Saturday, April 01, 2023 // (IG): BB // Financial Enabler // Coffee for Bob
China Reviewing US Chipmaker Micron’s Products for Cyber Risks
Analyst Comments: China's review of Micron Technology is the latest escalation in the ongoing semiconductor battle between the US and China. The move risks further exacerbating tensions between the two countries, which have worsened in recent months over the security of Taiwan and the alleged spy balloon shot down over US territory in February. The review comes as the US is trying to secure its global supply chains and seeking to fence off advanced technology from China. The review on Micron Technology could potentially impact the US's national security and technology ambitions.
FROM THE MEDIA: China has launched a cybersecurity review of imports from Micron Technology, the US's largest memory-chip maker, risking further tensions between the two countries. The Chinese government announced that the review would ensure the integrity of the information infrastructure supply chain, prevent network security risks and maintain national security. Micron's shares fell 4.4% after the announcement. The move comes as the US tries to play down Taiwan President Tsai Ing-wen's visit, which Beijing has protested. The US has already blacklisted Chinese tech firms, sought to cut the flow of sophisticated processors, and banned its citizens from providing certain help to China's chip industry.
READ THE STORY: BNN Bloomberg // Forex Factory
ChatGPT privacy and safety concerns lead to a temporary ban in Italy
Analyst Comments: The use of advanced techniques and custom malware by state-sponsored threat actors highlights the importance of maintaining a robust cybersecurity posture. Cybersecurity experts have recommended that organizations apply patches regularly, monitor access to external-facing network devices, and configure intrusion detection or prevention systems to monitor for malware detections to defend against these attacks. It is essential to stay vigilant and proactive in implementing security measures to prevent potential cyber-attacks from state-sponsored actors.
FROM THE MEDIA: Italy's data protection agency has imposed a temporary ban on ChatGPT, alleging that the powerful artificial intelligence tool has been illegally collecting users' data and failing to protect minors. The agency alleges that OpenAI, the company that owns ChatGPT, does not alert users that it is collecting their data and lacks age verification, which exposes children to inappropriate content. OpenAI has 20 days to address the allegations, and either remedy or justify them, otherwise, it could face a fine of up to 20 million euros.
READ THE STORY: The Record
Russia’s pockets of support are growing in the developing world
Analyst Comments: The EIU's updated map highlights the shifting alliances and geopolitical dynamics following Russia's invasion of Ukraine. The decline in active condemnation of Russia suggests that some emerging economies are shifting to a more neutral position, while some previously Western-aligned countries are seeking to reap economic benefits from engaging with both sides. Russia's growing influence in Africa, as seen in the increasing number of countries leaning towards Russia, is also noteworthy. The EIU's warning about Russia and China's efforts to court non-aligned and neutral countries raises concerns about the erosion of Western democracies' influence and the potential for growing challenges to diplomacy.
FROM THE MEDIA: The Economist Intelligence Unit (EIU) has released an updated map that assesses the level of support for Russia after its invasion of Ukraine. The map highlights the countries that support Russia, those that side with Western states, and those that fall in between. According to the EIU, the number of countries actively condemning Russia has fallen from 131 to 122 over the past year, while the number of neutral countries has risen from 32 to 35. The number of countries leaning towards Russia has increased from 29 to 35, highlighting Russia's growing influence in Africa. The EIU believes that Russia and China will continue to court non-aligned and neutral countries, posing growing challenges for Western democracies and diplomacy.
READ THE STORY: EIU
Xi and Putin reaffirm cooperation at Moscow talks
Analyst Comments: The relationship between Russia and China has been growing stronger in recent years as both countries seek to counter US influence globally. However, the relationship is not without its challenges, given Russia's weakened economy and dependence on Chinese economic assistance. Furthermore, China's potential role in ending the war in Ukraine is not a central part of the China-Russia relationship, which is more focused on deepening bilateral ties predicated on other economic and political cooperation. China's efforts to court European countries do not imply fragility in the China-Russia relationship. The two countries' shared hostility to Western sanctions and courtship of developing countries will remain a driving force in expanding economic and defense ties in the 2020s.
