Daily Drop: (443)
Monday, March 27, 2023 // (IG): BB // Cyber-Roundup// Coffee for Bob
China Deploys Weapons Capable Of ‘Wiping’ US Space Capabilities; PLA’s Phenomenal Rise Alarms Pentagon
Analyst Comments: The militarization of space, as evidenced by the increasing development of anti-satellite missiles, ground-based directed energy, and orbit interception capacities, has become a global concern, particularly with China's phenomenal rise in the space sector. China and Russia's expansion of their in-orbit assets by 70% in the last two years has contributed to the increased militarization of space. As a result, the US Space Force is focusing on building resilient, ready, combat-credible forces, amplifying the Guardian spirit, and strengthening partnerships with allies to accomplish its mission.
FROM THE MEDIA: India's Chief of the Air Staff, Air Chief Marshal VR Chaudhari, has expressed concern about the increasing militarization of space, stating that a race to weaponize space has begun. The Indian Air Force chief called for both offensive and defensive capabilities in space to safeguard Indian assets. Similarly, General Bradley Chance Saltzman, the US Chief of Space Operations, identified China as the biggest threat in the space arms race, citing the country's development of a range of weapons aimed at US space capabilities. Experts say China is on track to become the dominant military force in space by 2045, and the country has been rapidly closing the gap with the US in space dominance and ambition. China is developing and testing anti-satellite weapons that could take down adversary satellites in low and high orbits, and its intentions to fight "informalized" wars of the future have led to the establishment of the Strategic Support Force in 2015. The global space industry is currently worth an estimated $1.4 trillion, with independent forecasts predicting its value will reach €1tn before 2040.
READ THE STORY: The Eurasian Times
Time for an International Cyber Court
Analyst Comments: The damages caused by cybercrime are significant and are set to increase further in the future. International cooperation is required to tackle this global challenge, and there are several options being considered to establish an international cybercrime court. However, due to the lack of comprehensive international legal regulation of international information security and the divergent positions of states on the implementation of personal criminal responsibility for cybercrime, creating such a body at the current stage of international law evolution and amid a serious crisis crippling international relations would be an untimely move. Nonetheless, the issue of creating a judicial body to address cybercrime should remain a priority for international organizations and nations to develop a comprehensive universal international legal framework for cooperation in ICT.
FROM THE MEDIA: In the current international environment, the significance of Information and Communications Technology (ICT) is steadily rising, and international cooperation is gradually moving towards a legal architecture for ICT governance and international information security (IIS) as an integral part of the overall international security framework. Cybercrime is a key global challenge on this path, and the damages from cybercrime are estimated to exceed $11 trillion in 2023, while annual global spending on countering cyber offenses could exceed $20 trillion by 2026. International cooperation in countering cybercrime is actively developing through various forms of criminal prosecution, including mutual legal assistance, cooperation in the field of arrest warrants, law enforcement collaboration, mutual recognition of foreign verdicts, etc. However, the existing possibilities of legal assistance and international cooperation in fighting cybercrime are woefully insufficient in most cases.
READ THE STORY: ModernDiplomacy
Food production giant Dole says the February ransomware attack compromised employees' personal data
Analyst Comments: The attack against Dole is significant in terms of cybersecurity for critical infrastructure, as the ransomware attack compromised the sensitive personal information of the company's employees. Dole is one of the world's largest producers of fruit and vegetables, and its operations span several countries, making it a significant target for cybercriminals. The incident highlights the need for organizations to adopt data-centric security measures such as tokenization, have a clear incident response plan, and reduce the implicit trust of entities and users within the network. Additionally, the incident underscores the need for vigilance and the assumption that organizations will be targeted by threat actors who will try to disrupt operations and compromise sensitive data.
FROM THE MEDIA: On February 10, 2023, the Dublin, Ireland-based food production company Dole suffered a ransomware attack that affected its daily operations. The company immediately shut down its systems throughout North America, with plants and shipments put on hold. Dole subsequently launched an investigation with forensic experts to fix the issue and secure its systems. In a recent filing with the U.S. Securities and Exchange Commission (SEC), Dole confirmed that the threat actors behind the ransomware attack had gained unauthorized access to its employees' data. Although Dole has not commented on the number of individuals affected or the identity of the attackers, the company has notified all relevant law enforcement authorities.
