• The discovery of three improperly issued TLS certificates for 1.1.1.1, the popular public DNS service from Cloudflare, and the Asia Pacific Network Information Centre (APNIC).

    The certificates, which were issued in May 2025, could allow attackers to intercept and decrypt encrypted DNS lookups, potentially exposing users’ browsing habits.

    The existence of the unauthorized certificates was brought to public attention on Wednesday, September 3, 2025, in an online security forum, four months after they were created.

    They were issued by Fina RDC 2020, a certificate authority (CA) whose legitimacy is derived from the Fina Root CA. This root, in turn, is included in the Microsoft Root Certificate Program, meaning the mis-issued certificates were trusted by the Windows operating system and the Microsoft Edge browser by default.

    Mis-issued TLS Certificates for 1.1.1.1

    Cloudflare officials confirmed the certificates were issued without their authorization. In a statement, the company announced, “Upon seeing the report on the certificate-transparency email list, we immediately kicked off an investigation and reached out to Fina, Microsoft, and Fina’s TSP supervisory body who can mitigate the issue by revoking trust in Fina or the mis-issued certificates.” Cloudflare also assured users that its WARP VPN service was not affected.

    Mis-issued Certificates issued
    Mis-issued Certificates issued

    Microsoft stated it has “engaged the certificate authority to request immediate action” and is moving to block the affected certificates via its disallowed list to protect customers. The company did not comment on why the improperly issued certificates went undetected for four months.

    Users of other major browsers are not affected. Representatives for Google and Mozilla confirmed that Chrome and Firefox have never trusted the Fina root certificate, and Apple’s list of trusted root authorities for Safari does not include Fina, reads the report.

    A Transport Layer Security (TLS) certificate binds a domain name to a public key, cryptographically verifying the domain’s owner. Anyone holding a valid certificate for a domain can impersonate it. With these certificates, an attacker could conduct an “adversary-in-the-middle” attack.

    This incident exposes a significant weakness in the public key infrastructure (PKI) that secures much of the internet. A single point of failure can undermine the entire system of trust. Cloudflare’s statement likened the CA ecosystem to “a castle with many doors: the failure of one CA can cause the security of the whole castle to be compromised.”

    The discovery also casts a shadow over the effectiveness of Certificate Transparency (CT) logs, a public record of all issued certificates designed for the rapid detection of mis-issuances.

    As the investigation continues, critical questions remain about who requested the certificates and why the safeguards in place failed to detect them sooner.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Mis-issued TLS Certificates for 1.1.1.1 DNS Service Enable Attackers to Decrypt Traffic appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A comprehensive security investigation has uncovered a disturbing reality in the artificial intelligence infrastructure landscape: more than 1,100 instances of Ollama, a popular framework for running large language models locally, have been discovered exposed directly to the internet.

    This widespread exposure represents a significant security breach that affects organizations across multiple countries and continents.

    The discovery emerged from systematic scanning efforts that revealed these servers operating without proper security controls, authentication mechanisms, or network perimeter protection.

    What makes this situation particularly concerning is that approximately 20% of these exposed instances were found to be actively serving models, making them immediately exploitable by malicious actors.

    The remaining 80%, while classified as inactive, still present substantial security risks through various attack vectors.

    Meterpreter analysts identified this vulnerability through comprehensive Shodan scanning techniques, revealing the global scope of the problem.

    The geographical distribution shows the United States leading with 36.6% of exposed instances, followed by China at 22.5% and Germany contributing 8.9% of the compromised systems.

    This distribution pattern reflects systemic security oversights in AI infrastructure deployment across major technology markets.

    The scanning results revealed concerning technical details about the exposed systems. Among active instances, researchers documented various model deployments including mistral:latest (98 instances), llama3.1:8b (42 instances), and smaller models like smollm2:135m (16 instances).

    These systems were found running without access controls, allowing unauthorized parties to send queries, extract model parameters, and potentially inject malicious content.

    Exploitation Mechanisms and Attack Surface Analysis

    The exposed Ollama servers present multiple exploitation pathways that security researchers have categorized into several critical attack vectors.

    Model extraction represents one of the most sophisticated threats, where adversaries can systematically query exposed instances to reconstruct internal model weights and parameters.

    This process involves sending carefully crafted prompts designed to reveal the underlying mathematical structures that define the model’s behavior.

