
SESs 7th and 8th O3b mPOWER satellites set to begin connectivity services
SES has announced that the latest pair of O3b mPOWER satellites launched in December 2024 is now ready to offer services across the globe.
Featuring redesigned payload power modules, the seventh and eighth O3b mPOWER satellites are bolstering the capabilities of SESs second-generation medium earth orbit (MEO) system, supporting the delivery of high throughput and predictable low latency services at scale. To date, SES has launched eight out of 13 O3b mPOWER high-throughput and low-latency satellites. The next O3b mPOWER launch is scheduled for summer 2025.
SES has also expanded its strategically located satellite ground stations, and now has 12 operational O3b mPOWER gateways located in South Africa, Peru, Brazil, Portugal, Australia, Greece, the US, Chile, the United Arab Emirates and Senegal. Five out of these are co-located and operated by Microsofts Azure data centres.
Our O3b mPOWER services are in high demand and we were eagerly awaiting the additional satellites to strengthen our MEO network, said Adel Al-Saleh, CEO of SES. As we continue to deploy additional O3b mPOWER satellites, we are bringing substantially more capacity and improved network efficiency, resulting in a threefold increase in available capacity by 2027 to better serve our mobility, government, enterprise and cloud customers.
SES started offering O3b mPOWER services worldwide since April 2024 and has been delivering high-performance network services to customer sites across Asia-Pacific, Africa, the Middle East and the Americas in multiple market segments. The systems exceptional flexibility means it can provide services ranging from tens of Mbps to multiple gigabits per second of capacity to any site.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Zawya
3 days ago
- Zawya
US Stocks: S&P 500, Nasdaq hit new closing highs on rate cut hopes
NEW YORK: The benchmark S&P 500 and Nasdaq indexes hit new closing highs for the second straight day on Wednesday on hopes that the Federal Reserve was getting close to a monetary easing cycle. But the market reflected weakness in some technology stocks after the previous day's strong gains. Signs that U.S. tariffs on imports have not fully filtered into headline consumer prices came as a relief for investors this week as they seek insight on the impact of trade uncertainty on the economy. Some large technology stocks including Nvidia, Alphabet and Microsoft - among the so-called Magnificent Seven stocks - closed lower as investors searched for new growth drivers. "Valuations are elevated. I do think, though, at the end of the day, the key will be the delivery of earnings, and that's what we're seeing," said Katherine Bordlemay, co-head of client portfolio management, fundamental equities at Goldman Sachs Asset Management. She said the dispersion of stock-level returns in the U.S. is at one of the higher levels of the last 30 years. Apple rose 1.6% after Bloomberg News reported the company is plotting expansion into AI-powered robots, home security and smart displays. The Dow Jones Industrial Average rose 463.66 points, or 1.04%, to 44,922.27, the S&P 500 gained 20.82 points, or 0.32%, to 6,466.58 and the Nasdaq Composite gained 31.24 points, or 0.14%, to 21,713.14. The Russell 2000 index, which tracks rate-sensitive small-cap companies, rose almost 2% to hit a six-month high. Traders are now fully pricing in a 25 basis-point interest rate cut, according to the CME's FedWatch Tool. The central bank last lowered borrowing costs in December. Treasury Secretary Scott Bessent said on Wednesday he thought an aggressive half-point cut was possible, given recent weak employment numbers. Investors were also taking notice of other sectors following the recent tech-led rally in U.S. stocks that has pushed valuations of the S&P 500 above long-term averages. Healthcare stocks, which have been beaten down for much of the year, rose 1.6% to rank among the leading sectors in the 11 S&P 500 sectors. Chicago Federal Reserve President Austan Goolsbee said on Wednesday the U.S. central bank is grappling with understanding whether tariffs will push up inflation just temporarily or more persistently, which would inform its decision on when to cut interest rates. CoreWeave, which is backed by Nvidia, fell almost 21% after the AI data center operator reported a bigger-than-expected quarterly net loss. Paramount Skydance jumped 36.7% as the company won exclusive broadcasting rights to the Ultimate Fighting Championship for seven years. Advancing issues outnumbered decliners by a 4.05-to-1 ratio on the NYSE. There were 630 new highs and 56 new lows on the NYSE. On the Nasdaq, advancing issues outnumbered decliners by a 2.53-to-1 ratio. The S&P 500 posted 40 new 52-week highs and 2 new lows while the Nasdaq Composite recorded 149 new highs and 69 new lows. Volume on U.S. exchanges was relatively light, with 16.9 billion shares traded, compared with an average of 18.3 billion shares over the previous 20 sessions.