READ THE STORY: TEISS
OpenAI: ChatGPT payment data leak caused by an open-source bug
Analyst Comments: The ChatGPT data leak and outage are significant in terms of cybersecurity as they exposed sensitive personal information for a number of ChatGPT Plus subscribers. OpenAI's post-mortem report revealed that the bug was in an open-source library, highlighting the potential risks of relying on third-party libraries without conducting thorough security checks. The incident underscores the need for companies to conduct regular security audits, especially when using open-source software, to prevent data breaches and other security incidents.
FROM THE MEDIA: OpenAI has revealed that a bug in the Redis client open-source library caused the data leak and outage that occurred on Monday, March 20, on its ChatGPT service. The bug resulted in the exposure of users' personal information and chat queries, affecting approximately 1.2% of ChatGPT Plus subscribers. OpenAI reached out to Redis maintainers and provided a patch to resolve the issue as soon as the bug was identified. The exposed information included the name, email address, payment address, and the last four digits of the credit card number and expiration date for affected subscribers. OpenAI has contacted all affected ChatGPT users who had their payment information exposed.
READ THE STORY: Bleeping Computer
The dilemma of China’s role as Mediator in the case of Ukraine
Analyst Comments: China's role as a global security provider and mediator in the Russo-Ukrainian war. The importance of this role can be assessed both tactically and strategically. From a tactical standpoint, China's mediation could potentially end the ongoing war, leading to significant changes in the security and political landscape of the region. However, this will require Ukraine to accept China as a mediator and lose Western vital support, which could affect its economy and future stability. Strategically, China's role as a global mediator can contribute to the ongoing shift towards a multipolar world order model, posing a challenge to the US's global influence and leadership.
FROM THE MEDIA: China has offered to participate in peaceful adjustments to end the Russo-Ukrainian war, but Ukraine is reluctant to accept Beijing's brokering. China gained legitimacy as a global security provider by launching the Global Security Initiative, which posed itself as a stabilizing mediator. However, Ukraine remains politically, diplomatically, militarily, and economically dependent on the West and is ideologically biased to accept the West as the only security guarantee provider. Additionally, Ukraine has its own approved peace plan, which assumes the restoration of territorial integrity and Russian troop withdrawal from occupied territories. It is not clear whether China's proposition of an immediate ceasefire and peace talks launch, without addressing Ukraine's territorial restoration, would be acceptable to Ukraine.
READ THE STORY: Modern Diplomacy
Emotet malware distributed as fake W-9 tax forms from the IRS
Analyst Comments: The significance of the phishing campaign targeting US taxpayers is high, as Emotet malware has been known to steal sensitive personal and financial information, and the US tax season is a time when people may be more vulnerable to phishing scams. The use of Microsoft OneNote files with embedded scripts to install the malware highlights the evolving tactics of Emotet, which is adapting to Microsoft's security measures. The widespread use of reply-chain emails and impersonating legitimate business partners increases the likelihood of unsuspecting victims falling prey to the phishing campaign. The impact of a successful attack could result in significant financial losses for individuals and businesses and the potential for the installation of other malware, such as ransomware, by other threat actors. The article recommends caution when receiving tax forms via email and advises people to scan documents with local antivirus software and to avoid uploading them to cloud-based scanning services.
FROM THE MEDIA: A new phishing campaign is targeting US taxpayers with fake W-9 tax forms allegedly sent by the Internal Revenue Service (IRS) and companies that people work with. The Emotet malware operation is notorious for distributing malware through phishing emails containing Microsoft Word and Excel documents with malicious macros, but after Microsoft blocked macros by default in downloaded Office documents, Emotet has switched to using Microsoft OneNote files with embedded scripts to install the malware. Once installed, the malware steals victims' emails to use in future reply-chain attacks and installs other malware, providing access to other threat actors, such as ransomware gangs. Emotet is using themed phishing campaigns to coincide with holidays and yearly business activities such as the current US tax season.
READ THE STORY: Bleeping Computer
Unpacking the “China Debt Trap” Narrative: Nuances and Context
Analyst Comments: The "China debt trap" cannot be analyzed in isolation, as it is embedded within a complex geopolitical landscape. In particular, the Indo-Pacific region has recently witnessed heightened competition between China and the United States, which has consequently led to increased scrutiny of China's investments in developing countries. The United States has taken a critical stance toward China's Belt and Road Initiative (BRI) and accused China of utilizing debt to achieve strategic leverage in developing countries. Additionally, the United States has introduced its own economic and security initiatives in the region, including the Free and Open Indo-Pacific strategy and the Build Back Better World (B3W) initiative.
