Author name: DJ Henderson

in-new-level-of-stupid,-rfk-jr.’s-anti-vaccine-advisors-axe-mmrv-recommendation

In new level of stupid, RFK Jr.’s anti-vaccine advisors axe MMRV recommendation


The vote to strip the recommendation came after a day of inept discussion.

An MMR and VAR vaccine ready for a pediatric vaccination at Kaiser Permanente East Medical offices in Denver in 2015. Credit: Getty | Joe Amon

The panel of vaccine advisors hand-selected by anti-vaccine activist Robert F. Kennedy Jr. voted on Thursday to change the federal vaccine recommendations for children, removing safe, well-established vaccine doses from current schedules and realizing Kennedy’s anti-vaccine agenda to erode federal vaccine policy and sow distrust.

Specifically, the panel—the Advisory Committee on Immunization Practices (ACIP)—voted to remove the Centers for Disease Control and Prevention’s previous recommendation for use of a measles, mumps, rubella, varicella (chickenpox) MMRV combination vaccine for children under 4 years old.

The context

In June, Kennedy fired all 17 highly qualified, highly vetted members of ACIP and quickly replaced them with seven questionable members, who largely did not have subject matter expertise. Moreover, many of them have clearly expressed anti-vaccine rhetoric and skepticism about pandemic responses and COVID-19 vaccines. At least two new members have been paid witnesses in trials against vaccine makers, a clear conflict of interest. Earlier this week, Kennedy added five additional members, who raise the same anti-vaccine concerns as the first group.

In the meeting today—the first of two all-day meetings—members made clear their inexperience and lack of expertise in evaluating vaccine policy. They asked basic questions about study data and analysis—such as asking what a “low confidence” designation means—and claimed CDC presentations lacked critical data when, in fact, a CDC scientist had just presented the exact data in question.

The first half of the day focused on the MMRV vaccine, while the second half focused on a newborn dose of the hepatitis B (hep B) vaccine. A vote was initially scheduled for that vaccine today, too, but was postponed after the panel decided to change the wording of the voting question. They meet again tomorrow to vote on the hep B recommendation as well as recommendations for this year’s COVID-19 vaccine. Ars Technica will have coverage of the second half of the meeting tomorrow, along with a report on the hepatitis B discussion today.

MMRV vaccine change

For the MMRV vaccine, the panel rehashed an issue that vaccine experts had thoroughly examined years ago. Currently, the CDC recommends children get vaccinated against measles, mumps, rubella, and varicella (chickenpox) twice—one dose at 12 to 15 months, and a second dose between the ages of 4 and 6 years.

In 2005, the Food and Drug Administration approved a combo shot for all four—the MMRV vaccine—which provided an alternative to the previous method of giving an MMR vaccine dose (against measles, mumps, and rubella) plus a separate varicella vaccine dose at the same time. (This vaccination strategy is shorthanded as MMR + V.) Thus, the MMRV combo shot meant one fewer shot for children. But, in 2008, post-market data suggested that the MMRV shot might have a slightly higher risk of causing febrile seizures (seizures associated with fevers), which is a very low risk with the MMR + V separate shots.

Febrile seizures are a somewhat common reaction in young children; this type of seizure almost entirely occurs in children under age 5 years, most often striking between 14 and 18 months. The seizures are short, usually less than a minute or two, and they can be caused by essentially anything that can cause a fever—ear infections, vaccines, the flu, etc. For parents, a febrile seizure can be very scary and lead them to bring their child to a doctor or hospital. However, febrile seizures are almost always harmless—the prognosis is “excellent,” as CDC staff experts noted. Nearly all children fully recover with no long-term problems. By age 5, up to 5 percent of all children have had a febrile seizure at some point, for some reason.

Low risks

In post-market studies of the MMRV vaccine, it was very clear that a slightly increased risk of febrile seizures was only linked to the first dose (given at 12 to 15 months, not the second, given at 4 to 6 years). In studies of over 400,000 children, data found that the risk of a febrile seizure after a first-dose MMRV vaccine was 7 to 8.5 seizure cases for every 10,000 vaccinations. That’s compared to 3.2 to 4.2 seizure cases in 10,000 vaccinations with MMR + V. In all, a first-dose MMRV vaccine had about one additional febrile seizure per 2,300 to 2,600 children vaccinated compared with MMR + V.

In 2009, CDC vaccine experts reviewed all the data and updated the vaccine recommendation. They maintained that MMRV and the MMR+V vaccinations are still both safe, effective, and recommended at both vaccination time points. But, they added the nuance that there is a preference (or a default, basically) for using the MMR + V shots for the first dose, unless a parent expressly wanted the MMRV vaccine for that first dose. This skirted the slightly increased risk of febrile seizure in young children, without entirely taking away the option if a parent prioritized fewer jabs and wanted the MMRV. For the second dose, again, both MMRV and MMR + V are options, but the CDC stated a preference for the one-shot MMRV.

Since then, about 85 percent of vaccinated children have gotten MMR + V for their first dose shots, with the other 15 percent getting the MMRV vaccine.

Inept discussion

In the discussion today, Kennedy’s members seemed to have little grasp of the issue at hand and the clinical significance of febrile seizures generally. They continued to circle back to unfounded concerns about febrile seizures and fringe theories about potential long-term effects.

