logo
Bethesda Devs Win First-Ever Union Contract In The Country At A Major Gaming Company After Threatening Strike

Bethesda Devs Win First-Ever Union Contract In The Country At A Major Gaming Company After Threatening Strike

Yahoo2 days ago

ZeniMax Workers United just became the first game developer union in the country to win a contract at a major publisher. The group of over 300 quality assurance testers across franchises like Fallout and Doom secured an agreement with Microsoft that includes wage increases, salary minimums, and crediting procedures.
'Video games have been the revenue titan of the entire entertainment industry for years, and the workers who develop these games are too often exploited for their passion and creativity. Organizing unions, bargaining for a contract, and speaking with one collective voice has allowed workers to take back the autonomy we all deserve,' ZeniMax QA tester and bargaining committee member Jessee Leese said in a press release. 'Our first contract is an invitation for video game professionals everywhere to take action. We're the ones who make these games, and we'll be the ones to set new standards for fair treatment.'
The contract will now go to the full membership for review with a ratification vote planned for June 20. Once completed, ZeniMax devs, including staff at Bethesda Game Studios, will have won the first collective bargaining agreement of any of the major gaming unions that have formed in recent years. Sega of America staff are also currently in negotiations for a contract, as are developers at other Microsoft-owned studios including the Overwatch 2 and World of Warcraft teams at Blizzard as well as Call of Duty testers at Raven Software.
The ZeniMax contract comes just two months after union employees there threatened to go on strike if an agreement wasn't reached following a nearly two-year-long negotiation process. The Communications Workers of America, which represents ZeniMax Workers United and other Microsoft gaming unions, previously filed an unfair labor practice charge against the tech giant claiming it was slow-walking the talks. The new contract, once ratified, will provide important benchmarks for other teams currently hashing out agreements.
.
For the latest news, Facebook, Twitter and Instagram.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft Issues New Emergency Update For Windows Users
Microsoft Issues New Emergency Update For Windows Users

Forbes

timean hour ago

  • Forbes

Microsoft Issues New Emergency Update For Windows Users

Emergency update now available. Anadolu Agency Following on from Microsoft's warning that its most recent security update was failing for some users and breaking Windows, the company has just released an emergency out-of-band update. This is the second such fix within the last two weeks. Microsoft had already confirmed it was 'investigating reports of the May 13, 2025 Windows security update (KB5058405) failing to install on some Windows 11, version 22H2 and 23H2 devices.' Affected users will be warned 'your PC/Device needs to be repaired,' and that 'the operating system couldn't be loaded because a required file is missing or contains errors.' You will see error code 0xc0000098. Microsoft has released the out-of-band (OOB) update KB5062170, which it says is available through its Update Catalog. The update resolves the driver issue, which is the critical Advanced Configuration and Power Interface driver 'that enables Windows to manage hardware resources and power states.' Users are warned 'there are also reports of this same error occurring with a different file name.' This has impacted some physical setups, but primarily hits virtual environments 'including Azure Virtual Machines, ​Azure Virtual Desktop [and] on-premises virtual machines hosted on Citrix or Hyper-V.' That means enterprise rather than home users. This issue and fix impacts Windows 11 users, which balances out the other emergency update following May's security fixes which only hit Windows 10 users. That was more widespread, resulting in a BitLocker Recovery screen. 'Windows 10 might repeatedly display the BitLocker recovery screen at startup,' the company warned, as it confirmed that other out-of-band update was being made available. Microsoft also advises 'this [new] out-of-band update contains all of the improvements and fixes included in the May 2025 Windows non-security preview update, in addition to this issue's resolution. Since this is a cumulative update, you do not need to apply any previous update before installing KB5062170, as it supersedes all previous updates for affected versions.' Once installed, you will need to restart your device.

Microsoft takes down malware found on 394,000 Windows PCs
Microsoft takes down malware found on 394,000 Windows PCs

Fox News

time2 hours ago

  • Fox News

Microsoft takes down malware found on 394,000 Windows PCs

Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer. I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data (more on this later), but the good news is that Microsoft has taken it down. The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Microsoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16. Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware's reach and impact made it a favored choice among threat actors for financial theft and data breaches. To disrupt the malware's operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma's infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma's core command system and shut down marketplaces where the malware was being sold. International cooperation played a major role as well. Japan's cybercrime unit helped dismantle Lumma's locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage. Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. Lumma is a Malware-as-a-Service (MaaS) that has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information. Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn't limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. To protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures: 1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it's likely a scam. Close the page immediately and avoid interacting with it. 2. Don't click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company's official website instead of clicking any links inside the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. 4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected. 5. Monitor your accounts for suspicious activity and change your passwords: If you've interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don't recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here. 6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. Microsoft's takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I've been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous. Do you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store