Zawya
3 days ago
- Zawya
Microsoft Vulnerabilities exposed by check point research
Check Point Research uncovered six fresh vulnerabilities in Microsoft Windows, including one critical flaw with potential for wide-reaching impact. These weaknesses could trigger system crashes, enable arbitrary code execution, or expose sensitive data across networks. Following a responsible disclosure process, Check Point privately reported these issues to Microsoft, with the final patch delivered on August 12 Patch Tuesday. Check Point customers are already protected—our security solutions actively detect and block attempts to exploit these vulnerabilities. Microsoft released the final patches for six newly discovered Windows vulnerabilities identified by Check Point Research, including one rated as critical. These vulnerabilities could crash entire systems or allow attackers to run malicious code, posing real risks to business operations. Additionally, one of the vulnerabilities marks what is likely the first publicly disclosed bug in a Rust-based component of the Windows kernel, raising important questions about the limits and challenges of memory safety in modern software. We strongly encourage all Microsoft users to apply the August updates right away. Check Point customers are already protected—our security solutions detect and block these threats. Read on to learn more about each vulnerability, the potential risks they pose, and how Check Point customers remain protected. Breaking Down the Vulnerabilities Check Point Research identified six vulnerabilities in Microsoft Windows, ranging from critical to moderate severity. In this section, we'll focus on the three most significant flaws, explaining their potential impact and why they matter—before briefly summarizing the remaining ones. 1. Vulnerability in Rust-Based Windows Kernel Component — System Crash Risk Check Point Research uncovered what is probably the first-ever publicly disclosed security flaw in a Rust-based component of the Windows kernel —Microsoft's foundational operating system layer. This vulnerability can cause a total system crash, forcing a hard reboot and instantly knocking users offline. Rust is widely praised for its ability to prevent memory bugs that have long challenged software security. Its introduction into Windows aimed to enhance system safety. In this case, the vulnerability emerged because Rust detected an underlying issue—but instead of containing the problem gracefully, it triggered a system-wide failure. For organizations with large or remote workforces, the risk is significant: attackers could exploit this flaw to simultaneously crash numerous computers across an enterprise, resulting in widespread disruption and costly downtime. This discovery highlights that even with advanced security technologies like Rust, continuous vigilance and proactive patching are essential to maintaining system integrity in a complex software environment. 2. Memory Corruption Vulnerabilities Enabling Arbitrary Code Execution Among the remaining vulnerabilities, two are especially concerning due to their exploitability, one of which is classified as critical and was patched Tuesday, August 12th. Both vulnerabilities, tracked as CVE-2025-30388 and CVE-2025-53766, allow attackers to execute arbitrary code on the affected system, effectively giving them the ability to run any malicious software they choose. This could include installing remote control tools or launching other damaging attacks, leading to a full system compromise. The attack vector involves interacting with a specially crafted file. When a user opens or processes this file, the vulnerability is triggered, allowing the attacker to take control. 3. Additional Memory Corruption and Information Disclosure Vulnerabilities The remaining three vulnerabilities also involve memory corruption, but with a different twist: they lead to information disclosure. Typically, information leaks are less immediately dangerous because an attacker would need a way to obtain the data leaked on a local system. However, one of these vulnerabilities, identified as CVE-2025-47984, can leak memory contents directly over the network, potentially exposing sensitive information beyond the local system. This network-linked memory leak raises the stakes, as attackers could remotely access data they shouldn't see without needing physical access to the computer. While these issues are generally considered less critical than full system compromise, they still represent important security risks and relevant patches should be applied. Secure Your Systems: Patch Now and Remain Protected The six Windows vulnerabilities uncovered by Check Point Research, including a system crash due to a flaw in a Rust-based kernel component, highlight the ongoing challenges of securing even the most mature and widely used operating systems. These vulnerabilities could lead to system crashes, remote code execution, and sensitive data leaks, all of which pose serious risks to organizations of any size. We strongly urge all Microsoft users to apply the August Patch Tuesday updates as soon as possible to protect their systems from these threats. Check Point customers are already safeguarded: our security solutions detect and block exploitation attempts related to these vulnerabilities, ensuring continuous protection even before patches are applied. Staying proactive with updates and threat detection is key to maintaining a strong security posture in today's evolving landscape.


Khaleej Times
4 days ago
- Khaleej Times
Passwords under threat as tech giants seek tougher security
Fingerprints, access keys and facial recognition are putting a new squeeze on passwords as the traditional computer security method -- but also running into public hesitancy. "The password era is ending," two senior figures at Microsoft wrote in a July blog post. The tech giant has been building "more secure" alternatives to log in for years -- and has since May been offering them by default to new users. Many other online services -- such as artificial intelligence giant OpenAI's ChatGPT chatbot -- require steps like entering a numerical code emailed to a user's known address before granting access to potentially sensitive data. "Passwords are often weak and people re-use them" across different online services, said Benoit Grunemwald, a cybersecurity expert with Eset. Sophisticated attackers can crack a word of eight characters or fewer within minutes or even seconds, he pointed out. And passwords are often the prize booty in data leaks from online platforms, in cases where "they are improperly stored by the people supposed to protect them and keep them safe," Grunemwald said. One massive database of around 16 billion login credentials amassed from hacked files was discovered in June by researchers from media outlet Cybernews. The pressure on passwords has tech giants rushing to find safter alternatives. Tricky switchover One group, the Fast Identity Online Alliance (FIDO) brings together heavyweights including Google, Microsoft, Apple, Amazon and TikTok. The companies have been working on creating and popularising password-free login methods, especially promoting the use of so-called access keys. These use a separate device like a smartphone to authorise logins, relying on a pin code or biometric input such as a fingerprint reader or face recognition instead of a password. Troy Hunt, whose website Have I Been Pwned allows people to check whether their login details have been leaked online, says the new systems have big advantages. "With passkeys, you cannot accidentally give your passkey to a phishing site" -- a page that mimics the appearance of a provider such as an employer or bank to dupe people into entering their login details -- he said. But the Australian cybersecurity expert recalled that the last rites have been read for passwords many times before. "Ten years ago we had the same question... the reality is that we have more passwords now than we ever did before," Hunt said. Although many large platforms are stepping up login security, large numbers of sites still use simple usernames and passwords as credentials. The transition to an unfamiliar system can also be confusing for users. Passkeys have to be set up on a device before they can be used to log in. Restoring them if a PIN code is forgotten or trusted smartphone lost or stolen is also more complicated than a familiar password reset procedure. "The thing that passwords have going for them, and the reason that we still have them, is that everybody knows how to use them," Hunt said. Ultimately the human factor will remain at the heart of computer security, Eset's Grunemwald said. "People will have to take good care of security on their smartphone and devices, because they'll be the things most targeted" in future, he warned.