Connect with us
DAPA Banner

Tech

Mythos autonomously exploited vulnerabilities that survived 27 years of human review. Security teams need a new detection playbook

Published

on

A 27-year-old bug sat inside OpenBSD’s TCP stack while auditors reviewed the code, fuzzers ran against it, and the operating system earned its reputation as one of the most security-hardened platforms on earth. Two packets could crash any server running it. Finding that bug cost a single Anthropic discovery campaign approximately $20,000. The specific model run that surfaced the flaw cost under $50.

Anthropic’s Claude Mythos Preview found it. Autonomously. No human guided the discovery after the initial prompt.

The capability jump is not incremental

On Firefox 147 exploit writing, Mythos succeeded 181 times versus 2 for Claude Opus 4.6. A 90x improvement in a single generation. SWE-bench Pro: 77.8% versus 53.4%. CyberGym vulnerability reproduction: 83.1% versus 66.6%. Mythos saturated Anthropic’s Cybench CTF at 100%, forcing the red team to shift to real-world zero-day discovery as the only meaningful evaluation left. Then it surfaced thousands of zero-day vulnerabilities across every major operating system and every major browser, many one to two decades old. Anthropic engineers with no formal security training asked Mythos to find remote code execution vulnerabilities overnight and woke up to a complete, working exploit by morning, according to Anthropic’s red team assessment.

Anthropic assembled Project Glasswing, a 12-partner defensive coalition including CrowdStrike, Cisco, Palo Alto Networks, Microsoft, AWS, Apple, and the Linux Foundation, backed by $100 million in usage credits and $4 million in open-source grants. Over 40 additional organizations that build or maintain critical software infrastructure also received access. The partners have been running Mythos against their own infrastructure for weeks. Anthropic committed to a public findings report “within 90 days,” landing in early July 2026.

Advertisement

Security directors got the announcement. They didn’t get the playbook.

“I’ve been in this industry for 27 years,” Cisco SVP and Chief Security and Trust Officer Anthony Grieco told VentureBeat in an exclusive interview at RSAC 2026. “I have never been more optimistic for what we can do to change security because of the velocity. It’s also a little bit terrifying because we’re moving so quickly. It’s also terrifying because our adversaries have this capability as well, and so frankly, we must move this quickly.”

Security directors saw this story told fifteen different ways this week, including VentureBeat’s exclusive interview with Anthropic’s Newton Cheng. As one widely shared X post summarizing the Mythos findings noted, the model cracked cryptography libraries, broke into a production virtual machine monitor, and gave engineers with zero security training working exploits by morning. What that coverage left unanswered: Where does the detection ceiling sit in the methods they already run, and what should they change before July?

Seven vulnerability classes that show where every detection method hits its ceiling

  1. OpenBSD TCP SACK, 27 years old. Two crafted packets crash any server. SAST, fuzzers, and auditors missed a logic flaw requiring semantic reasoning about how TCP options interact under adversarial conditions. Campaign cost ~$20,000. Anthropic notes the $50 per-run figure reflects hindsight.

  2. FFmpeg H.264 codec, 16 years old. Fuzzers exercised the vulnerable code path 5 million times without triggering the flaw, according to Anthropic. Mythos caught it by reasoning about code semantics. Campaign cost ~$10,000.

  3. FreeBSD NFS remote code execution, CVE-2026-4747, 17 years old. Unauthenticated root from the internet, per Anthropic’s assessment and independent reproduction. Mythos built a 20-gadget ROP chain split across multiple packets. Fully autonomous.

  4. Linux kernel local privilege escalation. Mythos chained two to four low-severity vulnerabilities into full local privilege escalation via race conditions and KASLR bypasses. CSA’s Rich Mogull noted Mythos failed at remote kernel exploitation but succeeded locally. No automated tool chains vulnerabilities today.

  5. Browser zero-days across every major browser. Thousands identified. Some required human-model collaboration. In one case, Mythos chained four vulnerabilities into a JIT heap spray, escaping both the renderer and the OS sandboxes. Firefox 147: 181 working exploits versus two for Opus 4.6.

  6. Cryptography library vulnerabilities (TLS, AES-GCM, SSH). Implementation flaws enabling certificate forgery or decryption of encrypted communications, per Anthropic’s red team blog and Help Net Security. A critical Botan library certificate bypass was disclosed the same day as the Glasswing announcement. Bugs in the code that implements the math. Not attacks on the math itself.

