Daily Drop (580): India lands Chandrayaan-3, Space Industry: ODNI, Tornado Cash: Scandal, Ilya Sachkov, Huawei: Chip Factories, Russia’s Tech Giants, AI Chatbots: Attack Vector, Nvidia’s AI boom
08-24-23
Thursday, Aug 24, 2023 // (IG): BB // Financial Enabler PODCAST // Coffee for Bob
India lands Chandrayaan-3 spacecraft on Moon, is the first to lunar south pole
Analyst Comments: ISRO's successful landing of Chandrayaan-3 on the lunar south pole is a monumental achievement for India and the global space community. This accomplishment not only places India among the elite group of nations that have landed on the Moon but also highlights the country's growing prowess in space exploration. The focus on the lunar south pole, a region believed to hold valuable resources for long-term lunar habitation, indicates a forward-thinking approach to space exploration. The mission's success, especially after the setback with Chandrayaan-2 in 2019, demonstrates resilience, determination, and technological advancement. The global recognition and support from organizations like the European Space Agency and NASA further emphasize the collaborative spirit of space exploration and the shared goals of humanity in understanding our universe.
FROM THE MEDIA: India's space agency, the Indian Space Research Organization (ISRO), has successfully landed its Chandrayaan-3 spacecraft on the Moon, marking a significant achievement as the first organization to touch down on the lunar south pole. The Chandrayaan-3, which was launched from the Satish Dhawan Space Centre on July 14, consists of a triple-stage Launch Vehicle Mark-3 rocket, a lander module named Vikram, and a rover called Pragyan. The spacecraft reached lunar orbit on August 5 and released the lander and rover on August 17. This mission makes India the fourth country to achieve a lunar landing, following the US, Russia, and China. The lunar south pole is of particular interest due to its craters that are permanently shadowed from the Sun and contain ice. The Vikram lander is equipped with instruments to study the Moon's thermal properties, seismic activity, and plasma density, while the Pragyan rover will analyze rocks using its laser-induced spectroscope and X-ray spectrometer.
READ THE STORY: The Register
Foreign Intelligence Warning to Space Industry Highlights Risks
Analyst Comments: The ODNI's warning underscores the vulnerabilities of the burgeoning space startup industry in the U.S. While established defense companies have the experience and resources to fend off potential intelligence threats, newer space startups lack these defenses, especially in areas like cybersecurity. The strategic importance of these startups to the U.S. makes them prime targets for foreign adversaries, particularly Russia and China. The theft of intellectual property not only undermines the economic prospects of these companies but also poses a significant threat to national security. If adversaries can access and create vulnerabilities in space systems, the reliability of these systems is compromised. Namrata Goswami, a space policy analyst, emphasized the gravity of the situation, noting the potential loss of technological advantage if foreign entities gain access to core U.S. space technologies.
FROM THE MEDIA: The Office of the Director of National Intelligence (ODNI) recently issued a warning about potential foreign intelligence risks to the U.S. commercial space industry. As the space startup scene grows, there's an increasing concern that "foreign intelligence entities" might try to steal technology assets and intellectual property from these companies. The warning highlighted various methods these entities might employ, such as on-site company visits, targeted inquiries about proprietary information, recruitment of technical experts, and the creation of subsidiaries in third countries to hide the parent company's affiliations. The space startup industry is especially at risk due to its limited resources in cybersecurity and personnel training. Scott Pace, the director of the Space Policy Institute at George Washington University, emphasized that countries like Russia and China recognize the significance of these innovative commercial space companies to the U.S.'s strategic advantage.
READ THE STORY: FS
Tornado Cash Founders Charged in Billion-Dollar Crypto Laundering Scandal
Analyst Comments: The indictment of Tornado Cash's founders underscores the increasing scrutiny and regulatory challenges faced by cryptocurrency platforms, especially those that potentially enable money laundering and other illicit activities. The involvement of such platforms in large-scale financial crimes can have significant implications for the broader cryptocurrency industry, potentially leading to stricter regulations and oversight. The case also highlights the global nature of cryptocurrency operations, and the challenges authorities face in tracking and apprehending individuals involved in cross-border cybercrimes. The actions taken by the DoJ and OFAC emphasize the U.S. government's commitment to combating cyber-related financial crimes and ensuring the integrity of the financial system.
FROM THE MEDIA: The U.S. Justice Department (DoJ) has indicted the founders of the Tornado Cash cryptocurrency mixer service, Roman Storm and Roman Semenov, for allegedly laundering over $1 billion in criminal proceeds. While Storm has been arrested in Washington, Semenov remains at large in Dubai. The duo is accused of profiting millions from the service, which is believed to have processed around $7 billion in crypto assets in three years. The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has also sanctioned Semenov and linked cryptocurrency addresses. Tornado Cash, established in 2019, is a decentralized mixer service designed to obscure the origins of cryptocurrency transactions, making them anonymous. This service has been particularly attractive to criminals seeking to hide their illicit gains.