Cody Meissner, a pediatric professor at Dartmouth’s Geisel School of Medicine who has served on ACIP in the past—arguably the most qualified of Kennedy’s new lineup—was bewildered at why the committee was rehashing the issue addressed years ago. “This discussion is really a déjà vu for me,” he said.  Yet, while Meisner felt the issue was settled and pediatricians were well-equipped to calm parents’ fears about febrile seizures, the other members could not be swayed. They claimed, without evidence, that parents of children who have febrile seizures after a vaccine would be less likely to get future vaccines.

As the committee seemed to be leaning toward removing the recommendation for MMRV for the first dose, Jason Goldman, president of the American College of Physicians, who attended the meeting as a liaison, pushed back strongly. He pointed out that—as with the last time Kennedy’s ACIP met—they were not following the standard framework for making and changing recommendations.

“Are we going to have a thoroughly vetted evidence-to-recommend framework presentation that looks at all the harms benefits, acceptability, feasibility—with input from practicing clinicians and liaisons in order to make an informed decision?” Goldman asked. “I would argue that this recommendation is going to create more confusion among the public.”

Goldman noted that if the committee rescinds the recommendation for MMRV for children under 4, the shot would no longer be covered by the Vaccines for Children (VFC) Program, a federal program for Medicaid-eligible and under- or uninsured kids, which covers about half of American children.

“And finally, you are taking away the choice of parents to have informed consent and discussion with their physician on what they want to do for the health and benefit of their children,” Goldman said. “So, I urge this committee not to change the recommendations if they truly want to give the power to the parents to decide what is best for their child and allow them to make the choice in consultation with their physicians.”

Voting confusion

In the end, Kennedy’s panel voted 8–3 (with one abstention) to not recommend MMRV for children under age 4, meaning the MMRV vaccine could potentially no longer be available for some children under age 4. Private insurance companies are required to cover ACIP-recommended vaccines, so this move strips the recommendation and that coverage requirement.

But, anticipating such a change, AHIP, a trade organization representing insurance companies, put out a statement earlier this week suggesting that they would still cover the MMRV vaccine for children under 4, even if it’s not required.

“Health plans will continue to cover all ACIP-recommended immunizations that were recommended as of September 1, 2025, including updated formulations of the COVID-19 and influenza vaccines, with no cost-sharing for patients through the end of 2026,” the statement reads.

But, there’s more: In a second vote today, ACIP voted 8–1 (with three abstentions) against changing VFC coverage for MMRV. Therefore, the VFC program will continue to cover MMRV vaccines for children under age 4. This is a split from standard policy that is likely to spur confusion, because VFC typically goes with ACIP recommendations. Also, Medicaid’s Children’s Health Insurance Program (CHIP) has to follow the ACIP vaccine recommendation and thus will no longer cover MMRV for children under age 4 covered by CHIP.

One of the abstentions on the VFC coverage vote was Meissner, who didn’t want to strip the recommendation or the VFC coverage but was entirely confused by how this would work in practice.

Photo of Beth Mole

Beth is Ars Technica’s Senior Health Reporter. Beth has a Ph.D. in microbiology from the University of North Carolina at Chapel Hill and attended the Science Communication program at the University of California, Santa Cruz. She specializes in covering infectious diseases, public health, and microbes.

In new level of stupid, RFK Jr.’s anti-vaccine advisors axe MMRV recommendation Read More »

some-dogs-can-classify-their-toys-by-function

Some dogs can classify their toys by function

Certain dogs can not only memorize the names of objects like their favorite toys, but they can also extend those labels to entirely new objects with a similar function, regardless of whether or not they are similar in appearance, according to a new paper published in the journal Current Biology. It’s a cognitively advanced ability known as “label extension,” and for animals to acquire it usually involves years of intensive training in captivity. But the dogs in this new study developed the ability to classify their toys by function with no formal training, merely by playing naturally with their owners.

Co-author Claudia Fugazza of Eötvös Loránd University in Budapest, Hungary, likens this ability to a person calling a hammer and a rock by the same name, or a child understanding that “cup” can describe a mug, a glass, or a tumbler, because they serve the same function. “The rock and the hammer look physically different, but they can be used for the same function,” she said. “So now it turns out that these dogs can do the same.”

Fugazza and her Hungarian colleagues have been studying canine behavior and cognition for several years. For instance, in 2023, we reported on the group’s experiments on how dogs interpret gestures, such as pointing at a specific object. A dog will interpret the gesture as a directional cue, unlike a human toddler, who will more likely focus on the object itself. It’s called spatial bias, and the team concluded that the phenomenon arises from a combination of how dogs see (visual acuity) and how they think, with “smarter” dog breeds prioritizing an object’s appearance as much as its location. This suggests the smarter dogs’ information processing is more similar to that of humans.

Another aspect of the study involved measuring the length of a dog’s head, which prior research has shown is correlated with visual acuity. The shorter a dog’s head, the more similar their visual acuity is to human vision. That’s because there is a higher concentration of retinal ganglion cells in the center of their field of vision, making vision sharper and giving such dogs binocular depth vision. The testing showed that dogs with better visual acuity, and who also scored higher on the series of cognitive tests, also exhibited less spatial bias. This suggests that canine spatial bias is not simply a sensory matter but is also influenced by how they think. “Smarter” dogs have less spatial bias.

Some dogs can classify their toys by function Read More »

meta’s-$799-ray-ban-display-is-the-company’s-first-big-step-from-vr-to-ar

Meta’s $799 Ray-Ban Display is the company’s first big step from VR to AR

Zuckerberg also showed how the neural interface can be used to compose messages (on WhatsApp, Messenger, Instagram, or via a connected phone’s messaging apps) by following your mimed “handwriting” across a flat surface. Though this feature reportedly won’t be available at launch, Zuckerberg said he had gotten up to “about 30 words per minute” in this silent input mode.