  7. Virtual machine monitor guest-to-host escape. Guest-to-host memory corruption in a production VMM, the technology keeping cloud workloads from seeing each other’s data. Cloud security architectures assume workload isolation holds. This finding breaks that assumption.

Nicholas Carlini, in Anthropic’s launch briefing: “I’ve found more bugs in the last couple of weeks than I found in the rest of my life combined.”

VentureBeat’s prescriptive matrix

Vulnerability Class

Advertisement

Why Current Methods Miss It

What Mythos Does

Security Director Action

OS kernel logic (OpenBSD 27yr, Linux 2-4 chain)

Advertisement

SAST lacks semantic reasoning. Fuzzers miss logic flaws. Pen testers time-boxed. Bounties scope-exclude kernel.

Chains 2-4 low-severity findings into local priv-esc. ~$20K campaign.

Add AI-assisted kernel review to pen test RFPs. Expand bounty scope. Request Glasswing findings from OS vendors before July. Re-score clustered findings by chainability.

Media codec (FFmpeg 16yr H.264)

Advertisement

SAST unflagged. Fuzzers hit path 5M times, never triggered.

Reasons about semantics beyond brute-force. ~$10K campaign.

Inventory FFmpeg, libwebp, ImageMagick, libpng. Stop treating fuzz coverage as security proxy. Track Glasswing codec CVEs from July.

Network stack RCE (FreeBSD 17yr, CVE-2026-4747)

Advertisement

DAST limited at protocol depth. Pen tests skip NFS.

Full autonomous chain to unauthenticated root. 20-gadget ROP chain.

Patch CVE-2026-4747 now. Inventory NFS/SMB/RPC services. Add protocol fuzzing to 2026 cycle.

Multi-vuln chaining (2-4 sequenced, local)

Advertisement

No tool chains. Pen testers hours-limited. CVSS scores in isolation.

Autonomous local chaining via race conditions + KASLR bypass.

Require AI-assisted chaining in pen test methodology. Build chainability scoring. Budget AI red teams for 2026.

Browser zero-days (thousands, 181 Firefox exploits)

Advertisement

Bounties + continuous fuzzing missed thousands. Some required human-model collaboration.

90x over Opus 4.6. Chained 4 vulns into JIT heap spray escaping renderer + OS sandbox.

Shorten patch SLA to 72hr critical. Pre-stage pipeline for July cycle. Pressure vendors for Glasswing timelines.

Crypto libraries (TLS, AES-GCM, SSH, Botan bypass)

Advertisement

SAST limited on crypto logic. Pen testers rarely audit crypto depth. Formal verification not standard.

Found cert forgery + decryption flaws in battle-tested libraries.

Audit all crypto library versions now. Track Glasswing crypto CVEs from July. Accelerate PQC migration.

VMM / hypervisor (guest-to-host memory corruption)

Advertisement

Cloud security assumes isolation. Few pen tests target hypervisor. Bounties rarely scope VMM.

Guest-to-host escape in production VMM.

Inventory hypervisor/VMM versions. Request Glasswing findings from cloud providers. Reassess multi-tenant isolation assumptions.

Attackers are faster. Defenders are patching once a year.

The CrowdStrike 2026 Global Threat Report documents a 29-minute average eCrime breakout time, 65% faster than 2024, with an 89% year-over-year surge in AI-augmented attacks. CrowdStrike CTO Elia Zaitsev put the operational reality plainly in an exclusive interview with VentureBeat. “Adversaries leveraging agentic AI can perform those attacks at such a great speed that a traditional human process of look at alert, triage, investigate for 15 to 20 minutes, take an action an hour, a day, a week later, it’s insufficient,” Zaitsev said. A $20,000 Mythos discovery campaign that runs in hours replaces months of nation-state research effort.

Advertisement

CrowdStrike CEO George Kurtz reinforced that timeline pressure on LinkedIn the same day as the Glasswing announcement. “AI is creating the largest security demand driver since enterprises moved to the cloud,” Kurtz wrote. The regulatory clock compounds the operational one. The EU AI Act’s next enforcement phase takes effect August 2, 2026, imposing automated audit trails, cybersecurity requirements for every high-risk AI system, incident reporting obligations, and penalties up to 3% of global revenue. Security directors face a two-wave sequence: July’s Glasswing disclosure cycle, then August’s compliance deadline.

