Ubisoft has shared new combat details for Assassin's Creed Shadows ahead of its February 15, 2025 release.
In a new blog post, the developer provided a deep dive into the fundamental principles of the game's combat system and discussed how weapons will alter battles, depending on which protagonist you play as; Naoe or Yasuke.
For offensive basics, there are light, heavy, posture attacks. Light attacks are quick and reliable and inflict small increments of damage, but some enemies can easily counter them and "power through" to land attacks of their own.
Heavy attacks are useful for staggering enemies, but posture attacks seem to be the most effective in fights. Holding down the input will charge the ability to dial up the damage, can be held indefinitely, and is used to break through an enemy's blocking stance.
Ubisoft also explained that an enemy can be put into a "vulnerable state", a short window that will allow the player to deal "devastating" damage.
While in defense both Naoe and Yasuke can use directional dodges to avoid incoming blows, but Naoe's dodges are "characterized by directional rolls", whereas Yasuke's are directional steps that keep his posture upright.
The protagonists also share similar parry mechanics but results vary. When Yasuke deflects a blow, the enemy bounces back, opening them up for attacks, while Naoe's requires her to pivot to either side of the enemy.
Yasuke also has a unique block mechanic that allows him to "turtle up behind his weapon" and withstand oncoming attacks from kunai and arrows.
"These subtle differences in attack and defense are really what makes the control of each character unique - and adaptable to your ideal playstyle," said Shadows' game director Charles Benoit.
Although Naoe excels in stealth as a shinobi, she's able to defeat enemies using a barrage of attacks but can be overwhelmed when surrounded due to her lack of armor and limited combat resources.
As a samurai, Yasuke can stay in the fight longer and is the only protagonist with the ability to switch weapons mid-combo through the link-attack ability, like the Sheathed Posture Attack, a charged opening attack while his katana is still in its sheathe.
For weapons, Naoe has a versatile katana that unlocks the ability to assassinate enemies through shoji doors, a Tanto and Hidden Blades which unlock Double Assassinations, as well as a Kusarigama for crowd control. This extendable ball-and-chain can reach enemies at a distance and can unlock the Rush Assassinate ability to take down foes 10 meters away.
Yasuke has a long katana to match his size, a Naginata for crowd control, a Kanabo for breaking through defenses and armor, and a Yumi Bow for long-range attacks.
There's also the Teppo flint rifle for armor penetration, but has a slow fire rate and an even slower reload time.
Players will be able to use all these weapons against a number of enemy types each with their own unique combat styles that will need to be learned as you progress through the game, including Outlaws, Ashigara Soldiers, Ronin, Samurai, Samurai Daisho, and Guardians.
You might also like...It's official: Brett Goldstein is breaking into the best Apple TV Plus movies territory – and I couldn't be happier.
Shrinking is one of my favorite Apple TV Plus shows, so when I discovered that the co-creator of the hit comedy series has a movie on its way to Apple TV Plus, I immediately knew that it could very well be my favorite movie in 2025.
Goldstein is a comedy connoisseur, having helped produce and star in the hugely successful Ted Lasso and Shrinking. Now, Apple Original Films has landed the streaming rights to Goldstein's sci-fi romance All of You, which is set to stream in the new year.
All of You premiered at this year's Toronto International Film Festival, and went on to screen at the London Film Festival. Currently, the film has an 83% Rotten Tomatoes score from 24 critics, with Cool Girl Critiques writing in their TIFF 2024 review: "A tender and heartbreaking portrait of love with the right person at the wrong time – this drama’s cynical and cathartic take on the soulmate trope will leave an emotional mark by its final frame."
What is All of You about?Goldstein penned the script alongside the film's director William Bridges, who won an Emmy Award for his Black Mirror episode U.S.S. Callister. The official plot of All of You is as follows: "When an exciting new test matching soulmates together comes between two best friends, they spend the next 12 years trying to resist the urge to disrupt the paths their lives have taken – marriage, children and tragedy – despite the undeniable feeling they belong together."
Goldstein plays the lead role of Simon, and Imogen Poots stars as his best friend Laura. The cast also includes Steven Cree (Outlander) and Zawe Ashton (The Marvels).
Apple is set to add some exciting titles to its movie library next year, with the new sci-fi mystery thriller The Gorge starring Miles Teller, Anya Taylor-Joy and Sigourney Weaver, as well as Brad Pitt's F1 in June.
