
Zuckerberg surfed and drank beer on vacation, Musk: I prefer to work
After Meta CEO Mark Zuckerberg posted a video on his Facebook and Instagram accounts of his free time during the Independence Day holiday on the X platform, Musk said, "I prefer to work." Zuckerberg posted a video of himself surfing on a hydrofoil in a tuxedo, waving an American flag and drinking a beer, and wrote: "Happy birthday America." The video quickly went viral, and after greg shared it on the X platform, Musk replied: "I hope he continues to have fun on the yacht." I prefer to work." Musk, a workaholic, attended the 29th annual Barron Investment Conference in November 2022, where he said: "My workload went from 78 hours a week to 120 hours a week..." In 2018, he slept on the floor of the Gigafactory in Fremont in an effort to ramp up production of the Tesla Model 3.

Hamas chief says latest Israeli attack on Gaza could jeopardise ceasefire talks
AIRO, July 8 (Reuters) - A new Israeli assault on Gaza on Monday threatened ceasefire talks at a crucial moment, the head of Hamas said, as Israeli tanks pressed into the heart of Gaza City and ordered residents out after a night of massive bombardment. Residents said the airstrikes and artillery barrages were among the heaviest in nine months of conflict between Israeli forces and Hamas militants in the enclave. Thousands fled. The assault unfolded as senior U.S. officials were in the region pushing for a ceasefire after Hamas made major concessions last week. The militant group said the new offensive appeared intended to derail the talks and called for mediators to rein in Israel's Prime Minister Benjamin Netanyahu. The assault "could bring the negotiation process back to square one. Netanyahu and his army will bear full responsibility for the collapse of this path," Hamas quoted leader Ismail Haniyeh as saying. Gaza City, in the north of the Palestinian enclave, was one of Israel's first targets at the start of the war in October. But clashes with militants there have persisted and civilians have sought shelter elsewhere, adding to waves of displacement. Much of the city lies in ruins. Residents said Gaza City neighbourhoods were bombed through the night into the early morning hours of Monday. Several multi-storey buildings were destroyed, they said. The Gaza Civil Emergency Service said it believed dozens of people were killed but emergency teams were unable to reach them because of ongoing offensives. Gaza residents said tanks advanced from at least three directions on Monday and reached the heart of Gaza City, backed by heavy Israeli fire from the air and ground. That forced thousands of people out of their homes to look for safer shelter, which for many was impossible to find, and some slept on the roadside.

South Korean government decides not to punish interns who resign
South Korea's Minister of Health and Welfare Cho Kyu-hong said at a press conference on the 8th local time that after comprehensively considering the suggestions of frontline interns and the situation on the front line of medical care, the government decided that from that day on, all interns and residents who resigned would not be given administrative sanctions such as revoking their medical licenses. Cho Kyu-hong also said that for interns and residents who have returned to work and those who have resigned and are preparing to re-register for internship courses in September, the government will make special cases to try to minimize the internship gap and not affect the relevant doctors from obtaining specialist medical licenses. Cho Kyu-hong said that the government believes that in order to minimize the diagnosis and treatment gaps for critically ill and emergency patients and ensure the smooth training process of interns and residents, it is in the public interest, so it has made a decision not to punish interns and residents who resigned. It is hoped that major hospitals will complete the resignation processing of doctors who have not returned to work before July 15 and determine the scale of vacancies. Previously, large general hospitals in South Korea, such as Seoul National University Hospital, Yonsei University Severance Hospital, and Seoul Asan Medical Center, suspended or limited their medical services in an effort to cancel all penalties against interns and residents.

EV maker Lucid to recall over 5,200 Air luxury sedans for software error, US regulator says
July 9 (Reuters) - Lucid Group (LCID.O), opens new tab will recall about 5,251 of its 2022-2023 Air luxury sedans due to a software error that could cause a loss of power, according to a notice from the U.S. National Highway Traffic Safety Administration published on Tuesday. The regulator added the EV maker will also recall about 7,506 of its 2022-2024 Air luxury sedans due to an issue with a coolant heater that could fail to defrost the windshield. Lucid had released an over-the-air software update in June as a fix for the software error and a separate update to identify a high voltage coolant heater failure and provide a warning to the drivers of the affected vehicles. The company had reported second-quarter deliveries above market expectations on Monday, as price cuts helped boost demand for its luxury electric sedans.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.