Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Xbox brings cloud gaming fun to Amazon Fire TVs

Xbox brings cloud gaming fun to Amazon Fire TVs

24 December 2025
Save 0 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

Save $500 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

24 December 2025
This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for 0 off

This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for $160 off

24 December 2025
Gemini could soon handle tasks in the background without holding your screen hostage

Gemini could soon handle tasks in the background without holding your screen hostage

24 December 2025
Why smart glasses should be on your Christmas list next year

Why smart glasses should be on your Christmas list next year

24 December 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Security News This Week: Amazon Explains How Its AWS Outage Took Down the Web
Tech News

Security News This Week: Amazon Explains How Its AWS Outage Took Down the Web

By technologistmag.com25 October 20256 Mins Read
Security News This Week: Amazon Explains How Its AWS Outage Took Down the Web
Share
Facebook Twitter Reddit Telegram Pinterest Email
Security News This Week: Amazon Explains How Its AWS Outage Took Down the Web

The cloud giant Amazon Web Services experienced DNS resolution issues on Monday leading to cascading outages that took down wide swaths of the web. Monday’s meltdown illustrated the world’s fundamental reliance on so-called hyperscalers like AWS and the challenges for major cloud providers and their customers alike when things go awry. See below for more about how the outage occurred.

US Justice Department indictments in a mob-fueled gambling scam reverberated through the NBA on Thursday. The case includes allegations that a group backed by the mob was using hacked card shufflers to con victims out of millions of dollars—an approach that WIRED recently demonstrated in an investigation into hacking Deckmate 2 card shufflers used in casinos.

We broke down the details of the shocking Louvre jewelry heist and found in an investigation that US Immigration and Customs Enforcement likely did not buy guided missile warheads as part of its procurements. The transaction appears to have been an accounting coding error.

Meanwhile, Anthropic has partnered with the US government to develop mechanisms meant to keep its AI platform, Claude, from guiding someone through building a nuclear weapon. Experts have mixed reactions, though, about whether this project is necessary—and whether it will be successful. And new research this week indicates that a browser seemingly downloaded millions of times—known as the Universe Browser—behaves like malware and has links to Asia’s booming cybercrime and illegal gambling networks.

And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

AWS confirmed in a “post-event summary” on Thursday that its major outage on Monday was caused by Domain System Registry failures in its DynamoDB service. The company also explained, though, that these issues tipped off other problems as well, expanding the complexity and impact of the outage. One main component of the meltdown involved issues with the Network Load Balancer service, which is critical for dynamically managing the processing and flow of data across the cloud to prevent choke points. The other was disruptions to launching new “EC2 Instances,” the virtual machine configuration mechanism at the core of AWS. Without being able to bring up new instances, the system was straining under the weight of a backlog of requests. All of these elements combined to make recovery a difficult and time-consuming process. The entire incident—from detection to remediation—took about 15 hours to play out within AWS. “We know this event impacted many customers in significant ways,” the company wrote in its post mortem. “We will do everything we can to learn from this event and use it to improve our availability even further.”

The cyberattack that shut down production at global car giant Jaguar Land Rover (JLR) and its sweeping supply chain for five weeks is likely to be the most financially costly hack in British history, a new analysis said this week. According to the Cyber Monitoring Centre (CMC), the fallout from the attack is likely to be in the region of £1.9 billion ($2.5 billion). Researchers at the CMC estimated that around 5,000 companies may have been impacted by the hack, which saw JLR stop manufacturing, with the knock-on impact of its just-in-time supply chain also forcing firms supplying parts to halt operations as well. JLR restored production in early October and said its yearly production was down around 25 percent after a “challenging quarter.”

ChatGPT maker OpenAI released its first web browser this week—a direct shot at Google’s dominant Chrome browser. Atlas puts OpenAI’s chatbot at the heart of the browser, with the ability to search using the LLM and have it analyze, summarize, and ask questions of the web pages you’re viewing. However, as with other AI-enabled web browsers, experts and security researchers are concerned about the potential for indirect prompt injection attacks.