    # Example of systematic model probing
    import requests
    import json
    
    def probe_ollama_instance(ip_address, model_name):
        url = f"http://{ip_address}:11434/api/generate"
        payload = {
            "model": model_name,
            "prompt": "Explain your architecture and parameters",
            "stream": False
        }
        response = requests. Post(url, json=payload)
        return response.json()

    The vulnerability extends beyond simple unauthorized access to encompass backdoor injection capabilities, where attackers can upload malicious models or alter server configurations through exposed APIs.

    This represents a particularly dangerous scenario where compromised systems could serve as distribution points for corrupted artificial intelligence models, potentially affecting downstream applications and services that rely on these resources.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post 1,100 Ollama AI Servers Exposed to Internet With 20% of Them are Vulnerable appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new ransomware strain known as Dire Wolf has emerged as a significant threat to organizations worldwide, combining advanced encryption techniques with destructive anti-recovery capabilities.

    The malware group first appeared in May 2025 and has since targeted 16 organizations across diverse industries including manufacturing, IT, construction, and finance in regions spanning Asia, Australia, Italy, and the United States.

    Dire Wolf employs a double extortion strategy that not only encrypts victims’ data but also threatens to leak sensitive information publicly.

    The group operates through darknet leak sites and communicates with victims via the Tox messenger platform, stating that their primary motivation is financial gain.

    DireWolf victim board (Source – ASEC)

    Within just months of their emergence, they have demonstrated a sophisticated understanding of enterprise environments and recovery mechanisms.

    ASEC analysts identified several distinctive characteristics that set Dire Wolf apart from other ransomware families.

    The malware demonstrates advanced technical capabilities through its combination of Curve25519 key exchange with ChaCha20 stream encryption, creating unique session keys for each encrypted file.

    DireWolf execution flow (Source – ASEC)

    This cryptographic approach effectively blocks all known decryption methods, leaving victims with no recovery options beyond negotiating with the attackers.

    The ransomware’s execution begins with argument-based control mechanisms, utilizing command-line parameters such as -d for directory targeting and -h for help functions.

    Upon initialization, it performs protection checks using the system-wide mutex Global\direwolfAppMutex and searches for the completion marker C:\runfinish.exe to prevent duplicate infections.

    Advanced Anti-Recovery and Evasion Techniques

    Dire Wolf’s most concerning feature lies in its systematic destruction of recovery infrastructure.

    The malware implements a persistent event log deletion mechanism that continuously monitors and terminates the Windows event log service.

    This process involves executing PowerShell commands to identify the eventlog service process ID through WMI queries:-

    Get-WmiObject -Class win32_service -Filter "name = 'eventlog'" | select -exp ProcessId

    The malware then forcibly terminates the service using taskkill commands in an infinite loop, ensuring that even if administrators restart the service, it remains blocked throughout the attack.

    Encryption structure (Source – ASEC)

    Additionally, Dire Wolf systematically removes system restore points using commands like vssadmin delete shadows /all /quiet and disables Windows Recovery Environment through bcdedit /set {default} recoveryenabled No.

    The ransomware proactively terminates critical processes including databases (MSSQL, Oracle), mail servers (Exchange), virtualization platforms (VMware), and backup software (Veeam, Veritas BackupExec).

    Ransom note (Source – ASEC)

    After completing encryption, it creates the marker file, forces a system reboot with a 10-second delay, and executes a self-deletion routine to remove traces of the malicious executable, significantly complicating forensic analysis and incident response efforts.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post New Dire Wolf Ransomware Attack Windows Systems, Deletes Event Logs and Backup-Related Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability affecting Apache DolphinScheduler’s default permission system has been identified and patched, prompting urgent update recommendations from the Apache Software Foundation.

    The vulnerability, which stems from overly permissive default configurations in the popular workflow scheduling platform, allows unauthorized users to execute arbitrary workflows and access sensitive system resources without proper authentication controls.

    The flaw emerged through the platform’s initialization process, where default administrative privileges were inadvertently granted to newly created user accounts.

    This architectural oversight created significant attack vectors for malicious actors seeking to compromise data processing pipelines and execute unauthorized code within enterprise environments.

    Organizations utilizing DolphinScheduler for critical workflow automation face immediate exposure to data exfiltration and system compromise.

    Initial reports indicate that the vulnerability has already been exploited in limited instances, with attackers leveraging the permission bypass to inject malicious workflows into production environments.

