<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>outage &#8211; Cincy Link</title>
	<atom:link href="https://cincylink.com/tag/outage/feed/" rel="self" type="application/rss+xml" />
	<link>https://cincylink.com</link>
	<description>Explore Cincy</description>
	<lastBuildDate>Wed, 14 Jun 2023 04:17:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://cincylink.com/pub/content/uploads/sites/27/2020/03/apple-touch-icon-precomposed-100x100.png</url>
	<title>outage &#8211; Cincy Link</title>
	<link>https://cincylink.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Food safety after power outages</title>
		<link>https://cincylink.com/2023/06/14/food-safety-after-power-outages/</link>
					<comments>https://cincylink.com/2023/06/14/food-safety-after-power-outages/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 04:17:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[food]]></category>
		<category><![CDATA[hurricane]]></category>
		<category><![CDATA[mdnd]]></category>
		<category><![CDATA[New Orleans]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=183973</guid>

					<description><![CDATA[Food safety is a major concern after a power outage. According to FoodSafety.gov, your refrigerator will keep food safe for up to four hours during a power outage.A full freezer will keep food safe for roughly 48 hours. People should not taste the food after a power outage to determine its safety. According to the &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2022/12/Food-safety-after-power-outages.jpg" /></p>
<p>
					Food safety is a major concern after a power outage. According to FoodSafety.gov, your refrigerator will keep food safe for up to four hours during a power outage.A full freezer will keep food safe for roughly 48 hours. People should not taste the food after a power outage to determine its safety. According to the United States Department of Agriculture, refrigerators should be set to maintain a temperature of 40 degrees Fahrenheit or below. Some refrigerators have built-in thermometers to measure their internal temperature. If your fridge does not, keep an appliance thermometer in the refrigerator to monitor the temperature. The USDA says this can be critical in the event of a power outage. When the power goes back on, if the refrigerator is still 40 degrees Fahrenheit, the food is safe. Foods held at temperatures above 40 degrees Fahrenheit for more than two hours should not be consumed, according to the USDA. For tips on when to throw out certain refrigerated and frozen foods, click here.
				</p>
<div>
<p>Food safety is a major concern after a power outage. </p>
<p><!-- article/blocks/side-floater --></p>
<p><!-- article/blocks/side-floater --></p>
<p>According to <a href="https://www.foodsafety.gov/food-safety-charts/food-safety-during-power-outage" target="_blank" rel="nofollow noopener">FoodSafety.gov,</a> your refrigerator will keep food safe for up to four hours during a power outage.</p>
<p>A full freezer will keep food safe for roughly 48 hours. </p>
<p>People should not taste the food after a power outage to determine its safety. </p>
<p>According to the United States Department of Agriculture, refrigerators should be set to maintain a temperature of 40 degrees Fahrenheit or below. </p>
<p>Some refrigerators have built-in thermometers to measure their internal temperature. If your fridge does not, keep an appliance thermometer in the refrigerator to monitor the temperature. </p>
<p>The USDA says this can be critical in the event of a power outage. When the power goes back on, if the refrigerator is still 40 degrees Fahrenheit, the food is safe. </p>
<p>Foods held at temperatures above 40 degrees Fahrenheit for more than two hours should not be consumed, according to the USDA. </p>
<p>For tips on when to throw out certain refrigerated and frozen foods, click <a href="https://htv-prod-media.s3.amazonaws.com/files/food-safety-during-power-outage-1661180604.pdf" target="_blank" rel="nofollow noopener">here.</a></p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/power-outage-food-safety-tips-winter-weather/42278469">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2023/06/14/food-safety-after-power-outages/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Numerous sites affected by Amazon Web Services outage</title>
		<link>https://cincylink.com/2021/12/07/numerous-sites-affected-by-amazon-web-services-outage/</link>
