#cyrusone-outage

[ follow ]
#cybersecurity
fromFortune
6 days ago
Information security

'There are a lot more attacks happening that aren't being reported': Iran's cyber response creeps across the globe | Fortune

Information security
fromFortune
6 days ago

'There are a lot more attacks happening that aren't being reported': Iran's cyber response creeps across the globe | Fortune

Iran is using sophisticated cyber tactics to exploit vulnerabilities during missile strikes against Israel.
#iran
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
Information security
fromFortune
2 weeks ago

Companies are now on the front lines of war. They need to act like it | Fortune

Iranian drone strikes on U.S. data centers signify a shift in modern warfare, targeting corporations as part of military strategy.
World news
fromEngadget
4 days ago

Iran threatens imminent attacks on US tech companies in the Middle East

The Islamic Revolutionary Guard Corps threatens to target major US tech companies in the Middle East, urging employees to evacuate for safety.
Information security
fromFortune
2 weeks ago

Companies are now on the front lines of war. They need to act like it | Fortune

Iranian drone strikes on U.S. data centers signify a shift in modern warfare, targeting corporations as part of military strategy.
fromFuturism
2 days ago

Almost Half of US Data Centers That Were Supposed to Open This Year Slated to Be Canceled or Delayed

"If one piece of your supply chain is delayed, then your whole project can't deliver. It is a pretty wild puzzle at the moment."
Environment
DevOps
fromTechzine Global
3 days ago

IGEL brings 'Smarter, Zero Trust' approach Contextual Access to endpoints

IGEL's Contextual Access enhances endpoint security by adapting access rights based on user, device, location, and trust status.
fromSecurityWeek
5 days ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

The WAV file is a valid audio file. It passes MIME-type checks. But the audio frame data contains a base64-encoded payload. Decode the frames, take the first 8 bytes as the XOR key, XOR the rest, and you have your executable or Python script.
Python
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
San Francisco
fromMission Local
5 days ago

Cell outage blocks San Francisco 911 calls

A cell outage may disrupt 911 calls in San Francisco, prompting residents to use Wi-Fi calling or text 911 for assistance.
Information security
fromTechzine Global
1 day ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
#microsoft
fromFortune
1 week ago
Silicon Valley

Microsoft is picking up a Texas data center project OpenAI didn't want, in a telling sign of how far they've drifted apart | Fortune

Microsoft is taking over a Texas data center project after OpenAI declined to pursue it, positioning both companies as neighbors in AI development.
Silicon Valley
fromFortune
1 week ago

Microsoft is picking up a Texas data center project OpenAI didn't want, in a telling sign of how far they've drifted apart | Fortune

Microsoft is taking over a Texas data center project after OpenAI declined to pursue it, positioning both companies as neighbors in AI development.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
DevOps
fromTheregister
1 week ago

AWS would prefer to forget March in UAE region

AWS is waiving charges for the ME-CENTRAL-1 Region in March 2026, erasing billing and inventory data without explanation.
Tech industry
fromFortune
2 weeks ago

"A bend in the trajectory": U.S. data center development has hit snags because the power grid is approaching its limits to support them | Fortune

Data center development slowed significantly in Q4 2025, with capacity additions dropping 50% quarter-over-quarter, signaling that unlimited AI-driven growth projections may not materialize due to power infrastructure constraints.
#cisco
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromThe Hacker News
2 days ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
East Bay (California)
fromSFGATE
2 weeks ago

Widespread Xfinity outage reported across Bay Area on Monday morning

A major Xfinity outage affected the Bay Area on Monday morning, peaking at over 7,000 reports at 9:14 a.m., with service disruptions continuing through 10 a.m.
#x-outage
Tech industry
fromMashable
2 weeks ago

Is X down? Thousands of users report outage.

X experienced a widespread outage on Wednesday morning affecting thousands of users, with over 33,000 error reports recorded on DownDetector by mid-morning.
Tech industry
fromMashable
2 weeks ago

Is X down? Thousands of users report outage.

X experienced a widespread outage on Wednesday morning affecting thousands of users, with over 33,000 error reports recorded on DownDetector by mid-morning.
Business intelligence
fromEntrepreneur
3 weeks ago

The Game-Changing Tech Saving Companies From Data Disasters

Combining Continuous Data Protection with AI capabilities enables businesses to achieve near-zero Recovery Point Objectives and minimal Recovery Time Objectives, preventing data loss and minimizing downtime.
Artificial intelligence
fromwww.theguardian.com
3 weeks ago

Datacenters are becoming a target in warfare for the first time

Iran deliberately targeted commercial datacenters in the Persian Gulf, marking the first known instance of a country at war striking commercial datacenters, causing widespread service disruptions across the UAE and Bahrain.
fromInfoQ
2 weeks ago