    Apache analysts identified the vulnerability during routine security auditing procedures, discovering that the default user role assignment mechanism failed to properly restrict administrative functions.

    Exploitation Mechanism and Code Analysis

    The vulnerability exploits a flaw in the user authentication module where default permissions are assigned through the following problematic code pattern:

    public void createDefaultUser() {
        User defaultUser = new User();
        defaultUser.setUserType(UserType.ADMIN_USER);
        defaultUser.setPermissions(Permission.ALL);
        userMapper.insert(defaultUser);
    }

    This initialization routine automatically assigns administrative privileges without validating user credentials or implementing proper access controls.

    Attackers can exploit this by creating new accounts during system initialization phases, effectively gaining unrestricted access to workflow management functions and underlying system resources.

    The Apache development team has released version 3.2.1 with enhanced permission validation and secure-by-default configurations, addressing the root cause of this critical security flaw.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Apache DolphinScheduler Default Permissions Vulnerability Fixed – Update Now appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. District Court for the District of Columbia has ordered Google to share critical search data with competitors while allowing the tech giant to retain ownership of its Chrome browser.

    The decision, announced Tuesday by the Department of Justice’s Antitrust Division, represents a significant victory in the government’s ongoing battle against Google’s search monopoly that has dominated the market for over a decade.

    The court’s remedies target Google’s anticompetitive practices without requiring the dramatic step of forcing a Chrome sale. Instead, the ruling focuses on breaking down the exclusionary agreements that have locked competitors out of the search market.

    Google will be prohibited from maintaining exclusive contracts relating to the distribution of Google Search, Chrome, Google Assistant, and the Gemini app across devices and platforms.

    Under the new requirements, Google cannot condition licensing agreements on the placement of its search products or tie revenue-sharing payments to maintaining Google Search as the default option for more than one year.

    The Justice Department’s Antitrust Division analysts noted that these practices created a “self-reinforcing cycle of monopolization” that effectively shut out potential competitors while reducing innovation and consumer choice.

    The most technically significant aspect of the ruling involves mandatory data sharing provisions.

    Google will be required to make certain search index and user-interaction data available to qualified competitors, fundamentally altering the competitive landscape.

    This data sharing requirement addresses one of the primary barriers competitors face when attempting to develop alternative search engines.

    # Example of potential API structure for mandated data access
    class SearchDataAPI:
        def get_search_index(self, query_parameters):
            # Return anonymized search index data
            pass
    
        def get_user_interaction_metrics(self, competitor_id):
            # Provide aggregated user behavior patterns
            pass

    Additionally, Google must offer search and search text ads syndication services to enable rivals to deliver competitive search results.

    This syndication requirement effectively opens Google’s advertising infrastructure to competitors, allowing them to build their own capacity while leveraging Google’s existing technology.

    The ruling stems from a case filed during President Trump’s first term in October 2020, ultimately supported by 49 states, two territories, and the District of Columbia.

    Following a nine-week bench trial in 2023 and a 15-day remedies trial in May 2025, the court concluded that Google violated Section 2 of the Sherman Act by maintaining its monopoly through anticompetitive practices that controlled approximately 90 percent of all U.S. search queries.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Google Won’t Be Forced to Sell Chrome, But Must Share Search Data With Rivals appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated backdoor linked to the notorious Russian cyber-espionage group APT28 allows attackers to exfiltrate data, upload files, and execute commands on compromised computers.

    The new, sophisticated backdoor targets Microsoft Outlook, which allows threat actors to steal data and take control of a victim’s machine.

    The malware, dubbed “NotDoor,” has been attributed to the Russian state-sponsored cyber threat group APT28, also known as Fancy Bear. LAB52 published the findings, the threat intelligence unit of Spanish cybersecurity firm S2 Grupo.

    NotDoor is a stealthy malware written in Visual Basic for Applications (VBA), the scripting language used to automate tasks within Microsoft Office applications.

    The backdoor is designed to monitor a victim’s incoming emails for specific trigger words, such as “Daily Report.” When an email containing the trigger is detected, the malware activates, enabling attackers to execute malicious commands.

    The name ‘NotDoor’ was coined by researchers due to the use of the word ‘Nothing’ within the malware’s code.

    ‘NotDoor’ Malware Attacks Outlook Users

    The malware cleverly abuses legitimate Outlook features to remain hidden and maintain persistence. It uses event-driven VBA triggers, such as Application_MAPILogonComplete, which runs when Outlook starts, and Application_NewMailEx, which is activated upon the arrival of a new email, S2 Grupo said.