					<comments>https://cincylink.com/2021/12/07/numerous-sites-affected-by-amazon-web-services-outage/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Tue, 07 Dec 2021 19:17:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[amazon web services]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[jbnd]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=124673</guid>

					<description><![CDATA[Numerous sites affected by Amazon Web Services outage Updated: 2:04 PM EST Dec 7, 2021 Amazon Web Services suffered a major outage Tuesday, the company said, limiting service at many key and popular sites.The company provides cloud computing services to many governments, universities and companies, including The Associated Press.Amazon said in a post an hour &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<div class="mobile">
											<!-- blocks/ad.twig --></p>
<p><!-- blocks/ad.twig --></p>
<p><!-- article/blocks/headline --></p>
<section class="article-headline">
<p>Numerous sites affected by Amazon Web Services outage</p>
<div class="article-social-branding share-content horizontal">
<p><!-- blocks/share-content/share-widget --></p>
<p><!-- /blocks/share-content/share-widget --></p>
<div class="article-branding">
												<img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/12/Numerous-sites-affected-by-Amazon-Web-Services-outage.png" class="lazyload lazyload-in-view branding" alt="AP"/></p>
<p>
					Updated: 2:04 PM EST Dec 7, 2021
				</p>
</p></div>
</p></div>
</section>
<p><!-- /article/blocks/headline --><!-- article/blocks/byline --><br />
<!-- /article/blocks/byline --></p></div>
<p>
					Amazon Web Services suffered a major outage Tuesday, the company said, limiting service at many key and popular sites.The company provides cloud computing services to many governments, universities and companies, including The Associated Press.Amazon said in a post an hour after the outage began that it had identified the root cause and was “actively working towards recovery.” It did not disclose more about the cause.The outage also affected Amazon’s ability to provide updates, it said.The outage began midmorning on the U.S. East Coast, said Doug Madory, director of internet analysis at Kentik Inc, a network intelligence firm. “AWS is the biggest cloud provider and us-east-1 is their biggest data center, so any disruption there has big impacts to many popular websites and other internet services,” he said.Madory said he did not believe the outage was anything nefarious. He said a recent cluster of outages at providers that host major websites reflects how the networking industry has evolved. “More and more these outages end up being the product of automation and centralization of administration,” he said. “This ends up leading to outages that are hard to completely avoid due to operational complexity, but are very impactful when they happen.”Kentik was seeing a 26% drop in traffic to Netflix, among major web-based services affected by the outage, Madory said. According to Down Detector, a clearinghouse for user reports on outages, Delta and Southwest have been affected, but not American, United, Alaska or JetBlue.People trying to use Instacart, Venmo, Kindle, Roku, and Disney+ have reported issues. The McDonald’s app is also down.Check back for updates on this story.
				</p>
<div class="article-content--body-text">
<p>Amazon Web Services suffered a major outage Tuesday, the company said, limiting service at many key and popular sites.</p>
<p>The company provides cloud computing services to many governments, universities and companies, including The Associated Press.</p>
<p><!-- article/blocks/side-floater --></p>
<p><!-- article/blocks/side-floater --></p>
<p><a href="https://status.aws.amazon.com/" target="_blank" rel="nofollow noopener noreferrer">Amazon said in a post</a> an hour after the outage began that it had identified the root cause and was “actively working towards recovery.” It did not disclose more about the cause.</p>
<p>The outage also affected Amazon’s ability to provide updates, it said.</p>
<p>The outage began midmorning on the U.S. East Coast, said Doug Madory, director of internet analysis at Kentik Inc, a network intelligence firm. “AWS is the biggest cloud provider and us-east-1 is their biggest data center, so any disruption there has big impacts to many popular websites and other internet services,” he said.</p>
