Home Blog

Outlook Send/Receive Error 0x8004010F[Solved]

Although Microsoft Outlook is a popular business email client app, it’s not perfect. There are several common Outlook issues that users often experience while using it. These Outlook issues may not only disrupt the email communication but also result in loss of mailbox items due to damage to Outlook data file (OST/PST) or corruption. Thus, it’s critical to prevent and fix the common Outlook issues and avoid data loss. Stellar Repair for Outlook can easily make solutions to all the below issues.

In this article, we’ve discussed 10 common Outlook issues that can disrupt your business communication and lead to data loss, along with the fixes to quickly resolve them.

List of 10 Common Outlook Issues and their Solutions

Below we have compiled a list of 10 common Outlook issues that one may experience during everyday Outlook use. These include Outlook errors such as 0x800ccc0f, 0x80040154, 0x800CCC13, etc. You may resolve these common Outlook issues by following the solutions discussed below or use an Outlook repair software, such as Stellar Repair for Outlook. The software can help repair damaged or corrupt Outlook data file (PST) and resolve all kinds of Outlook issues in a few clicks, without the risk of data loss. It’s compatible with Outlook 2021, 2019, 2016, 2013, 2010, 2007, and 2003 versions.

1. Error 0x800ccc0f
The cryptic Outlook error code 0x800ccc0f appears while sending or receiving emails. The error may occur in MS Outlook 2021, 2019, 2016, 2013, 2010, and 2007 due to poor network connection, firewall settings, corrupt or oversized Outlook data file (OST/PST), etc.

Outlook-Error

The error can be fixed by ensuring correct configuration settings in Outlook and a stable connection with the mail server. You may also disable your firewall settings or antivirus protection to check if the problem is caused by them. Further, you may also check the Outlook data file for errors or damage and repair it with the help of Inbox Repair tool or an Outlook repair software (as mentioned earlier) to fix the error 0x800ccc0f. The Outlook repair software can also help reduce the size of an oversized PST file by compressing it. This will resolve the issue if it is occurred due to an oversized Outlook data file.

2. Microsoft Outlook Has Stopped Working
MS Outlook may stop working or may not respond due to reasons, such as faulty add-ins, damaged or lost DLL files, corrupt Outlook profile, damaged Outlook program or Outlook data file, etc.

Outlook stopped working
Outlook stopped working

However, this Outlook issue can be resolved by removing faulty add-in(s), creating a new Outlook profile, reinstalling or repairing the Outlook program, or by repairing the damaged Outlook data file. To know more about this Outlook issue and fix it, refer to our guide on Microsoft Outlook Stopped Working.

3. Not Implemented Error
“Not implemented” is another Outlook send/receive error message that appears when a user clicks on the Send/Receive button to manually send or receive emails.

“Not implemented” is another Outlook send/receive error message that appears when a user clicks on the Send/Receive button to manually send or receive emails.
“Not implemented” is another Outlook send/receive error message that appears when a user clicks on the Send/Receive button to manually send or receive emails.

This send/receive error may occur due to faulty add-ins, incorrect configuration, damaged Outlook profile, or corrupt PST file. To fix this Outlook issue, you can refer to our in-depth guide on Fix “Not Implemented” Error in Microsoft Outlook on Windows.

4. Error 0x80040154

The error 0x80040154 is yet another Outlook error that appears when a user tries to send or receive emails. It occurs due to damaged Outlook program, incompatible software (antivirus program), faulty add-in, damaged or corrupt DLL files, ActiveX control issues, a problem with COM components, etc.

You can resolve this Outlook issue by reinstalling the Outlook, removing the faulty add-in, or using the Microsoft Support and Recovery Assistant utility. We have already discussed this error in detail and explained various solutions to fix Microsoft Outlook error 0x80040154 on Windows.

5. Error 0x800CCC13

The error 0x800CCC13 occurs due to connectivity issues, incompatible add-ins, virus or malware intrusion, bad sectors on the drive, etc.

