The clock has struck midnight. The city sleeps, but the servers are humming louder than ever. Welcome to this special Christmas Eve edition of **Night Tekin**. It has been a chaotic 24 hours in the world of technology. Just as we were preparing to settle down for the holidays, the cybersecurity world was rocked by a terrifying revelation from Sony’s PlayStation Network. At the same time, the "Grey Market" of streaming services saw the rise of a new champion on GitHub, while PC gamers are holding their breath for what might be the biggest giveaway in Epic Games Store history. From the plummeting charts of Bitcoin to the AI-infused future of Xiaomi’s HyperOS, we have a lot to unpack. Pour yourself a strong coffee (or a hot cocoa), Commander. We are diving deep into the digital abyss.
1. Code Red at PlayStation: The Myth of the "Unbreakable" Passkey We begin tonight with the most alarming story of the week—one that should send shivers down the spine of every gamer with a digital library.
For years, security experts have told us: "Enable Two-Factor Authentication (2FA). Use Passkeys. You will be safe." Tonight, that promise has been broken. The Breach: A Critical Flaw in PSN Reports emerged
late this afternoon of a "Critical Zero-Day" vulnerability within the Sony PlayStation Network (PSN) infrastructure. This is not a simple phishing attack where a user accidentally gives away their password.
This is a structural failure. The bug reportedly allows malicious actors to bypass the most advanced security layers, including the supposedly unhackable Passkeys , without ever needing physical access
to the victim's device. The Victim: Nicolas Lellouche The story broke when Nicolas Lellouche , a respected tech journalist for the French media outlet Numerama , went public with his nightmare. Lellouche
is not a novice user; he is a tech expert. He had every security measure enabled. Yet, a hacker managed to: 1. Bypass his biometric Passkey. 2. Change his login ID (Email). 3. Reset his password. 4. Utilize
his stored credit card for unauthorized transactions. The most terrifying part? After Lellouche spent hours with Sony Support to recover his account, the hacker broke back in almost immediately. This confirms
that the exploit is reproducible and persistent. The attacker didn't need the new password; they had found a backdoor in the recovery process itself. Technical Analysis: The "Recovery Flow" Exploit While
Read Full Article