War in Iran Damages Multiple AWS Data Centers, Challenging Multi-AZ Assumptions

In the ME-CENTRAL-1 (UAE) Region, two of our three Availability Zones (mec1-az2 and mec1-az3) remain significantly impaired. The third Availability Zone (mec1-az1) continues to operate normally, though some services have experienced indirect impact due to dependencies on the affected zones. In the ME-SOUTH-1 (Bahrain) Region, one facility has been impacted.
DevOps
#cyberattack
Information security
fromTechRepublic
2 days ago

Hasbro Cyberattack Knocks Systems Offline, Recovery Could Take Weeks

Hasbro experienced a cyberattack that forced parts of its systems offline, potentially leading to weeks of operational impact.
Information security
fromTheregister
3 weeks ago

Iran-linked cyber crew claims hit on US med-tech firm

An Iranian-linked hacking group claimed responsibility for a cyberattack on medical device maker Stryker, marking a potential first destructive cyber incident linked to the current Middle East conflict targeting a major US company.
Information security
fromTechRepublic
2 days ago

Hasbro Cyberattack Knocks Systems Offline, Recovery Could Take Weeks

Hasbro experienced a cyberattack that forced parts of its systems offline, potentially leading to weeks of operational impact.
Information security
fromTheregister
3 weeks ago

Iran-linked cyber crew claims hit on US med-tech firm

An Iranian-linked hacking group claimed responsibility for a cyberattack on medical device maker Stryker, marking a potential first destructive cyber incident linked to the current Middle East conflict targeting a major US company.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromTheregister
1 month ago

Server crashes traced to one very literal knee-jerk reaction

It was the time of Novell networks, RG58 cables, and bulky tower PCs. It was also a time before the telemarketer's IT department employed specialists. Carter and his two colleagues - boss Mike and part-time student Stefan - therefore handled tasks ranging from programming to support, and everything in between.
Software development
fromTheregister
3 weeks ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
Artificial intelligence
fromApp Developer Magazine
1 year ago

Cloudbrink expands secure connectivity platform

Cloudbrink expanded its platform to secure AI agents and online services, addressing enterprise cybersecurity risks from widespread AI adoption and diverse, non-standardized AI implementations.
Information security
fromComputerWeekly.com
4 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Miscellaneous
fromTheregister
1 month ago

Iran's cyberwar has begun

Iranian hackers launched sophisticated cyber attacks including spying, DDoS attacks, and malware staging against Israel, Persian Gulf countries, and US organizations following missile strikes.
fromComputerworld
4 days ago

Why the axios supply chain attack should have Apple worried

The attack illustrates the extent to which Big Tech relies on open-source software. Without the many contributions of open-source developers, Apple, Amazon, Google, Microsoft, and everyone else would need to invest vast sums in building more of the infrastructure of our digital world.
Information security
fromZDNET
1 month ago

Why encrypted backups may fail in an AI-driven ransomware era

What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
Miscellaneous
#aws-outage
Tech industry
fromTheregister
1 month ago

Tech vendors urge failover from hit Middle East AWS regions

Aerial strikes damaged AWS datacenters in the UAE and Bahrain, forcing Snowflake, Red Hat, and EMQX to direct customers to activate disaster recovery plans and migrate workloads to alternate regions.
Tech industry
fromTheregister
1 month ago

Tech vendors urge failover from hit Middle East AWS regions

Aerial strikes damaged AWS datacenters in the UAE and Bahrain, forcing Snowflake, Red Hat, and EMQX to direct customers to activate disaster recovery plans and migrate workloads to alternate regions.
#citrix
Information security
fromTheregister
5 days ago

Citrix NetScaler bug may be multiple flaws in one

In-the-wild exploitation of a critical Citrix NetScaler bug has begun, with attackers actively targeting vulnerable systems within days of its disclosure.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
Information security
fromTheregister
5 days ago

Citrix NetScaler bug may be multiple flaws in one

In-the-wild exploitation of a critical Citrix NetScaler bug has begun, with attackers actively targeting vulnerable systems within days of its disclosure.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
Information security
fromSecuritymagazine
1 week ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
fromComputerWeekly.com
1 month ago

Interview: CyrusOne on the sustainable innovation that drives datacentre business outcomes | Computer Weekly

[EHS] is actually a profit centre in the company," he says. "I know people tend to think it isn't. Compared to some other hats that I've worn, sustainability is usually not a cost centre.
Environment
Information security
fromTechzine Global
1 week ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Tech industry
fromUnited States Edition
1 month ago

Spotlight report: Accelerating Data Center Modernization

Data center modernization is critical for AI deployment, requiring integrated infrastructure solutions across servers, storage, networking, and security.
#verizon
fromTheregister
2 months ago

Techie banned from client site for outage he didn't cause

This week, meet a reader we'll Regomize as "Patrick" who told us he once installed an extra shelf of storage for a NAS at a local council office in Australia. The job initially went well. "The staff left me alone in the computer room while I was tidying up the paperwork," Patrick wrote. While he handled that administrivia, something caught Patrick's eye.
Gadgets
US politics
fromFortune
2 months ago