FROM THE MEDIA: The recent meeting between the Russian and Chinese heads of state in Moscow was aimed at strengthening their ties amid rising tensions with the US and the West. The talks also affirmed the importance of Russia in China's foreign policy strategy. However, the relationship between the two countries will be uneven, given Russia's weakened economy and dependence on Chinese economic assistance. China's potential role in ending the war in Ukraine is not a central part of the China-Russia relationship. The limited attention paid to the war in Ukraine by the leaders of both countries paints a picture of deepening bilateral ties predicated on other economic and political cooperation. Despite both sides speaking of the importance of regional security and economic institutions such as the Shanghai Cooperation Organisation and BRICS, existing institutions represent only weak alternatives to Western frameworks such as NATO, the EU, or the AUKUS security pact.
READ THE STORY: EIU
More evidence links 3CX supply-chain attack to North Korean hacking group
Analyst Comments: The identification of the North Korean group Labyrinth Chollima or the Lazarus Group as the attacker in the 3CX supply-chain attack shows that nation-states are continuing to use sophisticated tactics to carry out cyber espionage and steal sensitive information. This attack highlights the vulnerability of supply chains and the need for organizations to ensure the security of their third-party software providers. It also demonstrates the importance of ongoing monitoring and threat detection to identify potential breaches and mitigate their impact. The fact that the attackers were able to manipulate the 3CX app installation without detection highlights the need for organizations to ensure that their cybersecurity protocols are up-to-date and effective in preventing such attacks.
FROM THE MEDIA: A supply-chain attack was recently carried out on 3CX, an enterprise phone company, and cybersecurity firms such as SentinelOne, Sophos, and CrowdStrike have reported on the attack. CrowdStrike has suspected nation-state involvement, by a group it calls Labyrinth Chollima, which it describes as one of the most prolific hacking groups based in North Korea. Sophos recently updated its blog post on the incident, adding that the shellcode loader used by the attacker has only been seen in incidents attributed to Lazarus, a financially motivated hacking organization allegedly sponsored by the North Korean government. The malicious code in the corrupted app was found to match previous samples of code used in Lazarus attacks byte-to-byte.
READ THE STORY: The Record
ChatGPT could help crypto investors thanks to the Internet bot
Analyst Comments: The new plug-ins for ChatGPT have the potential to provide investors and traders with real-time information on crypto market trends, but there are risks involved in relying on unreliable information and sentiment. While artificial intelligence tools have the potential to bridge the gap between small traders and whales, the effectiveness of ChatGPT and other similar tools remains to be seen. Investors should exercise caution and due diligence in their use of these tools, and it is important to remember that financial markets are often structured to benefit the most competent traders at the expense of the less skilled.
FROM THE MEDIA: OpenAI has launched new plug-ins for its popular ChatGPT bot, including an internet bot that could potentially optimize crypto investments. The new plug-ins are only available to a small group of users but will gradually be implemented on a large scale. ChatGPT can pull data from the web using Bing’s search API to answer users’ questions, allowing investors and traders to access real-time information on trends and market developments. However, the risks associated with using ChatGPT for trading include unreliable information and incorrect sentiment. ChatGPT is the first tool of its kind on the mass market, but other existing or unrealized tools could potentially enable even better results.
READ THE STORY: Cryptonomist
Thief Who Held $3.4 Billion in Bitcoin Deserves Prison
Analyst Comments: The case highlights the importance of securely storing cryptocurrencies and the risks of leaving them vulnerable to cyberattacks or theft. The fact that Zhong hid his caper for a decade and spent the proceeds on luxury items shows the attractiveness of cryptocurrencies as a means of conducting illegal activities. The case also underscores the need for a regulatory framework to prevent such activities, including theft, fraud, and money laundering. The prosecutors' call for a prison sentence sends a message that cryptocurrency theft and fraud will not be tolerated and that perpetrators will be held accountable. The case serves as a cautionary tale for those who may be tempted to engage in similar activities.