The most impressive part of Zuckerberg’s on-stage demo that will be available at launch was probably a “live caption” feature that automatically types out the words your partner is saying in real-time. The feature reportedly filters out background noise to focus on captioning just the person you’re looking at, too.

A Meta video demos how live captioning works on the Ray-Ban Display (though the field-of-view on the actual glasses is likely much more limited).

Credit: Meta

A Meta video demos how live captioning works on the Ray-Ban Display (though the field-of-view on the actual glasses is likely much more limited). Credit: Meta

Beyond those “gee whiz” kinds of features, the Meta Ray-Ban Display can basically mirror a small subset of your smartphone’s apps on its floating display. Being able to get turn-by-turn directions or see recipe steps on the glasses without having to glance down at a phone feels like genuinely useful new interaction modes. Using the glasses display as a viewfinder to line up a photo or video (using the built-in 12 megapixel, 3x zoom camera) also seems like an improvement over previous display-free smartglasses.

But accessing basic apps like weather, reminders, calendar, and emails on your tiny glasses display strikes us as probably less convenient than just glancing at your phone. And hosting video calls via the glasses by necessity forces your partner to see what you’re seeing via the outward-facing camera, rather than seeing your actual face.

Meta also showed off some pie-in-the-sky video about how future “Agentic AI” integration would be able to automatically make suggestions and note follow-up tasks based on what you see and hear while wearing the glasses. For now, though, the device represents what Zuckerberg called “the next chapter in the exciting story of the future of computing,” which should serve to take focus away from the failed VR-based metaverse that was the company’s last “future of computing.”

Meta’s $799 Ray-Ban Display is the company’s first big step from VR to AR Read More »

how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension

How weak passwords and other failings led to catastrophic breach of Ascension


THE BREACH THAT DIDN’T HAVE TO HAPPEN

A deep-dive into Active Directory and how “Kerberoasting” breaks it wide open.

Active Directory and a heartbeat monitor with Kerberos the three headed dog

Credit: Aurich Lawson | Getty Images

Credit: Aurich Lawson | Getty Images

Last week, a prominent US senator called on the Federal Trade Commission to investigate Microsoft for cybersecurity negligence over the role it played last year in health giant Ascension’s ransomware breach, which caused life-threatening disruptions at 140 hospitals and put the medical records of 5.6 million patients into the hands of the attackers. Lost in the focus on Microsoft was something as, or more, urgent: never-before-revealed details that now invite scrutiny of Ascension’s own security failings.

In a letter sent last week to FTC Chairman Andrew Ferguson, Sen. Ron Wyden (D-Ore.) said an investigation by his office determined that the hack began in February 2024 with the infection of a contractor’s laptop after they downloaded malware from a link returned by Microsoft’s Bing search engine. The attackers then pivoted from the contractor device to Ascension’s most valuable network asset: the Windows Active Directory, a tool administrators use to create and delete user accounts and manage system privileges to them. Obtaining control of the Active Directory is tantamount to obtaining a master key that will open any door in a restricted building.

Wyden blasted Microsoft for its continued support of its three-decades-old implementation of the Kerberos authentication protocol that uses an insecure cipher and, as the senator noted, exposes customers to precisely the type of breach Ascension suffered. Although modern versions of Active Directory by default will use a more secure authentication mechanism, it will by default fall back to the weaker one in the event a device on the network—including one that has been infected with malware—sends an authentication request that uses it. That enabled the attackers to perform Kerberoasting, a form of attack that Wyden said the attackers used to pivot from the contractor laptop directly to the crown jewel of Ascension’s network security.

A researcher asks: “Why?”

Left out of Wyden’s letter—and in social media posts that discussed it—was any scrutiny of Ascension’s role in the breach, which, based on Wyden’s account, was considerable. Chief among the suspected security lapses is a weak password. By definition, Kerberoasting attacks work only when a password is weak enough to be cracked, raising questions about the strength of the one the Ascension ransomware attackers compromised.

“Fundamentally, the issue that leads to Kerberoasting is bad passwords,” Tim Medin, the researcher who coined the term Kerberoasting, said in an interview. “Even at 10 characters, a random password would be infeasible to crack. This leads me to believe the password wasn’t random at all.”

Medin’s math is based on the number of password combinations possible with a 10-character password. Assuming it used a randomly generated assortment of upper- and lowercase letters, numbers, and special characters, the number of different combinations would be 9510—that is, the number of possible characters (95) raised to the power of 10, the number of characters used in the password. Even when hashed with the insecure NTLM function the old authentication uses, such a password would take more than five years for a brute-force attack to exhaust every possible combination. Exhausting every possible 25-character password would require more time than the universe has existed.

“The password was clearly not randomly generated. (Or if it was, was way too short… which would be really odd),” Medin added. Ascension “admins selected a password that was crackable and did not use the recommended Managed Service Account as prescribed by Microsoft and others.”

It’s not clear precisely how long the Ascension attackers spent trying to crack the stolen hash before succeeding. Wyden said only that the laptop compromise occurred in February 2024. Ascension, meanwhile, has said that it first noticed signs of the network compromise on May 8. That means the offline portion of the attack could have taken as long as three months, which would indicate the password was at least moderately strong. The crack may have required less time, since ransomware attackers often spend weeks or months gaining the access they need to encrypt systems.

Richard Gold, an independent researcher with expertise in Active Directory security, agreed the strength of the password is suspect, but he went on to say that based on Wyden’s account of the breach, other security lapses are also likely.