Inside the race to build data centers | Fortune

Mega-scale AI data centers are driving AI growth, transforming landscapes, straining energy and water resources, and creating major political and economic conflicts.
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
World news
fromIrish Independent
1 month ago

X suffers major outage weeks after similar collapse

X (formerly Twitter) experienced a global outage that prevented loading of the app and website, showing only the X logo and no posts.
Software development
fromInfoQ
2 months ago

Thinking Like a Detective: Solving Cloud Infrastructure Mysteries

Intermittent, user-visible cloud errors can occur despite green health checks and normal logs; solving them requires methodical tracing across network, client, and infrastructure.
Environment
fromFast Company
1 month ago

How data centers provided power during Winter Storm Fern

Authorities authorized data centers and large consumers to run diesel backup generators, providing up to 35 GW but risking significant air pollution.
Miscellaneous
fromTheregister
2 months ago

UK users say Oracle Cloud Infrastructure wobbled last week

Oracle Cloud Infrastructure experienced a London-region outage; users reported Fusion application disruptions while Oracle provided no public comment.
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
#verizon-outage
fromZDNET
2 months ago
Gadgets

Verizon is down for millions of users: What 'SOS' means, and other outage updates

fromZDNET
2 months ago
Gadgets

Verizon is down for millions of users: What 'SOS' means, and other outage updates

fromTheregister
2 months ago

Power shortages threaten to cap datacenter growth

A looming shortage of electrical power is set to constrain datacenter expansion, potentially leaving many industry growth forecasts looking overly optimistic. In its latest report, " Five Predictions for 2026," Uptime Institute says that power will become the defining constraint on datacenter growth in 2026 and beyond. This is because it simply isn't possible to add extra grid and generating capacity at the same rate as new server farms are popping up, so something is going to have to give.
Environment
#azure-outage
fromSecurityWeek
1 month ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
Information security
fromThe Hacker News
4 weeks ago

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Cisco Catalyst SD-WAN Manager has two actively exploited vulnerabilities allowing file overwrite and information disclosure to authenticated attackers with valid credentials.
Information security
fromSecuritymagazine
1 month ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
fromZDNET
2 months ago

Why the internet kept breaking and taking down your favorite sites in 2025

Altogether, Cloudflare reported in its 2025 fourth quarter analysis that it observed more than 180 internet disruptions worldwide over the course of 2025, ranging from short, localized incidents to multiday nationwide outages. The most dramatic outages involved physical infrastructure failures, especially submarine cables and national power grids. For example, in Haiti, Digicel suffered two separate international fiber cuts in October and November, pushing traffic on its network close to zero during one incident and triggering multi‑hour outages until repairs were completed.
Tech industry
Tech industry
fromwww.dw.com
2 months ago

X outages reported by thousands of users primarily in US

X experienced a global outage affecting tens of thousands of users for about one hour before services, including the Grok chatbot, were restored.
Tech industry
fromTheregister
2 months ago

Power scarcity drives datacenters to Texas

Texas will become the leading datacenter market as operators shift to onsite power, with about one-third of campuses relying entirely on onsite generation by 2030.
fromDataBreaches.Net
1 month ago

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

The bug, which has a maximum-rated vulnerability severity score of 10.0, allows hackers to remotely break into networks running its Catalyst SD-WAN products, which allow large companies and government agencies with multiple offices to connect their private networks over long distances.
Information security
Information security
fromTechzine Global
1 month ago

Kyndryl launches integrated Cyber Defense Operations Center

Kyndryl opened a Cyber Defense Operations Center in Bengaluru consolidating network and security operations to deliver integrated monitoring, threat detection, incident response and performance management.
Information security
fromThe Hacker News
1 month ago

When Cloud Outages Ripple Across the Internet

Cloud infrastructure outages can disable identity authentication and authorization, creating hidden single points of failure that cause broad operational and security impacts.
Information security
fromTheregister
2 months ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
fromNew Relic
2 months ago

Traditional Network Monitoring is Failing

For any IT department, these four words are the beginning of a familiar, often frustrating, journey. In our modern world, where business success is built on distributed applications and hybrid cloud architectures, the network is the circulatory system. When it fails, everything grinds to a halt. Yet, despite its critical importance, it often remains a black box-a source of blame that is difficult to prove or disprove.
Information security
Information security
fromBusiness Matters
2 months ago

Understanding the Safety of the Cloud: How Threat Protection Strengthens Your Business

Cloud safety requires continuous, coordinated threat protection that detects suspicious activity early to protect data, maintain productivity, and enable scalable operations.
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromTheregister
1 month ago

CISA: Remove EOL edge kit before cybercriminals strike

CISA directs federal agencies to inventory and replace end-of-support edge devices within set timelines to eliminate critical intrusion risks.
[ Load more ]