FROM THE MEDIA: China has extended substantial economic and military aid to Pakistan, including the development of the China-Pakistan Economic Corridor (CPEC), a significant infrastructure project intended to link China's western regions to the Arabian Sea via Pakistan. While China's Belt and Road Initiative (BRI) has been criticized for leading developing countries into the "China debt trap," not all of China's infrastructure initiatives in emerging economies adhere to the same blueprint. Instead, the outcome depends on several factors, including the terms of the loan agreement, the economic policies of the recipient country, and the governance framework that governs the project.
READ THE STORY: Modern Diplomacy
Online trolls are taking a toll in China
Analyst Comments: The online bullying phenomenon in China has claimed the lives of several individuals, indicating that it is a serious problem that needs to be addressed. The prevalence of cyberbullying and its impact on mental health underscores the need for enhanced social media regulations and policies in China. In addition, the lack of support for victims and inadequate mental healthcare exacerbates the situation. The Chinese government must recognize the seriousness of this issue and take steps to address it through public education, mental health support, and stronger regulations to protect victims of online bullying. In the absence of such measures, the problem could worsen, leading to more tragedies in the future.
FROM THE MEDIA: Zheng Linghua, a 23-year-old music student, shared a photo of her with her grandfather on the Chinese social media platform Xiaohongshu, announcing her admission to East China Normal University. However, the photo and her subsequent posts made her a target of online bullying, which led to her death on January 23, 2023. A poll of over 2,000 Chinese social media users found that 40% had experienced online abuse, with 16% of victims having suicidal thoughts. Experts point out that online bullying is exacerbated in China's collectivist culture, where going against the norm can result in severe punishment. While social media platforms in China have been accused of not doing enough to protect users, the government's censorship machinery is more focused on stifling dissent rather than combating cyberbullying. Mental healthcare needs to be strengthened, and public education on online safety is crucial to combat online bullying.
READ THE STORY: BBC
EU and UK ramp up talks on defense co-operation
Analyst Comments: The discussions between the EU and the UK regarding increased defense and security cooperation in response to Russia's war in Ukraine hold strategic significance. Given the current conflict, better coordination in security matters and joint-up defense industrial planning are vital to ensure the safety of the involved nations. The need for potential joint-defense missions and intelligence sharing will enable these nations to better prepare for and defend against any future aggression. Additionally, closer EU-UK defense cooperation can increase defense capacity for Europe, thus strengthening the European Union's overall security.
FROM THE MEDIA: Senior officials from the European Union (EU) and the UK have been holding discussions in recent weeks regarding increased defense and security cooperation in response to Russia's war in Ukraine. The success of the Windsor framework, which resolved Northern Ireland's post-Brexit trading arrangements, encouraged officials to ramp up discussions regarding better coordination in areas such as European arms production. The discussions are aimed at incremental progress rather than a formalized agreement. The EU and the UK are exploring potential areas of cooperation such as intelligence-sharing, joint defense missions, and possible ties with the European Defense Agency. Although officials are keen on better cooperation, they are wary of potential political blowback from Eurosceptic members of the UK's governing Conservative party. The significance of these discussions lies in the need for better coordination on security matters and joint-up defense industrial planning to meet increased demand for arms production.
READ THE STORY: FT
The Limits of Economic Warfare
Analyst Comments: While sanctions and export controls have undermined Russia’s financial resources and industrial base, they have done little to change the Kremlin’s strategic calculus. Russia was able to profit off its own war and had been prepared for Western sanctions, and the sanctions on Russia have been somewhat more limited in scope. The lesson learned is that sanctions are a valuable supporting tool but are rarely going to be a magic bullet or radically alter the decision calculus of an adversary in the short term. Countries continue to operate in a hard-power world, and the success of military defenses and failures of the adversary’s military will be a greater deterrent to military adventurism than economic costs.
FROM THE MEDIA: This report analyzes the effectiveness of economic sanctions imposed by the US and its allies on Russia in response to its invasion of Ukraine in February 2022. While the sanctions have undermined Russia's financial resources and industrial base, they have done little to change the Kremlin's strategic calculus. The report notes that sanctions are not a panacea and that Western policymakers need to invest in a range of tools to defend their interests and values in the context of a protracted conflict with Russia and an era of geopolitical great-power competition with China. The report recommends using sanctions to support more immediate goals, such as providing necessary support to the defense of Ukraine and investing more heavily in information tools to boost favored narratives not just in like-minded countries but also in non-aligned states and within Russia and other authoritarian countries themselves.