You might also likeApple has finally fixed a security bug with its new password manager app which could have put your data at risk.
The provider first introduced Passwords with the long-awaited iOS 18 update as a built-in application to help you manage your login details and alert you if they're compromised in a data breach. Developer and security researcher Tommy Mysk, however, found a vulnerability in its system soon after the launch.
Apple confirmed that the new 18.2 operating system update has solved the issue that an attacker could have exploited to "alter network traffic. " Mysk now urges everyone to upgrade all their Apple devices to the latest version to patch the critical issue as soon as possible.
iOS 18.2 security update"Since iOS 18 launched, the new Passwords app has been using unencrypted HTTP to download icons for password entries – a potential security risk. We reported this bug to Apple in September, and it’s finally fixed in iOS 18.2 (CVE-2024-54492)," Mysk wrote on X on Wednesday, December 11, 2024.
HTTP (Hypertext Transfer Protocol) refers to a set of rules that allow us to communicate data on the Internet and is used to load webpages. As the iOS expert explains (see video below), malicious networks can easily intercept and manipulate insecure HTTP.
The problem was that every time you added a new password, Passwords got the account's icon from the added website (say, gmail.com, for example) and called the website over the insecure HTTP protocol.
"This malicious network overwrites the response to return a custom icon," said Mysk. "Passwords picked the custom icon and showed it in the app. This could be a malicious payload."
"This issue was addressed by using HTTPS when sending information over the network," confirmed Apple in its 18.2 security update release.
The Passwords fix is now available for all devices (iPhone and iPad 18.2, as well as macOS Sequoia 15.2) after upgrading to the latest version.
Mysk urges everyone to upgrade their devices as soon as possible, noting that also another security company, Tenable, classified the vulnerability as "critical."
The 18.2 update isn't just about fixing vulnerabilities, though. The release is probably the biggest Apple Intelligence upgrade for iPhone, iPad, and Mac so far, in fact, bringing some of the most-anticipated Apple AI features to devices including Genmoji, Image Playground, and a ChatGPT-powered Siri.
Most notably, Apple Intelligence finally extends its support for Australia, Canada, Ireland, New Zealand, South Africa, and the UK.
Even before the internet was invented, businesses have had security operations centers (SOCs) to monitor, manage and secure the enterprise. This was because protecting data, applications, and the network were all seen as integral to the success of the business. Today, no serious enterprise would ignore the importance of its network operations.
Yet when it comes to an even more valuable resource – employees – it’s only recently that businesses have started to assess and improve the quality of the digital employee experience (DEX) and its subsequent impact on productivity. One way some organizations are tackling the problem is the creation of DEX Operations Centres (DOC), i.e. a function designed to maximize the digital experience for all employees by removing blockers, reducing stress, and enabling better focus.
However, building a new function can be a tricky business if it isn’t planned right. Happily, creating a DOC doesn’t need to be a convoluted or onerous process. Having worked with multiple organizations, I can testify that, with the right approach and executive support, it’s possible to launch a small, but fully functional one after only a few key steps.
Avoiding the big mistakeLaunching any new tech-related initiative can be daunting. Every business has its own set of horror stories about projects going sideways or costly implementations that got botched.
One of the most common reasons for this is that, too often, businesses start by purchasing expensive technology and then trying to retrofit a structure and rationale to justify it afterwards. This is precisely the wrong approach, especially when building a DOC. Technological solutions and tools need to be the final piece of the puzzle, after the organization has developed a full understanding of the purpose, scope, and structure of the proposed DOC.
Four workshopsWhile there is no one ‘right’ way to build a DOC, having been involved in multiple such initiatives, there are four key elements that should be addressed. Fortunately, while these are vital steps, they do not have to be particularly drawn out. If all relevant stakeholders are available and engaged, a DOC can be created with four targeted workshops:
1. The mission: The first workshop is the most high-level, but also the most important: the mission of the DOC must be clearly defined. Once there is a clear definition of the mission and vision of the DOC that covers why it’s necessary and what it aims to bring to the business, a whole host of subsequent decisions become easier. Moreover, this helps position the DOC within the organization, clarifying which teams it will be working with, and what the reporting structure could be. As an example, a business might launch a DOC with the vision to provide the best possible digital experience for all employees.
