Technology
What Snowflake isn’t saying about its customers’ data breaches

Snowflake’s security problems are, for lack of a greater word, growing after a recent wave of customer data theft.
After Ticketmaster became the primary company to link its recent data breach to cloud computing company Snowflake, loan comparison site LendingTree confirmed that its QuoteWizard subsidiary had data stolen from Snowflake.
“We can confirm that we use Snowflake for our business operations and have been notified by Snowflake that this incident may have impacted data from our QuoteWizard subsidiary,” Megan Greuling, a spokeswoman for LendingTree, told TechCrunch.
“We take these matters seriously and initiated an internal investigation immediately after receiving information from (Snowflake),” the spokesman said. “At this time, there does not appear to be an impact on consumer financial account information or LendingTree’s parent information,” the spokesperson added, declining to comment further, citing the continuing investigation.
As increasingly affected customers come forward, Snowflake has said little other than a brief statement on its website reiterating that there was no data breach on its own systems, but somewhat that customers weren’t using multi-factor authentication, or MFA, a security measure that Snowflake doesn’t implement or require its customers to enable by default. Snowflake itself caught wind of the incident, claiming that a former worker’s “demo” account was compromised since it was only protected by a username and password.
In an announcement Friday, Snowflake firmly stood by its response thus far, saying its position “remains unchanged.” Referring to his earlier statement on Sunday, Snowflake’s chief information security officer, Brad Jones, said it was a “targeted campaign targeting users using single-factor authentication” and using credentials stolen from information-stealing malware or obtained through previous data breaches.
The lack of MFA appears to be causing cybercriminals to download massive amounts of data from Snowflake customer environments that weren’t protected by an extra layer of security.
Earlier this week, TechCrunch found lots of of Snowflake customer credentials stolen online by password-stealing malware that was infecting the computers of employees who had access to their employer’s Snowflake environment. The credential count suggests there’s a risk for Snowflake customers who haven’t yet modified their passwords or enabled MFA.
Over the course of the week, TechCrunch sent Snowflake greater than a dozen questions about the continuing incident affecting its customers as we proceed to report on this story. Snowflake refused to reply our questions a minimum of six times.
These are among the questions we ask ourselves and why.
It shouldn’t be yet known what number of Snowflake customers are affected or whether Snowflake already knows about it.
Snowflake said it has thus far notified “a limited number of Snowflake customers” that the corporate believes could have been affected. On its website, Snowflake says it has greater than 9,800 customers, including technology corporations, telecommunications corporations and health care providers.
Snowflake spokeswoman Danica Stańczak declined to say whether the variety of affected customers was within the tens, tens, lots of or more.
It’s likely that despite several customer breaches reported this week, we’re only just starting to know the dimensions of this incident.
Even for Snowflake, it might not be clear how many shoppers are affected, as the corporate will either should depend on its own data, equivalent to logs, or discover directly from the affected customer.
It is unclear how quickly Snowflake could have learned about the hacking of its customers’ accounts. In an announcement, Snowflake said it became aware of “threat activity” on May 23 – accessing customer accounts and downloading their content – but later found evidence of intrusions dating back to around mid-April, suggesting the corporate had some data on whom he can rely.
But that also leaves open the query of why Snowflake didn’t detect the exfiltration of huge amounts of customer data from its servers until much later in May, and if that’s the case, why Snowflake didn’t publicly notify its customers earlier.
Mandiant, an incident response company that Snowflake called to assist reach customers he told Bleeping Computer in late May that the corporate has been helping affected organizations for “several weeks.”
We still do not know what was in the previous Snowflake worker’s demo account and whether it’s related to customer data breaches.
A key line from Snowflake’s statement reads: “We found evidence that the threat actor obtained personal credentials and accessed demo accounts belonging to a former Snowflake employee. It did not contain sensitive data.”
An evaluation by TechCrunch shows that among the stolen customer credentials related to the information-stealing malware include data belonging to a then-Snowflake worker.
As we have previously noted, TechCrunch shouldn’t be naming the worker since it’s unclear whether he did anything improper. The indisputable fact that Snowflake was caught failing to implement MFA, allowing cybercriminals to download data from a then-employee’s “demo” account using only their username and password, highlights a fundamental problem in Snowflake’s security model.
However, it’s unclear what role, if any, this demo account plays within the theft of customer data, because it shouldn’t be yet known what data was stored on it or whether it contained data from other Snowflake customers.
Snowflake wouldn’t say what role, if any, the then-Snowflake worker’s demo account played within the recent customer security breaches. Snowflake reiterated that the demo account “did not contain sensitive data,” but repeatedly declined to say how the corporate defines what it considers “sensitive data.”
We asked whether Snowflake considers individuals’ personal information to be sensitive data. Snowflake declined to comment.
It is unclear why Snowflake didn’t proactively reset passwords or require and implement the usage of MFA on its customer accounts.
It’s commonplace for corporations to force password resets on their customers after a data breach. But if you happen to ask Snowflake, there isn’t a violation. And while this will be true within the sense that there was no apparent breach of central infrastructure, Snowflake customers are fairly often exposed to security breaches.
Snowflake advises his clients involves resetting and rotating Snowflake credentials and forcing MFA on all accounts. Snowflake previously told TechCrunch that its customers care about their very own security: “In Snowflake’s shared responsibility model, customers are responsible for enforcing MFA against their users.”
However, since Snowflake’s customer data thefts involve the usage of stolen usernames and passwords for accounts that will not be protected by MFA, it’s remarkable that Snowflake didn’t intervene on behalf of its customers to guard their accounts with a reset passwords or forced MFA.
This shouldn’t be unheard of. Last 12 months, cybercriminals deleted 6.9 million user records and genetic data from 23andMe accounts that weren’t protected with MFA. 23andMe fastidiously reset user passwords to forestall further scraping attacks after which required MFA for all of its user accounts.
We asked Snowflake if the corporate plans to reset passwords for its customer accounts to forestall possible further breaches. Snowflake declined to comment.
According to them, Snowflake appears to be moving towards implementing MFA by default Runtime technical news site, quoting Snowflake CEO Sridhar Ramaswamy in an interview this week. This was later confirmed by Snowflake’s CISO Jones in a Friday update.
“We are also developing a plan to require our customers to implement advanced security controls such as multi-factor authentication (MFA) or network policies, especially for privileged Snowflake customer accounts,” Jones said.
No timetable for the implementation of the plan was provided.
Technology
Ilya Sutskever uses Google Cloud to supply AI Startup tests