READ THE STORY: Foreign Affairs
The Role of Technology and Innovation in Countering Extremism and Terrorism
Analyst Comments: The increasing global threat of extremism and terrorism is a significant tactical and strategic concern. The rise of these global threats poses a serious risk to social cohesion, economic development, and human life. The use of innovation and technology is becoming more popular as a strategy to combat these threats. The use of social media and digital communication channels by extremist groups to spread propaganda and find new members has been identified as a significant challenge. The advancement of surveillance technology, artificial intelligence, and data analytics has improved the effectiveness and efficiency of counterterrorism efforts. Additionally, empowering communities through technology can help prevent the spread of extremist ideology and radicalization.
FROM THE MEDIA: Extremism and terrorism pose a serious threat to social cohesion, economic development, and human life worldwide. Governments, civil society, and private organizations have all struggled to find effective solutions to these global threats. With the development of modern technology, terrorist groups have used it to carry out attacks more frequently. The internet, social media, and other digital communication channels have been identified as significant in the spread of extremist ideologies, recruitment, and attack planning. In response, efforts have been made to monitor and thwart extremist content online using technology. Governments have invested in surveillance technology like drones, facial recognition software, and biometric scanners to monitor and track potential threats. Additionally, counterarguments to extremist ideologies have been disseminated using technology and innovation. This article discusses the role of technology in combating extremism and terrorism.
READ THE STORY: Modern Diplomacy
What's happening with the Latitude Financial cyber attack? Millions of customer details were stolen in one of the largest-known data breaches in Australia
Analyst Comments: The cyber attack on Latitude Financial is significant, as millions of customers' personal data have been stolen. The Australian government has responded by calling for a national cyber office to be established to lead emergency responses to cyber attacks. The attack is a warning to financial institutions to be vigilant with their cybersecurity protocols and to prepare for the possibility of cyber-attacks in the future. Customers of Latitude Financial are advised to stay alert for phishing scams, ensure that communications received are legitimate, not open texts from unknown or suspicious numbers, change passwords regularly with strong passwords, and activate multi-factor authentication when available on any online accounts.
FROM THE MEDIA: Latitude Financial, a non-bank lender based in Melbourne, has confirmed that the personal data of millions of Australian and New Zealand customers have been stolen in a cyber attack that was announced on March 16. The data stolen includes up to 7.9 million driver’s license numbers and 53,000 passport numbers. Latitude confirmed that the hack is the largest-known data breach on a financial institution in Australia. The company is rectifying the platforms impacted in the attack and has implemented additional security monitoring as they return to operations. The company apologized for the attack and is reimbursing customers who choose to replace their stolen ID documents. Latitude is cooperating with the Australian Federal Police in their investigation of the incident and with the Australian government to ensure customers affected by the attack are protected from immediate and future risks.
READ THE STORY: ABC (UK)
United States charges Russian spy who lived in Maryland using forged identity
Analyst Comments: The charges against Cherkasov highlight the continued efforts of Russian intelligence agencies to carry out espionage activities in foreign countries using false identities and forged documents. The case also underscores the importance of thorough background checks and vetting procedures for individuals seeking access to sensitive information or positions of trust in government, academic, or private sector organizations. The charges against Cherkasov are a reminder of the ongoing threat posed by foreign intelligence services to national security and the need for continued vigilance in countering these threats.
FROM THE MEDIA: On March 25, 2023, the US Department of Justice charged a Russian intelligence operative, Victor Muller Ferreira, with espionage and other crimes for acting as an unregistered agent of a foreign power and repeatedly carrying out visa, bank, and wire fraud from 2018 to 2020. Ferreira, who is actually Sergey Vladimirovich Cherkasov, a 36-year-old Russian citizen and former intelligence officer for the Main Directorate of the Russian Armed Forces General Staff (GRU), had been stopped from entering the Netherlands in June of 2022, where he had intended to join the International Criminal Court as an intern. He was found guilty in Brazil of having used the identity of a dead Brazilian citizen to forge identity papers, which he then used to enter and leave Brazil 15 times over 10 years. Having examined the charges against Cherkasov, the court jailed him for 15 years. The charges by the US Department of Justice resulted from an investigation conducted by the Federal Bureau of Investigation’s counterintelligence division, in coordination with the Bureau’s Washington Field Office.
READ THE STORY: INTELNEWS
Detecting ChatGPT Phishing on Social Media with the Help of DNS Intelligence
Analyst Comments: The discovery of phishing attacks using ChatGPT sites to phish for credit card information is significant as it demonstrates that the popularity of ChatGPT makes it an attractive target for cybercriminals. The identified IoCs, domains, subdomains, and malware hosts suggest a coordinated and sophisticated attack campaign, which could have a significant impact on military operations and critical infrastructure. The analysis also highlights the importance of adopting effective cybersecurity measures such as monitoring WHOIS records and DNS ties to detect and prevent such attacks.