<p>Madory said he did not believe the outage was anything nefarious. He said a recent cluster of outages at providers that host major websites reflects how the networking industry has evolved. “More and more these outages end up being the product of automation and centralization of administration,” he said. “This ends up leading to outages that are hard to completely avoid due to operational complexity, but are very impactful when they happen.”</p>
<p>Kentik was seeing a 26% drop in traffic to Netflix, among major web-based services affected by the outage, Madory said. According to Down Detector, a clearinghouse for user reports on outages, Delta and Southwest have been affected, but not American, United, Alaska or JetBlue.</p>
<p>People trying to use Instacart, Venmo, Kindle, Roku, and Disney+ have reported issues. The McDonald’s app is also down.</p>
<p><em>Check back for updates on this story.</em></p>
</p></div>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/numerous-sites-affected-by-amazon-web-services-outage/38452259">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/12/07/numerous-sites-affected-by-amazon-web-services-outage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Several major websites briefly down after apparent internet outage</title>
		<link>https://cincylink.com/2021/07/23/several-major-websites-briefly-down-after-apparent-internet-outage/</link>
					<comments>https://cincylink.com/2021/07/23/several-major-websites-briefly-down-after-apparent-internet-outage/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 23 Jul 2021 04:18:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet is down]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=73533</guid>

					<description><![CDATA[The web pages of several major companies including Amazon, AT&#38;T, UPS and US Bank were briefly impacted by an apparent outage Thursday. According to Downdetector.com, a website that tracks internet outages, the problems began for several websites late Thursday morning. The cause of the outages is not known at this time. Internet company Akamai acknowledged &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/07/Several-major-websites-briefly-down-after-apparent-internet-outage.jpg" /></p>
<p>
					The web pages of several major companies including Amazon, AT&amp;T, UPS and US Bank were briefly impacted by an apparent outage Thursday. According to Downdetector.com, a website that tracks internet outages, the problems began for several websites late Thursday morning. The cause of the outages is not known at this time. Internet company Akamai acknowledged the outage on its website saying they "are aware of an emerging issue with the Edge DNS service and that they are "actively investigating the issue."As services began to get back online, Akamai tweeted, "We have implemented a fix for this issue, and based on current observations, the service is resuming normal operations. We will continue to monitor to ensure that the impact has been fully mitigated."
				</p>
<div>
<p>The web pages of several major companies including Amazon, AT&amp;T, UPS and US Bank were briefly impacted by an apparent outage Thursday. </p>
<p>According to Downdetector.com, a website that tracks internet outages, the problems began for several websites late Thursday morning. </p>
<p>The cause of the outages is not known at this time. Internet company Akamai acknowledged the outage on its website saying they "are aware of an emerging issue with the Edge DNS service and that they are "actively investigating the issue."</p>
<p>
	This content is imported from Twitter.<br />
	You may be able to find the same content in another format, or you may be able to find more information, at their web site.
</p>
<div class="embed embed-resize embed-twitter embed-center lazyload-in-view">
<div class="embed-inner">
<blockquote class="twitter-tweet">
<p lang="en" dir="ltr"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2139.png" alt="ℹ" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Note: A number of websites and online services are currently facing international outages.</p>
<p>The incident is not related to country-level internet disruptions or filtering, but originates with the Akamai Edge DNS service. <a href="https://t.co/BTmRmoyV9m" rel="nofollow">pic.twitter.com/BTmRmoyV9m</a></p>
<p>— NetBlocks (@netblocks) <a href="https://twitter.com/netblocks/status/1418248339431337992?ref_src=twsrc^tfw" rel="nofollow">July 22, 2021</a></p></blockquote></div>
</div>
<p>
	This content is imported from Twitter.<br />
	You may be able to find the same content in another format, or you may be able to find more information, at their web site.