2. The service catalogue: After defining the vision, the mission and the positioning of the center in the organization, the next workshop should focus on what services the Centre will be providing. DEX encompasses a vast range of potential services and use cases, so it’s essential to start with a small number and doing those efficiently, rather than immediately trying to take on two dozen different problems from jump. In our example above, initial services might be around hardware and software optimization to improve the performance of devices and thereby the digital experience.
3. The use cases: In the same way that the service catalogue is aligned with the mission, so the specific use cases, standard operating procedures, and deliverables need to be aligned with the services catalogue. Continuing our example, the use cases for our hypothetical DOC could be around supporting the reduction of proactive tickets, extending the lifetime of devices, or identifying and repurposing unused hardware rather than buying new.
4. The team: Once all of the above is in place, the final workshop can assess what sort of team and operational model is needed in order to most effectively carry out the plan. For some organizations, the DOC will be an evolution of the support team that sits alongside traditional IT support, while others may merge the two into a larger team. There is no right or wrong answer to how to create a DOC – some organisations have a fully allocated team, others only partly allocated. Some have their DOC as an internal function, others outsource it. Some have a dedicated team; others draw upon a cross-functional set of skills. The important thing is that, with the services and use cases mapped out already, it’s far more straightforward to identify the requisite expertise and input to make the Centre a success.
Only after all of these decisions have been made should organizations start thinking about what technology is needed, otherwise they can find they are spending significant sums on new solutions without getting any worthwhile ROI.
An evolving practiceWhile every business should follow the four steps above in creating their DOC, that doesn’t mean they should feel constrained in terms of what it looks like. There is no minimum size, set of services, or standard structure that has to be followed. Many Centres have been launched with only two people and a handful of use cases. Indeed, it can be better to scale back ambitions for the initial launch and make sure that things are running smoothly before increasing investment.
However it’s constituted, once the Centre has a couple of successes under its belt, it’s far easier to showcase the value of DexOps as a concept and to get additional buy-in from stakeholders across the enterprise. And, because a well-constructed DOC is agile and responsive to the needs of the business, it will mature alongside the enterprise, adding and discarding services as needed to best facilitate the core mission. Regardless, as long as organizations take the time to map out a proper mission, vision, and operational structure, any DOC will consistently add value across all areas of the employee experience.
We've featured the best productivity tool.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
As is customary for this time of year, fitness tracking and wellness platforms continue to release aggregated wellness data to give us helpful trends and insights into the world of fitness.
Garmin is the latest platform to dish out its numbers, with its annual Garmin Connect Data Report for 2024 out now.
Its stats are taken from the personalized fitness insights available in the Garmin Connect app, and covers customers of all the best Garmin Watches on the market, from the Forerunner to the Fenix and everything in between. Here's everything you need to know from this year's report.
Garmin Connect Data Report 2024 (Image credit: Future)Garmin has provided insights into several of its proprietary tracking metrics, including Body Battery and Sleep Score, so you can see where you stack up on the list.
Garmin says the average morning score is 71, and the average evening low is 22, putting average daily drain at 49. Users had the most energy on Tuesdays, and the lowest scores on Saturdays. The lowest energy expenditure of the year? January 1. The highest? August 27.
Regarding sleep scores, Garmin says most users sleep best on Monday nights into Tuesday mornings, with the worst night of sleep of the week being a Saturday, unsurprisingly.
Saturday's alright for fighting (stress)Next is stress, and Garmin users average 30 (out of 100) for the year, with Monday the lowest average stress score of the week, and Saturday the highest.
Finally, for training readiness, Garmin says that the average user score was 60 (out of 100), the highest training readiness scores were on Tuesday, and the lowest on Sunday.
When it comes to walking 10,000 steps, Garmin users take an average of 8,317 a day, the highest daily step count of 10,340 goes to Hong Kong, the lowest in Indonesia.
The stats provide a fascinating insight into Garmin's averages. Don't read too much into them, we're all unique after all, but you can see how you stack up across the data with the full results.
You may also likeIndependent auditors have confirmed that one of the best VPN apps on the market protects your data with "a high-security level."
Mullvad VPN put its security infrastructure under scrutiny for the fourth time between October 23 and November 28, 2024. Experts from X41 D-Sec performed penetration tests and source code audits across all VPN apps for 30 days, finding only non-critical issues.
The VPN provider stated that it has now addressed these flaws "to the extent possible."
