news aggregator
DevOps guru and ex-Googler say vibes beat reading diffs but there are risks
"Accept All. Always. Don't read the diffs anymore."…
Security pros explore whether infection-spoofing code can immunize Windows systems against attack
Feature What's better, prevention or cure? For a long time the global cybersecurity industry has operated by reacting to attacks and computer viruses. But given that ransomware has continued to escalate, more proactive action is needed.…
Another phone Linux? The Reg attempts to disentangle the options
The latest version of Mobian, an edition of Debian aimed at mobile devices, is here, based on Debian 13 "Trixie".…
Calendar cock-up exposed recipients' details
Anti-fraud nonprofit Cifas was left red-faced after sending out a calendar invite that exposed the email addresses of dozens of individuals working across the fraud space.…
SpaceX surpassed the 10,000-satellite milestone for its Starlink constellation after two Falcon 9 launches on Oct. 19 added 56 more satellites to orbit. The company now operates about two-thirds of all active satellites worldwide and continues to break reuse records. Space.com reports: A Falcon 9 rocket carrying 28 Starlink internet satellites lifted off from California's Vandenberg Space Force Base today at 3:24 p.m. EDT (1924 GMT; 12:24 p.m. local California time). Those 28 included the 10,000th Starlink spacecraft ever to reach orbit, which a SpaceX employee noted on the company's launch webcast: "From Tintin to 10,000! Go Starlink, go Falcon, go SpaceX!"
It was also the 132nd Falcon 9 liftoff of the year, equaling the mark set by the rocket last year -- and there are still nearly 2.5 months to go in 2025. [...] This launch was the second of the day for SpaceX; less than two hours earlier, another Falcon 9 sent 28 more Starlink satellites up from Florida's Space Coast. That earlier liftoff was the 31st for that Falcon 9's first stage, setting a new reuse record.
Read more of this story at Slashdot.
12 more hours of pain followed initial outage
Amazon Web Services has revealed that its efforts to recover from the massive mess at its US-EAST-1 region caused other services to fail.…
Better scheduling and resource-sharing for inferencing workloads using multiple models, not a training breakthrough
Chinese tech giant Alibaba has published a paper detailing scheduling tech it has used to achieve impressive utilization improvements across the GPU fleet it uses to power inferencing workloads – which is nice, but not a breakthrough that will worry AI investors.…
An anonymous reader quotes a report from Wired: The National Transportation Safety Board confirmed Sunday that it is investigating an airliner that was struck by an object in its windscreen, mid-flight, over Utah. "NTSB gathering radar, weather, flight recorder data," the federal agency said on the social media site X. "Windscreen being sent to NTSB laboratories for examination." The strike occurred Thursday, during a United Airlines flight from Denver to Los Angeles. Images shared on social media showed that one of the two large windows at the front of a 737 MAX aircraft was significantly cracked. Related images also reveal a pilot's arm that has been cut multiple times by what appear to be small shards of glass.
The captain of the flight reportedly described the object that hit the plane as "space debris." This has not been confirmed, however. After the impact, the aircraft safely landed at Salt Lake City International Airport after being diverted. Images of the strike showed that an object made a forceful impact near the upper-right part of the window, showing damage to the metal frame. Because aircraft windows are multiple layers thick, with laminate in between, the window pane did not shatter completely. The aircraft was flying above 30,000 feet -- likely around 36,000 feet -- and the cockpit apparently maintained its cabin pressure.
Read more of this story at Slashdot.
Investigators recovered the OceanGate Titan sub's underwater camera nearly intact, discovering a SanDisk SD card that survived the 2023 implosion and still contained 12 images and 9 videos. TechSpot reports: Scott Manley, the science communication YouTuber, gamer, astrophysicist, and programmer, posted about the latest find: a hardened SubC-branded Rayfin Mk2 Benthic Camera containing the undamaged SD card. The titanium and synthetic sapphire crystal camera is rated to withstand depths of up to 6,000 meters (19,685 feet) -- the Titan imploded at around 3,300 meters (10,827 feet). The casing is intact, though the lens is shattered and the PCBs are slightly damaged.
Incredibly the SD card inside the camera was undamaged. Tom's Hardware reports that it's almost certainly a SanDisk Extreme Pro 512GB, which costs around $62 on Amazon. The camera's SD card was found to be fully encrypted, divided into a small partition for operating system updates and a larger one for user data. Due to impact damage from the accident, several components of the system-on-module (SOM) board -- including connectors and the microcontroller -- were broken, complicating the data extraction process. [...] After determining the data wasn't encrypted beyond the file system level, they successfully accessed the SD card contents using the manufacturer's proprietary equipment and procedures.
Read more of this story at Slashdot.
Shall I refer thee to all those lawsuits about fair use? Researchers think this result makes them worth revisiting
Readers of texts created to use the styles of famous authors prefer works written by AI to human human-written imitations, but only after developers fine-tune AI models to understand an author’s output.…
Foreign hackers breached the National Nuclear Security Administration's Kansas City National Security Campus (KCNSC) by exploiting unpatched Microsoft SharePoint vulnerabilities. The intrusion happened in August and is possibly linked to either Chinese state actors or Russian cybercriminals. CSO Online notes that "roughly 80% of the non-nuclear parts in the nation's nuclear stockpile originate from KCNSC," making it "one of the most sensitive facilities in the federal weapons complex." From the report: The breach targeted a plant that produces the vast majority of critical non-nuclear components for US nuclear weapons under the NNSA, a semi-autonomous agency within the Department of Energy (DOE) that oversees the design, production, and maintenance of the nation's nuclear weapons. Honeywell Federal Manufacturing & Technologies (FM&T) manages the Kansas City campus under contract to the NNSA. [...] The attackers exploited two recently disclosed Microsoft SharePoint vulnerabilities -- CVE-2025-53770, a spoofing flaw, and CVE-2025-49704, a remote code execution (RCE) bug -- both affecting on-premises servers. Microsoft issued fixes for the vulnerabilities on July 19.
On July 22, the NNSA confirmed it was one of the organizations hit by attacks enabled by the SharePoint flaws. "On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability began affecting the Department of Energy," a DOE spokesperson said. However, the DOE contended at the time, "The department was minimally impacted due to its widespread use of the Microsoft M365 cloud and very capable cybersecurity systems. A very small number of systems were impacted. All impacted systems are being restored." By early August, federal responders, including personnel from the NSA, were on-site at the Kansas City facility, the source tells CSO.
Read more of this story at Slashdot.
Pages
|