logo
Crew members set to abandon ship after Red Sea attack

Crew members set to abandon ship after Red Sea attack

Yahoo2 days ago
A ship set ablaze by a series of attacks in the Red Sea is taking on water and crew members are preparing to abandon the vessel.
No one has claimed responsibility for the attack, which include gunfire, rocket-propelled grenades and potentially drone boats being used.
However, the scale of the attack led to the suspicion that Yemen's Houthi rebels carried it out. The rebels acknowledged the attack happened but have not claimed carrying out the assault.
The rebels have launched a series of attacks on ships in the Red Sea corridor in response to the Israel-Hamas war in the Gaza Strip, though they have refrained for months from attacking ships.
The British military's United Kingdom Maritime Trade Operations centre made the announcement about the stricken vessel.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

A Syrian Death Factory Gives Up its Secrets
A Syrian Death Factory Gives Up its Secrets

Wall Street Journal

time2 hours ago

  • Wall Street Journal

A Syrian Death Factory Gives Up its Secrets

SAYDNAYA, Syria—Inside Bashar al-Assad's most-notorious death factory, the hangings had become routine. Once a month, around midnight, the guards at Saydnaya Prison would call the names of the condemned, usually dozens at a time. They wrapped nooses around their necks, then dragged tables from beneath their feet with a scraping that echoed through the building. Those in nearby cells heard a gagging sound as the men choked to death.

Rubio impersonated by AI-generated voice
Rubio impersonated by AI-generated voice

UPI

time2 hours ago

  • UPI

Rubio impersonated by AI-generated voice

July 8 (UPI) -- An unknown party has used artificial intelligence to impersonate Secretary of State Marco Rubio and contact several government and foreign officials, the State Department announced. The State Department on Thursday alerted all diplomatic and consular posts that a Signal account using the display name [email protected] was created in mid-June, The Washington Post reported on Tuesday. "The individual contacted at least five non-department individuals, including three foreign ministers, a U.S. governor and a U.S. member of Congress," the State Department said in the alert, CBS News reported on Tuesday. "The actor left voicemails on Signal for at least two targeted individuals and in one instance sent a text message inviting the individual to communicate on Signal." Other State Department personnel also were impersonated in the fraudulent email, according to the State Department. Impersonating a federal worker or officer with the intent to deceive or to gain something is a federal crime. Such acts do not require extensive knowledge and often succeed due to government officials many times being careless about online security, Hany Farid, a University of California-Berkeley professor in digital forensics, told The Washington Post. "This is precisely why you shouldn't use Signal or other insecure channels for official government use," Farid said. As little as 15 seconds of audio is enough to enable AI to impersonate a particular individual and make it say whatever is desired to obtain the intended result, Farid added. The FBI declined to comment on the Rubio impersonation but May warned U.S. officials that "malicious actors" are using AI to impersonate senior U.S. officials as part of an ongoing "malicious text and voice-messaging campaign," The Washington Post reported. Signal is the same encrypted app that resulted in Defense Secretary Pete Hegseth and others accidentally included a journalist in a group discussion of plans to strike Houthi targets in Yemen in March. A second Signal chat included two members of Hegseth's family.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store