</p>
<div class="embed embed-resize embed-twitter embed-center lazyload-in-view">
<div class="embed-inner">
<blockquote class="twitter-tweet">
<p lang="en" dir="ltr">Due to a widespread internet outage impacting a large number of pages across the internet, the eMoney platform and associated sites are experiencing connectivity issues, although service seems to be recovering.  We appreciate your patience!</p>
<p>— eMoney Advisor (@eMoneyAdvisor) <a href="https://twitter.com/eMoneyAdvisor/status/1418250504363257857?ref_src=twsrc^tfw" rel="nofollow">July 22, 2021</a></p></blockquote></div>
</div>
<p>As services began to get back online, Akamai tweeted, "We have implemented a fix for this issue, and based on current observations, the service is resuming normal operations. We will continue to monitor to ensure that the impact has been fully mitigated."</p>
<p>
	This content is imported from Twitter.<br />
	You may be able to find the same content in another format, or you may be able to find more information, at their web site.
</p>
<div class="embed embed-resize embed-twitter embed-center lazyload-in-view">
<div class="embed-inner">
<blockquote class="twitter-tweet">
<p lang="en" dir="ltr">We have implemented a fix for this issue, and based on current observations, the service is resuming normal operations. We will continue to monitor to ensure that the impact has been fully mitigated.</p>
<p>— Akamai Technologies (@Akamai) <a href="https://twitter.com/Akamai/status/1418251400660889603?ref_src=twsrc^tfw" rel="nofollow">July 22, 2021</a></p></blockquote></div>
</div></div>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/internet-outage-july-22/37103706">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/07/23/several-major-websites-briefly-down-after-apparent-internet-outage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fallout from biggest global ransomware attack continues as hackers demand $70 million</title>
		<link>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/</link>
					<comments>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 04:07:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bhnd]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[russia]]></category>
		<category><![CDATA[Service.]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[united states]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=67383</guid>

					<description><![CDATA[The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.An affiliate of the notorious REvil gang, best known for extorting $11 &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/07/Fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand.jpg" /></p>
<p>
					The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said. REvil was demanding ransoms of up to $5 million. But late Sunday it offered in a posting on its dark web site a universal decryptor software key that would unscramble all affected machines in exchange for $70 million in cryptocurrency. It wasn't clear who they expected might pay that amount.Sweden may have been hardest hit by the attack — or at least most transparent about it. Its defense minister, Peter Hultqvist, bemoaned on Monday "a serious attack on basic functions in Swedish society." "It shows how fragile the system is when it comes to IT security and that you must constantly work to develop your ability to defend yourself," he said in a TV interview. Most of the Swedish grocery chain Coop's 800 stores were closed all weekend because their cash register software supplier was crippled. They remained closed Monday. A Swedish pharmacy chain, gas station chain, the state railway and public broadcaster SVT were also hit. A broad array of businesses and public agencies were affected, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. The cybersecurity firm ESET identified victims in countries including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya.Ransomware criminals infiltrate networks and sow malware that cripples them by scrambling all their data. Victims get a decoder key when they pay up.In Germany, an unnamed IT services company told authorities several thousand of its customers were compromised, the news agency dpa reported. Also among reported victims were two big Dutch IT services companies — VelzArt and Hoppenbrouwer Techniek. Most ransomware victims don't publicly report attacks or disclose if they've paid ransoms.On Sunday, the FBI said in a statement  that while it was investigating the attack, its scale "may make it so that we are unable to respond to each victim individually." Deputy National Security Advisor Anne Neuberger later issued a statement saying President Joe Biden had "directed the full resources of the government to investigate this incident" and urged all who believed they were compromised to alert the FBI.Biden  suggested Saturday  the U.S. would respond if it was determined that the Kremlin is at all involved. Less than a month ago, Biden pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks  the U.S. deems a national security