FROM THE MEDIA: A Georgia man, James Zhong, who stole more than 50,000 Bitcoin valued at $3.35 billion when authorities seized it in November 2021, should do time behind bars, according to federal prosecutors who urged prison time. James Zhong hid his caper for a decade and spent $16 million of the proceeds on real estate investments, luxury hotels, nightclubs, and cars like Lamborghinis and a Tesla. In November 2021, when authorities seized 50,491 Bitcoin from Zhong’s lakefront home in Gainesville, Georgia, it exploded in value. The cryptocurrencies were found stored on devices in a safe under floorboards and on a single-board computer stowed in a Cheetos popcorn tin in a closet. Zhong pleaded guilty in November and wants the judge to spare him a prison term. He is scheduled to be sentenced on April 14.
READ THE STORY: Bloomberg
Corporate espionage, the latent objective behind many cyberattacks
Analyst Comments: The article presents a plausible scenario for the motivations behind the recent cyberattacks carried out by the Alphv hacker group. While the evidence presented does not definitively prove that the attacks were driven by corporate espionage, the timing of negotiations and the lack of pressure on victims to pay ransom are suggestive of a different objective. It is possible that as hacker groups diversify their revenue streams, espionage becomes another revenue spinner, as suggested in the article. Overall, the article provides an interesting insight into the potential motivations behind recent cyberattacks.
FROM THE MEDIA: Two recent cyberattacks, one targeting a large pharmaceutical company in Asia and the other targeting a large American heavy equipment manufacturer, were both carried out by the Alphv hacker group. While both attacks appeared to be motivated by monetary gain, a deeper investigation suggests that they may have been driven by corporate espionage. Evidence includes the timing of negotiations, the lack of pressure on victims to pay the ransom, and the fact that only a portion of the exfiltrated data was put up for sale. It is possible that Alphv was contracted to exfiltrate specific data from the victims' servers and networks for a price, with the ransom demand acting as a smokescreen.
READ THE STORY: Security Boulevard
Other developments in the cyber phases of Russia's hybrid war against Ukraine
Analyst Comments: The latest reports suggest that Russian state-sponsored cyber operations continue to evolve, with a focus on Ukraine's European allies and a shift towards espionage as opposed to disruption. Russia is preparing for a long war, and its intelligence services are working to establish persistence in adversary networks, while hacktivists and criminal auxiliaries take the fight to Ukraine's Western sympathizers. It is likely that these operations will continue to escalate, and it is important for countries to be prepared and vigilant in the face of these threats.
FROM THE MEDIA: Russian state-owned defense conglomerate Rostec is developing a method to de-anonymize Telegram channels to align them with the government line. Meanwhile, Russian hacktivist group NoName057(16) claims responsibility for a DDoS attack on France's National Assembly website. According to the State Service of Special Communications and Information Protection of Ukraine, Russian cyberattacks have shifted towards espionage rather than disruption, and infrastructure remains a popular target set. Industry sources report that Russia is increasingly targeting Kyiv's European allies and smaller states that are candidates for full EU integration, while Ukraine's Defense Ministry alleges that Russia has declared online piracy patriotic. Ukrainian officials and experts believe that Russian cyber operations are increasing as Russian offensives fall short, focusing on establishing persistence in adversary networks, taking the fight to Ukraine's Western sympathizers, and influencing opinion domestically and internationally.
READ THE STORY: The Cyberwire
‘Vulkan Files’ Reveal Russia’s Cyberwarfare Techniques
Analyst Comments: The report is a significant revelation of the tactics and methods employed by the Russian authorities to conduct cyber warfare against Western institutions and businesses. The whistleblower’s anonymous testimony and the thousands of confidential documents make it clear that Vulkan NTC is a key player in Russia’s cyberwarfare operations. The software systems employed by Vulkan enable the identification of vulnerabilities and the monitoring of the internet, which is used to spread disinformation and launch cyberattacks. The report highlights the need for greater vigilance and cybersecurity measures to counter the growing threat posed by Russia’s cyberwarfare operations.