The error 0x800CCC13 occurs due to connectivity issues, incompatible add-ins, virus or malware intrusion, bad sectors on the drive, etc.
The error 0x800CCC13 occurs due to connectivity issues, incompatible add-ins, virus or malware intrusion, bad sectors on the drive, etc.

However, you can resolve this issue by checking the internet connection and running the SFC (System File Checker) scan on the system. However, if that does not work, follow this guide to resolve the error “0x800CCC13” Outlook cannot connect to Server.

6. Error 0x8004210A

The error 0x8004210a is a server timeout error that indicates a problem with Outlook’s send/receive functionality. The complete Outlook error message is as follows,

“Task ‘XXXX’ reported error (0x8004210A): ‘The operation timed out while waiting for a response from the receiving (POP) server. If you continue to receive this message, contact your server administrator or internet service provider (ISP).’

This error occurs due to incorrect settings, connectivity issues, and problems with Outlook data files. You can fix this by ensuring reliable internet connectivity, increasing the server timeout interval, etc. To know more about the solutions to resolve this error, follow How to Fix POP Server Timeout Error 0x8004210a in MS-Outlook or Send/Receive Pop Error.

7. Error 0x80040600

The error 0x80040600 is another send/receive error that occurs when an Outlook user tries to send, receive, or delete email messages. The error is usually caused by a large or oversized PST file that exceeds the mailbox size limit. It may also occur if the PST file is damaged or corrupt.

To resolve this issue in Outlook, you may attempt to compact the PST file or repair it via the ScanPST.exe utility. For more details and steps to resolve this Outlook issue, follow our guide on How to Fix ‘An unknown error has occurred 0x80040600’ in MS Outlook.

8. Outlook Search not Working

Microsoft Outlook has a search option that allows users to find emails based on keywords. It also provides several filters to quickly locate specific email or mail items. However, sometimes, this search option may fail or not list any results.

Microsoft Outlook has a search option that allows users to find emails based on keywords. It also provides several filters to quickly locate specific email or mail items. However, sometimes, this search option may fail or not list any results.
Microsoft Outlook has a search option that allows users to find emails based on keywords. It also provides several filters to quickly locate specific email or mail items. However, sometimes, this search option may fail or not list any results.

This may occur due to problems with Outlook indexing, problematic add-in, or issue with the Windows search service. To resolve this Outlook issue, you can follow our comprehensive guide on How to Fix Outlook Search When Not Working.

9. Microsoft Outlook Not Responding Error

Outlook not responding or Outlook not working is a common Outlook issue where Outlook application gets stuck or freezes. This may occur due to outdated system drivers, virus or malware intrusion, lack of system resources, or system overheating. It may also occur if the Outlook data file is damaged.

To resolve this, you may free up more resources by closing other applications, update Outlook and Windows, uninstall incompatible or faulty add-ins, etc. For a detailed guide, visit How to Deal with ‘Microsoft Outlook Not Responding’ Error.
To resolve this, you may free up more resources by closing other applications, update Outlook and Windows, uninstall incompatible or faulty add-ins, etc. For a detailed guide, visit How to Deal with ‘Microsoft Outlook Not Responding’ Error.

To resolve this, you may free up more resources by closing other applications, update Outlook and Windows, uninstall incompatible or faulty add-ins, etc. For a detailed guide, visit How to Deal with ‘Microsoft Outlook Not Responding’ Error.

10. Outlook Performance Issue

Usually, Outlook works without any hiccups on compatible systems. However, as the size of Outlook data file i.e., PST reaches or exceeds the mailbox size limit, Outlook performance starts to drop significantly. This can lead to issues such as delays in sending or receiving emails, integrity issues, PST file errors, and corruption.

Fix Outlook Slow in Outlook 2021, 2019, 2016, 2013 & earlier versions.
Fix Outlook Slow in Outlook 2021, 2019, 2016, 2013 & earlier versions.

