It’s Game Awards season, y’all. That special time of the year when we gather together to celebrate video games and the people who make them… by watching expensive commercials briefly punctuated by the odd awards speech or musical performance. For better or worse, The Game Awards is the biggest night on the video game event calendar. But with the way things have been going, lately it’s been more “worse” than it has been “better.”
Technology
5.5 million patients' information exposed by major healthcare data breach
Healthcare seems to be the favorite target of attackers this year. It’s been only four months, and we’ve already seen some of the biggest data breaches in the sector. Recently, news about the Blue Shield of California data breach came to light, leaking the personal data of 4.7 million people.
But if that wasn’t enough, Connecticut’s largest healthcare system, Yale New Haven Health, has now revealed that a data breach affected more than 5.5 million people.
The information leaked included patient names, dates of birth, postal and email addresses, phone numbers and more.
Join the FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)
What you need to know
According to a legally mandated disclosure with the U.S. Department of Health and Human Services, Yale New Haven Health experienced a cyberattack on March 8 that allowed malicious hackers to obtain copies of patients’ personally identifiable information as well as some healthcare-related data.
Yale New Haven Health is a nonprofit healthcare system based in New Haven, Connecticut. It includes five acute-care hospitals, a medical foundation, and a network of outpatient facilities and multispecialty centers across Connecticut, New York and Rhode Island.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
In a notice posted on its website, the healthcare system said the stolen data varied by individual but could include names, dates of birth, postal and email addresses, phone numbers, race and ethnicity information, Social Security numbers, types of patients and medical record numbers. Reportedly, the number of affected individuals may still change as investigations continue. Importantly, electronic medical record systems and treatment information were not accessed, and no financial account, payment or employee HR information was involved.
This is not the first time healthcare systems have been in the crosshairs of cybercriminals. In recent years, attacks on institutions like UnitedHealth and Ascension Health have led to months of operational disruption, massive financial costs and prolonged investigations.
Illustration of a doctor looking at data on a phone. (Kurt “CyberGuy” Knutsson)
DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVER
What Yale New Haven Health is doing
Yale New Haven Health brought in cybersecurity firm Mandiant to assist with the investigation and said a rapid response helped contain the incident and prevent any disruption to patient care. The organization noted that it regularly updates and strengthens its systems to protect sensitive data and will continue those efforts. Notification letters began going out to affected individuals on April 14, and complimentary credit monitoring and identity theft protection services have been offered to those whose Social Security numbers were compromised.
The breach could have serious consequences for those impacted. The stolen data includes highly sensitive information that can be used for identity theft, financial fraud, phishing attacks or targeted scams. Healthcare data is especially valuable on the black market because it can be exploited for long periods without easy detection. Even if Social Security numbers or medical information aren’t misused right away, the long-term risk for affected individuals remains significant.
We reached out to Yale New Haven Health (YNHHS), and a health system spokesperson said in part:
“We take our responsibility to safeguard patient information incredibly seriously, and we regret any concern this incident may have caused. We are continuously updating and enhancing our systems to protect the data we maintain and to help prevent events such as this from occurring in the future. For more information on this incident, patients may visit YNHHS’ website at ynhhs.org or call our dedicated, toll-free call center at 1-855-549-2678, Monday through Friday, between 9:00 am and 9:00 pm Eastern Time, excluding major U.S. holidays.”
A healthcare employee working on a laptop. (Kurt “CyberGuy” Knutsson)
MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT
5 ways you can stay safe from insurance data breach
If your information was part of the Yale New Haven Health breach or any similar one, it’s worth taking a few steps to protect yourself.
1. Consider identity theft protection services: Since the Yale New Haven Health data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, social security number, and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.
2. Use personal data removal services: The Yale New Haven Health data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.
One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
3. Have strong antivirus software: Yale New Haven Health hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses..
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.
5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.
WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE
Kurt’s key takeaway
While Yale New Haven has been working with security experts to contain the breach and notify those affected, it is troubling that hackers were able to access the data of 5.5 million individuals before the organization detected the intrusion. The incident highlights a deeper issue, revealing gaps in the security infrastructure that many healthcare institutions are still not adequately addressing.
Do you think companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The Game Awards 2025: all the news and announcements
The Game Awards are back once again to showcase a metric ton of commercials, provide the gaming public with their monthly dose of Muppets, and validate gamers’ opinions on which title should be named the Game of the Year. I don’t wanna say it’s a foregone conclusion what this year’s GOTY will be — Silksong may surprise us — but it’s pretty obvious that Clair Obscur: Expedition 33 is the frontrunner and for good reason. It’s netted 12 nominations, the most out of this year’s contenders, including all five craft awards (Direction, Art, Music and Score, Narrative, and Audio Design).
On the announcements side, Crystal Dynamics and Amazon Games are planning something related to the Tomb Raider series. Keighley also probably had plans to reveal big news about Resident Evil: Requiem, but unfortunately it got spoiled early thanks to some leaked key art on the PlayStation Store. Here’s all the news, announcements, and trailers from The Game Awards 2025.