FROM THE MEDIA: A recent report sheds light on the methods and tactics employed by the Russian authorities to organize cyberwarfare against Western institutions and businesses. The report is based on thousands of confidential documents provided by an anonymous whistleblower who was motivated to disrupt Russia’s abuses in Ukraine. The documents reveal that a Russian IT consulting firm, Vulkan NTC, is Russia’s top cyber threat actor. Vulkan engineers reportedly worked for the Russian military and intelligence services like the FSB, the GRU, and the SVR. Their tasks included fomenting and launching hacking operations, training agents, spreading disinformation, and controlling sections of the internet. Vulkan’s operations are supported by several software systems, including Scan-V, Amezit, and Crystal-2V, that enable the identification of vulnerabilities, the monitoring of the internet, and the training of cyber attackers.
READ THE STORY: GearRice
A letter signed by Elon Musk demanding AI research pause sparks controversy
Analyst Comments: The letter organized by the FLI has faced criticism for its claims and the manner in which it was organized. The use of signatures from fake signatories and the citation of research without verification protocols for signing call into question the credibility of the letter. Some experts cited in the letter have expressed concern that their research was used to make such claims, while others have criticized it for overlooking more immediate concerns with AI. While it is important to consider the potential risks of developing highly intelligent AI systems, it is equally important to prioritize the development of safety protocols and ethical standards for AI.
FROM THE MEDIA: More than 1,800 signatories, including Elon Musk and Apple co-founder Steve Wozniak, called for a six-month pause on the development of AI systems that are “more powerful” than GPT-4 in a letter organized by the Future of Life Institute (FLI). The letter cited 12 pieces of research from AI experts, including university academics, and current and former employees of OpenAI, Google, and its subsidiary DeepMind, to argue that AI systems with “human-competitive intelligence” pose profound risks to humanity. However, four of the experts cited in the letter have since expressed concern that their research was used to make such claims, and some signatories were revealed to be fake. Critics accused the FLI of prioritizing imagined apocalyptic scenarios over more immediate concerns, such as racist or sexist biases being programmed into the machines.
READ THE STORY: The Guardian
The Contradictions of Sam Altman, AI Crusader
Analyst Comments: The article provides an interesting profile of Sam Altman and his role in the development of AI technology. It offers insights into his motivations and vision for the future of AI, as well as his concerns about the potential dangers of AI if not developed and deployed safely. The article also highlights the tensions within OpenAI, including the departure of co-founder Elon Musk and criticism of the company's commercialization efforts. Overall, the article provides a balanced assessment of Altman's leadership and the challenges facing OpenAI as it continues to develop and commercialize AI technology.
FROM THE MEDIA: Sam Altman, the CEO of OpenAI, has become a key figure in the development and commercialization of AI technology, with OpenAI's ChatGPT chatbot being one of the most viral AI products in history. Altman co-founded OpenAI eight years ago as a research nonprofit, arguing that profits should not be the main driver of developing powerful AI models. Despite the success of OpenAI, Altman has taken no direct financial stake in the company but instead is focused on forging a new world order in which machines free people to pursue more creative work. He envisions universal basic income compensating for jobs replaced by AI and a global governance structure that would oversee decisions about the future of AI.
READ THE STORY: WSJ
Nearly 5 million people were affected by a cyberattack on high-cost lender TMX Finance
Analyst Comments: This incident highlights the serious risks associated with data breaches and cyberattacks, particularly for companies that handle sensitive personal information. The theft of Social Security numbers and financial data can lead to identity theft and financial fraud. It is commendable that TMX Finance promptly notified the FBI and is offering victims credit monitoring and identity protection services. However, it is concerning that the company did not provide details about the nature of the cyberattack or whether a ransom was issued. It is also notable that TMX Finance has faced numerous lawsuits and criticism for its business practices. The incident underscores the importance of strong cybersecurity measures and responsible lending practices.
