Video Game Actors End Strike After Securing AI Safeguards - 1

Image by Freepik

Video Game Actors End Strike After Securing AI Safeguards

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

Video game performers ended their year-long strike after SAG-AFTRA members ratified a new contract that protects their work from artificial intelligence misuse.

In a rush? Here are the quick facts:

  • The contract requires written consent to create digital replicas of performers.
  • Actors will be paid for AI replica creation and receive usage reports.
  • The agreement includes a 15% pay raise and annual increases over three years.

The AP reports that the vote involved 2,500 union members who supported the deal at a 95% rate for major companies: Activision, Electronic Arts, and Disney.

At the heart of the strike was a disagreement over the use of AI replication of actor performances , particularly motion capture work, which companies treated as “data” instead of creative work, as noted by the BBC .

The new contract now requires employers to obtain written consent before making digital replicas of performers, both during their lifetime and after death, unless specific posthumous use is permitted. Additionally, the new agreement requires performers to be compensated for time spent creating replicas, and will receive a detailed report about the usage of their likenesses, as reported by the AP.

SAG-AFTRA’s chief negotiator Duncan Crabtree-Ireland said the contract includes “meaningful gains and important AI protections,” as reported by the AP. Audrey Cooling, spokesperson for the game companies, called the agreement “historic,” citing “industry-leading AI protections” and “enhanced health and safety measures,” as reported by the BBC.

Voice actor Ashly Burch, known for roles in Life is Strange and Horizon Zero Dawn, supported the strike. “We just don’t want to be replaced,” she told the BBC, emphasizing the need for “consent, transparency, and compensation.”

While some performers continued work under interim deals during the strike, many faced financial strain. BBC reports that Actor Ray Chase noted the heavy toll on motion capture artists: “If you came out to Los Angeles to be a motion capture actor, then your entire existence is being threatened by AI.”

With a 15% pay raise upon ratification and annual increases over three years, the contract marks a significant step in protecting performers’ rights in the AI age. As one actor put it to the BBC, “We’re just so happy that we’ve found a peaceful resolution, for sure.”

European Foreign Ministry Hit By DoNot APT Cyber-Espionage Attack - 2

Image by vecstock, from Unsplash

European Foreign Ministry Hit By DoNot APT Cyber-Espionage Attack

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

The hacker group DoNot APT performed a secretive cyberattack against a European foreign ministry, using fake emails and malware which demonstrated the advancement of worldwide espionage tactics.

In a rush? Here are the quick facts:

  • Attack began with a phishing email impersonating defense officials.
  • Malware disguised as a PDF was delivered via Google Drive.
  • Malware steals data and maintains access using scheduled tasks.

The cyber-espionage group DoNot APT, known as APT-C-35 or Mint Tempest, conducted a covert cyberattack against a European foreign ministry, as Trellix research shows. Since 2016, the espionage group operating from India has focused on South Asian government targets and diplomatic institutions, but now appears to be expanding into Europe.

The email, with the subject line “Italian Defence Attaché Visit to Dhaka, Bangladesh,” contained a malicious Google Drive link. Clicking the link downloaded a password-protected document but contained malware.

Once opened, the malware, disguised as a PDF, quietly installed a backdoor on the victim’s system. After gaining access, the attackers began stealing sensitive data by running tasks which refreshed the malware every 10 minutes. Since 2018, DoNot APT has used LoptikMod as its exclusive malware tool.

The researchers observed that the attackers employed a technique which embedded malicious code within binary strings, which made the malware detection more challenging. The malware steals personal system information through its encryption protocol to send it to a command-and-control server that researchers found inactive at the time of analysis, likely to evade detection.

The experts recommend that governments and organizations must enhance email protection mechanisms, monitor network activity, and implement signature-based malware blocking and employee training for phishing identification.