Technology
Malicious browser extensions hit 4.3M users
NEWYou can now listen to Fox News articles!
A long-running malware campaign quietly evolved over several years and turned trusted Chrome and Edge extensions into spyware. A detailed report from Koi Security reveals that the ShadyPanda operation affected 4.3 million users who downloaded extensions later updated with hidden malicious code.
These extensions began as simple wallpaper or productivity tools that looked harmless. Years later, silent updates added surveillance functions that most users could not detect.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
THIS CHROME VPN EXTENSION SECRETLY SPIES ON YOU
Malicious extensions spread through trusted browsers and quietly collected user data for years. (Kurt “CyberGuy” Knutsson)
How the ShadyPanda campaign unfolded
The operation included 20 malicious Chrome extensions and 125 on the Microsoft Edge Add-ons store. Many first appeared in 2018 with no obvious warning signs. Five years later, the extensions began receiving staged updates that changed their behavior.
Koi Security found that these updates rolled out through each browser’s trusted auto-update system. Users did not need to click anything. No phishing. No fake alerts. Just quiet version bumps that slowly turned safe extensions into powerful tracking tools.
NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS
WeTab functions as a sophisticated surveillance platform disguised as a productivity tool. (Koi)
What the extensions were doing behind the scenes
Once activated, the extensions injected tracking code into real links to earn revenue from user purchases. They also hijacked searches, redirected queries and logged data for sale and manipulation. ShadyPanda gathered an unusually broad range of personal information, including browsing history, search terms, cookies, keystrokes, fingerprint data, local storage, and even mouse movement coordinates. As the extensions gained credibility in the stores, the attackers pushed a backdoor update that allowed hourly remote code execution. That gave them full browser control, letting them monitor websites visited and exfiltrate persistent identifiers.
Researchers also discovered that the extensions could launch adversary-in-the-middle attacks. This allowed credential theft, session hijacking and code injection on any website. If users opened developer tools, the extensions switched into harmless mode to avoid detection. Google removed the malicious extensions from the Chrome Web Store. We reached out to the company, and a spokesperson confirmed that none of the extensions listed are currently live on the platform.
Meanwhile, a Microsoft spokesperson told CyberGuy, “We have removed all the extensions identified as malicious on the Edge Add-on store. When we become aware of instances that violate our policies, we take appropriate action that includes, but is not limited to, the removal of prohibited content or termination of our publishing agreement.”
Most of you will not need the full technical IDs used in the ShadyPanda campaign. These indicators of compromise are primarily for security researchers and IT teams. Regular users should focus on checking your installed extensions using the steps in the guide below.
You can review the full list of affected Chrome and Edge extensions to see every ID tied to the ShadyPanda campaign by clicking here and scrolling down to the bottom of the page.
How to check whether your browser contains these extension IDs
Here is an easy, step-by-step way for you to verify if any malicious extension IDs are installed.
For Google Chrome
Open Chrome.
Type chrome://extensions into the address bar.
Press Enter.
Look for each extension’s ID.
Click Details under any extension.
Scroll down to the Extension ID section.
Compare the ID with the lists above.
If you find a match, remove the extension immediately.
For Microsoft Edge
Open Edge.
Type edge://extensions into the address bar.
Press Enter.
Click Details under each extension.
Scroll to find the Extension ID.
If an ID appears in the lists, remove the extension and restart the browser.
183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW
Simple security steps can block hidden threats and help keep your browsing safer. (Kurt “CyberGuy” Knutsson)
How to protect your browser from malicious extensions
You can take a few quick actions that help lock down your browser and protect your data.
1) Remove suspicious extensions
Before removing anything, check your installed extensions against the IDs listed in the section above. Most of the malicious extensions were wallpaper or productivity tools. Three of the most mentioned are Clean Master, WeTab and Infinity V Plus. If you installed any of these or anything that looks similar, delete them now.
2) Reset your passwords
These extensions have access to sensitive data. Resetting your passwords protects you from possible misuse. A password manager makes the process easier and creates strong passwords for each account.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Use a data removal service to reduce tracking
ShadyPanda collected browsing activity, identifiers and behavioral signals that can be matched with data already held by brokers. A data removal service helps you reclaim your privacy by scanning people-search sites and broker databases to locate your exposed information and remove it. This limits how much of your digital footprint can be linked, sold or used for targeted scams.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
4) Install strong antivirus software
An antivirus may not have caught this specific threat due to the way it operated. Still, it can block other malware, scan for spyware and flag unsafe sites. Many antivirus tools include cloud backup and VPN options to add more protection.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Limit your extensions
Each extension adds risk. Stick with known developers and search for recent reviews. If an extension asks for permissions it should not need, walk away.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
ShadyPanda ran for years without raising alarms and proved how creative attackers can be. A trusted extension can shift into spyware through a silent update, which makes it even more important to stay alert to changes in browser behavior. You protect yourself by installing fewer extensions, checking them from time to time and watching for anything that feels out of place. Small steps help lower your exposure and reduce the chances that hidden code can track what you do online.