Mike Riemer, Field CISO at Ivanti and a 25-year US Air Force veteran who works closely with federal cybersecurity agencies, told VentureBeat what he is hearing from the government. “Threat actors are reverse engineering patches, and the speed at which they’re doing it has been enhanced greatly by AI,” Riemer said. “They’re able to reverse engineer a patch within 72 hours. So if I release a patch and a customer doesn’t patch within 72 hours of that release, they’re open to exploit.” Riemer was blunt about where that leaves the industry. “They are so far in front of us as defenders,” he said.

Grieco confirmed the other side of that collision at RSAC 2026. “If you talk to an operational team and many of our customers, they’re only patching once a year,” Grieco told VentureBeat. “And frankly, even in the best of circumstances, that is not fast enough.”

CSA’s Mogull makes the structural case that defenders hold the long-term advantage: fix a vulnerability once and every deployment benefits. But the transition period, when attackers reverse-engineer patches in 72 hours and defenders patch once a year, favors offense.

Advertisement

Mythos is not the only model finding these bugs. Researchers at AISLE, an AI cybersecurity startup, tested Anthropic’s showcase vulnerabilities on small, open-weights models and found that eight out of eight detected the FreeBSD exploit. AISLE says one model had only 3.6 billion parameters and costs 11 cents per million tokens, and that a 5.1-billion-parameter open model recovered the core analysis chain of the 27-year-old OpenBSD bug. AISLE’s conclusion: “The moat in AI cybersecurity is the system, not the model.” That makes the detection ceiling a structural problem, not a Mythos-specific one. Cheap models find the same bugs. The July timeline gets shorter, not longer.

Over 99% of the vulnerabilities Mythos has identified have not yet been patched, per Anthropic’s red team blog. The public Glasswing report lands in early July 2026. It will trigger a high-volume patch cycle across operating systems, browsers, cryptography libraries, and major infrastructure software. Security directors who have not expanded their patch pipeline, re-scoped their bug bounty programs, and built chainability scoring by then will absorb that wave cold. July is not a disclosure event. It is a patch tsunami.

What to tell the board

Every security director tells the board “we have scanned everything.” Merritt Baer, CSO at Enkrypt AI and former Deputy CISO at AWS, told VentureBeat that the statement does not survive Mythos without a qualifier.

“What security leaders actually mean is: we have exhaustively scanned for what our tools know how to see,” Baer said in an exclusive interview with VentureBeat. “That’s a very different claim.”

Advertisement

Baer proposed reframing residual risk for boards around three tiers: known-knowns (vulnerability classes your stack reliably detects), known-unknowns (classes you know exist but your tools only partially cover, like stateful logic flaws and auth boundary confusion), and unknown-unknowns (vulnerabilities that emerge from composition, how safe components interact in unsafe ways). “This is where Mythos is landing,” Baer said.

The board-level statement Baer recommends: “We have high confidence in detecting discrete, known vulnerability classes. Our residual risk is concentrated in cross-function, multi-step, and compositional flaws that evade single-point scanners. We are actively investing in capabilities that raise that detection ceiling.”

On chainability, Baer was equally direct. “Chainability has to become a first-class scoring dimension,” she said. “CVSS was built to score atomic vulnerabilities. Mythos is exposing that risk is increasingly graph-shaped, not point-in-time.” Baer outlined three shifts security programs need to make: from severity scoring to exploitability pathways, from vulnerability lists to vulnerability graphs that model relationships across identity, data flow, and permissions, and from remediation SLAs to path disruption, where fixing any node that breaks the chain gets priority over fixing the highest individual CVSS.

“Mythos isn’t just finding missed bugs,” Baer said. “It’s invalidating the assumption that vulnerabilities are independent. Security programs that don’t adapt, from coverage thinking to interaction thinking, will keep reporting green dashboards while sitting on red attack paths.”

Advertisement

VentureBeat will update this story with additional operational details from Glasswing’s founding partners as interviews are completed.

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

The FAA is encouraging gamers to get jobs in air traffic control

Published

on

Sick! The Federal Aviation Administration is targeting gamers in its most recent job advertisement for air traffic controllers. The administration’s annual hiring window opens at 12AM ET on April 17, and considering the ongoing shortage of air traffic controllers, it’s calling this a period of “supercharged hiring.” Rad! The FAA’s YouTube video draws parallels between gaming and directing air traffic, and notes that the average salary for the role after three years is $155,000. Hella!

