1.10.2 Release Notes

While we prepare for our big 1.11 release, we have been working diligently on regular fixes and minor upgrades! [b]Version 1.10.2 Release Notes[/b] Fixes • RVB1-980 Mismatch between win condition in multiplayer games with the Blue Team Damaged Their Own Process win condition • RVB1-976 Turning off Damage ICS Process win condition causes PnL win condition to silently turn off • RVB1-959 ICS Security Monitoring is marked as already implemented when IR is activated a turn after it is queued, despite the fact that the action fails • RVB1-956 Host scanning from the onsite pivot reveals hosts previously accessible to the rogue device once it is removed • RVB1-954 BT can replace compromised assets that they don't know are compromised yet • RVB1-953 "Prepare Covert Attack" action entry English error • RVB1-951 Actions that cost money count as spent cash if the action is cancelled afterwards • RVB1-950 Unable to enter IR mode with only a ransomware lock being discovered • RVB1-947 ICS Security Monitoring is successful when finished in IR mode • RVB1-946 Exfiltrate Data should not be available on IDS devices • RVB1-944 LC&A has an incorrect, overtly long name on BT's action tree both in Japanese and Turkish • RVB1-938 Restoring backups doesn't restore vulnerability detection and/or resolution statistics properly • RVB1-932 RT will lose the information on the vulnerabilities an asset has if a backup is restored from before the turn the vulnerabilities were found • RVB1-931 Restoring from backup doesn't affect detected and resolved incident count metrics • RVB1-926 Assets can be portscanned and enumerated if their upstream asset is denied/disconnected • RVB1-921 Last selected attack target is always available, even if the asset is disconnected or already compromised Features and Upgrades • RVB1-929 Boost Pilfer Data's buff to Electronic SE skill • RVB1-924 Reenable the ability to queue actions when it's not your turn without reintroducing RVB1-743