“All the boring, unsexy but effective security stuff was missing—network segmentation, principle of least privilege, need to know and even the kind of asset tiering recommended by Microsoft,” he wrote. “These foundational principles of security architecture were not being followed. Why?”

Chief among the lapses, Gold said, was the failure to properly allocate privileges, which likely was the biggest contributor to the breach.

“It’s obviously not great that obsolete ciphers are still in use and they do help with this attack, but excessive privileges are much more dangerous,” he wrote. “It’s basically an accident waiting to happen. Compromise of one user’s machine should not lead directly to domain compromise.”

Ascension didn’t respond to emails asking about the compromised password and other of its security practices.

Kerberos and Active Directory 101

Kerberos was developed in the 1980s as a way for two or more devices—typically a client and a server—inside a non-secure network to securely prove their identity to each other. The protocol was designed to avoid long-term trust between various devices by relying on temporary, limited-time credentials known as tickets. This design protects against replay attacks that copy a valid authentication request and reuse it to gain unauthorized access. The Kerberos protocol is cipher- and algorithm-agnostic, allowing developers to choose the ones most suitable for the implementation they’re building.

Microsoft’s first Kerberos implementation protects a password from cracking attacks by representing it as a hash generated with a single iteration of Microsoft’s NTLM cryptographic hash function, which itself is a modification of the super-fast, and now deprecated, MD4 hash function. Three decades ago, that design was adequate, and hardware couldn’t support slower hashes well anyway. With the advent of modern password-cracking techniques, all but the strongest Kerberos passwords can be cracked, often in a matter of seconds. The first Windows version of Kerberos also uses RC4, a now-deprecated symmetric encryption cipher with serious vulnerabilities that have been well documented over the past 15 years.

A very simplified description of the steps involved in Kerberos-based Active Directory authentication is:

1a. The client sends a request to the Windows Domain Controller (more specifically a Domain Controller component known as the KDC) for a TGT, short for “Ticket-Granting Ticket.” To prove that the request is coming from an account authorized to be on the network, the client encrypts the timestamp of the request using the hash of its network password. This step, and step 1b below, occur each time the client logs in to the Windows network.

1b. The Domain Controller checks the hash against a list of credentials authorized to make such a request (i.e., is authorized to join the network). If the Domain Controller approves, it sends the client a TGT that’s encrypted with the password hash of the KRBTGT, a special account only known to the Domain Controller. The TGT, which contains information about the user such as the username and group memberships, is stored in the computer memory of the client.

2a. When the client needs access to a service such as the Microsoft SQL server, it sends a request to the Domain Controller that’s appended to the encrypted TGT stored in memory.

2b. The Domain Controller verifies the TGT and builds a service ticket. The service ticket is encrypted using the password hash of SQL or another service and sent back to the account holder.

3a. The account holder presents the encrypted service ticket to the SQL server or the other service.

3b. The service decrypts the ticket and checks if the account is allowed access on that service and if so, with what level of privileges.

With that, the service grants the account access. The following image illustrates the process, although the numbers in it don’t directly correspond to the numbers in the above summary.

Credit: Tim Medin/RedSiege

Getting roasted

In 2014, Medin appeared at the DerbyCon Security Conference in Louisville, Kentucky, and presented an attack he had dubbed Kerberoasting. It exploited the ability for any valid user account—including a compromised one—to request a service ticket (step 2a above) and receive an encrypted service ticket (step 2b).

Once a compromised account received the ticket, the attacker downloaded the ticket and carried out an offline cracking attack, which typically uses large clusters of GPUs or ASIC chips that can generate large numbers of password guesses. Because Windows by default hashed passwords with a single iteration of the fast NTLM function using RC4, these attacks could generate billions of guesses per second. Once the attacker guessed the right combination, they could upload the compromised password to the compromised account and use it to gain unauthorized access to the service, which otherwise would be off limits.

Even before Kerberoasting debuted, Microsoft in 2008 introduced a newer, more secure authentication method for Active Directory. The method also implemented Kerberos but relied on the time-tested AES256 encryption algorithm and iterated the resulting hash 4,096 times by default. That meant the newer method made offline cracking attacks much less feasible, since they could make only millions of guesses per second. Out of concern for breaking older systems that didn’t support the newer method, though, Microsoft didn’t make it the default until 2020.

Even in 2025, however, Active Directory continues to support the old RC4/NTLM method, although admins can configure Windows to block its usage. By default, though, when the Active Directory server receives a request using the weaker method, it will respond with a ticket that also uses it. The choice is the result of a tradeoff Windows architects made—the continued support of legacy devices that remain widely used and can only use RC4/NTLM at the cost of leaving networks open to Kerberoasting.

Many organizations using Windows understand the trade-off, but many don’t. It wasn’t until last October—five months after the Ascension compromise—that Microsoft finally warned that the default fallback made users “more susceptible to [Kerberoasting] because it uses no salt or iterated hash when converting a password to an encryption key, allowing the cyberthreat actor to guess more passwords quickly.”

Microsoft went on to say that it would disable RC4 “by default” in non-specified future Windows updates. Last week, in response to Wyden’s letter, the company said for the first time that starting in the first quarter of next year, new installations of Active Directory using Windows Server 2025 will, by default, disable the weaker Kerberos implementation.

Medin questioned the efficacy of Microsoft’s plans.

“The problem is, very few organizations are setting up new installations,” he explained. “Most new companies just use the cloud, so that change is largely irrelevant.”