Co -founder and former scientist of Opeli and former primary scientist ILYA SUTSKEVER, SAFE SUPERINTELELENCE (SSI), uses the Google Cloud TPU systems to supply their AI research, partly latest partnership that corporations announced on Wednesday press release.
Google Cloud claims that the SSI uses TPU to “accelerate its research and development to build safe, overintelical artificial intelligence.”
Cloud suppliers chase a handful of AI Unicorn startups, which spend tons of of hundreds of thousands of dollars annually on computing power supply for training AI Foundation models. The SSI agreement with Google Cloud suggests that the primary will spend a big a part of its computing budget with Google Cloud; The well -known source says TechCrunch that Google Cloud is the primary supplier of SSI calculations.
Google Cloud has the history of striking computing agreements with former AI researchers, a lot of which now lead billions of dollars of AI start-ups. (Sutskever once worked on Google.) In October Google Cloud said that he can be the primary supplier of computers for World Labs, founded by the previous scientist Ai Ex-Google Cloud Ai Fei-Feii Li.
It is just not clear whether the SSI has hit the partnership with other cloud or computers suppliers. Google Cloud spokesman refused to comment. A spokesman for a secure superintelligence didn’t immediately answer to the request for comment.
SSI got here out of Stealth in June 2024, months after Sutskever left his role because the primary scientist Opeli. The company has $ 1 billion in support from Andreessen Horowitz, Sequoia Capital, DST Global, SV Angel and others.
Since the premiere of the SSI, we’ve got heard relatively little about startup activities. On his websiteSSI says that the event of secure, super -intellectual AI systems is “our mission, our name and our entire product map, because this is our only goal.” SUTSKEVER He said earlier that he identified the “new mountain to climb” and is investigating latest ways to improve the performance of AI Frontier models.
Before the co -founder of Opeli, Sutskever spent several years on Google Brain examining neural networks. After years of conducting work of security, AI Openai Sutskever played a key role within the overthrow of the overall director of OPENNAI Altman in November 2023. Sutskever later joined the worker’s movement to restore Altman as CEO.
After the Sutskever trial, he was supposedly not seen in Openai offices for months and eventually left the startup to start SSI.
(Tagstransate) ilya SUTSKEVER (T) SSI
Technology
Meta introduces limited teen accounts on Facebook and Messenger