However, this issue can be resolved by splitting the PST file into smaller sizes and by storing the Outlook data file on system drive or volume rather than on network storage. To know more about Outlook performance issues and how to resolve them, refer to our previous post Fix Outlook Slow in Outlook 2021, 2019, 2016, 2013 & earlier versions.

Conclusion:

In this article, we’ve covered 10 common Outlook issues and their solutions to help you troubleshoot and resolve these issues. However, there are several other not so common Outlook issues that we haven’t covered in this post. In case you have encountered a different Outlook error than what we’ve covered in this article, you can always use an Outlook repair software as discussed in this post to fix the error without the risk of data loss. You may also reach us and let us know the Outlook error you’re facing it via comments down below. We will try to get back to you with the best solution possible.

How to safe your laptop with this Anti-Virus

0
Anti-Virus
Get your pc Virus free

Understanding the Importance of Antivirus Software: Safeguarding Your Digital World with Avast Antivirus.

In an age where technology permeates every aspect of our lives, from personal communication to financial transactions, ensuring the security of our digital environment has become paramount. One of the most crucial tools in this endeavor is antivirus software, with Avast Antivirus standing out as a trusted solution. But why exactly do we need antivirus protection, and how does Avast contribute to our digital well-being? Let’s delve into this topic to understand its significance.

Avast Antivirus
Avast Antivirus

1. Protecting Against Malware with Avast:
Malware, short for malicious software, encompasses a broad category of harmful programs designed to infiltrate, damage, or gain unauthorized access to computer systems. Avast Antivirus employs cutting-edge technology to detect, block, and remove malware threats in real-time, ensuring that your devices remain secure from viruses, worms, trojans, ransomware, and other malicious entities.

2. Safeguarding Personal Information with Avast:
Your computer contains a treasure trove of personal data – from login credentials and financial information to photos and private messages. Avast Antivirus includes robust privacy features that encrypt sensitive data, secure online transactions, and provide secure storage options, ensuring that your personal information remains protected against unauthorized access and exploitation.

3. Preventing Identity Theft with Avast:
Identity theft is a pervasive threat in today’s digital landscape. Avast Antivirus offers comprehensive identity protection features, including phishing detection and anti-keylogging technology, to safeguard your identity against theft and fraud. By actively monitoring for suspicious activities and blocking malicious attempts, Avast helps prevent identity theft and keeps your personal information secure.

4. Enhancing System Performance with Avast:
Malware doesn’t just compromise your security; it can also significantly impact the performance of your device. Avast Antivirus includes system optimization tools that remove junk files, optimize system settings, and eliminate resource-draining malware, ensuring that your devices operate at peak performance without compromise.

5. Protecting Network Security with Avast:
In today’s interconnected world, network security is paramount. Avast Antivirus extends its protective umbrella to networked devices, offering robust firewall protection, Wi-Fi network scanning, and vulnerability assessment tools to safeguard your network infrastructure against intrusions and attacks.

6. Proactive Threat Detection with Avast:
Cyber threats are constantly evolving, requiring proactive measures to stay ahead of emerging threats. Avast Antivirus employs advanced algorithms and heuristic analysis to identify and mitigate emerging threats proactively. With regular updates and real-time threat intelligence, Avast ensures that your defenses remain robust against evolving cyber threats.

In conclusion, the need for antivirus software in today’s digital landscape cannot be overstated, and Avast Antivirus stands as a trusted solution in this regard. By protecting against malware, safeguarding personal information, preventing identity theft, enhancing system performance, protecting network security, and offering proactive threat detection, Avast enables users to enjoy a safer and more secure online experience.

Remember, with Avast Antivirus, you can stay informed, stay vigilant, and stay protected against cyber threats, ensuring peace of mind in an increasingly digital world.

Microsoft 365 makes everyone work hassle free

0

Office 365 Explained: Your Productivity Powerhouse in the Cloud

Imagine this: You’re on a tropical beach, laptop balanced on your knees, basking in the sun as you whip up a presentation like a boss. No clunky software downloads, no frantic updates, just you, your creativity, and the magic of Office 365.