READ THE STORY: THN
Ilya Sachkov versus the Kremlin
Analyst Comments: Ilya Sachkov's story underscores the complexities and challenges of operating in the cybersecurity field within Russia. While Sachkov and Group-IB initially received support and recognition for their work, their increasing visibility and Sachkov's willingness to criticize the Kremlin's approach to cybercrime put them at odds with powerful entities. The secretive nature of Sachkov's trial and the severity of his sentence highlight the risks faced by those who challenge the status quo in Russia, especially when it comes to sensitive areas like cybersecurity and state-sponsored cyber activities. The case serves as a cautionary tale for cybersecurity professionals operating in environments where the line between cybercrime and state interests is blurred.
FROM THE MEDIA: In a Moscow City courtroom on July 26, 2023, Ilya Sachkov, the founder and CEO of the Russian cybersecurity company Group-IB, found himself facing legal consequences. Group-IB is renowned for its role in identifying and tracking global cybercriminals. Sachkov, who had been gaining prominence through TEDx Talks and international awards, was once even recognized by the Kremlin for his contributions. However, the relationship soured, leading to Sachkov's trial. From a young age, Sachkov was intrigued by mysteries and detective stories. His passion for cybersecurity was ignited during his teenage years when he read a book by Kevin Mandia on computer forensics. With a background in Information Security from Bauman Moscow State Technical University, Sachkov envisioned a career as a "cyber detective." Along with his friend, Igor Katkov, he founded Group-IB. Over the years, Group-IB made significant strides in the cybersecurity realm, identifying malware targeting Russian stock trading, tracking digital bank robbers, and even attributing an $81 million heist to North Korea. The company's unique position, being a Russian entity investigating other Russians, made it stand out.
READ THE STORY: The Record
Huawei accused of using covert semiconductor factories in China to circumvent US sanctions
Analyst Comments: The allegations against Huawei, if proven true, indicate a strategic move by the company to ensure its growth and dominance in the tech industry despite facing significant hurdles from US sanctions. The US's concerns stem from the potential security risks associated with Chinese tech firms, leading to stringent measures to curb their influence and operations. The Biden administration's recent actions, including the signing of the Chips Act and the executive order banning certain US investments in sensitive Chinese technology sectors, highlight the US's intent to safeguard its technological leadership and national security. The ongoing tussle between the US and Chinese tech giants like Huawei underscores the broader geopolitical tensions and the significant role technology plays in this dynamic.
FROM THE MEDIA: The Semiconductor Industry Association in the United States has accused the Chinese tech company, Huawei, of secretly developing chip manufacturing facilities in China. This move is seen as an attempt by Huawei to bypass US sanctions. The association informed Bloomberg that Huawei began chip production last year with $30 billion in funding from the Chinese government. With this funding, Huawei has reportedly acquired two existing plants and is in the process of constructing three more. The US Department of Commerce added Huawei to its export control list in 2019 due to security concerns, which the Chinese firm has refuted. If the allegations by the Semiconductor Industry Association are accurate, Huawei might be able to indirectly purchase American chip-making equipment despite the sanctions. The US has been stringent about its stance on China and its technological influence, with both the Trump and Biden administrations taking measures to restrict and monitor Chinese tech advancements.
READ THE STORY: Minute Mirror
Russia’s Tech Giants — A Wartime Choice of Bad or Worse
Analyst Comments: While not as oppressive as Stalin's era, Putin's regime still exerts considerable pressure on businesses, pushing them into a tight spot. Their decisions, be it compliance or resistance, have far-reaching implications for their global reputation and business prospects. The nuanced choices made by companies like Yandex and Kaspersky Lab underscore the broader challenges businesses face in authoritarian regimes, suggesting that while there's some room for maneuver, there's also potential future accountability for their actions.
FROM THE MEDIA: The Center for European Policy Analysis (CEPA) delves into the challenges faced by Russian tech giants, particularly Yandex and Kaspersky Lab, in the backdrop of Russia's invasion of Ukraine. Yandex, while built independently, often yielded to the Kremlin's demands, such as altering search results. However, it also provided a platform for employees to voice anti-Kremlin sentiments. The onset of the war saw Yandex allowing its fleeing programmers to work remotely. Despite facing European sanctions, Yandex's co-founder, Arkady Volozh, openly criticized Russia's actions in Ukraine. On the other hand, Kaspersky Lab, a global cybersecurity firm with ties to Russian intelligence agencies, faced significant market losses post-Russia's interference in the 2016 US elections. Opting to remain in Russia, the company now dominates the cybersecurity market there. While not directly supporting the war, Kaspersky's anti-drone products could be used against Ukrainian drones, indirectly involving them in the conflict.
