Thousands report outage with Google Cloud: Downdetector
Reports started flooding in shortly before 2 p.m.
More Local News
By 2:20 p.m., over 13,000 reports of outages had been submitted. The majority of issues being reported were related to connecting to the server.
Additionally, thousands of reports have been submitted regarding outages with Google, Google Meet, and Google Nest.
Google Cloud Service Health reports that multiple GCP products were impacted by an Identity and Access Management Service Issue. As of 3:30 p.m., Google reported that all regions across the U.S. except for US-Central1, which includes Iowa, have fully recovered.
Ben Mitchell is a digital content producer from Vermont who has covered both local and international news since 2021. He joined PIX11 in 2024. See more of his work here.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
an hour ago
- Forbes
Warning—This Is How Easy It Is To Steal All Your Passwords
Stealing passwords has never been easier Microsoft and Google users in particular have been inundated in recent weeks with warnings to ditch passwords for passkeys. And rightly so. These are the passwords that unlock much of your digital life, and it's never been easier to steal them. Microsoft is moving fastest when it comes to leaving passwords behind, confirming its intent to delete passwords for more than a billion users. Google is not too far behind, warning that most of its account holders need to add passkeys to their accounts. Passkeys use your device security to sign into your account, rather than a user name and password. As such, there's no password to steal or breach, there aren't even any two factor authentication codes to bypass or share. It's 'phishing resistant.' With perfect timing, the team at Okta has just warned it has observed threat actors abusing v0, a breakthrough GenAI tool created by Vercelopens to develop phishing sites that impersonate legitimate sign-in webpages.' There's even a video showing how this works — and it should worry anyone still relying on passwords to log into key accounts, even if they're backed up by 2FA and especially if that 2FA is nothing better than SMS, which is now little better than nothing at all. 'This signals a new evolution in the weaponization of GenAI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts,' Okta says. 'This technology [is]Watch the video on Okta's website While it may surprise users how easily a sign-in page can be replicated, is should not surprise them that 'today's threat actors are actively experimenting with and weaponizing leading GenAI tools to streamline and enhance their phishing capabilities.' Gone are are the days of clumsy imagery and texts and fake sign-in pages that can be detected in an instant. These latest attacks need a technical solution. The advice remains to add passkeys to any account where it's available, and then to stop using passwords to access those accounts. You should also ensure any passwords that need to remain on accounts are long and unique and backed up by non-SMS 2FA. The best form of easy-to-use 2FA is an authenticator app on your smartphone, these are quasi passkeys as they link to your hardware, albeit they're not as good as passkeys and still can be open to interception and users being tricked into sharing codes. Okta says this 'highlights a critical new vector in the phishing landscape. As GenAI tools become more powerful and accessible, organizations and their security teams must adapt to the reality of AI-driven social engineering and credential harvesting attacks.'


Android Authority
2 hours ago
- Android Authority
US Mobile's firecracker $249 Pixel 9 deal is coming back for the Fourth of July
Edgar Cervantes / Android Authority TL;DR US Mobile is bringing back its $249 Pixel 9 deal for new and existing customers. The offer discounts the Google flagship by a whopping 68% The deal goes live on Friday, July 4, 2025. US Mobile is once again getting ready to offer its wild Pixel 9 deal, which will see the $799 phone drop down to just $249 on the carrier. The deal is valid for both new and existing US Mobile customers. The only catch is that the device will be locked to the carrier's network for 90 days of active service. New subscribers can avail themselves of the $249 Pixel 9 promotion on US Mobile with any unlimited plan, including Unlimited Flex, Unlimited Starter, or Unlimited Premium. Existing US Mobile subscribers on Unlimited or By-the-Gig plans for 90+ days can also participate in the Pixel 9 beta without switching their plans. The new US Mobile deal on the Pixel 9 goes live tomorrow, Friday, July 4, at 11 AM ET and will remain available while supplies last, so hurry up and snag your $249 Pixel 9 before stocks run out. The carrier has already sold out this deal twice before, so there may not be another chance for you to grab the flagship Pixel at this low price. Got a tip? Talk to us! Email our staff at Email our staff at news@ . You can stay anonymous or get credit for the info, it's your choice.


Forbes
3 hours ago
- Forbes
Google Play Store Warning—Find And Delete All Apps On This List
Delete all these apps from your smartphone Here we go again. A list of malicious apps has just been published and smartphone users are being urged to root out and delete any still on their devices. The latest report outs more than 350 apps responsible for more than a billion ad bid requests per day. This latest report comes courtesy of Human Security's Satori team, which says it has 'disrupted IconAds, a massive fraud operation involving hundreds of deceptive mobile apps that hide their presence and deliver unwanted ads.' this app campaign has been under investigation for some time, but is growing its viral presence. Satori says this 'highlights the evolving tactics of threat actors,' and that the scale of threats such as this are similar to BADBOX 2.0, the major IOT threat flagged by the FBI and Google, in which millions of smart TVs and other devices Here is the list of IconAds issued by Human; and here is the list of previously known apps flagged by other researchers before this latest report was published. This AdWare follows on the HiddenAds threat, but on a much larger scale. The malware takes over devices with unwanted fullscreen ads, generating revenue for its handlers. It even changes app icons top avoid detection and removal. Global IconAds campaign 'While these apps often have a short shelf life before they're removed from Google's Play Store,' Sartorial says, 'the continued new releases demonstrate the threat actors' commitment to further adaptation and evolution. Google has now deleted all of apps in the report fromPlay Store, and users with Play Protect enabled will be protected from those apps. But apps are not automatically deleted from devices, and so you should do this manually. In Satori's technical report, it warns that such is the scale of this operation it deployed a dedicated domain for every malicious app, which helped the team compile their list. 'These domains consistently resolve to a specific CNAME and return a specific message; this means that while the domains were different, they very likely shared the same back-end infrastructure or second-level C2. These and other unique parameters allowed Satori researchers to find more of these domains and associate them back to IconAds.' The team also warns that the app obfuscation was highly deceptive. In one instance, an app 'used a variation of the Google Play Store's own icon and name. When opened, it automatically redirects into the official app while working in the background.' Satori says 'the IconAds operation underscores the increasing sophistication of mobile ad fraud schemes. Ongoing collaboration across the digital advertising ecosystem is essential to disrupting these and future fraud operations.'