FROM THE MEDIA: TMX Finance, the parent company of TitleMax, TitleBucks, and InstaLoan, has contacted the FBI about a cyberattack that compromised the personal information of nearly five million people. The attackers accessed TMX Finance's systems in early December 2022 and may have acquired sensitive data between February 3 and 14, 2023. The stolen data includes names, dates of birth, passport numbers, driver's license numbers, federal/state identification card numbers, tax identification numbers, Social Security numbers, and financial account information. TMX Finance is offering victims 12 months of credit monitoring and identity protection services. The company has faced frequent backlash and lawsuits for its business model, which offers high-cost loans to people who lack access to traditional sources of credit.
READ THE STORY: The Record
Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps
Analyst Comments: The misconfiguration issue affecting Azure Active Directory (AAD) is a significant vulnerability that could have resulted in unauthorized access to sensitive data, as it affected several "high-impact" applications, including Bing.com. It is worrying that the vulnerability was present in Microsoft's own internal apps, indicating a lack of oversight in the company's security protocols. The bug bounty awarded to Wiz is a positive step, as it encourages security researchers to report vulnerabilities and helps companies identify and remediate security issues. However, the vulnerability underscores the importance of regular security audits and testing to prevent potential data breaches. It is important for companies to prioritize security and adopt a proactive approach to cybersecurity to prevent vulnerabilities that could result in serious consequences.
FROM THE MEDIA: Microsoft has fixed a misconfiguration issue affecting the Azure Active Directory (AAD) identity and access management service that exposed multiple "high-impact" applications to unauthorized access. The vulnerability, which was reported to Microsoft in January and February 2022, could allow hackers to access an Azure app configured to permit users from any Microsoft tenant, leading to unintended access. Microsoft fixed the issue and awarded a $40,000 bug bounty to cloud security firm Wiz, which discovered the vulnerability. Interestingly, Microsoft's internal apps were also found to be vulnerable. The cybersecurity firm was able to exploit the Bing Trivia app to manipulate search results and homepage content in a successful attack chain dubbed BingBang. The exploit could also be used to trigger an XSS attack on Bing.com and access users' Outlook emails, Teams messages, calendars, SharePoint documents, and OneDrive files. Other apps that were found to be vulnerable include Mag News, Central Notification Service (CNS), Contact Center, PoliCheck, Power Automate Blog, and COSMOS.
READ THE STORY: THN
Here Are the US Chipmakers Most Exposed to Escalating Tensions With China
Analyst Comments: China's cybersecurity review of Micron Technology is a significant concern for the company, which derives a substantial portion of its revenue from China. However, other US semiconductor makers, such as Qualcomm, are much more exposed to China and, therefore, are at greater risk. The potential expansion of China's review to other US firms could exacerbate supply chain issues for the electronics industry as many electronic components and systems come from Chinese factories. This development underscores the importance of diversification in supply chains and highlights the risks associated with relying on a single market or supplier.
FROM THE MEDIA: China's cybersecurity review of Micron Technology has raised concerns for the American memory chipmaker's revenue, which derives 11% from China. However, other US semiconductor makers such as Qualcomm are more exposed to China, receiving 64% of sales from the country. Micron is a significant supplier to several tech companies, and any potential expansion of China's review to other US firms could threaten Micron's peers and exacerbate supply chain problems, as many electronics and component systems come from Chinese factories.
READ THE STORY: Bloomberg
The U.S. Wants to Make Sure China Can’t Catch Up on Quantum Computing
Analyst Comments: The US government's plan to impose stricter export controls on emerging technologies could have significant implications for China's development of advanced technology. It may help the US maintain its lead in quantum computing, which has significant military and economic potential, and help protect sensitive data from cyber threats. However, these measures could also exacerbate tensions between the two countries and could potentially lead to retaliatory actions from China. The impact on US companies that have a significant stake in China's technology sector remains to be seen.