The FAA is clearly seeking players who are at least old enough to remember the Xbox One and Bjergsen in the LCS, which puts would-be candidates around their early 20s at least. It’s either that, or the ad editors really just picked videos at random from the pile of stock footage marked gamerz. But I won’t lie, it made me smile to see that Xbox One logo appear out of nowhere. Nostalgia is a hell of a thing.

“To reach the next generation of air traffic controllers, we need to adapt,” US Transportation Secretary Sean P. Duffy said. “This campaign’s innovative communication style and focus on gaming taps into a growing demographic of young adults who have many of the hard skills it takes to be a successful controller.”

The FAA has been losing more air traffic controllers than it can hire and retain since the 2010s, and this trend only worsened during the pandemic in the 2020s, according to a report released in December by the US Government Accountability Office. The administration increased hiring every year since 2021, but at the end of 2025 it employed 13,164 air traffic controllers, 6 percent fewer than in 2015, the report said. At the same time, the number of flights in the air traffic control system increased by about 10 percent, to 30.8 million.

Advertisement

Or, as the FAA put it on the ATC hiring page: “Join the BEST AND BRIGHTEST, the elite squad of 14,000 controllers protecting 2.9 million daily passengers.” Applicants must be a US citizen, under 31 (maybe those video editors do know what they’re doing), and be able to speak fluent English. An aptitude test, medical screening and academy training follows, among other steps.

Source link

Continue Reading

Tech

CPUID Site Hijacked To Serve Malware Instead of HWMonitor Downloads

Published

on

Attackers briefly hijacked part of CPUID’s backend and swapped legitimate download links on its site with malware-laced ones. “The issue hit tools like HWMonitor and CPU-Z, with users on Reddit and elsewhere starting to notice something wasn’t right when installers tripped antivirus alerts or showed up under odd names,” reports The Register. From the report: CPUID has since confirmed the breach, pinning it on a compromised backend component rather than tampering with its software builds. “Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised),” one of the site’s owners said in a post on X. “The breach was found and has since been fixed.”

The files themselves appear to have been left alone and remain properly signed, so it doesn’t seem like anyone got into the build process. Instead, the problem sat in front of that, in how downloads were being served. For anyone who hit the site during that stretch, though, that distinction offers little comfort. If the link you clicked had been swapped out, you were pulling whatever it pointed to, whether you realized it or not.

Source link

Continue Reading

Tech

CPUID hacked to deliver malware via CPU-Z, HWMonitor downloads

Published

on

CPUID hacked to deliver malware via CPU-Z, HWMonitor downloads

Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools.

The two utilities have millions of users who rely on them for tracking the physical health of internal computer hardware and for comprehensive specifications of a system.

Users who downloaded either tool reported on Reddit recently that the official download portal points to the Cloudflare R2 storage service and fetches a trojanized version of HWiNFO, another diagnostic and monitoring tool from a different developer.

Wiz

The name of the malicious file is HWiNFO_Monitor_Setup, and running it launches a Russian installer with an Inno Setup wrapper, which is atypical and highly suspicious.

Users reported that downloading the clean hwmonitor_1.63.exe from the direct URL was still possible, indicating that the original binaries were intact, but the distribution links appear to have been poisoned.

Advertisement

The externalized download chain was also confirmed by Igor’s Labs and @vxunderground, who reported that a fairly advanced loader using known techniques, tactics, and procedures (TTPs) is involved.

“As I began poking this with a stick, I discovered this is not your typical run-of-the-mill malware,” stated vxunderground.

“This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly.”

Tweet

The researcher claims that the same threat group targeted users of the FileZilla FTP solution last month, suggesting that the attacker is focusing on widely used utilities.

Advertisement

The downloaded ZIP is flagged by 20 antivirus engines on VirusTotal, although not clearly identified. Some classify it as Tedy Trojan, and others as Artemis Trojan.

Some researchers on Virustotal say that the fake HWiNFO variant is an infostealer malware.

BleepingComputer has contacted CPUID to learn more about what happened, the date of the compromise, the affected versions, and what impacted users should do. A spokesperson has provided the following statement.

“Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised). The breach was found and has since been fixed.” – CPUID

Advertisement

The same person told us that the hackers hit them at a time when the main developer was away on holiday.

Currently, it appears that CPUID has fixed the problem and now serves clean versions for both CPU-Z and HWMonitor.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Source link

Advertisement
Continue Reading

Tech

The Artemis II astronauts are back after a 10-day journey around the moon

Published

on

The Orion capsule carrying the Artemis II astronauts has successfully splashed down off the coast of San Diego at 8:07PM Eastern time on April 10. It signals the conclusion of Artemis II’s 10-day journey around the moon, which is meant to be a test flight for a future mission that would bring humanity back to the lunar surface. The Orion crew module carrying the mission’s astronauts separated from the service module at 7:33 PM. While the service module was designed to burn up in the Earth’s atmosphere, the crew capsule was built to bring the astronauts back home safely.

By 7:53 PM, Orion reached our planet’s upper atmosphere, where a six-minute communication blackout occurred due to the capsule heating up as it started its guided descent. The capsule has 11 parachutes, with its drogue parachutes being deployed at 23,400 feet to stabilize and slow it down. When Orion reached 5,400 feet above the ground, the drogue parachutes were cut off so that the three main parachutes could be deployed. That decreased the capsule’s velocity to 200 feet per second, enabling a safe splashdown.

NASA’s engineers conducted several tests while the capsule was in the water before the recovery team headed to the capsule on inflatable boats to extract the crew from Orion. By 9:34 PM, all four crew members were out of the capsule. They were then hoisted into helicopters and flown to the USS John P. Murtha dock ship, where doctors will assess their health.

Artemis II launched on April 1 with four astronauts on board: NASA’s Reid Wiseman, Victor Glover and Christina Koch, as well as Canadian Space Agency’s Jeremy Hansen. They traveled around the moon for almost 10 days, reaching distances no other crewed mission has before it. The astronauts took photos of the far side of the moon, the side we don’t see from our planet, including amazing closeups of the lunar surface using their smartphones. That makes them the first humans to directly and personally view the lunar far side.

Advertisement

During NASA’s post-splashdown news conference, the agency said it will announce the Artemis III crew soon. Artemis III will rendezvous with one or both commercial landers being developed by SpaceX and Blue Origin in low Earth orbit, which will take humans to the lunar surface. It will test the lander’s ability to dock with Orion before NASA lands humans on the moon again.

Source link

Continue Reading

Tech

Artemis II Astronauts Are Home Safe

Published

on

screenshot-20260401-142311-youtube

Here’s the astronauts’ out-of-this-world menu.

NASA Screenshot by Corinne Reichert/CNET

Astronaut eats: they’re not just Tang and Space Food Sticks these days. NASA shared a look at the menu for the Artemis II astronauts, and it doesn’t sound half bad.

The Artemis II crew will enjoy more than 10 types of beverages, including coffee, mango-peach smoothies, green tea, apple cider, lemonade, a pineapple drink, cocoa and breakfast drinks flavored in their choice of chocolate, vanilla or strawberry. 

Advertisement

The most common food items they’ll eat include tortillas, wheat flat bread, vegetable quiche, barbecued beef brisket, mango salad, granola with blueberries, macaroni and cheese, tropical fruit salad, couscous with nuts, broccoli au gratin, spicy green beans, almonds, cashews, and butternut squash cauliflower.

NASA also reports that the astronauts can choose to spice up their meals — there are five different hot sauces available to the crew. And culinary flavorings available include maple syrup, chocolate spread, peanut butter, spicy mustard, strawberry jam, honey, cinnamon and almond butter. Sweet treats include cookies, chocolate, pudding, cake, candy-coated almonds and cobbler.

And, no, they’re not popping a flavor pill or sucking a sandwich out of a tube, like old sci-fi shows told us.

“Food aboard Orion is ready-to-eat, rehydratable, thermostabilized or irradiated,” NASA says. “The crew uses Orion’s potable water dispenser to rehydrate foods and beverages and a compact, briefcase-style food warmer to heat meals as needed.”

Advertisement

Source link

Continue Reading

Tech

Today’s NYT Mini Crossword Answers for April 11

Published

on

Looking for the most recent Mini Crossword answer? Click here for today’s Mini Crossword hints, as well as our daily answers and hints for The New York Times Wordle, Strands, Connections and Connections: Sports Edition puzzles.