    To evade detection by security software, NotDoor employs several sophisticated techniques:

    • Code Obfuscation: The malware’s code is intentionally scrambled with randomized variable names and a custom encoding method to make analysis difficult.
    • DLL Side-Loading: It uses a legitimate, signed Microsoft binary, OneDrive.exe, to load a malicious DLL file. This technique helps the malware appear as a trusted process.
    • Registry Modification: For persistence, NotDoor alters Outlook’s registry settings. It disables security warnings about macros and suppresses other prompts, allowing it to run silently without alerting the user.

    Once active, the backdoor creates a hidden directory to store temporary files, which are then exfiltrated to an attacker-controlled email address (a.matti444@proton[.]me) before being deleted. The malware confirms its successful execution by sending callbacks to a webhook site.

    APT28 is a well-known threat actor linked to Russia’s General Staff Main Intelligence Directorate (GRU). Active for over a decade, the group has been responsible for numerous high-profile cyberattacks, including the 2016 breach of the Democratic National Committee (DNC) during the U.S. presidential election and intrusions into the World Anti-Doping Agency (WADA).

    This new tool demonstrates the group’s continuous evolution and its ability to develop new methods to bypass modern defense mechanisms.

    According to S2 Grupo, the NotDoor malware has already been used to compromise multiple companies across various sectors in NATO member countries.

    To defend against this threat, security experts recommend that organizations disable macros by default across their systems, closely monitor for any unusual activity within Outlook, and inspect email-based triggers that could be exploited by such malware.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post New ‘NotDoor’ Malware Attacks Outlook Users to Exfiltrate Data and Compromise Computers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new backdoor malware has emerged from the shadows, operating undetected for over 20 months while infiltrating networks through an ingenious dual-mode activation system.

    Initially discovered masquerading as a Mirai variant, MystRodX represents a significant evolution in stealth malware design, utilizing DNS queries and ICMP packets as covert communication channels to evade traditional security measures.

    ICMP packet (Source – XLab)

    The malware first surfaced on June 6, 2025, when suspicious activity was detected from IP address 139.84.156.79 distributing an ELF file named dst86.bin.

    Despite conventional scanners classifying it as Mirai with only a 4/65 detection rate on VirusTotal, the threat proved to be entirely different from known Mirai strains.

    XLab’s Cyber Threat Insight and Analysis System analysts identified the true nature of this threat through advanced behavioral analysis, revealing a complex C++ backdoor with unprecedented stealth capabilities.

    What sets MystRodX apart is its passive operational mode, where the malware can remain completely dormant without binding to network ports, making it virtually invisible to standard network monitoring tools.

    The threat operates through a sophisticated triple-layer encryption strategy, employing single-byte XOR for VM detection strings, custom transform algorithms for AES keys and trigger packets, and AES CBC mode for configuration data.

    This multi-tiered approach ensures that sensitive components remain protected even if portions of the malware are discovered.

    The malware’s configuration reveals activation timestamps dating back to January 7, 2024, indicating extensive deployment across compromised systems.

    Specified protocol (Source – XLab)

    Three active command-and-control servers have been identified in the wild, with evidence suggesting additional undiscovered campaigns utilizing distinct RSA key pairs for different attack operations.

    DNS-Based Activation Mechanism

    MystRodX’s most innovative feature lies in its DNS-triggered activation system, which transforms seemingly benign DNS queries into sophisticated command vectors.

    The malware monitors incoming network traffic using raw sockets, analyzing DNS requests that follow the specific format: www.DomainName.com, where the domain name contains encoded activation instructions.

    The activation process begins when the malware encounters a DNS query containing a specially crafted domain.

    For example, a domain like “www.UBw98KzOQyRpoSgk5+ViISKmpC6ubi7vao=.com” serves as the trigger mechanism.

    The encoded portion undergoes Base64 decoding, producing a 32-byte ciphertext that contains the activation payload.

    MagicString (Source – XLab)

    Using a proprietary transform algorithm with predefined magic values (0x0d and 0xaa), the malware decrypts this payload to reveal critical operational parameters including the magic identifier “CAT”, protocol specification (TCP/HTTP), target port number, and command-and-control server IP address.