That’s the beauty of this cloud-based suite from Microsoft. It’s not just your grandpa’s Office anymore. It’s a productivity playground packed with familiar favorites like Word, Excel, and PowerPoint, along with some new kids on the block that will seriously up your game.

Let’s dive into the good stuff:

  • Work from anywhere, anytime: Forget being chained to your desk. Office 365 lives in the cloud, so you can access your files and applications from any device with an internet connection. Edit that document on your phone during your commute, brainstorm with colleagues across the globe on a shared whiteboard, or catch up on emails while waiting for your latte (we’ve all been there).

  • Always up-to-date, always awesome: No more upgrade nightmares! Office 365 automatically delivers the latest features and security patches, so you can focus on what you do best, without worrying about being stuck in software limbo. Think of it as having a personal tech fairy keeping your tools shiny and sharp.

  • Teamwork makes the dream work: Collaboration is key in today’s world, and Office 365 gets it. Tools like SharePoint and Teams let you share files, brainstorm in real-time, and keep everyone on the same page, even if they’re in different time zones. It’s like having a virtual office water cooler, but without the awkward small talk (unless you want it, of course).

  • Your data, your fortress: Security is no joke, and Office 365 takes it seriously. Your data is protected by multiple layers of security, including encryption and data loss prevention, so you can rest assured that your important work is safe from prying eyes and digital gremlins.

  • Plans for every power player: Whether you’re a one-person show or a corporate giant, there’s an Office 365 plan that fits your needs and budget. From basic access to the essentials to full-blown enterprise-grade security, you can choose the package that lets you conquer your to-do list without breaking the bank.

But wait, there’s more! Office 365 is constantly evolving, adding new features and integrations that make your life easier and your work more efficient. Think AI-powered writing assistants, seamless cloud storage, and even apps that help you stay focused and avoid procrastination (we’ve all been there too).

So, ditch the desk shackles and embrace the cloud revolution. Office 365 is your passport to productivity paradise, where work gets done, dreams take flight, and maybe, just maybe, you can squeeze in a beach break or two.

Ready to take the plunge? Head over to the Office 365 website and explore the plans that suit you. Remember, the only limit is your imagination (and maybe your internet connection).

P.S. Don’t forget to unleash your inner office warrior and share your Office 365 superpowers with the world!

I hope this content is helpful, engaging, and informative, while adhering to the safety guidelines you outlined. Let me know if you have any other questions or want me to humanize content on a different topic!

Windows KB5032292

Zoom Calls now on Apple TV 4K

0

Join Zoom calls now directly from your Apple TV 4K

This week Zoom released a new Apple TV App “Zoom – for Home TV” which works with iPhone and iPad’s camera using the continuity feature, as Apple TV does not have a built-in camera.

Spotted by AppleInsider, the app works similarly, to how FaceTime works on Apple TV. To join the calls you can use your iPhone or iPad’s camera paired with the Apple TV app. You can hold the phone for audio and the video would be mirrored to the television. It would be better if you place the phone on a stand to make it feel like natural Zoom call.

The app come with calendar integration, so you can keep track of the upcoming meeting and join them instantly without having to type the lengthy Zoom meeting codes.

Continuity camera was first debuted last year for macOS, so you can use your iPhone’s cameras as webcam. With iOS17 the continuity camera added support for FaceTime calls on iPhone and then switching to Apple TV or just starting a FaceTime call with Apple TV.

Continuity Camera debuted last year for macOS:

Use your iPhone as a webcam for your Mac. Now you can use the powerful camera system of your iPhone as a webcam, including Center Stage, Portrait mode, Studio Light and Desk view.

Follow the below steps to use your iPhone as a webcam on your Mac.

