US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK

The US Federal Aviation Administration (FAA) has grounded SpaceX’s Falcon rockets for the third time in three months after a second-stage problem occurred following the successful launch of a Dragon Crew mission that brought two astronauts to the International Space Station on Saturday. A Falcon Heavy, which uses the same second-stage as the Falcon 9, is to launch NASA’s Europa Clipper to the Jupiter planetary system on 10 October, in a $5 billion (£3.7bn) mission whose window closes on 30 October. A Falcon 9 is scheduled to launch the ESA’s Hera mission to the Didymos binary asteroid system on 7 October, with a launch window ending on 27 October. The incident is likely to mean an investigation by the FAA, with which SpaceX is involved in a legal dispute over fines related to Falcon 9 activities at Kennedy Space Center and delays in authorising the fifth Starship test flight at the company’s base in south Texas. Falcon rockets were suspended on 11 July after a second-stage explosion in orbit sent Starlink satellites into a path toward destruction, SpaceX’s first mission failure in more than seven years. A suspension of three days came after a Falcon 9 first stage made a crash landing on the deck of a drone ship after a launch on 28 August. The suspension halted a planned launch of 20 OneWeb satellites that had been scheduled for late on Saturday, as well as a Starlink satellite launch that had been planned for Wednesday. At risk of delay are also two major solar system exploration missions from the European Space Administration and NASA that are due to launch this month with narrow launch windows. The manoeuvre is designed to ensure the rocket burns up in the atmosphere, rather than becoming orbital space junk, with any debris intended to fall in a previously designated area that had been specified in notifications to mariners and aviators. SpaceX said the Falcon 9 second stage failed to correctly fire its Merlin Vacuum engine less than 30 minutes after releasing the capsule into orbit.

This Cyber News was published on www.silicon.co.uk. Publication date: Tue, 01 Oct 2024 11:13:07 +0000


Cyber News related to US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK

US Grounds SpaceX Falcon After Second-Stage Issue | Silicon UK - The US Federal Aviation Administration (FAA) has grounded SpaceX’s Falcon rockets for the third time in three months after a second-stage problem occurred following the successful launch of a Dragon Crew mission that brought two astronauts to ...
1 month ago Silicon.co.uk
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
4 months ago Crowdstrike.com
SpaceX Sues US Agency That Alleged Illegal Firings - Elon Musk's SpaceX comes out swinging against US agency that accused it of illegally firing staff critical of Musk. Elon Musk is no stranger to lawsuits, as evidenced after SpaceX hit back and sued a US labour board that had logged a serious ...
10 months ago Silicon.co.uk
SpaceX Fired Staff Critical Of Elon Musk, US Agency - National Labor Relations Board alleges SpaceX illegally fired staff who in 2022 had denounced Elon Musk's behaviour. New development has emerged regarding the SpaceX staff who denounced the behaviour of Elon Musk back in 2022. It all stems from an ...
10 months ago Silicon.co.uk
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
11 months ago Crowdstrike.com
SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles - Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX Falcon 9 rocket into orbit Wednesday from Florida's Space Coast. These satellites are part of a new generation of ...
8 months ago Wired.com
SpaceX Capsule Docks With ISS For Starliner Rescue Mission - A SpaceX Dragon capsule has docked at the International Space Station as NASA organises a trip back to Earth for two astronauts who have been stranted on the station since June. NASA astronaut Nick Hague and Roscosmos cosmonaut Aleksandr Gorbunov ...
1 month ago Silicon.co.uk
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
5 months ago Crowdstrike.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
Award-Winning Centralized Platform Helps Unlock Value Through Simplicity - Network operators need to cater to their customers by delivering services from anywhere between 1G to 100G speeds, while having the ability to aggregate into 400G networks. With the evolution of the network and emergence of more localized and ...
8 months ago Feedpress.me
Generative AI Takes on SIEM - With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While adding generative AI capabilities to security information and event management is still in ...
11 months ago Darkreading.com
CVE-2021-31532 - NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an ...
2 years ago
Hackers Exploiting Windows Defender SmartScreen Flaw - Hackers actively target and exploit Windows Defender SmartScreen to deceive users and deliver malicious content by creating convincing, misleading websites or applications. By evading SmartScreen, the threat actors increase the chances of their ...
9 months ago Cybersecuritynews.com
macOS Malware Mix & Match: North Korean APTs Stir Up Fresh Attacks - North Korean advanced persistent threat groups are mixing and matching components of two recently unleashed types of Mac-targeted malware to evade detection and fly under the radar as they continue their efforts to conduct operations at the behest of ...
11 months ago Darkreading.com
Here's Why the World is Investing So Much in Semiconductors - Hannah Mullane, a BBC correspondent, recently visited Pragmatic Semiconductor, the UK's newest computer chip facility in Durham. The large site is being turned into a sophisticated computer chip production hub. Pragmatic Semiconductor has already ...
9 months ago Cysecurity.news
Navigating the AI Frontier with Cisco - Fresh from another impactful Cisco Live EMEA, the buzz around Artificial Intelligence is undeniable. AI stands as a new frontier for businesses, a beacon of innovation in our swiftly evolving landscape. On Partner Day, I addressed a packed room of ...
9 months ago Feedpress.me
North Korea-Linked Group Levels Multistage Cyberattack on South Korea - North Korea-linked threat group Kimsuky has adopted a longer, eight-stage attack chain that abuses legitimate cloud services and employs evasive malware to conduct cyber espionage and financial crimes against South Korean entities. NET applications - ...
7 months ago Darkreading.com
Android Malware Actively Infecting Devices to Take Full Control - Roid malware infects devices to take full control for various illicit purposes like:-. By gaining complete control, threat actors can exploit the device for their illicit activities, posing significant threats to:-. It employs social engineering for ...
10 months ago Gbhackers.com
Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes - While each issue might not result in significant damage on its own, when combined they create an opportunity for an attacker who already has access to a Kubernetes cluster to escalate their privileges. If an attacker has the ability to execute in the ...
10 months ago Unit42.paloaltonetworks.com
Microsoft: Lazarus hackers breach CyberLink in supply chain attack - Microsoft says a North Korean hacking group has breached Taiwanese multimedia software company CyberLink and trojanized one of its installers to push malware in a supply chain attack targeting potential victims worldwide. According to Microsoft ...
11 months ago Bleepingcomputer.com
CVE-2024-47070 - authentik is an open-source identity provider. A vulnerability that exists in versions prior to 2024.8.3 and 2024.6.5 allows bypassing password login by adding X-Forwarded-For header with an unparsable IP address, e.g. `a`. This results in a ...
1 month ago Tenable.com
US launches nuke spy satellites amid Russia weapon rumors The Register - Last night's launch of six Pentagon missile-detection satellites was well timed as fears mount that Russia is considering putting nuclear weapons into space. The US Department of Defense confirmed its payload included two satellites for the Missile ...
8 months ago Go.theregister.com
How to Build a Phishing Playbook Part 2: Wireframing - Welcome back to our series on automating phishing investigation and response with playbooks in Smart SOAR. This is a four-part series covering preparation, wireframing, development, and testing. Wireframing workflows is an excellent step in-between ...
10 months ago Securityboulevard.com
Trends: Hardware gets AI updates in 2024 - This includes the use of specialized neural engines in devices like the iPhone 15 Pro, which are optimized for AI tasks such as machine learning and natural language processing. This configuration allows for new experiences such as real-time AI image ...
1 month ago Securityintelligence.com
CVE-2020-10102 - An issue was discovered in Zammad 3.0 through 3.2. The Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending ...
4 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)