The ambitious plan calls for dozens of launches in the next decade, with crews eventually exploring the lunar south pole. “The goal is not flags and footprints but to stay on the Moon,” the US space agency chief said. https://www.semafor.com/article/03/24/2026/nasa-aims-to-build-20b-lunar-base
jbhall56@infosec.exchange
Posts
-
The ambitious plan calls for dozens of launches in the next decade, with crews eventually exploring the lunar south pole. -
The predictions made in these wine country gatherings have a frighteningly good track record of coming true, organizers told Axios.The predictions made in these wine country gatherings have a frighteningly good track record of coming true, organizers told Axios. https://www.axios.com/newsletters/axios-future-of-cybersecurity-16e34530-22ee-11f1-871c-0f669ee3f850.html?chunk=2&utm_term=twsocialshare#story2
-
My kids have stolen my gaming chair from my office.@accidentalciso I have a Herman Miller Aeron and love it. But I bought mine reconditioned for around $600 vs. $1600 new. I have roller blade casters on it which are lightyears better than stock.
-
AWS Bedrock is Amazon's platform for building AI-powered applications.AWS Bedrock is Amazon's platform for building AI-powered applications. https://thehackernews.com/2026/03/we-found-eight-attack-vectors-inside.html
-
One of the most honorable men I have ever met.One of the most honorable men I have ever met. RIP https://www.politico.com/news/2026/03/21/robert-mueller-trump-special-counsel-fbi-obituary-00039059
-
@georgetakei That is the problem, they are NOT reading the Bible.@georgetakei That is the problem, they are NOT reading the Bible.
-
The risks are not the kind a security team can address via patching or configuration changes because they exist at the architectural level in both large language models (LLMs) and in MCP, says Gianpietro Cutolo, cloud threat researcher at Netskope.The risks are not the kind a security team can address via patching or configuration changes because they exist at the architectural level in both large language models (LLMs) and in MCP, says Gianpietro Cutolo, cloud threat researcher at Netskope. https://www.darkreading.com/application-security/mcp-security-patched
-
In an interview at the SXSW conference in Austin this week, he said that with the speed at which artificial intelligence is growing, AI bot traffic will exceed the amount of human traffic that’s online by 2027.In an interview at the SXSW conference in Austin this week, he said that with the speed at which artificial intelligence is growing, AI bot traffic will exceed the amount of human traffic that’s online by 2027. https://techcrunch.com/2026/03/19/online-bot-traffic-will-exceed-human-traffic-by-2027-cloudflare-ceo-says/
-
LeakNet is a ransomware operation that has been active since late 2024, encrypting, exfiltrating, and (if a ransom is not paid) leaking the data of compromised organisations.LeakNet is a ransomware operation that has been active since late 2024, encrypting, exfiltrating, and (if a ransom is not paid) leaking the data of compromised organisations. https://www.fortra.com/blog/leaknet-ransomware-what-you-need-know
-
Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
-
Meta blamed users for not opting into the privacy-protecting feature.Meta blamed users for not opting into the privacy-protecting feature. Experts fear the move could be the first major domino to fall for end-to-end encryption tech worldwide. https://www.wired.com/story/the-danger-behind-metas-decision-to-kill-end-to-end-encrypted-instagram-dms/
-
@jack_daniel You'll likely feel much better after the Sun crosses the Equator.@jack_daniel You'll likely feel much better after the Sun crosses the Equator.

️

-
A co-founder of Supermicro is among three people charged with diverting servers fitted with Nvidia GPUs worth $2.5 billion to Chinese customers in violation of US export controls.A co-founder of Supermicro is among three people charged with diverting servers fitted with Nvidia GPUs worth $2.5 billion to Chinese customers in violation of US export controls. https://www.theregister.com/2026/03/20/supermicro_nvidia_gpu_charges/
-
Interesting list of podcasts.Interesting list of podcasts. https://www.bbc.com/culture/article/20260318-the-best-podcasts-of-2026
-
Sen. Mark Warner (D-Va.) has questions about a $10 billion fee that TikTok's buyers reportedly are paying the U.S.Sen. Mark Warner (D-Va.) has questions about a $10 billion fee that TikTok's buyers reportedly are paying the U.S. Treasury Department, on top of what they spent to buy the actual business from China's ByteDance. https://www.axios.com/2026/03/18/tiktok-sale-oracle-silver-lake
-
The IoT is horribly insecure, but we already knew that.The IoT is horribly insecure, but we already knew that. https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html
-
Alex Palcuie was formerly an SRE for Google Cloud Platform.Alex Palcuie was formerly an SRE for Google Cloud Platform. "My job is keeping Claude up," Palcuie said, adding: "I've been using LLMs for actual incident response." Since January, he's been reaching for Claude before looking at other monitoring tools. https://www.theregister.com/2026/03/19/anthropic_claude_sre/
-
Hackers are using a "highly sophisticated" tool called DarkSword to take over devices, stealing data including emails, usernames, passwords, photos and even cryptocurrency wallets.Hackers are using a "highly sophisticated" tool called DarkSword to take over devices, stealing data including emails, usernames, passwords, photos and even cryptocurrency wallets. https://news.sky.com/story/apple-issues-iphone-spyware-alert-and-tells-users-to-update-ios-operating-system-13521654
-
Jassy's comments, delivered at an internal all-hands meeting and reviewed by Reuters, reflect a growing conviction within Amazon that AI will reshape not only its cloud segment but also the company's broader strategy.Jassy's comments, delivered at an internal all-hands meeting and reviewed by Reuters, reflect a growing conviction within Amazon that AI will reshape not only its cloud segment but also the company's broader strategy. https://www.techspot.com/news/111726-amazon-jassy-now-sees-aws-hitting-600-billion.html
-
Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia.Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia. https://www.securityweek.com/cisco-firewall-vulnerability-exploited-as-zero-day-in-interlock-ransomware-attacks/