Ascension called to the carpet

Wyden has focused on Microsoft’s decision to continue supporting the default fallback to the weaker implementation; to delay and bury formal warnings that make customers susceptible to Kerberoasting; and to not mandate that passwords be at least 14 characters long, as Microsoft’s guidance recommends. To date, however, there has been almost no attention paid to Ascension’s failings that made the attack possible.

As a health provider, Ascension likely uses legacy medical equipment—an older X-ray or MRI machine, for instance—that can only connect to Windows networks with the older implementation. But even then, there are measures the organization could have taken to prevent the one-two pivot from the infected laptop to the Active Directory, both Gold and Medin said. The most likely contributor to the breach, both said, was the crackable password. They said it’s hard to conceive of a truly random password with 14 or more characters that could have suffered that fate.

“IMO, the bigger issue is the bad passwords behind Kerberos, not as much RC4,” Medin wrote in a direct message. “RC4 isn’t great, but with a good password you’re fine.” He continued:

Yes, RC4 should be turned off. However, Kerberoasting still works against AES encrypted tickets. It is just about 1,000 times slower. If you compare that to the additional characters, even making the password two characters longer increases the computational power 5x more than AES alone. If the password is really bad, and I’ve seen plenty of those, the additional 1,000x from AES doesn’t make a difference.

Medin also said that Ascension could have protected the breached service with Managed Service Account, a Microsoft service for managing passwords.

“MSA passwords are randomly generated and automatically rotated,” he explained. “It 100% kills Kerberoasting.”

Gold said Ascension likely could have blocked the weaker Kerberos implementation in its main network and supported it only in a segmented part that tightly restricted the accounts that could use it. Gold and Medin said Wyden’s account of the breach shows Ascension failed to implement this and other standard defensive measures, including network intrusion detection.

Specifically, the ability of the attackers to remain undetected between February—when the contractor’s laptop was infected—and May—when Ascension first detected the breach—invites suspicions that the company didn’t follow basic security practices in its network. Those lapses likely include inadequate firewalling of client devices and insufficient detection of compromised devices and ongoing Kerberoasting and similar well-understood techniques for moving laterally throughout the health provider network, the researchers said.

The catastrophe that didn’t have to happen

The results of the Ascension breach were catastrophic. With medical personnel locked out of electronic health records and systems for coordinating basic patient care such as medications, surgical procedures, and tests, hospital employees reported lapses that threatened patients’ lives. The ransomware also stole the medical records and other personal information of 5.6 million patients. Disruptions throughout the Ascension health network continued for weeks.

Amid Ascension’s decision not to discuss the attack, there aren’t enough details to provide a complete autopsy of Ascension’s missteps and the measures the company could have taken to prevent the network breach. In general, though, the one-two pivot indicates a failure to follow various well-established security approaches. One of them is known as security in depth. The security principle is similar to the reason submarines have layered measures to protect against hull breaches and fighting onboard fires. In the event one fails, another one will still contain the danger.

The other neglected approach—known as zero trust—is, as WIRED explains, a “holistic approach to minimizing damage” even when hack attempts do succeed. Zero-trust designs are the direct inverse of the traditional, perimeter-enforced hard on the outside, soft on the inside approach to network security. Zero trust assumes the network will be breached and builds the resiliency for it to withstand or contain the compromise anyway.

The ability of a single compromised Ascension-connected computer to bring down the health giant’s entire network in such a devastating way is the strongest indication yet that the company failed its patients spectacularly. Ultimately, the network architects are responsible, but as Wyden has argued, Microsoft deserves blame, too, for failing to make the risks and precautionary measures for Kerberoasting more explicit.

As security expert HD Moore observed in an interview, if the Kerberoasting attack wasn’t available to the ransomware hackers, “it seems likely that there were dozens of other options for an attacker (standard bloodhound-style lateral movement, digging through logon scripts and network shares, etc).” The point being: Just because a target shuts down one viable attack path is no guarantee that others remain.

All of that is undeniable. It’s also indisputable that in 2025, there’s no excuse for an organization as big and sensitive as Ascension suffering a Kerberoasting attack, and that both Ascension and Microsoft share blame for the breach.

“When I came up with Kerberoasting in 2014, I never thought it would live for more than a year or two,” Medin wrote in a post published the same day as the Wyden letter. “I (erroneously) thought that people would clean up the poor, dated credentials and move to more secure encryption. Here we are 11 years later, and unfortunately it still works more often than it should.”

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

How weak passwords and other failings led to catastrophic breach of Ascension Read More »

you-can-hold-on-to-your-butts-thanks-to-dna-that-evolved-in-fish

You can hold on to your butts thanks to DNA that evolved in fish

There were some indications that the same thing is true in fish, where the elimination of equivalent hox genes also interfered with the formation of the rays at the ends of fins. This would suggest that digits formed by elaborating on a genetic system that already existed in order to produce fins.

However, when a US-French team started looking at the regulation of one set of hox genes in the limbs, things turned out to be a bit more complicated. The hox gene clusters have two chunks of regulatory DNA that help set the activity of the genes within the cluster, one upstream of the genes, one downstream. (For the molecular biologists among us, that’s on the 5′ and 3′ sides of the gene cluster.) And we know that in vertebrates, some of the key regulatory DNA for one of the clusters is on the upstream side, since deleting it left all the genes in the cluster inactive in the region of the limb where digits form.