FROM THE MEDIA: The US is planning to impose unprecedented export controls on China for emerging technologies like quantum computing, AI, biotechnology, and clean energy technologies. This comes after the US put in place restrictions on semiconductor exports to China, which the Netherlands and Japan have agreed to follow. The US is determined to maintain its lead in quantum computing, which has the potential for military and economic advantages. The Commerce Department is reportedly considering export controls on quantum computing hardware, error correction software, and cloud services to Chinese entities.
READ THE STORY: FP
China truce with business — for now
Analyst Comments: China's announcement to respect the legitimate rights of corporations is a significant shift from its two-year crackdown on the private sector, resulting in the exodus of prominent tycoons such as Jack Ma. However, experts remain cautious about the Chinese government's intentions, as they need sustained foreign investment to help boost the economy, which requires predictability in policymaking. Additionally, the crackdown on the tech sector has affected the country's reputation among the business community, and the government needs to reassure them that it is open to business. The situation is still unpredictable, and the impact of China's sudden change in tone remains to be seen.
FROM THE MEDIA: China's Cyberspace Administration announced that it would respect the legitimate rights of corporations and take action against anyone who bad-mouthed the country's bosses. This statement comes after a two-year crackdown on China's private sector, resulting in the escape of prominent tycoons such as Jack Ma. Worried about the deceleration of growth caused by Covid restrictions, President Xi Jinping has launched a charm offensive to convince domestic and foreign capital that China is reopening for business. The wider economy needs sustained foreign investment to help boost productivity and create jobs for millions of university graduates entering the workforce each year. However, the Chinese government has brought tycoons to heel under the auspices of Xi's "common prosperity" program, leading to a crackdown in the tech sector, including the scrapping of a planned $37bn IPO of Ant Group in 2020.
READ THE STORY: FT
Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk
Analyst Comments: This attack highlights the importance of promptly patching vulnerabilities in software, as hackers will exploit unpatched vulnerabilities as soon as they find them. The Elementor Pro plugin is estimated to be used on over 12 million websites, making it a high-value target for cybercriminals. Website owners using Elementor Pro are urged to update to the latest version to mitigate potential threats. The recent spate of WordPress plugin vulnerabilities underscores the need for website administrators to regularly check for and install updates to software to ensure that their sites remain secure.
FROM THE MEDIA: Unknown hackers are exploiting a recently patched vulnerability in the Elementor Pro website builder plugin for WordPress. The high-severity vulnerability, described as a case of broken access control, impacted versions 3.11.6 and earlier, and was addressed in version 3.11.7. The flaw can allow an authenticated attacker to take over a WordPress site with WooCommerce enabled, and malicious users can turn on the registration page, set the default user role to administrator, and create an account that instantly has administrator privileges. This can then be used to upload a malicious plugin or backdoor and redirect the site to another malicious domain.
READ THE STORY: THN
Crypto Crackdown: Here Are All The Major Crypto Firms Facing Charges From Regulators This Year
Analyst Comments: The cryptocurrency industry is facing an increasing crackdown by regulators and authorities globally, with exchanges and their founders coming under particular scrutiny. These recent charges and lawsuits against Beaxy, Binance, and Kwon are indicative of a broader trend toward stronger enforcement of cryptocurrency regulations. The closure of Beaxy is the latest example of how regulatory action can have a direct impact on the operations of a crypto exchange. The cases against Binance and Kwon will be watched closely as they are among the largest and most prominent players in the industry.