Have you ever found an extension on your browser that you didn’t remember installing or one that started acting in strange ways? How did you handle it? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alert, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The Game Awards are losing their luster
Between host and industry hypeman Geoff Keighley’s two video game vanity projects, The Game Awards is older and ostensibly more mature than Summer Game Fest. Conceived in 2014 as a way to celebrate both the people who make and play games, the show has always been part awards ceremony, part commercial product. That idea has been executed with varying degrees of success. (Remember the Schick Hydrobot?) But for the last few years, it’s felt like the awards part was increasingly getting in the way of the commercial part.
That was felt most acutely during the 2023 Game Awards. Developers accepting statues were often drowned out by music or cut off by teleprompters asking them to “please wrap it up” after their roughly 30 seconds of allotted time. Muppets and Death Stranding director Hideo Kojima, though, had no such time limits enforced on them, with Aftermath calculating that 13 acceptance speeches could have fit inside the five minutes Kojima took to explain his game / not-game OD.
2023 was also the first full year into the now endemic video game labor crisis that saw developers laid off by the tens of thousands while studios of popular games got shut down. That crisis went by that year’s game awards with no acknowledgement, angering developers further. “I’m incredibly disappointed in Geoff Keighley for his silence on the state of the industry this year,” Monomi Park senior environment artist Dillon Sommerville told The Verge in 2023.
How to watch The Game Awards
On Thursday, December 11th at 5PM PT / 8PM ET the TGAs will be streamed on Twitch and YouTube. This year, Keighley has also signed a deal to beam the show live via Prime Video where it’ll be free to watch for Prime subscribers.
Keighley, perhaps responding to the bad optics, acknowledged the continuing labor issue in 2024. The Game Awards also introduced a new category, Game Changer, with its inaugural award going to Amir Satvat, a business development director at Tencent who created a resource to help laid-off developers find jobs.
But in the months since the 2024 awards, Keighley has once again been accused of poor treatment of the people he’s supposed to be celebrating. In 2020, The Game Awards announced a new initiative called The Future Class, designed to celebrate game makers, “who represent the bright, bold and inclusive future of video games.” Inductees are honored during the broadcast and provided with networking opportunities, mentorship programs, and other resources throughout the following year. However, there have been reports alleging that Keighley has ignored Future Class concerns and that resources from the program have been materially lacking.
In 2023, the Future Class wrote an open letter to The Game Awards and Keighley demanding recognition of the war in Gaza. This wasn’t without precedent. In 2022, the awards show acknowledged the war in Ukraine. But Keighley didn’t respond to the letter, nor has he mentioned the Future Class that much either. The Game Awards hasn’t named a Future Class in the last two years and won’t be naming anymore according to Future Class organizer Emily Weir. “At this time, we are not planning a new Future Class for this year and do not have any active programming plans for Future Class,” she said in a statement to Game Developer.

Like a lot of diversity and inclusion-minded programs, Future Class got started in the wake of George Floyd’s murder in 2020. But as diversity, equity, and inclusion (DEI) have become publicly verboten in the rise of the Trump Administration and the online right, many companies, including game publishers, have diminished or jettisoned their DEI programs. While there has been no explicitly stated reason for the seeming shut down of the Future Class, it seems like The Game Awards is just doing what it always does — whatever’s popular at the time.
For as much as The Game Awards has lost the veneer of respectability among some of the people whose work it’s meant to celebrate, rest assured, it ain’t going anywhere. The Game Awards broadcast nets millions of viewers with a record-breaking 154 million livestreams in 2024. That’s a lot of eyeballs that developers pay a lot of money to get in front of. And even for those who don’t buy airtime, having your game featured at all during the presentation can net a big boost in sales. After Balatro was nominated for and won multiple awards last year including best debut indie, its publisher PlayStack shouted out the awards specifically for contributing to a huge increase in players.
More generally, the awards also provide a nice focal point for the disparate online gaming communities to gather around… and bitch about. E3 is long gone, and the other big events (not also run by Keighley) are the publisher-specific direct livestreams. With everything so fractured now, yelling with your friends or colleagues about how Hades was robbed for game of the year (an event I will never get over) is fun and something TGAs are singularly suited to provide. It is not the Oscars of gaming — DICE, the BAFTAs, and the International Game Development Awards (IGDA) pretty well take care of that. But if you want popularity, production values, and Flute Guy, there’s nothing like The Game Awards — even though some of the shine is starting to wear off.
-
Alaska6 days agoHowling Mat-Su winds leave thousands without power
-
Politics1 week agoTrump rips Somali community as federal agents reportedly eye Minnesota enforcement sweep
-
Ohio1 week ago
Who do the Ohio State Buckeyes hire as the next offensive coordinator?
-
Texas6 days agoTexas Tech football vs BYU live updates, start time, TV channel for Big 12 title
-
News1 week agoTrump threatens strikes on any country he claims makes drugs for US
-
World1 week agoHonduras election council member accuses colleague of ‘intimidation’
-
Washington3 days agoLIVE UPDATES: Mudslide, road closures across Western Washington
-
Iowa5 days agoMatt Campbell reportedly bringing longtime Iowa State staffer to Penn State as 1st hire