threat.On Monday, Putin spokesman Dmitry Peskov was asked if Russia was aware of the attack or had looked into it. He said no, but suggested it could be discussed by the U.S. and Russia in consultations on cybersecurity issues for which no timeline has been specified.Experts say it was no coincidence that REvil launched the attack at the start of the Fourth of July holiday weekend, knowing U.S. offices would be lightly staffed and many victims might not learn of it until back at work Monday or Tuesday. Most end users of managed service providers "have no idea" whose software keep their networks humming, said CEO Fred Voccola of the breached software company, Kaseya. He estimated the victim number in the low thousands, mostly small businesses like "dental practices, architecture firms, plastic surgery centers, libraries, things like that."Voccola said only between 50-60 of the company's 37,000 customers were compromised. But 70% were managed service providers who use the company's hacked VSA software to manage multiple customers. It automates the installation of software and malware-detection updates and manages backups and other vital tasks. Kaseya said it sent a detection tool to nearly 900 customers on Saturday night.The REvil offer to offer blanket decryption for all victims of the Kaseya attack in exchange for $70 million suggested its inability to cope with the sheer quantity of infected networks, said Allan Liska, an analyst with the cybersecurity firm Recorded Future. But Kevin Reed of Acronis said the offer of a universal decryptor could be a PR stunt because no human involvement would be needed to pay a $45,000 base ransom demand apparently sent to the vast majority of targets. Analysts reported seeing demands of $5 million and $500,000 for bigger targets, which would require negotiation.Analyst Brett Callow of Emsisoft said he suspects REvil is hoping insurers might crunch the numbers and determine the $70 million will be cheaper for them than extended downtime. Sophisticated ransomware gangs on REvil's level usually examine a victim's financial records — and  insurance policies if they can find them  — from files they steal before activating the ransomware. The criminals then threaten to dump the stolen data online unless paid, although that does not appear to have happened in this case. But this attack was apparently bare-bones. REvil seems only to have scrambled victims' data.                Dutch researchers  said they alerted Miami-based Kaseya to the breach and said the criminals used a "zero day," the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing. "The level of sophistication here was extraordinary," he said.It was not the first ransomware attack to leverage managed services providers. In 2019, criminals hobbled the networks of  22 Texas municipalities  through one. That same year, 400 U.S. dental practices were crippled in a separate attack.Active since April 2019, REvil provides ransomware-as-a-service, meaning it develops the network-paralyzing software and leases it to so-called affiliates who infect targets and earn the lion's share of ransoms. U.S. officials say the most potent ransomware gangs are based in Russia and allied states and operate with Kremlin tolerance and sometimes collude with Russian security services.___AP reporters Jim Heintz in Moscow, Jan Olsen in Stockholm, Kirsten Grieshaber in Berlin, Jari Tanner in Helsinki and Sylvie Corbet in Paris contributed to this report.
				</p>
<div>
					<strong class="dateline">BOSTON —</strong> 											</p>
<p>The single biggest global ransomware attack yet continued to bite Monday as details emerged on how the Russia-linked gang responsible breached the company whose software was the conduit. In essence, the criminals used a tool that helps protect against malware to spread it widely.</p>
<p>An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said. </p>
<p>REvil was demanding ransoms of up to $5 million. But late Sunday it offered in a posting on its dark web site a universal decryptor software key that would unscramble all affected machines in exchange for $70 million in cryptocurrency. It wasn't clear who they expected might pay that amount.</p>
<p>Sweden may have been hardest hit by the attack — or at least most transparent about it. Its defense minister, Peter Hultqvist, bemoaned on Monday "a serious attack on basic functions in Swedish society." </p>
<p>"It shows how fragile the system is when it comes to IT security and that you must constantly work to develop your ability to defend yourself," he said in a TV interview. Most of the Swedish grocery chain Coop's 800 stores were closed all weekend because their cash register software supplier was crippled. They remained closed Monday. A Swedish pharmacy chain, gas station chain, the state railway and public broadcaster SVT were also hit. </p>
<p>A broad array of businesses and public agencies were affected, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. The cybersecurity firm ESET identified victims in countries including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya.</p>