  1. Mount your iPhone
  2. Choose your iPhone camera or mic
  3. Use Reactions, Presenter Overlay, and other effects
  4. Pause, disconnect, or turn off

System requirements

iOS 16 or later
iPhone XR or later (all iPhone models introduced in 2018 or later)

macOS Ventura or later
Any Mac compatible with macOS Ventura or later

Additional Requirements:

FjordPhantom Malware

Promon discovers Android malware FjordPhantom

0

Background

The Security Research team at Promon was alerted by i-Sprint, a longstanding partner, to a recent occurrence of Android malware in Southeast Asian countries such as Indonesia, Thailand, and Vietnam. Along with these targeted areas, it is suspected that the malware has also affected Singapore and Malaysia. This form of malware operates through messaging platforms and utilizes social engineering tactics to deceive banking clients. In conversations with banks in this region, Promon discovered an unfortunate incident where one customer lost 10 million Thai Baht (equivalent to $280,000) due to this scheme.

Promon had obtained a sample of this malware from an end-customer’s device, specifically designed to attack one particular bank. However, it also contains code that could potentially target other banking applications. Despite extensive efforts, additional samples and public information about this specific malware were unavailable, leading to their own technical analysis. The presence of Android banking malware has been ongoing for some time now, with new families being uncovered regularly. What sets this particular malware apart is its use of virtualization as a means of attacking applications – a tactic not commonly seen among other malicious software. Traditionally, virtualization has been utilized for reverse engineering purposes.

How FjordPhantom malware spreads

The malware spreads primarily through email, SMS, and messaging apps called FjordPhantom. The user is prompted to download an app resembling their own bank app. It contains the real bank’s Android app, but it runs in a virtual environment with additional components that allow it to be attacked.

Once the app is installed, users are contacted by call center team who pose as bank customer care and instruct the user about the process. During this time they have access to users device and either complete the transaction and steal the credentials for further use.

How FjordPhantom malware uses virtualization

To perform its attacks, the malware embeds a virtualization solution and a hooking framework from open source/free projects found on Github.

In recent years, virtualization has become quite popular on the Android platform. It allows apps to be installed and run in virtual containers. Since many of these apps can be downloaded from the Google Play Store, Google accepts them since there are legitimate reasons for using such solutions. Installing the same app multiple times for logging into it with different accounts is a popular reason for using these solutions. This is not possible on Android.

Virtualization breaks the Android sandbox

Potential danger of loading apps in virtual containers is that it breaks Android Sandbox. Each app usaully operated in its own isolated sandbox in Android. But with virtualization multiple apps are able to work in same sandbox and access each others files and memory. This makes virtualization a handy tool for attackers, with which they can bypass rooting of device to break the sandbox. Installing multiple apps in same sandbox removes the need for rooting thus being not detected by security measures.

How FjordPhantom works

malware
malware

Image Source: Promon

Prevention

The FjordPhantom malware is a sophisticated Android malware used to commit real-world fraud. Users should exercise caution when downloading apps from untrusted sources.

Google Maps New Colour Update

Money Heist Berlin Netflix Trailer Released

0

Netflix released a new trailer of Berlin the Money Heist’s Spinoff drama series. Based on the character from Money heist, the shows prime focus is on the glory days of the ambitious heist-planning thief Berlin.
Set in distant past where he has not discovered his terminal illness post which he joins the heist at Royal Mint of Spain. Berlin is once again potrayed by Pedro Alonso chasing a huge payday. The mastermind formulates a team to steal $44 million USD worth of jewels in Paris from a prestigious action house.
The team includes Keila (Michelle Jenner), academic Damián (Tristán Ulloa), the wild Cameron (Begoña Vargas), locksmith Roi (Julio Peña) and gadget guru Bruce (Joel Sánchez).

Explore the life and adventures of Berlin the mastermind behind some of Money Heists robberies. Get ready for heart pounding action in the Money Heist spinoff promising untold stories and deeper insights into our favorite characters lives. Berlins captivating presence and calculated approach have made him a beloved character worldwide despite his portrayal as ruthless. As the series delves into his past it challenges viewers perceptions. Reveals his complex nature. Pedro Alonsos remarkable portrayal of Berlin has redefined how villains can be depicted on screen. Money Heist, a crime drama centered around heists has become a global phenomenon thanks to its compelling storyline and intricate characters. With his personality Berlin brings a dimension to the show that keeps audiences hooked throughout. Whether adored or despised there is no denying that Berlins impact, on the world of Money Heist is unmatched.