Same place, different reasons

So, the research team behind the new work deleted the equivalent region in a fish (the zebrafish) using the gene editing tool CRISPR. And, deleting the same area that wipes out hox gene activity in the digits in mice did… not very much. The hox gene activity was slightly reduced, but these genes were still active in the right place at the right time to make digits. So, while the activity looked the same, the reasons for the activity seem to be different in fish and mice. Which means that hox activity in the digits isn’t the ancestral state; instead, it seems to have evolved separately in the ray-finned fish and vertebrate lineages.

So, the researchers asked a simple question: If the regulatory DNA they deleted didn’t activate these genes in the limb, where was it needed? So, the researchers looked at where these hox genes were active in fish with and without the deletion. They found one region where it seems to matter: the developing cloaca. In fish, the cloaca is a single orifice that handles excretion (both urine and fecal material) as well as reproduction. So, it’s basically the fish equivalent of our rear ends.

You can hold on to your butts thanks to DNA that evolved in fish Read More »

white-house-officials-reportedly-frustrated-by-anthropic’s-law-enforcement-ai-limits

White House officials reportedly frustrated by Anthropic’s law enforcement AI limits

Anthropic’s AI models could potentially help spies analyze classified documents, but the company draws the line at domestic surveillance. That restriction is reportedly making the Trump administration angry.

On Tuesday, Semafor reported that Anthropic faces growing hostility from the Trump administration over the AI company’s restrictions on law enforcement uses of its Claude models. Two senior White House officials told the outlet that federal contractors working with agencies like the FBI and Secret Service have run into roadblocks when attempting to use Claude for surveillance tasks.

The friction stems from Anthropic’s usage policies that prohibit domestic surveillance applications. The officials, who spoke to Semafor anonymously, said they worry that Anthropic enforces its policies selectively based on politics and uses vague terminology that allows for a broad interpretation of its rules.

The restrictions affect private contractors working with law enforcement agencies who need AI models for their work. In some cases, Anthropic’s Claude models are the only AI systems cleared for top-secret security situations through Amazon Web Services’ GovCloud, according to the officials.

Anthropic offers a specific service for national security customers and made a deal with the federal government to provide its services to agencies for a nominal $1 fee. The company also works with the Department of Defense, though its policies still prohibit the use of its models for weapons development.

In August, OpenAI announced a competing agreement to supply more than 2 million federal executive branch workers with ChatGPT Enterprise access for $1 per agency for one year. The deal came one day after the General Services Administration signed a blanket agreement allowing OpenAI, Google, and Anthropic to supply tools to federal workers.

White House officials reportedly frustrated by Anthropic’s law enforcement AI limits Read More »

tesla-model-y-door-handles-now-under-federal-safety-scrutiny

Tesla Model Y door handles now under federal safety scrutiny

Break window to free child

NHTSA’s Office of Defects Investigation says it has received nine complaints from the owners of model year 2021 Tesla Model Y that have resulted in this investigation. The complaints detail owners’ experiences with a 12 V power failure and inoperable doors, trapping children or dogs in cars on hot days. In most cases, the car suffered a power failure after the parent had placed the child in the back seat, and in four instances, the only way to free the trapped occupants was by breaking a window.

NHTSA notes that while there are manual emergency door releases, “a child may not be able to access or operate the releases even if the vehicle’s driver is aware of them.” To make matters worse, NHTSA says that none of the reported complaints say they saw a low-voltage warning light before the 12 V battery failed. The agency also criticizes the complicated process required to start a Tesla with off-board 12 V power, which “requires applying 12 volts DC from a separate power source to two different points accessible from the vehicle’s exterior,” something that “may not be readily available to owners or well known.”

Tesla Model Y door handles now under federal safety scrutiny Read More »

“china-keeps-the-algorithm”:-critics-attack-trump’s-tiktok-deal

“China keeps the algorithm”: Critics attack Trump’s TikTok deal

However, Trump seems to think that longtime TikTok partner Oracle taking a bigger stake while handling Americans’ user data at its facilities in Texas will be enough to prevent remaining China-based owners—which will maintain less than a 20 percent stake—from allegedly spying, launching disinformation campaigns, or spreading other kinds of propaganda.

China previously was resistant to a forced sale of TikTok, FT reported, even going so far as to place export controls on algorithms to keep the most lucrative part of TikTok in the country. And “it remains unclear to what extent TikTok’s Chinese parent would retain control of the algorithm in the US as part of a licensing deal,” FT noted.

On Tuesday, Wang Jingtao, deputy head of China’s cyber security regulator, did not go into any detail on how China’s access to US user data would be restricted under the deal. Instead, Wang only noted that ByteDance would “entrust the operation of TikTok’s US user data and content security,” presumably to US owners, FT reported.

One Asia-based investor told FT that the US would use “at least part of the Chinese algorithm” but train it on US user data, while a US advisor accused Trump of chickening out and accepting a deal that didn’t force a sale of the algorithm.

“After all this, China keeps the algorithm,” the US advisor said.

To the Asia-based investor, it seemed like Trump gave China exactly what it wants, since “Beijing wants to be seen as exporting Chinese technology to the US and the world.”

It’s likely more details will be announced once Trump and Chinese President Xi Jinping hold a phone conference on Friday. ByteDance has yet to comment on the deal and did not respond to Ars’ request to comment.

“China keeps the algorithm”: Critics attack Trump’s TikTok deal Read More »

when-will-jaguar-land-rover-restart-production?-“no-one-actually-knows.”

When will Jaguar Land Rover restart production? “No one actually knows.”

Jaguar Land Rover’s dealers and suppliers fear the British carmaker’s operations will take another few months to normalize after a cyber attack that experts estimate could wipe more than £3.5 billion off its revenue.

