EA patched Origin security flaws that put millions of users at risk [www.engadget.com]
EA Origin vulnerability could have risked 300 million users [www.slashgear.com]
Security firms demonstrate subdomain hijack exploit vs. EA/Origin [arstechnica.com]
Major vulnerability found in EA's Origin gaming client [betanews.com]
EA patched Origin security flaws that put millions of users at risk https://t.co/Cye2XTaDmm pic.twitter.com/JdS7PFrCK3
— Engadget Gaming (@engadgetgaming) June 26, 2019
Wowie zowie! This should have some admins and webmasters to see if they have any no longer being used CNAMEs: Security firms demonstrate subdomain hijack exploit vs. EA/Origin @arstechnica https://t.co/nFXkc1gmG8
— Christine Hall (@BrideOfLinux) June 26, 2019
Security firms demonstrate subdomain hijack exploit vs. EA/Origin - From Discover on Google https://t.co/iLKwULOm46
— Martin McKeay (@mckeay) June 26, 2019
EA patched Origin #security flaws that put millions of users at riskhttps://t.co/PDP3fRR0dP#EA #Games #DataLeak #cloud #CloudSecurity #SecurityIssues
— William Harvey (@williamharvey07) June 26, 2019
As long as vulnerabilities remain, proactive detection and prevention strategies are the only way to prevent damage before it happens. https://t.co/XmFgfedZ6Q
— DataVisor (@DataVisor) June 26, 2019
【自分用メモ】Security firms demonstrate subdomain hijack exploit vs. EA/Origin | Ars Technica https://t.co/HTdMaDBkY3
— Yasuhiro Morishita (@OrangeMorishita) June 27, 2019