Need some help with today’s Mini Crossword? It’s the longest of the week, the Saturday edition. Read on for all the answers. And if you could use some hints and guidance for daily solving, check out our Mini Crossword tips.

If you’re looking for today’s Wordle, Connections, Connections: Sports Edition and Strands answers, you can visit CNET’s NYT puzzle hints page.

Advertisement

Read more: Tips and Tricks for Solving The New York Times Mini Crossword

Let’s get to those Mini Crossword clues and answers.

completed-nyt-mini-crossword-puzzle-for-april-11-2026.png

The completed NYT Mini Crossword puzzle for April 11, 2026.

Advertisement

NYT/Screenshot by CNET

Mini across clues and answers

1A clue: N.B.A. team that plays at M.S.G.
Answer: KNICKS

7A clue: Guy with a nerdy, passionate interest
Answer: FANBOY

8A clue: Rudely merges
Answer: CUTSIN

Advertisement

9A clue: Standard number of bowling pins
Answer: TEN

10A clue: Inflated sense of one’s own importance
Answer: BIGEGO

13A clue: Arrived via airplane
Answer: FLEWIN

14A clue: History-making achievements, perhaps
Answer: FIRSTS

Advertisement

Mini down clues and answers

1D clue: Colonel Sanders’s fast-food chain
Answer: KFC

2D clue: Spiral-shelled mollusks
Answer: NAUTILI

3D clue: 1, 2 or 3, but not 1.23
Answer: INTEGER

4D clue: “60 Minutes” producer
Answer: CBSNEWS

Advertisement

5D clue: Colorful pond fish
Answer: KOI

6D clue: Thesaurus listing: Abbr.
Answer: SYN

10D clue: Closest pal, for short
Answer: BFF

11D clue: “Go on, ___!” (“Scram!”)
Answer: GIT

Advertisement

12D clue: Opposite of offs
Answer: ONS

Source link

Advertisement
Continue Reading

Tech

iPhone Fold, MacBook Neo, and iPhones in Space, on the AppleInsider Podcast

Published

on

There is a huge amount to say about the latest iPhone Fold rumors, and a lesson for Apple in how the MacBook Neo could even be too successful, on the AppleInsider Podcast.

Close-up of a silver smartphone's rear, highlighting three raised camera lenses, flash, and buttons along the side, held in a hand with blurred background and ai logo overlay
Even on Earth, iPhones are so light they feel as if they could float

After months or even really years of rumors and expectations over the iPhone Fold, it really does look as if one is coming. There’s still the issue of when, as conflicting reports are arguing over a range of dates, but they all agree it’s coming.
Not all of them can agree on why, though. If only to save you unnecessarily buying the single most expensive iPhone ever conceived, we’ve got reasons why you should and shouldn’t buy it. And we’ve got reasons why it will probably be worth waiting.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

NYT Connections hints and answers for Saturday, April 11 (game #1035)

Published

on

Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing ‘today’s game’ while others are playing ‘yesterday’s’. If you’re looking for Friday’s puzzle instead then click here: NYT Connections hints and answers for Friday, April 10 (game #1034).

Good morning! Let’s play Connections, the NYT’s clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

Advertisement

Source link

Advertisement
Continue Reading

Tech

NASA Artemis II splashes down in Pacific Ocean in ‘perfect’ landing for Moon mission

Published

on

After 10 days, the four astronauts aboard the Orion spacecraft have returned to Earth, their mission around the Moon a success.

Integrity, the name of the crew’s spacecraft as part of NASA’s Artemis II mission, splashed down in the Pacific Ocean off the coast of San Diego, California, at 5:07 p.m. Pacific Time, according to NASA. The four crew members aboard — three Americans and one Canadian — were all in “green” (or safe and healthy) condition after the Orion craft’s “perfect” landing.

The crew was composed of Commander Reid Wiseman, pilot Victor Glover, and mission specialists Christina Koch and Jeremy Hansen. From liftoff to splashdown, the quartet was in space for just over nine days (with NASA rounding up and calling it a 10-day mission).

Advertisement

Artemis II was NASA’s first mission to the Moon’s orbit in more than 50 years. The crew traveled farther from Earth than humans ever have before — reaching an estimated 252,760 miles from our planet. During their journey, the crew orbited the Moon, taking photos from their flyby of never-before-seen parts of the surface, and even witnessing a total solar eclipse. They identified new craters, naming one after Wiseman’s wife Carroll, who died of cancer in 2020.