Meta introduces teen accounts on Facebook and Messenger. A function that routinely saves young users for the impression of applications with built -in security, shall be available on these platforms within the USA, Great Britain, Australia and Canada, before it expands to additional regions in the long run.
Teen accounts first appeared on Instagram in September last yr after Instagram, and other popular social networks were grilled by American legislators for not doing enough to guard teenagers. As a part of Tuesday’s announcement, Meta said that he brings a brand new built -in account protection for teenagers on Instagram.
With the extension of Facebook and messengers, teenagers shall be routinely placed in an experience that goals to cut back inappropriate content and unwanted contact. Teens under 16 years of age need parents’ consent to vary any of the settings.
While Post on the META blog about launching doesn’t provide exact restrictions under which teenagers shall be placed, the corporate told TechCrunch We -Mail that teenagers will only receive messages from individuals who follow or had news earlier.
In addition, only teen friends can see and reply to their stories. Tags, references and comments will even be limited to people they follow or who’re their friends.
Teens will even receive reminders of leaving social networks after using them for an hour a day. In addition, they shall be enrolled within the “quiet mode” overnight.
As for brand spanking new instagram restrictions, teens under 16 years of age is not going to give you the chance to modify to the platform, unless their parents give them permission. In addition, teenagers under the age of 16 can have to get the parents’ consent to show off the applying function, which blur images containing suspicion of nudity in DMS.

The changes announced on Tuesday show the newest Meta step towards solving problems related to the mental health of teenagers related to social media. These fears were Raised by an American general surgeon and several states, a few of which have even began to limit teenagers from using social media Without the consent of the parent.
The Meta shared insight into how teen accounts on Instagram are doing, because the corporate claims that it has moved 54 million teenagers to teen accounts. The meta claims that there remains to be lots more, because this function remains to be developing all around the world. The company also shared that 97% of teenagers aged 13-15 maintain built-in protection, says finish.
The finish line also commissioned an IPSOS study, which showed that just about all surveyed parents (94%) claim that teen accounts are helpful for fogeys, and 85% consider that they make helping teenagers easier to have positive experiences on Instagram.
(Tagstranslate) Facebook
Technology
Benchmarks meta for new AI models are somewhat misleading

One of the new flagship AI Meta models released on Saturday, Maverick, Second rating at LM ArenaA test during which human rankings compare the outcomes of models and select which they like. But it appears that evidently the Maverick version, that the finish implemented on LM Arena differs from the version that’s widely available to programmers.
How several And researchers He pointed to X, Meta noticed within the announcement that Maverick on LM Arena is a “experimental version of the chat.” Chart on The official website of LlamaMeanwhile, it reveals that the testing of the LM META Arena was carried out using “Llama 4 Maverick optimized for conversation.”
As we wrote earlier, for various reasons LM Arena has never been essentially the most reliable measure of the performance of the AI model. But AI firms generally didn’t adapt or otherwise adapted their models to higher rating at LM Arena-Lub a minimum of didn’t admit it.
The problem related to adapting the model to the reference point, suspension of it, after which releasing the “vanilla” variant of the identical model, is that programmers are difficult to predict how good it can work in specific contexts. It can be misleading. It is best if the tests tests – miserably inadequate – provide a shutter of strong and weaknesses of 1 model in various tasks.
Indeed, scientists on X have Stark was observed Differences in behavior From publicly to download maverick in comparison with the hosted model on LM Arena. The LM Arena version seems to make use of many emoji and provides extremely long answers.
Okay, Lama 4 is Def and Littled cooked lol, what a yap city is that this city pic.twitter.com/y3gvhbvz65
– Nathan Lambert (@natolambert) April 6, 2025
For some reason, the Llam 4 model in the sector uses rather more emoji
together. Ai, it seems higher: pic.twitter.com/f74odx4zttt
– technological notes (@techdevnotes) April 6, 2025
We arrived at Meta and Chatbot Arena, a company that maintains LM Arena to comment.
(Tagstotransate) benchmark
-
Press Release12 months ago
U.S.-Africa Chamber of Commerce Appoints Robert Alexander of 360WiseMedia as Board Director
-
Press Release1 year ago
CEO of 360WiSE Launches Mentorship Program in Overtown Miami FL
-
Business and Finance10 months ago
The Importance of Owning Your Distribution Media Platform
-
Business and Finance1 year ago
360Wise Media and McDonald’s NY Tri-State Owner Operators Celebrate Success of “Faces of Black History” Campaign with Over 2 Million Event Visits
-
Ben Crump12 months ago
Another lawsuit accuses Google of bias against Black minority employees
-
Theater1 year ago
Telling the story of the Apollo Theater
-
Ben Crump1 year ago
Henrietta Lacks’ family members reach an agreement after her cells undergo advanced medical tests
-
Ben Crump1 year ago
The families of George Floyd and Daunte Wright hold an emotional press conference in Minneapolis
-
Theater1 year ago
Applications open for the 2020-2021 Soul Producing National Black Theater residency – Black Theater Matters
-
Theater10 months ago
Cultural icon Apollo Theater sets new goals on the occasion of its 85th anniversary