Berlin is directed by the original Money Heist creator Álex Pina along with Esther Martínez Lobato. Series is filmed in Madrid & Paris.

 

Watch the official trailer below:

2023 International Emmy Awards

Windows KB5032292 is now live

1
windows11-update
windows11-update

In the Beta Channel, Microsoft recently released Windows 11 Insider Preview Build 22635.2776 (KB5032292). A notable change is the enhanced integration of Microsoft Teams into Windows Share. Although this build does not introduce any new features, it does add some significant improvements and changes to the operating system.

More specifically, Windows 11 users with a Microsoft Entra ID now have the ability to directly share files to designated Microsoft Teams Channels and group chats through the Windows Share window. This new functionality simplifies communication by eliminating the need to open Teams and manually transfer files, making it easier for users to share documents with friends, family, or colleagues. This integration is expected to greatly improve the user experience, especially for those who regularly collaborate using Microsoft Teams.

As this feature is currently available in the Beta Channel, it is likely to make its way into the stable Windows 11 channel in the coming weeks. Let’s explore the changes and improvements it brings.

What You Need to Know About KB5032292

Gradually rolling out to the Beta Channel with a toggle switch

Windows Share: If you’re signed in with a Microsoft Entra ID, you can now share files with your Microsoft Teams contacts (work or school) as well as with specific Microsoft Teams Channels and group chats directly within the Windows Share window if you have a Microsoft Entra ID.

Windows Ink is now expanding its use of digital handwriting (inking) beyond just specific edit boxes. This feature will now be available in multiple languages and locales, including Chinese Simplified (People’s Republic of China), English (Australia, Canada, India, and United Kingdom), French (Canada and France), German (Germany), Italian (Italy), Japanese (Japan), Korean (Korea), Portuguese (Brazil), Spanish (Mexico and Spain). Additionally, the update includes improved recognition technology as well as new gestures for deleting, selecting, joining, splitting words, and inserting a new line.

In Task Manager, the process grouping has been improved.

Gradually rolling out fixes to the Beta Channel with toggle on Computer desktops: In contrast themes, desktop tooltips in Task view were hard to read.

Drag and drop windows in Task View to different desktops may now place them in the background of other windows unexpectedly. The live captions sometimes showed the same line of text twice due to a bug.

The Beta Channel is gradually rolling out improvements and changes.

The latest update includes the release of account-related notifications for Microsoft accounts on the Settings homepage. A Microsoft account is essential for connecting Windows to various Microsoft apps, securing data backups, and managing subscriptions. To enhance security measures, users can opt to add additional steps to avoid getting locked out of their accounts. These notifications will now appear on the Start menu and Settings page. To manage these notifications, go to Settings > Privacy & security > General.

As a result, Windows 11 Insider Preview Build provides notable improvements, particularly the integration of Microsoft Teams into Windows Share. As a result, users signed in with Microsoft Entra IDs will have an easier time sharing files, offering a more seamless and efficient collaboration experience.

As a result of the expansion of digital handwriting support in Windows Ink to multiple languages and locales, this feature becomes more accessible to a wider range of users. Task Manager’s process grouping capabilities have also been enhanced to improve performance monitoring.

The fixes addressed in this build, including those related to desktop tooltips and live captions, contribute to a more stable and user-friendly environment. By rolling out the update gradually, Microsoft can gather feedback and resolve any potential issues before they reach a wider audience.

Additionally, Microsoft’s commitment to improving user account security and providing an interactive and informative user experience is demonstrated by the addition of account-related notifications for Microsoft accounts on the Settings homepage. As a result of this feature, account management will be improved and system security will be improved.

Microsoft will continue to refine Windows 11 with these incremental updates, providing users with a more polished and feature-rich operating system in the near future. The Beta Channel serves as a testing ground for these enhancements, ensuring the final release meets the high standards expected of the Windows operating system.