READ THE STORY: CEPA
Proposed bill would require vulnerability disclosure policies for all federal contractors
Analyst Comments: The proposed legislation underscores the increasing importance of cybersecurity in the federal contracting space. By mandating vulnerability disclosure policies for all federal contractors, the bill aims to create a more uniform and proactive approach to identifying and addressing software vulnerabilities. This move can potentially reduce the risk of cyberattacks and data breaches, ensuring a more secure digital infrastructure for federal operations. The collaboration between governmental entities and private cybersecurity firms, as seen with Rep. Mace and HackerOne, indicates a growing trend of public-private partnerships in addressing cybersecurity challenges. If passed, the bill could set a precedent for other sectors to adopt similar proactive cybersecurity measures.
FROM THE MEDIA: Rep. Nancy Mace (R-SC), chair of the House Oversight Committee’s cybersecurity subpanel, has proposed legislation titled "The Federal Cybersecurity Vulnerability Reduction Act." This bill mandates that all federal contractors must have a vulnerability disclosure policy (VDP) in place. VDPs detail the process by which security researchers should inform organizations about discovered flaws that could be exploited by hackers. These policies also outline any potential rewards or recognition for reporting such vulnerabilities. The goal of the legislation is to ensure a proactive approach to cybersecurity, allowing contractors to promptly identify and address software vulnerabilities. The bill calls for the collaboration of the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) with the National Cyber Director and other entities to review and possibly update federal contract requirements related to VDPs.
READ THE STORY: The Record
China's top EV battery maker announced a breakthrough, but top boffin isn't convinced
Analyst Comments: CATL's announcement of the Shenxing battery could be a game-changer for the EV industry, addressing one of the primary concerns of potential EV buyers: charging time. However, the skepticism expressed by experts like Dr. Yazami underscores the importance of transparency and providing comprehensive data when making such significant claims. If CATL's assertions hold true, this could revolutionize the EV market and further accelerate the shift from traditional gasoline vehicles to electric ones. However, until more details are provided and independent tests are conducted, the industry and consumers will likely remain cautiously optimistic.
FROM THE MEDIA: China's leading electric vehicle (EV) battery manufacturer, Contemporary Amperex Technology Co. Limited (CATL), recently announced the development of a battery named Shenxing. This battery purportedly allows an EV to travel 400km after only ten minutes of charging, with a full charge enabling a range of 700km. For context, the average EV range in the US as of March was around 470km. However, Dr. Richard Yazami, a renowned battery tech scientist and the inventor of the graphite anode, has expressed skepticism regarding CATL's claims. While CATL asserts that Shenxing is the world's first superfast charging lithium iron phosphate (LFP) battery, Yazami points out that critical information, such as the battery's cycle life, performance under extreme temperatures, safety, and costs, is missing from the company's announcement. CATL has stated that mass production of the Shenxing battery will commence by the end of 2023, with its integration into EVs expected by Q1 2024.
READ THE STORY: The Register
A New Attack Impacts Major AI Chatbots—and No One Knows How to Stop It
Analyst Comments: The discovery of this vulnerability in major AI chatbots underscores the challenges in ensuring the security and reliability of AI systems, especially as they become more integrated into various applications and services. The fact that a seemingly nonsensical string of text can cause these chatbots to produce forbidden outputs highlights the unpredictability of AI behavior, especially when faced with inputs that might not have been considered during their training. This revelation serves as a reminder of the importance of continuous research, testing, and refinement in the field of AI, especially as these technologies play an increasingly significant role in our digital landscape.
FROM THE MEDIA: In a recent study, researchers from Carnegie Mellon University discovered a vulnerability in several major AI chatbots, including ChatGPT, Google’s Bard, and Claude from Anthropic. These chatbots, which have been repeatedly modified to prevent them from producing inappropriate or harmful outputs, can be made to bypass these safeguards using a specific string of text. This string, which might appear nonsensical to humans, is significant to AI models trained on vast amounts of web data. The vulnerability suggests that the tendency for advanced AI chatbots to produce undesirable outputs isn't a minor issue that can be easily fixed with a few rules. Instead, it highlights a deeper, fundamental flaw in these systems. Zico Kolter, an associate professor at CMU involved in the study, stated that there's currently no known method to rectify this vulnerability, emphasizing the challenges in making these chatbots secure. The researchers developed adversarial attacks using an open-source language model. These attacks involve modifying the prompt given to a bot in a way that pushes it to produce forbidden outputs. The same attack was effective on several popular commercial chatbots. The researchers likened the attack to a buffer overflow, a common method used to breach a computer program's security.