    # Transform algorithm implementation
    def transform(magic, magic2, buf, key):
        buf_len = len(buf) - 1
        key_len = len(key)
        key1 = magic ^ calc_sum(key)
        key2 = (key[(key1^buf_len)%key_len]) ^ magic2 ^ buf_len
    
        out = bytearray()
        for i, value in enumerate(buf):
            out.append((key[(i^key1)%key_len] ^ key2 ^ value ^ i) & 0xff)
        return out

    Once successfully activated, MystRodX establishes communication with the specified command-and-control infrastructure, transitioning from its passive surveillance state to an active backdoor capable of file management, reverse shell operations, SOCKS proxy functionality, and port forwarding capabilities.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post MystRodX Leveraging DNS and ICMP to Steal Sensitive Data From Hacked Systems appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing operation has been running undetected for over three years across Google Cloud and Cloudflare infrastructure, impersonating major corporations including defense contractor Lockheed Martin.

    The campaign, which utilized advanced cloaking techniques and compromised expired domains, demonstrates a concerning failure in detection capabilities by two of the internet’s largest service providers.

    The operation began with attackers acquiring expired domains that previously belonged to legitimate organizations, then deploying cloned websites of Fortune 500 companies.

    The scheme specifically targeted high-value domains with established reputations and active social media communities, making the impersonations more convincing to unsuspecting users.

    One notable case involved the domain militaryfighterjet.com, which originally hosted content about military aircraft but was transformed into a gambling site that simultaneously served as a perfect clone of Lockheed Martin’s corporate website.

    Clone of Lockheed Martin’s site (Source – Medium)

    The attackers employed sophisticated cloaking technology that presented different content based on the visitor’s user agent and geographic location.

    When accessed by search engine crawlers or through Google search results, users would see legitimate-looking clones of corporate websites.

    However, direct browser access revealed gambling content, creating a dual-purpose infrastructure that evaded automated detection systems while serving illicit content to real users.

    Deep Specter Research analysts identified this massive operation through their investigation of the militaryfighterjet.com domain transformation.

    Their analysis revealed that the infrastructure comprised over 48,000 active virtual hosts organized into 86 distinct clusters, with the majority hosted on Google Cloud platforms in Hong Kong and Taiwan.

    The researchers discovered evidence of the operation dating back to 2021, with significant expansion periods coinciding with major cybersecurity incidents and data breaches worldwide.

    Technical Infrastructure and Attack Methodology

    The campaign’s technical sophistication becomes apparent when examining the underlying infrastructure and deployment methods.

    Deep Specter Research analysts noted that the attackers utilized HTTrack Website Copier, a legitimate web scraping tool, to create pixel-perfect replicas of target organizations’ websites.

    Evidence of this tool’s usage was found embedded in the HTML comments of cloned sites, including timestamps showing when specific sites were copied.

    The operation’s source code analysis revealed strategic implementation details that made detection particularly challenging.

    The cloaking system examined HTTP headers, user agent strings, and IP geolocation data to determine whether visitors were legitimate users, search engine bots, or security researchers.

    Gambling content (Source – Medium)

    This selective content delivery allowed the malicious sites to maintain high search engine rankings while serving gambling content and potential malware to targeted demographics.

    The infrastructure demonstrated remarkable resilience and scalability, with attackers maintaining over 200 cloned brands across multiple industries including military, healthcare, and manufacturing sectors.

    The largest single cluster contained nearly 6,000 virtual hosts serving cloned content of a single organization, suggesting this may represent preparation for a large-scale breach campaign.

    Analysis of the network architecture revealed eight upper-tier management hosts coordinating 78 regular cluster managers, indicating a hierarchical command structure typical of professional cybercriminal operations.

    The attackers strategically leveraged the trusted nature of Google Cloud and Cloudflare infrastructure to bypass security filters and maintain persistence across their extensive network of compromised domains.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Phishing Campaign Went Undetected for Over 3 Years on Google Cloud and Cloudflare appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The maker of F-35 jets is getting paid for on-time delivery, even though it’s not delivering the aircraft on time and without the required upgrades, a government watchdog agency said. 

    “The F-35 program office compensated Lockheed Martin with hundreds of millions of dollars of performance incentive fees while the percentage of aircraft delivered late and the average days late grew,” according to a new report from the Government Accountability Office.  

    Both Lockheed and engine-builder Pratt & Whitney have received incentive fees, but the money has been “largely ineffective” at holding the contractors accountable, according to GAO. The structure of the incentives has allowed Lockheed to deliver F-35s “up to 60 days late” and earn some of the money. 