<p>Ransomware criminals infiltrate networks and sow malware that cripples them by scrambling all their data. Victims get a decoder key when they pay up.</p>
<p>In Germany, an unnamed IT services company told authorities several thousand of its customers were compromised, the news agency dpa reported. Also among reported victims were two big Dutch IT services companies — VelzArt and Hoppenbrouwer Techniek. Most ransomware victims don't publicly report attacks or disclose if they've paid ransoms.</p>
<p>On Sunday, the FBI said in a statement  that while it was investigating the attack, its scale "may make it so that we are unable to respond to each victim individually." Deputy National Security Advisor Anne Neuberger later issued a statement saying President Joe Biden had "directed the full resources of the government to investigate this incident" and urged all who believed they were compromised to alert the FBI.</p>
<p>Biden  suggested Saturday  the U.S. would respond if it was determined that the Kremlin is at all involved. Less than a month ago, Biden pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks  the U.S. deems a national security threat.</p>
<p>On Monday, Putin spokesman Dmitry Peskov was asked if Russia was aware of the attack or had looked into it. He said no, but suggested it could be discussed by the U.S. and Russia in consultations on cybersecurity issues for which no timeline has been specified.</p>
<p>Experts say it was no coincidence that REvil launched the attack at the start of the Fourth of July holiday weekend, knowing U.S. offices would be lightly staffed and many victims might not learn of it until back at work Monday or Tuesday. </p>
<p>Most end users of managed service providers "have no idea" whose software keep their networks humming, said CEO Fred Voccola of the breached software company, Kaseya.</p>
<p>He estimated the victim number in the low thousands, mostly small businesses like "dental practices, architecture firms, plastic surgery centers, libraries, things like that."</p>
<p>Voccola said only between 50-60 of the company's 37,000 customers were compromised. But 70% were managed service providers who use the company's hacked VSA software to manage multiple customers. It automates the installation of software and malware-detection updates and manages backups and other vital tasks. </p>
<p>Kaseya said it sent a detection tool to nearly 900 customers on Saturday night.</p>
<p>The REvil offer to offer blanket decryption for all victims of the Kaseya attack in exchange for $70 million suggested its inability to cope with the sheer quantity of infected networks, said Allan Liska, an analyst with the cybersecurity firm Recorded Future. </p>
<p>But Kevin Reed of Acronis said the offer of a universal decryptor could be a PR stunt because no human involvement would be needed to pay a $45,000 base ransom demand apparently sent to the vast majority of targets. Analysts reported seeing demands of $5 million and $500,000 for bigger targets, which would require negotiation.</p>
<p>Analyst Brett Callow of Emsisoft said he suspects REvil is hoping insurers might crunch the numbers and determine the $70 million will be cheaper for them than extended downtime. </p>
<p>Sophisticated ransomware gangs on REvil's level usually examine a victim's financial records — and  insurance policies if they can find them  — from files they steal before activating the ransomware. The criminals then threaten to dump the stolen data online unless paid, although that does not appear to have happened in this case. But this attack was apparently bare-bones. REvil seems only to have scrambled victims' data.</p>
<p>                Dutch researchers  said they alerted Miami-based Kaseya to the breach and said the criminals used a "zero day," the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing. </p>
<p>"The level of sophistication here was extraordinary," he said.</p>
<p>It was not the first ransomware attack to leverage managed services providers. In 2019, criminals hobbled the networks of  22 Texas municipalities  through one. That same year, 400 U.S. dental practices were crippled in a separate attack.</p>
<p>Active since April 2019, REvil provides ransomware-as-a-service, meaning it develops the network-paralyzing software and leases it to so-called affiliates who infect targets and earn the lion's share of ransoms. U.S. officials say the most potent ransomware gangs are based in Russia and allied states and operate with Kremlin tolerance and sometimes collude with Russian security services.</p>
<p>___</p>
<p>AP reporters Jim Heintz in Moscow, Jan Olsen in Stockholm, Kirsten Grieshaber in Berlin, Jari Tanner in Helsinki and Sylvie Corbet in Paris contributed to this report.</p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/revil-ransomware-attack-hackers-demand-70-million/36931420">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/07/06/fallout-from-biggest-global-ransomware-attack-continues-as-hackers-demand-70-million/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NASA investigates outage on Hubble Space Telescope</title>