FROM THE MEDIA: Beaxy, a cryptocurrency trading platform, has announced its closure after the Securities and Exchange Commission (SEC) accused it of violating federal law. Beaxy was charged with failing to register as a securities exchange and misappropriating $900,000 of customer money. Meanwhile, the Commodity Futures Trading Commission has sued Binance, the world’s largest crypto exchange, and its CEO Changpeng Zhao for allegedly violating US laws by allowing US customers to trade on its platform without registration. In a separate case, Do Hyeong Kwon, founder of the TerraUSD stablecoin, has been charged with fraud by US prosecutors after his arrest in Montenegro.
READ THE STORY: OODALOOP
Capita was hit by an IT failure that left staff unable to access services
Analyst Comments: The IT failure at Capita is concerning, given the company's key role across vital services provided by the state and call center support for companies. While it is not yet clear whether the issue is due to a cyber attack or a technical issue, the possibility of a cyber attack is not being ruled out. Any disruption to the provision of services by Capita could have significant consequences for the smooth functioning of public sector departments and companies. The incident highlights the need for companies to have robust cybersecurity measures in place to protect against cyber attacks, which are becoming increasingly sophisticated and frequent.
FROM THE MEDIA: Capita, one of the UK government's largest contractors have suffered an IT failure that has disrupted services provided to local authorities and businesses. Capita said it was investigating the extent and cause of the "technical issue," which has affected its internal systems rather than client systems, and admitted that the possibility of a cyber attack could not be ruled out. The company, which provides IT services and staff to government and public sector bodies, has digitized many critical processes, including the ordering of medical supplies, the processing of payments, and providing support services to GPs, dentists, opticians, and pharmacists in the NHS. Capita has also been contracted to deliver Personal Independence Payment assessments, which are designed to help people with long-term conditions or disability lead independent lives through financial support.
READ THE STORY: FT
Items of interest
Peace, China wins. War, China wins
Analyst Comments: The article provides a comprehensive analysis of the various factors involved in the Russia-Ukraine conflict and the role of China in the peace process. It presents a unique perspective on China's "peace strategy" and its potential impact on global politics. However, the article's view on the conflict is somewhat biased towards China and its role as a mediator. The article overlooks the fact that Russia's actions in Ukraine are illegal and that it has violated Ukraine's sovereignty. It also downplays the possibility of China's military intervention in Taiwan, which is a significant concern for the international community. Overall, the article provides valuable insights into the complex geopolitical issues at play in the conflict and the need for a peaceful resolution.
FROM THE MEDIA: The article discusses the significance of Xi Jinping's visit to Russia and its implications for Ukraine and Taiwan. It analyzes China's "peace strategy" and its potential role as a mediator in the Russia-Ukraine conflict. The article also explores the possibility of nuclear war and its impact on global peace, as well as the challenges in achieving a peaceful resolution in Ukraine. It further discusses the potential shift of US attention towards Taiwan if it faces an embarrassing conclusion in Ukraine and the need for a peaceful reunification process. The article highlights China's focus on peace and the need for a multipolar world order.
READ THE STORY: Modern Diplomacy
ThinkJSOU with Dr. Daniel Moore - Offensive Cyber Operations: Understanding Intangible Warfare (Video)
FROM THE MEDIA: The interview with Dr. Daniel Moore provides valuable insights into cyber warfare and offensive cyber operations. His four-layer model offers a practical approach to identifying cyber warfare and distinguishing it from other types of cyber activity. His experience in both the public and private sectors lends credibility to his analysis, and his use of historical case studies to illustrate his points is informative. Overall, this interview provides a useful perspective for those interested in understanding cyber warfare and its implications.
Pegasus the spyware technology (Video)
FROM THE MEDIA: Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that can be covertly installed on mobile phones (and other devices) running most versions of iOS and Android. Pegasus is able to exploit iOS versions up to 14.7, through a zero-click exploit. As of 2022, Pegasus was capable of reading text messages, tracking calls, collecting passwords, location tracking, accessing the target device's microphone and camera, and harvesting information from apps. The spyware is named after Pegasus, the winged horse of Greek mythology. It is a Trojan horse computer virus that can be sent "flying through the air" to infect cell phones.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.