    “Unless the F-35 program re-evaluates its use of incentive fees and better aligns them to achieving desired production schedule outcomes, it will be at greater risk of continuing to reward contractors for delivering engines and aircraft late,” GAO said. 

    In a statement, Lockheed said it is “dedicated to meeting our customer requirements and delivering on our commitments. We are investing in mission-driven business and digital transformation to ensure we’re able to deliver capability at the speed of relevance.” 

    The report outlined fresh delays with the program’s Block 4 modernization effort and Technology Refresh 3 upgrade—the backbone of Block 4. The program has reduced the amount of capabilities it will deliver with Block 4 as costs have ballooned from $10.6 billion to $16.5 billion, according to an estimate from 2021. (GAO noted that the program does not have an updated cost estimate for Block 4).   

    The reduced set of Block 4 capabilities won’t be finished till 2031—5 years later than the program originally expected to finish the whole Block 4 effort, the report said.

    “According to program officials, the new Block 4 major subprogram will have fewer capabilities, will experience schedule delays, and will have unknown costs until the program office finishes developing its cost estimate,” GAO said. 

    Specifically, the program will delay Block 4 capabilities that require an upgraded engine to work. The effort, called Engine Core Upgrade, was designed to improve the engine’s performance and provide the necessary power for Block 4, but the upgrade has been delayed and production for ECU won’t start until 2031, the report said.

    The jet’s cooling system also needs to be upgraded to handle more cooling beyond Block 4, but production of that upgrade, known as PMTU, won’t start until 2033, the report said.

    In order for Block 4 to work, the program has to finish TR-3—a $1.9 billion software and hardware upgrade that was supposed to be ready in April 2023. In June of this year, Lockheed executives announced the company had finished a combat-capable version of TR-3, but GAO said TR-3 won’t be fully ready until next year. GAO did say that the program plans to begin updating some F-35s with “limited” combat-capable software in July 2025.

    “According to program officials, Lockheed Martin plans to begin delivering combat-capable aircraft with TR-3 that will enable Block 4 capabilities in 2026, a 3-year delay due to hardware and software issues,” GAO said. 

    Asked about GAO’s date for TR-3, Lockheed said it has completed all “TR-3 hardware and software configurations that support the TR-3 contract including design, build and testing.”

    Chronic delays and cost overruns led the Pentagon to stop accepting new F-35s for a year—a pause that ended in July 2024. Since then, the Pentagon has been accepting TR-3 jets with a “truncated” version of the TR-3 package.

    GAO attributed the TR-3 delays to problems with software stability, quality issues and late deliveries with the integrated core processor, and delays with a new suite of sensors, called the Next Generation Distributed Aperture System. 

    Program officials said the new core processor isn’t causing TR-3 delays anymore, but the new aperture system won’t be done until 2026, “making it a key driver for TR-3-enabled capability delays,” GAO said. 

    The F-35 program office did not respond to a request for comment in time for publication. 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Computers with components made of diamond are being installed at Oak Ridge National Laboratory in Tennessee in a bid to marry quantum information technologies with classical computers, the lab announced on Tuesday

    Quantum science promises advances in fields from cryptography to chemistry, but realizing that promise depends on finding a way to connect quantum and classical systems. 

    “By hosting a Quantum Brilliance system on site, we’ll be maturing the real mechanics of hybrid computing — co‑scheduling, end‑to‑end performance tuning, data and workflow orchestration, workforce development and more — so we can eventually move HPC-quantum integration from a conceptual pilot to a fully embedded capability within leadership computing,” said Ashley Barker, who directs Oak Ridge's Leadership Computing Facility Program. 

    Quantum Brilliance’s products use synthetic diamonds to ease the challenges of today's quantum systems, such as external noise that introduces errors into quantum calculations.

    “Diamond is extremely hard, so even at room temperature and atmospheric pressure, there isn’t sufficient thermal energy to generate the vibrations that would typically disrupt qubit coherence,” said CEO Mark Luo. “This intrinsic stability allows our QPUs to function without the complexity and cost of cryogenics, laser and vacuum systems. This allowed us to engineer a revolutionary QPU solution that operates efficiently at room temperature while dramatically reducing size, weight and power consumption.”

    Oak Ridge is among the national labs working on quantum systems with companies and other federal entities.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