FROM THE MEDIA: Cyble researchers have discovered phishing attacks using supposed ChatGPT sites to phish personally identifiable information (PII), specifically credit card data. The study identified four domains as indicators of compromise (IoCs) and subsequently found five IP addresses, 303 domains, and 1,142 domains starting with openai., chatgpt., and rebrand. (akin to two of the IoCs), 2,693 subdomains that contained the string chatgpt, and 11 confirmed malware hosts. The WHOIS record comparisons of string-connected domains and subdomains revealed that only three of the 372 domains started with openai. shared OpenAI's registrar and registrant country, only one of the 184 domains that started with the rebrand. was owned by Rebrand, and none of the 589 domains started with chatgpt. shared OpenAI's registrar and registrant country.
READ THE STORY: CircleID
The Innate, Psychopathic Nature of Software Engineering
Analyst Comments: The article highlights the potential dangers of software engineering and the development of AI. The author's argument that the "proof of concept" mindset often prioritizes coding over considering the impact on society is a valid concern. The article also raises important questions about the responsibility of software engineers to analyze the impact of their code and the potential psychopathic nature of the field. The significance of these issues is both tactical and strategic, as the development of AI and other advancements in computing will have far-reaching consequences for society.
FROM THE MEDIA: The author, a software engineer, reflects on the creative need of humans and the potential dangers that arise from it. He argues that software engineering, particularly in the development of AI, can be a slippery slope because the "proof of concept" mindset often prioritizes coding over considering the impact on society. The author questions whether software engineers have a responsibility to analyze the impact of their code before proving their concept. He argues that the development of AI and other advancements in computing has been driven by an innate desire to create, which can hide a deeper DNA-prescribed need to be like gods. The author suggests that software engineering has a psychopathic nature because of the bold, disinhibited, and egotistical traits it requires. He argues that this is a dangerous combination, particularly given the power of software engineering in every industry and the potential for AI to create irreversible damage if not developed responsibly.
READ THE STORY: Medium
Crypto groups expand in Hong Kong in a bid to tap mainland China's demand
Analyst Comments: The increasing presence of cryptocurrency companies in Hong Kong and their optimism that the city will offer a pathway for them to gain legal access to the Chinese market is significant from a strategic perspective. Hong Kong's push to become a hub for digital assets reflects a growing global trend toward mainstream adoption of cryptocurrencies. This development may result in Beijing easing restrictions on cryptocurrency trading and offshore exchanges, which could open up a vast and growing market to investors. However, this also presents potential risks, as cryptocurrency trading remains largely unregulated and susceptible to fraudulent activities, as evidenced by the US SEC's recent fraud allegations against Justin Sun, founder of Tron blockchain network and board member of Huobi.
FROM THE MEDIA: Cryptocurrency companies are increasing their presence in Hong Kong, hoping to leverage the city's push to become a hub for digital assets to capture demand from mainland China to buy and sell tokens. Hong Kong is seen by some businesses as being more crypto-friendly than rival Singapore, which imposed regulatory restrictions on the industry last year after several high-profile collapses. Hong Kong is developing a new regulatory regime for exchanges and legalizing crypto trading for retail investors. Companies hoping to establish or expand their presence in Hong Kong include exchanges KuCoin, Gate.io and Huobi, and Binance, the world's largest crypto exchange. These companies are optimistic that Hong Kong will offer a pathway for them to gain legal access to the Chinese market with regulatory approval from a top-tier financial hub. Cryptocurrency entrepreneurs believe Hong Kong's adoption of crypto is a signal that Beijing will eventually ease restrictions.
READ THE STORY: FT
Ransomware Attack to Hit Revenue at India’s Top Drugmaker
Analyst Comments: The cybersecurity breach at Sun Pharmaceutical Industries Ltd. is significant from a tactical and strategic perspective, as it has the potential to impact the company's financial and operational stability. The attack highlights the increasing threat of ransomware attacks, which are becoming more sophisticated and frequent. The incident also underscores the importance of cybersecurity measures for companies in the pharmaceutical industry, which handle sensitive and confidential data.
