logo
SpaceX sends 24 Starlink satellites to polar orbit in late night launch

SpaceX sends 24 Starlink satellites to polar orbit in late night launch

UPI3 days ago
July 19 (UPI) -- SpaceX launched 24 more Starlink satellites late Friday from California into low-Earth orbit.
The Falcon 9 lifted off at 8:52 p.m. PDT from Vandenberg Space Force Base's pad 4 East.
Watch Falcon 9 launch 24 @Starlink satellites to orbit from California https://t.co/LBEUcpxrDZ— SpaceX (@SpaceX) July 19, 2025
About eight minutes later, Falcon 9's first-stage booster successfully landed on "Of Course I Still Love You" stationed in the Pacific Ocean. It was the booster's 14th mission, and 141st on this vessel and 477th of all droneships.
SpaceX has launched 88 Falcon 9 rockets this year and 516th overall in California and Florida.
The satellites were deployed into a polar orbit about one hour later.
Falcon 9 launches 24 @Starlink satellites from California pic.twitter.com/57IRErhmHN— SpaceX (@SpaceX) July 19, 2025
The Starlink network includes 7,965 active units launched since 2019, Space.com reported.
The satellites provide broadband internet access and direct-to-cell service.
The next SpaceX flight from Florida is scheduled for 5:12 p.m. EDT Monday at Cape Canaveral Space Force Station's Complex 40. A Falcon 9 will launch the fifth pair of 03b mPower satellites to medium Earth orbit for Luxembourg-based SES.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

SpaceX Warns Investors Elon Musk Could Return to US Politics
SpaceX Warns Investors Elon Musk Could Return to US Politics

Bloomberg

time19 minutes ago

  • Bloomberg

SpaceX Warns Investors Elon Musk Could Return to US Politics

By , Loren Grush, and Edward Ludlow Save There's a new warning tucked into the tender offer for Elon Musk's SpaceX: The billionaire may not be done with politics just yet. Musk previously served as senior adviser to President Donald Trump 'in connection with the Department of Government Efficiency and may in the future serve in similar roles and devote significant time and energy to such roles,' according to documents reviewed by Bloomberg and people familiar with the content who were not authorized to speak publicly on the matter.

Microsoft hack risk spreads as cybercriminals and nation-states pile in
Microsoft hack risk spreads as cybercriminals and nation-states pile in

Axios

timean hour ago

  • Axios

Microsoft hack risk spreads as cybercriminals and nation-states pile in

A critical flaw in a major Microsoft document storage tool is hitting the organizations least able to defend themselves, security researchers and incident responders tell Axios. Why it matters: Schools, hospitals and government agencies are "sitting ducks" as they determine whether their servers have even been affected, one security executive said. Hackers are rushing into the breach, including groups linked to the Chinese government. Driving the news: Microsoft warned over the weekend of "active attacks" targeting a "zero-day" vulnerability in its on-premise SharePoint server. Today, the company said it has observed at least three China-based hacking groups, including two tied to the government, exploiting the vulnerability since as early as July 7. Charles Carmakal, CTO at Google's Mandiant, added that multiple threat groups are also now exploiting the bug. The Cybersecurity and Infrastructure Security Agency confirmed that attackers could exploit the bug to gain access to sensitive files or execute code remotely. At least one estimate puts the number of already compromised organizations near 100. The Washington Post reports that victims include state and federal agencies, universities, an energy company, and an Asian telecommunications firm. "It's not one specific group that is going to be doing the hacking of this anymore," Michael Sikorski, CTO at Palo Alto Networks' Unit 42 threat intelligence team, told Axios. "Everybody's getting on the train." The big picture: Security teams will likely spend weeks, even months, unpacking the full scope of the breach and what damage is still to come. Researchers say the hackers have been stealing machine keys from targeted entities, which will allow them to keep breaking into the organizations even after they patch the SharePoint issue. "Because the attack blends in with just normal, legitimate activity, it's quite hard to detect what's unusual and what's atypical," Kayne McGladrey, a senior member of the Institute of Electrical and Electronics Engineers, told Axios. Zoom in: Sikorski said Unit 42 is actively working with Microsoft to notify affected entities, but many victims likely still don't know they've been hit. "For those organizations that don't have a threat detection or red team capability built in, they are undoubtedly going to be at a longer time of risk for this because they just don't have the visibility," McGladrey said. Between the lines: The flaw mostly threatens legacy SharePoint systems still used by smaller public-sector entities and critical-infrastructure operators. Those organizations are unlikely to have the resources to quickly spin up their own investigations and response teams, Sikorski said. "That's the scary part," Sikorski said. "Not only are they sitting ducks, but they don't have the capability to deal with it." The intrigue: While Microsoft released a patch Monday to fix the issue in all affected versions of SharePoint, even patched systems may not be fully safe if attackers already gained entry, stole machine keys or installed new backdoors. What's next: Security experts say the SharePoint hacking activity will likely unfold in waves. Opportunistic hackers, such as cybercriminal gangs, will race to exploit exposed servers, aiming to steal login credentials, plant backdoors and deploy ransomware. Meanwhile, stealthier groups, including nation-state actors, will burrow into high-value organizations for the long haul, quietly stealing sensitive data and setting up persistent access that could go undetected for months.

Supermassive Games is delaying Directive 8020 and laying off staff
Supermassive Games is delaying Directive 8020 and laying off staff

Engadget

timean hour ago

  • Engadget

Supermassive Games is delaying Directive 8020 and laying off staff

Supermassive Games, the developer behind story-driven games like Until Dawn , The Quarry and The Dark Pictures Anthology , is cutting its workforce due to the ongoing "challenging" state of the games industry. The studio says it's having to adapt its team structure and as a consequence expects to lose up to 36 employees. The current size of the Supermassive's staff is unclear, but in February last year it cut somewhere in the region of 90 jobs, at which time Bloomberg estimated the studio had more than 300 employees. "This decision was not taken lightly, and we know it will be an incredibly difficult time for everyone," the UK-based developer said in a statement published today. "Our absolute priority will be to offer full support to all those affected." Supermassive is currently working on Little Nightmares III and the sci-fi horror adventure Directive 8020 , which is the fifth entry in The Dark Pictures Anthology . It said the layoffs will have no impact on the development of the former, which is still due out October 10. Directive 8020 has been delayed to the first half of 2026, which it says will allow it to "deliver the very best experience for our fans." The game had been scheduled to release on October 2. Supermassive is the latest developer to be hit with job losses, following Candy Crush studio King reportedly laying off at least 200 employees as part of the wide-ranging cuts at Microsoft . Virtuos, the studio behind Oblivion Remastered , also shed around seven percent of its staff last week, while Yooka-Laylee developer Playtonic let an unspecified number of its team go at the beginning of the summer.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store