JLR, which is owned by India’s Tata Motors, had been forced to shut down its systems and halt production across its UK factories since August 31, wreaking havoc across the country’s vast supply chain involving roughly 200,000 workers.

JLR on Tuesday said it would extend its production halt until at least next Wednesday as it continued its investigation. In a statement, the company also cautioned that “the controlled restart of our global operations… will take time.”

If JLR cannot produce vehicles until November, David Bailey, professor at University of Birmingham, estimated that the group would suffer a revenue hit of more than £3.5 billion while it would lose about £250 million in profits, or about £72 million in revenue and £5 million in profits on a daily basis.

With annual revenues of £29 billion in 2024, JLR will be able to absorb the financial costs but Bailey warned the consequences would be bigger for the smaller sized companies in its supply chain. JLR declined to comment.

The cyber attack comes at a crucial period for the UK carmaker when it is going through a controversial rebranding of its Jaguar brand and an expensive shift to all-electric vehicles by the end of the decade. Even before the latest incident, people briefed on the matter have said the company was facing delays with launching its new electric models.

“They are clearly in chaos,” said one industry executive who works closely with JLR, while another warned that “no one actually knows” when production would resume.

“If there is a major financial hit, the CEO will look for significant cost savings to try and recover some of that, so that could hit both the production base in the UK but also its product development,” said Bailey.

When will Jaguar Land Rover restart production? “No one actually knows.” Read More »

ars-live:-cta-policy-expert-explains-why-tariff-stacking-is-a-nightmare

Ars Live: CTA policy expert explains why tariff stacking is a nightmare

Earlier this month, Ars spoke with the Consumer Technology Association’s vice president of international trade, Ed Brzytwa, to check in and see how tech firms have navigated Donald Trump’s unpredictable tariff regimes so far.

Brzytwa has led CTA’s research helping tech firms prepare for Trump’s trade war, but during our talk, he confirmed that “the reality has been a lot more difficult and far worse, because of not just the height of the tariffs, but the variability, the tariffs on, tariffs off.”

Our discussion with Ed Brzytwa. Click here for transcript.

Currently, every tech company is in a “slightly different position,” depending on its specific supply chains, he explained. However, until semiconductor tariffs are announced, “it’s impossible” for any tech company to make the kind of long-term plans that could help keep consumer prices low as Trump’s negotiations with foreign partners and investigations into various products drag on, Brzytwa said.

Ahead of the busy holiday shopping season, Brzytwa suggested that many companies may be prepared to maintain prices, based on front-loading of inventory by firms in anticipation of more complicated tariff regimes coming. But some companies, notably in the video game industry, have already begun warning of tariff-related price hikes, Brzytwa noted, and for others likely delaying for as long as they can, there remains a question of “what happens when that inventory disappears?”

Ars Live: CTA policy expert explains why tariff stacking is a nightmare Read More »

california-bill-lets-renters-escape-exclusive-deals-between-isps-and-landlords

California bill lets renters escape exclusive deals between ISPs and landlords


Opt-out from bulk billing

Bill author says law “gives this industry an opportunity to treat people fairly.”

Credit: Getty Images | Yuichiro Chino

California’s legislature this week approved a bill to let renters opt out of bulk-billing arrangements that force them to pay for Internet service from a specific provider.

The bill says that by January 1, a landlord must “allow the tenant to opt out of paying for any subscription from a third-party Internet service provider, such as through a bulk-billing arrangement, to provide service for wired Internet, cellular, or satellite service that is offered in connection with the tenancy.” If a landlord fails to do so, the tenant “may deduct the cost of the subscription to the third-party Internet service provider from the rent,” and the landlord would be prohibited from retaliating.

The bill passed the state Senate in a 30–7 vote on Wednesday but needs Gov. Gavin Newsom’s signature to become law. It was approved by the state Assembly in a 75–0 vote in April.

Assemblymember Rhodesia Ransom, a Democratic lawmaker who authored the bill, told Ars today that lobby groups for Internet providers and real estate companies have been “working really hard” to defeat it. But she expects Newsom will approve.

“I strongly believe that the governor is going to look at what this bill provides as far as protections for tenants and sign it into law,” Ransom said in a phone interview.

“Just treat people fairly”

Ransom disputed claims from lobby groups that bulk billing reduces Internet prices for tenants.

“This is kind of like a first step in trying to give this industry an opportunity to just treat people fairly. It’s not super restrictive. We are not banning bulk billing. We’re not even limiting how much money the people can make. What we’re saying here with this bill is that if a tenant wants to opt out of the arrangement, they should be allowed to opt out,” she said.

A stricter bill could have told landlords that “you can’t charge the customer more than you’re paying. We could have put a cap on the amount that you’re able to charge,” she said. “There’s so many other things that we could have done that would’ve been a lot less business-friendly. But the goal was not to harm business, the goal was to help people.”

In theory, bulk billing could reduce prices for tenants if discounts negotiated between landlords and Internet providers were passed on to renters. But, Ransom said, “where there would be an opportunity for these huge discounts to be passed on to tenants, it’s not happening. We know of thousands of tenants across the state who are in landlord-tenant agreements where the landlord is actually adding an additional bonus for themselves, pocketing change, and not passing the discount on to the tenants… once we started working on this bill, we started to hear more and more about places where people were stuck in these agreements and their landlords were not letting them out.”

Ransom said not all landlords do this and that it is generally “the large corporate landlords” who own hundreds or thousands of properties that “were the ones who were reluctant to let their tenants out.”