“These were the ambassadors to the stars that we sent out there,” Jared Isaacman, NASA’s administrator, said after the landing. “I can’t imagine a better crew. It was a perfect mission.”

Isaacman, a commercial astronaut who has been on two private orbital missions, also took to X to celebrate the mission and signaled there would be more to come, noting that America is back in the business.

“America is back in the business of sending astronauts to the Moon and bringing them home safely,” he wrote on X, later giving credit to the entire NASA workforce. “This was a test mission, the first crewed flight of SLS and Orion, pushing farther into the unforgiving environment of space than ever before, and it carried real risk. They accepted that risk for all we stood to learn and for the exciting missions that follow, as we return to the lunar surface, build a Moon base, and prepare for what comes next.”

Advertisement

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Advertisement

Source link

Continue Reading

Tech

Artemis 2 crew makes triumphant splashdown at the end of humanity’s first trip around the moon since 1972

Published

on

NASA’s Orion spacecraft splashes into the Pacific Ocean, as seen in an overhead view. (NASA via YouTube)

Four astronauts and their Orion space capsule splashed down in the Pacific Ocean today, bringing the first crewed trip around the moon and back since 1972 to a successful end.

“What a journey!” mission commander Reid Wiseman said moments after splashdown.

During their 10-day odyssey, the crew of NASA’s Artemis 2 mission — Wiseman, pilot Victor Glover, mission specialist Christina Koch and Canadian astronaut Jeremy Hansen — became the most distant human travelers in history, swinging more than 4,000 miles past the moon’s far side. Koch is the first woman to venture beyond Earth orbit, Glover is the first Black astronaut to do so, and Hansen is the first non-U.S. astronaut to make such a trip.

The flight tested the Artemis program’s hardware and procedures to prepare the way for sending astronauts all the way to the lunar surface by as early as 2028, and for building a permanent lunar base in the 2030s.

“It’s the most important human spaceflight mission I think we’ve done in many decades, in terms of what it meant historically, but also what it means for the future of the agency,” NASA Associate Administrator Amit Kshatriya said at a post-splashdown news conference.

Advertisement

Orion’s hardware — including components built in the Seattle area — came through when it counted. Two sets of thrusters for Orion were built by L3Harris’ Aerojet Rocketdyne team in Redmond, Wash., while mechanisms that were made by Karman Space & Defense in Mukilteo, Wash., facilitated the safe deployment of Orion’s parachutes in the mission’s final minutes.

NASA calculated that Orion traveled 700,237 miles in all, from its launch atop a massive Space Launch System rocket on April 1 to its splashdown off the coast of California at 5:07 p.m. PT.

Textbook end to a history-making trip

The final hour of the mission unfolded as NASA planned. After jettisoning its European-built service module, the Orion crew module — christened Integrity by the astronauts — hit the atmosphere at a speed of more than 24,000 mph. The shock of re-entry created a plasma field around the spacecraft that blacked out radio communications for six minutes.

The crew endured G-forces that ranged up to 3.9 times the force of Earth’s gravity — about what they felt during launch — and Orion’s heat shield endured temperatures of 4,000 to 5,000 degrees Fahrenheit. The trajectory for Orion’s descent was designed to reduce the stress on the heat shield, after NASA discovered that the heat shield for an earlier uncrewed round-the-moon mission, Artemis 1, underwent more serious charring than expected.

Advertisement

“This is the true test of our trajectory,” NASA commentator Rob Navias said.

Orion passed the test: “Houston, Integrity: We have you loud and clear,” Wiseman told Mission Control when the blackout ended, sparking a cheer from ground controllers.

The spacecraft’s parachutes deployed on cue, and Orion’s descent slowed to a speed of 19 mph by the time it hit the water in the Pacific southwest of San Diego.

Moments after splashdown, Wiseman reported that all four of the astronauts were in good health. Orion’s airbags were inflated with helium to help stabilize the floating craft.

Advertisement

“It was a textbook mission,” Navias said.

Recovery teams converged on the touchdown site, hampered somewhat by a glitch that arose with the crew’s satellite phone connection. Mission Control was able to stay in two-way contact with the crew via radio, however, and assisted with troubleshooting.

