logo
Alaska Airlines grounds all flights after IT outage disrupts systems

Alaska Airlines grounds all flights after IT outage disrupts systems

CNA5 days ago
U.S. carrier Alaska Airlines grounded all of its flights after experiencing an IT outage on Sunday that impacted its systems, the company said, without specifying the nature of the outage.
"At approximately 8 p.m. Pacific on Sunday (0300 GMT on Monday), Alaska Airlines experienced an IT outage that's impacting our operations. We requested a temporary, system-wide ground stop for Alaska and Horizon Air flights," Alaska said in an emailed statement to Reuters on Sunday evening.
The Seattle-based airline said there would be residual impacts to its operations throughout the evening, without providing more specific details.
The FAA did not immediately respond to Reuters' requests for comment outside regular business hours.
The FAA status page showed all destinations being impacted by the ground stop of Alaska's mainline aircraft, and Horizon's ground stop.
Alaska Air Group maintains an operational fleet of 238 Boeing 737 aircraft, and 87 Embraer 175 aircraft, according to its website.
In June, Alaska Air Group-owned Hawaiian Airlines said some of its IT systems were disrupted by a hack. Alaska Air Group said it was still determining the financial impact of the hack.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Two Southwest flight attendants injured after jet moved to avoid another aircraft
Two Southwest flight attendants injured after jet moved to avoid another aircraft

Straits Times

time5 hours ago

  • Straits Times

Two Southwest flight attendants injured after jet moved to avoid another aircraft

Find out what's new on ST website and app. WASHINGTON - Two flight attendants on a Southwest Airlines flight departing from Burbank, California, were injured and being treated on Friday after pilots took evasive action to avoid another aircraft, the airline said. Southwest Flight 1496 sharply descended nearly 500 feet, according to flight tracking websites. The airline and the Federal Aviation Administration said pilots took action after receiving alerts of a potential collision. The Southwest Boeing 737 continued on to Las Vegas, where it landed uneventfully. The FAA is investigating. No passengers were injured, but a passenger identified as Caitlin Burdi told Fox News Digital the sharp descent stirred panic onboard. "We really thought we were plummeting to a plane crash," she was quoted as saying. According to a statement from Southwest, the incident began when its crew responded to "two onboard traffic alerts" while taking off from Burbank, "requiring them to climb and descend to comply with the alerts." Top stories Swipe. Select. Stay informed. Asia Cambodia calls for ceasefire with Thailand after deadly clashes Asia 'Nothing like this has happened before': At least 16 dead as Thai-Cambodian conflict continues Multimedia Lights dim at South-east Asia's scam hub but 'pig butchering' continues Singapore SMRT to pay lower fine of $2.4m for EWL disruption; must invest at least $600k to boost reliability Business Banking and finance jobs will change but won't disappear as AI becomes the new normal: Accenture Singapore Tipsy Collective sues former directors, HR head; alleges $14m lost from misconduct, poor decisions Asia Hottest 'ticket' in Jakarta? Young Indonesians compete for a slot at singing club Singapore Kopi, care and conversation: How this 20-year-old helps improve the well-being of the elderly The incident came a week after a SkyWest Airlines jet operating as a Delta Connection flight from Minneapolis reported taking evasive action to avoid a possible collision with a U.S. Air Force bomber during a landing approach over North Dakota. The FAA said on Monday it was investigating last Friday's near-miss incident involving SkyWest Flight 3788, an Embraer ERJ-175 regional jet, which landed safely at Minot, North Dakota. The Air Force confirmed a B-52 aircraft assigned to Minot Air Force Base had conducted a flyover of the North Dakota State Fair last Friday and that military investigators were looking into the matter. REUTERS

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report
Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report

CNA

time5 hours ago

  • CNA

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report

Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, Bloomberg News reported on Friday (Jul 25). A security patch Microsoft released this month failed to fully fix a critical flaw in the US tech giant's SharePoint server software, opening the door to a sweeping global cyber espionage effort. In a blog post on Tuesday, Microsoft said two allegedly Chinese hacking groups, dubbed "Linen Typhoon" and "Violet Typhoon", were exploiting the weaknesses, along with a third, also based in China. The tech giant is probing if a leak from the Microsoft Active Protections Program (MAPP) led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the report said. Microsoft said in a statement provided to Reuters that the company continually evaluates "the efficacy and security of all of our partner programs and makes the necessary improvements as needed". A researcher with Vietnamese cybersecurity firm Viettel demonstrated the SharePoint vulnerability in May at the Pwn2Own cybersecurity conference in Berlin. The conference, put on by cybersecurity company Trend Micro's Zero Day Initiative, rewards researchers in the pursuit of ethically disclosing software vulnerabilities. The researcher, Dinh Ho Anh Khoa, was awarded US$100,000 and Microsoft issued an initial patch for the vulnerability in July, but members of the MAPP program were notified of the vulnerabilities on Jun 24, Jul 3 and Jul 7, Dustin Childs, head of threat awareness for the Zero Day Initiative at Trend Micro, told Reuters Friday. Microsoft first observed exploit attempts on Jul 7, the company said in the Tuesday blog post. Childs told Reuters that "the likeliest scenario is that someone in the MAPP program used that information to create the exploits". It's not clear which vendor was responsible, Childs said, "but since many of the exploit attempts come from China, it seems reasonable to speculate it was a company in that region". It would not be the first time that a leak from the MAPP program led to a security breach. More than a decade ago, Microsoft accused a Chinese firm, Hangzhou DPTech Technologies, of breaching its non-disclosure agreement and expelled it from the program. 'We recognise that there is the potential for vulnerability information to be misused,' Microsoft said in a 2012 blog post, around the time that information first leaked from the program. 'In order to limit this as much as possible, we have strong non-disclosure agreements (NDA) with our partners. Microsoft takes breaches of its NDAs very seriously.' Any confirmed leak from MAPP would be a blow to the program, which is meant to give cyber defenders the upper hand against hackers who race to parse Microsoft updates for clues on how to develop malicious software that can be used against still-vulnerable users. Launched in 2008, MAPP was meant to give trusted security vendors a head start against the hackers, for example, by supplying them with detailed technical information and, in some cases, 'proof of concept' software that mimics the operation of genuine malware.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store