State bill similar to abandoned FCC plan

California’s action comes about eight months after the Federal Communications Commission abandoned a proposal to give tenants the right to opt out of bulk billing for Internet service. The potential federal action was proposed in March 2024 by then-FCC Chairwoman Jessica Rosenworcel, but nixed in January 2025 by Chairman Brendan Carr.

Bulk billing contracts are only banned by the FCC when they give a provider the exclusive right to access and serve a building. Despite that restriction, a bulk billing deal between an ISP and landlord can make it less financially feasible for other providers to serve a multi-unit building. Letting people opt out of bulk billing arrangements makes serving a building at least slightly more viable for a competing provider.

Ransom said the FCC action “was very unfortunate” and “give[s] a disadvantage to people who are already at the mercy of landlords.”

Cable lobby calls it an “anti-affordability bill”

The California bill was not welcomed by lobby groups for Internet providers and landlords. The California Broadband & Video Association, which represents cable companies, paid for a sponsored commentary in several news publications to express its opposition.

“AB 1414 is an anti-affordability bill masked as consumer protection, and it will only serve to widen the digital divide in California,” wrote the lobby group’s CEO, Janus Norman.

Norman complained that property owners would have “to provide a refund to tenants who decline the Internet service provided through the building’s contract with a specific Internet service provider.” He argued that without bulk billing, “low-income families and tenants risk losing access altogether.”

Letting tenants opt out of bulk deals “undermines the basis of the cost savings and will lead to bulk billing being phased out,” Norman wrote. This “will result in higher bills for everyone, including those already struggling,” he claimed.

“The truth, very simply, is this: bulk billing is good for consumers,” the cable industry commentary said. “Taking away bulk discounts raises total housing costs when Californians can least afford it.”

The bill also drew opposition from the Real Estate Technology & Transformation Center (RETTC). The group’s sponsors include real estate companies and Internet providers AT&T, Comcast, and Cox. Another notable sponsor of RETTC is RealPage, which has faced claims from the US government and state attorneys general that its software distorts competition in rental housing by helping landlords collectively set prices.

“AB 1414 introduces an opt-out requirement that would fundamentally undermine the economics of bulk billing,” the RETTC said. “By fragmenting service, it could destabilize networks and reduce the benefits residents and operators rely on today.” The group claimed the bill could lead to “higher broadband costs for renters, reduced ISP investment in multifamily housing, disruption of property-wide smart technology, [and] widening of the digital divide in California.”

The RETTC said it joined with the National Apartment Association and the California Rental Housing Association to detail the groups’ concerns directly to the bill sponsors.

Wireless providers could get a boost

The California Broadband & Video Association seems to be worried about wireless providers serving buildings wired up with cable. The group’s commentary claimed that “the bill’s lack of technology neutrality also creates winners and losers, granting certain types of providers an unfair advantage over their competitors.”

Ransom said her bill may be especially helpful for wireless or satellite providers because they wouldn’t need to install wires in each building.

“This does help with market competition, and in fact some of our support came from some of the smaller Internet service providers… and because this bill is technology-neutral, it helps with not only the current technology, but any new technology that comes out,” she said.

While Ransom’s bill could help make broadband more affordable for renters, California lawmakers recently abandoned a more aggressive effort to require affordable broadband plans. Assemblymember Tasha Boerner proposed a state law that would force Internet service providers to offer $15 monthly plans to people with low incomes but tabled the bill after the Trump administration threatened to block funding for expanding broadband networks.

Photo of Jon Brodkin

Jon is a Senior IT Reporter for Ars Technica. He covers the telecom industry, Federal Communications Commission rulemakings, broadband consumer affairs, court cases, and government regulation of the tech industry.

California bill lets renters escape exclusive deals between ISPs and landlords Read More »

education-report-calling-for-ethical-ai-use-contains-over-15-fake-sources

Education report calling for ethical AI use contains over 15 fake sources

AI language models like the kind that power ChatGPT, Gemini, and Claude excel at producing exactly this kind of believable fiction when they lack actual information on a topic because they first and foremost produce plausible outputs, not accurate ones. If there are no patterns in the dataset that match what the user is seeking they will create the best approximation based on statistical patterns learned during training. Even AI models that can search the web for real sources can potentially fabricate citations, choose the wrong ones, or mischaracterize them.

“Errors happen. Made-up citations are a totally different thing where you essentially demolish the trustworthiness of the material,” Josh Lepawsky, the former president of the Memorial University Faculty Association who resigned from the report’s advisory board in January, told CBC, citing a “deeply flawed process.”

The irony runs deep

The presence of potentially AI-generated fake citations becomes especially awkward given that one of the report’s 110 recommendations specifically states the provincial government should “provide learners and educators with essential AI knowledge, including ethics, data privacy, and responsible technology use.”

Sarah Martin, a Memorial political science professor who spent days reviewing the document, discovered multiple fabricated citations. “Around the references I cannot find, I can’t imagine another explanation,” she told CBC. “You’re like, ‘This has to be right, this can’t not be.’ This is a citation in a very important document for educational policy.”

When contacted by CBC, co-chair Karen Goodnough declined an interview request, writing in an email: “We are investigating and checking references, so I cannot respond to this at the moment.”

The Department of Education and Early Childhood Development acknowledged awareness of “a small number of potential errors in citations” in a statement to CBC from spokesperson Lynn Robinson. “We understand that these issues are being addressed, and that the online report will be updated in the coming days to rectify any errors.”

Education report calling for ethical AI use contains over 15 fake sources Read More »