		<link>https://cincylink.com/2021/06/25/nasa-investigates-outage-on-hubble-space-telescope/</link>
					<comments>https://cincylink.com/2021/06/25/nasa-investigates-outage-on-hubble-space-telescope/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 04:17:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Hubble Space Telescope]]></category>
		<category><![CDATA[June 13 malfunction]]></category>
		<category><![CDATA[mdnd]]></category>
		<category><![CDATA[nasa]]></category>
		<category><![CDATA[outage]]></category>
		<category><![CDATA[payload computer]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Space Shuttle Discovery]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=63485</guid>

					<description><![CDATA[Related video above: Hubble commemorates its 30th year with new imagesUniverse, we've got a problem: The payload computer aboard the Hubble Space Telescope that has shaped our understanding of the cosmos for over 30 years has stopped working.After the June 13 malfunction, Hubble's payload computer stopped receiving the "keep-alive" signal that's a "standard handshake between &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/06/NASA-investigates-outage-on-Hubble-Space-Telescope.jpg" /></p>
<p>
					Related video above: Hubble commemorates its 30th year with new imagesUniverse, we've got a problem: The payload computer aboard the Hubble Space Telescope that has shaped our understanding of the cosmos for over 30 years has stopped working.After the June 13 malfunction, Hubble's payload computer stopped receiving the "keep-alive" signal that's a "standard handshake between the payload and main spacecraft computers to indicate all is well," according to a NASA news release.Following the main computer's automatic shift of all science instruments to safe mode, control center personnel at NASA's Goddard Space Flight Center in Greenbelt, Maryland, restarted the payload computer but it soon halted once again on June 14. The telescope and other science instruments remain in good health, NASA reported.The payload computer -- a NASA Standard Spacecraft Computer-1, or NSSC-1, system built in the 1980s -- is part of the Science Instrument Command and Data Handling unit, a module on the Hubble Space Telescope that communicates commands to Hubble's science instruments and formats data for transmission to the ground. The current unit is a replacement that was installed by astronauts on shuttle mission STS-125 in May 2009 after the original unit failed in 2008, which delayed the final servicing mission to Hubble while NASA constructed the replacement.The payload computer's purpose is to control and coordinate the science instruments on the telescope, and monitor their health and safety, according to NASA. The computer's programs also analyze and manipulate the data it collects. The computer is critical, but there is a second computer the operations team can switch to if problems arise.Based on early data, the Hubble operations team initially thought a degrading memory module halted the computer. After the failed restart and attempt to switch to a backup memory module, the team tried to gain more information while again trying to bring the memory modules online, which also fell flat.After several tests of the computer's memory modules, the investigators found that a different piece of computer hardware might have been the culprit behind the memory errors: The operations team has started exploring whether the problem lies within the Standard Interface, or STINT, hardware -- which facilitates messaging between the computer's Central Processing Module and other parts -- or the CPM itself.The operations team members are also designing tests they'll soon run to pinpoint potential problems and a possible solution -- which, for future reference, would be instrumental for figuring out which hardware is still working properly when something else isn't.If the problem isn't fixed, the Hubble operations team will be prepared to switch to the STINT and CPM hardware in the backup payload computer, NASA reported.If the operations team members use plan B, they'll then need several days to see how the backup computer performs and to resume the normal operations for which the main payload computer is typically responsible. The backup hasn't been used since its installation in 2009, NASA reported, but it was "thoroughly tested on the ground prior to installation on the spacecraft."Launched aboard Space Shuttle Discovery in 1990, the Hubble Space Telescope has shared its observations of stars, galaxies and other astronomical objects "that have captured imaginations worldwide and deepened our knowledge of the cosmos," NASA reported.That includes its role in narrowing down the universe's age from the once estimated 10 billion to 20 billion years old to about 13.8 billion years, a number now used to understand the chronological development of stars, galaxies and more.