FROM THE MEDIA: Sun Pharmaceutical Industries Ltd., India’s largest drugmaker, has announced that its revenue is expected to decrease due to a cybersecurity breach in early March. The company disclosed that a ransomware group claimed responsibility for the breach, which involved a breach of some file systems and theft of certain company and personal data. While Sun Pharma is unable to determine other impacts of the breach, it has warned that expenses linked to the incident are anticipated.
READ THE STORY: Insurance Journal
Here Come the Hacktivists
Analyst Comments: The activity of "hacktivist" groups in the ongoing conflict between Russia and Ukraine has significant tactical and strategic implications. While the attacks carried out by these groups are relatively unsophisticated and often ridden out by targeted organizations, they have the potential to cause significant disruption and financial harm. Moreover, the use of hacktivist groups in the conflict underscores the importance of cybersecurity measures for both military and non-military targets, as cyber attacks have become an increasingly common tool in modern warfare. Additionally, the use of cryptocurrency as a means of payment for successful attacks and fundraising highlights the importance of tracking cryptocurrency transactions and implementing measures to prevent the use of cryptocurrency for illicit activities.
FROM THE MEDIA: Amid the ongoing conflict between Russia and Ukraine, "hacktivist" groups on both sides are conducting cyber attacks against each other. On the Ukrainian side is the IT Army of Ukraine, while on the Russian side is the group KillNet, which has splintered and occasionally fought among itself. KillNet is estimated to have around 30,000 volunteers, and its activists have attacked western targets each time somebody helps Ukraine or criticizes Russia. The groups raise funds by selling branded merchandise, such as jewelry rings, with a portion of the proceeds going to the group. They also pay a bonus for each successful attack, incentivizing hacktivists who can use bots to carry out attacks and earn regular income. The most common tactic used by these groups is denial-of-service attacks, which are relatively unsophisticated and often ridden out by organizations.
READ THE STORY: CDO
Items of interest
The confrontation between US and Chinese ships in the South China Sea
Analyst Comments: The recent sailing of the US Navy destroyer near the Paracel Islands in the South China Sea is a significant event as it highlights the ongoing tensions between the US and China in the region. The South China Sea is an important waterway for global trade, and the area holds valuable fish stocks and undersea mineral resources. Therefore, any disruption to the region's stability and security could have an impact on global trade and economic growth. China's increasingly assertive behavior in the region and the US's pushback has raised concerns about the potential for an armed conflict, which could have severe consequences for the region and beyond.
FROM THE MEDIA: On 3 and 4 March 2023, the US Navy guided-missile destroyer USS Milius sailed near the disputed Paracel Islands in the South China Sea. The move was part of a “freedom of navigation operation” and challenged China, Taiwan, and Vietnam’s requirements for advance notification or permission before a military vessel can pass through. China accused the US of violating its sovereignty and security and said its navy and air force had forced the American vessel away, although the US military denies this. Tensions between the two countries are at a new low. The South China Sea is a crucial waterway for global trade, with around $5 trillion in trade passing through each year, and it holds valuable fish stocks and undersea mineral resources.
READ THE STORY: Modern Diplomacy
The future of Adtech (Video)
FROM THE MEDIA: The transcript is from the Bristows Tech Summit and covers a range of topics related to technology and law. The summit covers adtech, AI, data privacy, tax, and brands, with a focus on the adtech sector. The speaker discusses the importance of technology in the firm's work and the different types of businesses that fall under the technology sector. The speaker also explains the adtech ecosystem and the process of real-time bidding. The latter part of the transcript focuses on compliance issues, such as e-privacy legislation and GDPR, and mentions recent fines issued to Google, Facebook, and Grindr. The transcript also discusses the end of third-party cookies and the development of identifier-based proposals and cleanroom solutions.
WTF is the Justice Department’s ad tech antitrust case against Google (Video)
FROM THE MEDIA: The Justice Department has filed an antitrust lawsuit against Google's ad tech business, alleging that for 15 years, Google has engaged in anti-competitive conduct that has allowed it to halt the rise of rival technologies, manipulate auction mechanics to insulate itself from the competition and force advertisers and publishers to use its tools. The lawsuit accuses Google of having a monopoly over the digital ad tech market, and positions itself as a buyer, seller, and auctioneer of digital display advertising. Google's position in the market is similar to that of a search engine, connecting users with websites through search tools, but in the digital ad tech market, it connects advertisers with publishers through ad exchange tools. Google's position as a DSP for advertisers and a publisher ad server for publishers, as well as an ad exchange connecting the two, gives it an advantage in matching advertisers with publishers, potentially harming competition.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at firstname.lastname@example.org.