News on Microsoft ChatGPT

New zero-day attacks: Routers and cameras vulnerable

0

Cybersecurity researchers uncover zero-day flaws exploited for router and video recorder attacks
In a concerning development, experts at networking firm Akamai have discovered that malicious actors are actively exploiting two previously unknown zero-day vulnerabilities to compromise routers and video recorders. These vulnerabilities are being leveraged to build a formidable botnet employed in distributed denial-of-service (DDoS) attacks, raising alarms within the cybersecurity community. The vulnerabilities, which have not been disclosed to the manufacturers or the broader security research community, enable remote code execution when affected devices use default administrative credentials.
The attackers are exploiting these vulnerabilities to compromise devices and subsequently infect them with Mirai, a powerful open-source malware notorious for turning routers, cameras, and various IoT devices into a botnet capable of launching DDoS attacks of unprecedented scale.
Specifically, one vulnerability targets network video recorders, while the other targets an “outlet-based wireless LAN router designed for hotels and residential applications.” The router in question is manufactured by a Japan-based company known for producing multiple switches and routers. Researchers note that the exploited router feature is widespread, raising concerns that multiple router models from the same manufacturer could be vulnerable.
Upon discovering these zero days, Akamai promptly reported the vulnerabilities to both manufacturers. One manufacturer has provided assurances that security patches will be released next month. However, Akamai has refrained from disclosing the specific devices or manufacturers until fixes are implemented to prevent wider exploitation of the zero-days.
Akamai emphasizes the delicate balance between responsible disclosure, aimed at aiding defenders and oversharing information that could potentially enable further abuse by threat actors. The company has provided a comprehensive list of file hashes, IP addresses, and domain addresses associated with the attacks to enable network administrators and device owners to check whether their devices have been targeted.
The method employed for remote code execution involves command injection, requiring the attacker to authenticate using default credentials in the vulnerable device. The authentication and injection are executed through a standard POST request.
Akamai estimates that at least 7,000 devices may be vulnerable, with the actual number potentially higher. The use of Mirai in these attacks is noteworthy, as Mirai gained significant attention in 2016 when it orchestrated a DDoS attack on the security news site KrebsOnSecurity, setting a record with a 620 gigabit-per-second assault.
Mirai is distinctive in its ability to compromise routers, security cameras, and other IoT devices, a phenomenon not widely observed before its emergence. Furthermore, Mirai’s source code quickly became publicly available, leading to its adoption in larger-scale DDoS attacks targeting gaming platforms and their associated ISPs. The Mirai strain involved in the recent attacks, known as JenX, has undergone modifications, employing fewer domain names than usual to connect to command-and-control servers. Some malware samples also exhibit ties to a separate Mirai variant called hailBot.
Interestingly, the code used in these zero-day attacks, which includes offensive racist slurs, closely resembles that observed in DDoS attacks reported by a China-based security firm targeting a Russian news website in May. This convergence of tactics raises questions about the potential collaboration or shared resources among threat actors employing Mirai-based attacks.
The image below shows a side-by-side comparison.

DDoS_Mirai_Attack
DDoS_Mirai_Attack

Payloads exploiting the zero-days are:
alert tcp any any -> any any (msg:”InfectedSlurs 0day exploit #1 attempt”; content:”lang=”; content:”useNTPServer=”; content:”synccheck=”; content:”timeserver=”; content:”interval=”; content:”enableNTPServer=”; sid:1000006;)
and
alert tcp any any -> any any (msg:”InfectedSlurs 0day exploit #2 attempt”; content:”page_suc=”; content:”system.general.datetime=”; content:”ntp.general.hostname=”; pcre:”ntp.general.hostname=”; content:”ntp.general.dst=”; content:”ntp.general.dst.adjust=”; content:”system.general.timezone=”; content:”system.general.tzname=”; content:”ntp.general.enable=”; sid:1000005;)

People or organizations concerned with the possibility they’re being targeted with these exploits can use Snort rules and indicators of compromise published by Akamail to detect and repel attacks. At the moment, there is no way to identify the specific devices that are vulnerable or the manufacturers of those devices.