				</p>
<div>
					<strong class="dateline">CNN —</strong> 											</p>
<p><strong><em>Related video above: Hubble commemorates its 30th year with new images</em></strong></p>
<p>Universe, we've got a problem: The payload computer aboard the Hubble Space Telescope that has shaped our understanding of the cosmos for over 30 years has stopped working.</p>
<p>After the June 13 malfunction, Hubble's payload computer stopped receiving the "keep-alive" signal that's a "standard handshake between the payload and main spacecraft computers to indicate all is well," according to a <a href="https://www.nasa.gov/feature/goddard/2021/operations-underway-to-restore-payload-computer-on-nasas-hubble-space-telescope" target="_blank" rel="nofollow noopener">NASA news release</a>.</p>
<p>Following the main computer's automatic shift of all science instruments to safe mode, control center personnel at NASA's Goddard Space Flight Center in Greenbelt, Maryland, restarted<strong> </strong>the payload computer but it soon halted once again<strong> </strong>on June 14. The telescope and other science instruments remain in good health, NASA reported.</p>
<p>The payload computer -- a NASA Standard Spacecraft Computer-1, or NSSC-1, system built in the 1980s -- is part of the Science Instrument Command and Data Handling unit, <a href="https://www.cnn.com/2009/TECH/space/05/14/space.shuttle/index.html" target="_blank" rel="nofollow noopener">a module</a> on the Hubble Space Telescope that communicates commands to Hubble's science instruments and formats data for transmission to the ground. The current unit is a replacement that was installed by astronauts on shuttle mission STS-125 in May 2009 after the original unit failed in 2008, which delayed the final servicing mission to Hubble while NASA constructed the replacement.</p>
<p>The payload computer's purpose is to control and coordinate the science instruments on the telescope, and monitor their health and safety, according to NASA. The computer's programs also analyze and manipulate the data it collects. The computer is critical, but there is a second computer the operations team can switch to if problems arise.</p>
<p>Based on early data, the Hubble operations team initially thought a degrading memory module halted the computer. After the failed restart and attempt to switch to a backup memory module, the team tried to gain more information while again trying to bring the memory modules online, which also fell flat.</p>
<p>After several tests of the computer's memory modules, the investigators found that a different piece of computer hardware might have been the culprit behind the memory errors: The operations team has started exploring whether the problem lies within the Standard Interface, or STINT, hardware -- which facilitates messaging between the computer's Central Processing Module and other parts -- or the CPM itself.</p>
<p>The operations team members are also designing tests they'll soon run to pinpoint potential problems and a possible solution -- which, for future reference, would be instrumental for figuring out which hardware is still working properly when something else isn't.</p>
<p>If the problem isn't fixed, the Hubble operations team will be prepared to switch to the STINT and CPM hardware in the backup payload computer, NASA reported.</p>
<p>If the operations team members use plan B, they'll then need several days to see how the backup computer performs and to resume the normal operations for which the main payload computer is typically responsible. The backup hasn't been used since its installation in 2009, NASA reported, but it was "thoroughly tested on the ground prior to installation on the spacecraft."</p>
<p>Launched aboard Space Shuttle Discovery in 1990, the <a href="https://www.nasa.gov/content/discoveries-why-a-space-telescope" target="_blank" rel="nofollow noopener">Hubble Space Telescope</a> has shared its observations of stars, galaxies and other astronomical objects "that have captured imaginations worldwide and deepened our knowledge of the cosmos," NASA reported.</p>
<p>That includes its role in narrowing down the universe's age from the once estimated 10 billion to 20 billion years old to about 13.8 billion years, a number now used to understand the chronological development of stars, galaxies and more.</p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/nasa-investigates-outage-hubble-space-telescope/36833565">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/06/25/nasa-investigates-outage-on-hubble-space-telescope/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