Mullvad's 4th security audit"Overall, the Mullvad VPN Applications appear to have a high-security level and are well positioned to protect from the threat model proposed in this report," concludes the audit.
As mentioned earlier, experts conducted a white box penetration test and source code audit to investigate if attackers could compromise users' real identity or monitor their activities.
"The use of safe coding and design patterns in combination with regular audits and penetration tests led to a very hardened environment," noted experts.
Auditors found a total of six vulnerabilities, though none of them were critical. Three smaller issues "without a direct security impact" were also identified. You can find all the technical details in the full report.
Commenting on the results, the provider said: "Mullvad is very happy with the quality of the audit performed by X41 D-Sec. X41 managed to find issues in our code that previous audits missed, which shows that there is great benefit in having audits performed by different companies."
This is, in fact, the fourth independent security audit Mullvad has undergone every two years since 2018.
The fourth third-party security audit of the Mullvad VPN app has concluded that the app has a high security level. Some non-critical issues were found, and have been fixed to the extent possible.Read more here: https://t.co/9XbSwJhwjDDecember 11, 2024
Mullvad implemented fixes for four of the issues found during the audit. The team released a new app version on the affected platforms (desktop, Android, and Linux VPN) immediately after receiving the audit report.
Auditors also confirm the provider addressed all the issues "swiftly and the fixes were audited to be working properly."
The latest results corroborate Mullvad as one of the most secure VPN providers on the market right now. Besides bullet-proof security infrastructure, the service offers a strict no-log policy (which an inconclusive police raid proved in real life), a built-in tracker blocker, and strong encryption protocols.
In October, Mullvad even beefed up its defense against AI surveillance and censorship thanks to some advanced security features. These include extended support for VPN obfuscation technology for the WireGuard protocol and the innovative DAITA system which aims to mitigate AI-powered tracking by modifying the appearance of data packets sent over the VPN network.
Cybersecurity researchers from Akamai have discovered a new way to get malware to run on Windows devices without triggering Endpoint Detection and Response (EDR) tools.
In a report published on the Akamai blog earlier this week, it was said that starting with Windows XP, the OS introduced a feature called UI Automation, as part of the .NET Framework. This feature is designed to provide programmatic access to user interface elements, enabling assistive technologies like screen readers to interact with applications and help users with disabilities. It also supports automated testing scenarios by allowing developers to manipulate and retrieve information from UI components programmatically.
But if a piece of malware were to abuse UI Automation, they could execute different malicious commands without triggering any security alarms: "To exploit this technique, a user must be convinced to run a program that uses UI Automation," Akamai said in its writeup. "This can lead to stealthy command execution, which can harvest sensitive data, redirect browsers to phishing websites, and more."
Detecting possible attacksThe new technique is essentially a port from Android, since it revolves around accessibility features.
Since the malware would essentially be abusing what’s otherwise a benign, intended use, antivirus programs would have a difficult time flagging the activity. In essence, it is the same as with Android - the accessibility services API has become the go-to way for malware on the platform. It is also the best way to spot malicious applications, since they all must ask for permission to use Accessibility Services, first.
To detect possible attacks, admins should monitor the use of UIAutomationCore.dll, the researchers concluded. It being loaded to a previously unknown process should be cause for concern, it was said. Furthermore, network admins can monitor the named pipes that are opened on an endpoint by the UIA, which is another indicator of use.
The details on how to do that can be found here.
You might also likeBlack Friday and the following holiday shopping season are critical for retailers worldwide. For many, the revenue generated during this period represents a substantial portion of their annual targets, and sets the stage for the year ahead. Preparation begins months in advance as retailers plan inventories, identify likely hits, and scale up operational capacities.
While experienced retailers often rely on past experience to gauge purchase volumes and potential obstacles; effective planning requires more than a gut feeling—it must be validated with data.
Retailers collect vast amounts of data relating to purchases, from average basket size, popularity of items, most frequent purchase days and times, and more. All of this data provides valuable insights for retailers to ensure they are well prepared for the peak season. Human analysis alone, however, may not guarantee the best and most valuable insights are drawn. This is where AI can help.
AI tools can sift through vast amounts of data, identify key trends, and generate predictive insights. By analyzing historical data and applying heuristics, AI can help retailers forecast demand, optimize inventory, and streamline staffing decisions.