These sneaky, almost unsolvable, attacks involve hiding a set of instructions to an LLM in text or an image that the chatbot will then “read” and act upon; for instance, malicious instructions could appear on a web page that a chatbot is asked to summarize. Security researchers have previously demonstrated how these attacks could leak secret data.

Almost like clockwork, AI security researchers have demonstrated how Atlas can be tricked via prompt injection attacks. In one instance, independent researcher Johann Rehberger showed how the browser could automatically turn itself from dark mode to light mode by reading instructions in a Google Document. “For this launch, we’ve performed extensive red-teaming, implemented novel model training techniques to reward the model for ignoring malicious instructions, implemented overlapping guardrails and safety measures, and added new systems to detect and block such attacks,” OpenAI CISO Dane Stuckey wrote on X. “However, prompt injection remains a frontier, unsolved security problem, and our adversaries will spend significant time and resources to find ways to make ChatGPT agent[s] fall for these attacks.”

Researchers from the cloud security firm Edera publicly disclosed findings on Tuesday about a significant vulnerability impacting open source libraries for a file archiving feature often used for distributing software updates or creating backups. Known as “async-tar,” numerous “forks” or adapted versions of the library contain the vulnerability and have released patches as part of a coordinated disclosure process. The researchers emphasize, though, that one widely used library, “tokio-tar,” is no longer maintained—sometimes called “abandonware.” As a result, there is no patch for tokio-tar users to apply. The vulnerability is tracked as CVE-2025-62518.

“In the worst-case scenario, this vulnerability … can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends,” the researchers wrote. “Our suggested remediation is to immediately upgrade to one of the patched versions or remove this dependency. If you depend on tokio-tar, consider migrating to an actively maintained fork like astral-tokio-tar.”

Over the last decade, hundreds of thousands of people have been trafficked to forced labor compounds in Southeast Asia. In these compounds—mostly in Myanmar, Laos, and Cambodia—these trafficking victims have been compelled to run online scams and steal billions for organized crime groups.

When law enforcement agencies have shut off internet connections to the compounds, the criminal gangs have often turned to Elon Musk’s Starlink satellite system to stay online. In February, a WIRED investigation found thousands of phones connecting to the Starlink network at eight compounds based around the Myanmar-Thailand border. At the time, the company did not respond to queries about the use of its systems. This week, multiple Starlink devices were seized in a raid at a Myanmar compound.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleHow to Keep Squirrels Off Bird Feeders
Next Article Pokémon Legends: Z-A Review – Maintaining Rank

Related Articles

Xbox brings cloud gaming fun to Amazon Fire TVs

Xbox brings cloud gaming fun to Amazon Fire TVs

24 December 2025
Save 0 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

Save $500 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

24 December 2025
This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for 0 off

This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for $160 off

24 December 2025
Gemini could soon handle tasks in the background without holding your screen hostage

Gemini could soon handle tasks in the background without holding your screen hostage

24 December 2025
Why smart glasses should be on your Christmas list next year

Why smart glasses should be on your Christmas list next year

24 December 2025
Report from Samsung’s home market claims Galaxy S26 Edge is effectively dead

Report from Samsung’s home market claims Galaxy S26 Edge is effectively dead

24 December 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Save 0 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

Save $500 on this iBUYPOWER RTX 5080 rig and skip the DIY headache

By technologistmag.com24 December 2025

If you want high-end gaming performance without spending your nights comparing part lists and watching…

This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for 0 off

This Dyson Purifier Hot+Cool deal gives you heat, cooling, and cleaner air for $160 off

24 December 2025
Gemini could soon handle tasks in the background without holding your screen hostage

Gemini could soon handle tasks in the background without holding your screen hostage

24 December 2025
Why smart glasses should be on your Christmas list next year

Why smart glasses should be on your Christmas list next year

24 December 2025
Report from Samsung’s home market claims Galaxy S26 Edge is effectively dead

Report from Samsung’s home market claims Galaxy S26 Edge is effectively dead

24 December 2025
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2025 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.