download Telegram
😒29πŸ’”6❀2πŸ‘2😁1
Fake emails helped hackers to gain access to NPM packages with 2 billion weekly downloads. Yep, I never trust NPM, PIP, and so on. They are a huge hole in security.

#JavaScript@GameDEV
#Security@GameDEV
🫑9❀2
Be very careful with GitHub emails: scammers send out phishing messages to all active GitHub users!

1. No, they are not from GH
2. No, you aren't getting $$
3. Yes, believing this would be dumb, but apparently thousands did and it's been out for a few days only

https://github.com/orgs/community/discussions/174380

#Hackers@GameDEV
#Security@GameDEV
#GitHub@GameDEV
πŸ‘5❀1πŸ‘1
Recently, Unity have found a security issue that affects all projects made on all versions of the engine since 2017.1:

Applications that were built using affected versions of the Unity Editor are susceptible to an unsafe file loading and local file inclusion attack, depending on the operating system.

It means, that thousands of games and game assets are affected. And the majority of them WILL NOT BE FIXED, since they are abandoned or on low maintenance mode. So, playing Unity games may be a security issue now.

https://unity.com/security/sept-2025-01

#Unity@GameDEV
#Security@GameDEV
😱12❀2😁2πŸ”₯1🌚1
Almost everyone who contacted the Discord support team during the last couple of years, is affected:

Discord was using a 3rd party support service and they leaked almost everything they could, including photos and documents provided.

They pretend that only a few people were affected, but it seems that everyone who contacted their support got the warning.

In the meantime EU is still trying to implement Chat Control 2.0 with extra backdoors to your files and messages.

#Security@GameDEV
#Discord@GameDEV
#SocialNetworks@GameDEV
😁8😱8
Don't trust bots, folks

#Steam@GameDEV
#Security@GameDEV
😁32
There's a CVE-2025-55182:

Pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

But that's not the crazy part: hackers created several forked tools for fake CVE inspection, that actually steals the data of users and loads you malware.

Do not launch GitHub repos mindlessly!

#Hackers@GameDEV
#Security@GameDEV
✍6😁3