Once these insights are generated, AIOps tools can take over, automatically scaling resources like CPU and capacity to handle traffic spikes, providing the necessary "boost" to handle high traffic, even during unexpected peaks.
Let’s explore AI’s role in ensuring success for retailers in this peak season.
Addressing operational challengesRetailers face various obstacles in preparing for the holiday rush. Planning includes anticipating product demand, ensuring inventory availability across locations, and preparing logistics. This period’s sales surge can put unprecedented pressure on IT systems, which may need to handle hundreds of orders per hour.
AI-driven forecasting enables retailers to move beyond a gut-feeling, making data-driven decisions based on historical trends and real-time data. AI tools analyze vast amounts of retail data—such as basket sizes, peak shopping times, and item popularity—to make precise predictions. These insights improve capacity planning, including timely adjustments for resources like storage and CPU power, which is essential for keeping systems running smoothly.
Once these insights have been drawn, AIOps platforms dynamically allocate resources as demand increases, minimizing downtime and keeping the customer experience intact.
Smarter inventory and staffingInventory management is another area transformed by AI. Predictive analytics allows retailers to anticipate demand more accurately, adjusting inventory levels to align with projected needs to avoid stock shortages or surplus.
This real-time forecasting helps ensure popular products remain available and inventory is efficiently distributed across stores and warehouses. Additionally, predictive insights enable more strategic staffing, ensuring that employee levels align with anticipated demand spikes.
AI also provides a feedback loop that retailers can leverage year after year, helping them refine their holiday season strategies. By using heuristics and historical data, AI helps forecast demand patterns and guides long-term planning for staffing, logistics, and inventory management.
Real-time visibility for seamless operationsVisibility across operations is essential for success during peak shopping periods. Retailers must monitor metrics like incident count (to track disruptions), churn rate or cart abandonment (to gauge retention), inventory turnover (to assess sales versus stock), and logistics (to ensure delivery success). AIOps platforms offer dashboards that provide real-time tracking of these metrics, allowing teams to make immediate, informed decisions to manage demand fluctuations and resolve any issues.
This comprehensive view helps large, omnichannel retailers manage both in-store and online channels. By responding to real-time data, retailers can address customer needs swiftly and reduce the risk of supply chain bottlenecks.
With AI providing this observability, retailers are better equipped to offer a seamless customer experience, even during peak demand.
A data-driven future for retailWith the holiday season's high stakes, AI and AIOps are enabling retailers to make well-informed, strategic decisions that go beyond gut instinct. By offering predictive analytics, real-time insights, and automated scaling, these technologies streamline operations, prevent costly outages, and enhance customer satisfaction. Retailers that embrace these data-driven strategies gain an edge in a competitive landscape, not only succeeding during peak periods but also laying the foundation for future growth and agility.
In a market where customer expectations are high and purchase habits are changing, data-driven strategies supported by AI are becoming essential tools for retail success.
We've featured the best small business software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
BMW has revealed teaser images and video footage of its forthcoming M3 replacement during testing, which will feature a quad-electric motor set-up in the first time in its long and illustrious career.
Choosing to tell the development story through a Netflix-esque mini-series on YouTube, the German automaker has revealed elements of what we can expect from the upcoming “M HP BEV” (high-powered battery electric vehicle), which will be based on an all-new Neue Klasse 3 Series platform.
Although there is no word on battery capacity and the sort of performance we can expect when it arrives in 2028, BMW M boss Frank van Meel says the project was about “embracing new technology”, and finding out “how to push the limits of what is technically possible".
That means a centralized ‘brain’ that aims to bring the numerous control modules under the stewardship of one, very powerful computer unit.
There will also be cutting-edge and highly precise torque vectoring at each wheel, which BMW hopes will deliver some of that ‘Ultimate Driving Experience’ that the company is famed for.
M3 fans are understandably worried about the electrified future of such a beloved and revered sports car, with many worried that the added weight of batteries will blunt performance – something van Meel says is inescapable.
During an interview with Autocar, the BMW CEO admitted that early performance EVs would have to be equipped with larger, heavier batteries in order to “avoid range anxiety in environments where charging infrastructure is still not widely spread.”
But he goes on to suggest that in the coming years, the charging infrastructure is going to improve at such a rapid rate that his company might not have to cram in such a huge quantity of battery packs, as charging will become faster and more convenient.