The astronauts were brought out from the spacecraft and hoisted up to helicopters for transfer to the USS John P. Murtha, an amphibious transport dock ship that served as the lead ship in the recovery effort. After undergoing medical checks, they were to be brought to shore in San Diego — and on Saturday, they’ll be flown to Johnson Space Center in Houston. Meanwhile, the Orion capsule will be towed back onto the USS John P. Murtha’s well deck for transport.

Back at Mission Control, members of the Artemis 2 team hugged each other as they watched the video from the Pacific. “The mission is over, but the melody lingers on,” Navias said.

Advertisement
Recovery team members bring Artemis 2’s astronauts out of the Orion spacecraft and onto a raft known as the “Front Porch” in preparation for transport to the USS John P. Murtha in the Pacific Ocean. (NASA via YouTube)

On the ship, NASA Administrator Jared Isaacman said he “couldn’t be more proud of the entire workforce” at the space agency.

“The childhood Jared can’t believe what I just saw,” said Isaacman, who was born 10 years after the final Apollo moon mission in 1972. “I’ve almost been waiting my whole life to see this.”

He pledged that Artemis 2’s round-the-moon trip wouldn’t be a once-in-a-lifetime experience. “This is just the beginning,” he said. “We are going to get back into doing this with frequency, sending missions to the moon until we land on it in 2028 and start building our base.”

President Donald Trump passed along his congratulations. “The entire trip was spectacular, the landing was perfect and, as President of the United States, I could not be more proud!” Trump wrote in a post on Truth Social. “I look forward to seeing you all at the White House soon. We’ll be doing it again and then, next step, Mars!”

Looking back, looking ahead

Even though Artemis 2 was primarily an engineering test mission, the trip also brought scientific benefits. The astronauts conducted a wide-angle survey of the lunar far side, and described areas that the Apollo program’s astronauts couldn’t see with their own eyes due to lighting conditions and a closer-in orbital perspective.

Advertisement

At the beginning and end of their swing around the moon, the Artemis 2 crew captured stunning images of Earthset and Earthrise, stirring the same feelings of awe that were sparked by Apollo 8’s original Earthrise image in 1968. The astronauts also witnessed an unearthly kind of solar eclipse that created an eerie glow around the darkened moon.

The upper image shows Earthrise during Apollo 8’s trip around the moon in 1968. The lower image shows Earthset during Artemis 2’s trip around the moon this week. (NASA Photos)
Artemis 2's view of solar eclipse
A darkened moon is backlit by scattered sunlight during an eerie solar eclipse observed by the Artemis 2 crew. (NASA Photo)

The astronauts were 252,756 miles from Earth at the farthest point of their trip, which exceeded the previous record set by Apollo 13 in 1970 by 4,101 miles.

Even though it was a textbook mission, not everything went perfectly. The first toilet to be installed in a spacecraft that was sent beyond Earth orbit acted up during the outbound leg of the journey, apparently due to ice that blocked a wastewater vent line. “Nailing this capability is one that we need to certainly work on,” Isaacman said at the time.

NASA also detected a slight helium leak in the pressurization system for the oxidizer tank on Orion’s service module. The leak didn’t pose a problem for Artemis 2, but Kshatriya said the system might have to be redesigned for the lunar landing mission in 2028.

Meanwhile, SpaceX and Blue Origin are still working on the landing systems that will be needed to get future astronauts to the lunar surface. NASA is planning to test-drive SpaceX’s Starship lander and/or Blue Origin’s Blue Moon lander in low Earth orbit next year during Artemis 3.

Advertisement

If all goes according to plan, one of those landers would facilitate the first lunar landing since 1972 during the Artemis 4 mission in early 2028, and the crew of Artemis 5 would begin work on a base near the moon’s south pole in late 2028.

As a warmup, Jeff Bezos’ Blue Origin space venture is gearing up to send an uncrewed version of the Blue Moon lander, known as Endurance, to the moon’s south polar region later this year. That region is a prime target for lunar exploration and settlement because its craters are thought to harbor reserves of ice that could be converted to drinkable water and breathable oxygen, plus hydrogen that could be used as rocket fuel.

Today Blue Origin CEO Dave Limp added his congratulations on a successful Artemis 2 mission, calling it “this generation’s Apollo moment.”

“On to Artemis III!” he said in a post to X.

Advertisement

Source link

Continue Reading

Trending

Copyright © 2025