Original Article was published on: https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/

Sam Altman is back to Chat GPT aka Openai

0

After a tumultuous period, Sam Altman has reclaimed his position as CEO of OpenAI, succeeding the previous leadership that had removed him. The new board overseeing OpenAI is not yet fully established, with ongoing negotiations to include representation from major investors such as Microsoft, which has invested billions in the company.

Sam-Altman
Sam-Altman

A notable shift in the board’s composition is evident, as the previous academic and research-focused members are replaced by individuals with extensive backgrounds in business and technology. Microsoft CEO Satya Nadella expressed optimism about the changes, stating that they are an essential step toward more stable and effective governance.

The newly appointed board members include:

  1. Bret Taylor (Board Chair): Former co-CEO of Salesforce, former Twitter board chair, and current board member at Shopify. Taylor co-founded Quip, an acquired collaboration platform.
Bret_Taylor
Bret_Taylor

2. Larry Summers: Former Treasury Secretary and Harvard University President, Summers brings economic expertise and valuable connections in Washington. He has praised OpenAI’s technology, comparing it to transformative inventions like the printing press and electricity.

Larry_Summers
Larry_Summers

3. Adam D’Angelo: The only returning member from the previous board, D’Angelo is the CEO of Quora and played a significant role in negotiating Altman’s return. He previously worked at Meta (formerly Facebook) and served as its CTO.

Adam_D'Angelo
Adam_D’Angelo

Reports suggest that Microsoft, Sequoia Capital, Thrive Capital, and Tiger Global, major investors without board representation, had been advocating for Altman’s reinstatement. Altman had reportedly been pushing for an expanded board at OpenAI for several months.

The board restructuring, marked by experienced technology and business executives, indicates a potential shift toward a more conventional Silicon Valley startup model for OpenAI. However, it’s crucial to note that OpenAI remains a “capped-profit” entity owned by a nonprofit, with excess profits directed to the nonprofit organization.

Original Article: https://www.cnbc.com/2023/11/22/sam-altmans-back-heres-whos-on-the-new-openai-board-and-whos-out.html

ChatGPT employees threaten to quit

0

Over 500 OpenAI employees are threatening to resign and demanding the resignation of the company’s board following the abrupt removal of CEO Sam Altman, which culminated in Altman’s subsequent hiring by Microsoft. In a letter obtained by CNN, the employees accused the board of mishandling Altman’s firing, lacking transparency in justifying the decision, and engaging in what they described as “negotiating in bad faith” with the company’s leadership.

The employees asserted that the board’s actions demonstrated incompetence and a disregard for OpenAI’s mission and its workforce. They warned of their imminent departure to Microsoft unless the board resigns and reinstates Altman and Greg Brockman, the former OpenAI president also removed by the board.

Among the signatories is Mira Murati, initially named Altman’s interim successor, and Ilya Sutskever, OpenAI’s co-founder, chief scientist, and board member, who had been implicated in Altman’s dismissal. Sutskever later issued an apology, acknowledging his role in the leadership crisis and expressing regret for any harm caused to OpenAI.

The letter underscores internal divisions at OpenAI following Altman’s firing, casting uncertainty on the status of the three non-employee board members: Adam D’Angelo, CEO of Quora; Tasha McCauley, a technology entrepreneur; and Helen Toner, director of strategy and foundational research grants at Georgetown University’s Center for Security and Emerging Technology.

According to the letter, the board allegedly suggested that the destruction of the company would align with OpenAI’s mission, raising concerns about the commitment to ensuring artificial general intelligence benefits humanity.

The employees’ collective stance highlights Altman’s strong support within OpenAI and presents an opportunity for Microsoft to absorb talent, as the tech giant has reportedly assured positions for all OpenAI employees. Altman, amplifying an apology from Sutskever, endorsed the sentiment with three heart emojis in a brief commentary.