AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Counter strike go vs source10/25/2023 ![]() ![]() ![]() A cybercriminal then sends that user a Steam invitation filled with malicious code. Here's how the potential exploit works: An unsuspecting user logs into Steam and starts playing CS:GO (or a comparable game). That's not practical, though, given that these games comprise some of the most popular multiplayer titles on Steam. The bad news is that if you're looking for a way to protect yourself, there isn't really one, save to avoid Source engine games entirely. However, two years have gone by since then, and as of CS: GO's most recent patch, the issue is still present. ![]() Florian, a secret club member, submitted the vulnerability to Valve's bug bounty program, which paid him for his efforts and promised to fix the Source code. Secret Club said it went through all the proper channels.
0 Comments
Read More
Leave a Reply. |