Analysis: BMW is hedging its bets (Image credit: BMW)According to BMW’s CEO, the electrified M3 is being developed alongside an internal combustion engine counterpart. The company has heavily revised the current generation 3.0-liter straight-six petrol engine to meet Europe’s stringent emissions regulations.
That means a petrol M-car will be available for as long as customer demand exists and, according to some of the YouTube comments under BMW’s recent video, could be a lot longer than the German automaker envisages.
BMW will have a tough job convincing the M-Performance faithful that an electric vehicle can deliver the raw, visceral thrill of some of its best V8 and V6-powered petrol cars, most of which have gone on to garner legendary status in the car community.
Former BMW M engineer Albert Biermann, the man behind some of the best M-Performance cars, proved electric could be exciting when he joined Hyundai and helped the team develop the Ioniq 5 N.
But that car required so much computing power and technical trickery to not only disguise its weight but also usher in the sort of driving cues that many expect of a combustion engine sports car, such as synthesized gear changes and fake exhaust notes.
The Hyundai Ioniq 5 N remains a special car, but it leaves many speculating that you could enjoy much the same thrills at half the price with a used petrol-powered counterpart that doesn’t require the heavy and expensive extras to raise a smile.
Whichever way you look at it, BMW will have a tough time convincing anyone that has ever owned a combustion-engined M3 that this electric version is going to be good enough to tempt them to make the switch.
You might also likeFollowing the monumental success of one of the best Max shows The Penguin, there's news that a standalone Clayface movie is in the works, with a screenplay written by one of the most exciting filmmakers out there, Mike Flanagan. Filming on the movie is expected to commence in early 2025, according to reports by Variety.
As someone who loves the darker side of DC, I am very keen to see Flanagan's take on Clayface. He's already terrified me with his Stephen King adaptation Doctor Sleep as well as some of the best Netflix shows like The Haunting of Hill House and Midnight Mass.
Flanagan has really made a name for himself in the horror genre, but as he's busy doing a Carrie TV series for Prime Video, he won't be in the director's chair for this one. So it'll be interesting to see who takes the reins for the recently greenlit DC project.
What do we know about the Clayface movie?At the time of writing, we don't have much to go off just yet. But Flanagan has teased that he was keen to make it a "horror/thriller/tragedy", so it seems he's keen to keep up his reputation as a writer with a keen eye for the macabre.
The Batman and The Penguin creator Matt Reeves will be producing the movie, and that's about all we know right now. Casting remains a mystery too so we'll need to wait and see who takes on the role of this iconic and underrated Batman villain.
The shapeshifting Clayface has previously been played by Ron Perlman in Batman: The Animated Series and by Brian McManamon in the TV series Gotham, but this movie will mark the first time he's really taken center stage and I'm keen to see who the role is given to next.
You might also likeByte Federal, a US company operating thousands of Bitcoin ATM machines, suffered a data breach in which customer data may (or may not) have been compromised.
In a new filing with the Maine Office of the Attorney General, the company said that on September 30 2024, an unidentified threat actor accessed its servers through a bug in third-party software.
The company spotted the intrusion on November 18, when it shut down the platform, isolated the bad actor, and secured the compromised server. The bug was in GitLab, which its developers used for project management and collaboration.
No evidence of abuseSubsequent investigation determined that the crooks tried to access users’ sensitive information, including their names, birthdates, postal addresses, phone numbers, email addresses, government-issued ID cards, Social Security numbers, transaction activity, and photos. More than enough to engage in all sorts of malicious activity, from phishing, to wire fraud, identity theft, and more.
Whether or not the crooks succeeded in accessing these files is not yet confirmed. “We have no evidence at this time that any of your personal information was actually compromised or misused in any manner,” the company said in the filing. “No user funds or assets were compromised,” the announcement added.
In total, 58,000 people could be affected by the incident.
To address the attack, Byte Federal performed a hard reset on all customer accounts, notified the affected individuals, and did a full rotation on all system passwords, tokens, and keys.
“With the assistance of an independent cybersecurity team, we are conducting a forensic investigation to determine the cause and the scope of the incident,” Byte Federal concluded. “This investigation is ongoing, and we continue to cooperate with law enforcement in this regard.”
The company is one of the largest Bitcoin ATM operators in the United States, servicing some 1,200 machines, according to TechCrunch.
You might also like