READ THE STORY: Wired
SpaceX, T-Mobile US phone service will interfere with ours, claims rival
Analyst Comments: The concerns raised by Omnispace underscore the complexities and potential conflicts in the rapidly evolving satellite communication industry. As more companies venture into space to provide global connectivity, regulatory bodies like the FCC will play a crucial role in ensuring that these systems can coexist without interference. The outcome of this dispute could set precedents for future satellite communication projects and collaborations.
FROM THE MEDIA: Satellite constellation operator Omnispace has expressed concerns to the FCC's Space Bureau that the proposed hybrid space-terrestrial phone service by SpaceX and T-Mobile US will interfere with its own system. SpaceX aims to combine its Starlink low Earth orbit satellite constellation with T-Mobile's terrestrial wireless network to provide connectivity throughout America. However, Omnispace, which is developing its own hybrid ground/space network for 5G and IoT services, believes that SpaceX's satellites will cause "harmful interference" with its receive antenna system. Omnispace claims that SpaceX made "elementary errors" in its interference calculations. The company also highlighted potential issues arising from the differences between the American terrestrial assignment system and the International Telecommunication Union's mobile-satellite uplink-downlink allocation.
READ THE STORY: The Register
Nvidia’s AI boom exceeds Wall Street’s lofty expectations
Analyst Comments: The attacker's agile methodology in malware development signifies a new era where cyber adversaries can quickly adapt and refine their tools based on feedback and changing environments. Their shift to multi-cloud targeting underscores the increasing importance of robust security measures across all cloud platforms. The German elements within the attacker's operations might provide a potential lead for attribution, but it also serves as a reminder that cyber threats can emerge from any corner of the globe. The use of masquerading domains, especially those mimicking legitimate AWS domains, is a clever tactic to evade detection and signifies the sophistication of the attacker.
FROM THE MEDIA: Nvidia's performance underscores the growing importance and demand for AI technologies in various industries. The company's ability to exceed Wall Street's expectations, even amidst supply constraints and regulatory challenges, highlights its strong market position and adaptability. The shift in data center spending towards AI-focused computing, as mentioned by CEO Jensen Huang, indicates a broader industry trend that other tech companies will likely follow. Nvidia's continued success in the Chinese market, despite US export restrictions, showcases its strategic approach to navigate geopolitical challenges. The company's growth trajectory suggests that it will remain a significant player in the AI and chipmaking industry for the foreseeable future.
READ THE STORY: FT
British court convicts two teen Lapsus$ members of hacking tech firms
Analyst Comments: The conviction of these teenagers underscores the evolving nature of cyber threats, where age is no longer a barrier to executing high-profile hacks. The Lapsus$ group's notoriety, combined with their young membership, highlights a concerning trend of younger individuals engaging in sophisticated cybercrimes. The methods used, such as hacking via an Amazon Fire Stick, demonstrate innovative approaches to cyber breaches. Companies must remain vigilant and adaptive in their cybersecurity measures, especially when the threat landscape includes unpredictable actors like Lapsus$. The tracing of IP addresses from communication platforms also suggests that while these young hackers might be technologically savvy, operational security might not be their strong suit.
FROM THE MEDIA: Two teenagers were recently convicted in a London court for their involvement in hacking major tech firms, including Uber, Revolut, and Rockstar Games. Arion Kurtaj, 18, identified as a central figure in the Lapsus$ hacking group, was responsible for the breaches at these companies. Another 17-year-old, unnamed due to legal reasons, attempted to blackmail BT and Nvidia. The Lapsus$ group, known for its erratic behavior and young membership, has ties to Brazil, with another member arrested there last year. Specific incidents include Kurtaj hacking Rockstar Games from a hotel using an Amazon Fire Stick and a hacker posting inappropriate content on Uber's internal page. The teens were linked to the hacks through their IP addresses, which were traced back from their email and Telegram accounts.
READ THE STORY: The Record
A New Supply Chain Attack Hit Close to 100 Victims—and Clues Point to China
Analyst Comments: The sophistication of this attack, especially the exploitation of Microsoft's trust model, underscores the evolving tactics of cybercriminals. The fact that a security software update was the entry point for this malware highlights the vulnerabilities present even in systems designed to protect users. The digital signature by Microsoft further complicates matters, as it lends an air of legitimacy to the malware, making detection even more challenging. The potential involvement of a state-sponsored group, possibly from China, indicates the high stakes and geopolitical implications of such cyberattacks.
FROM THE MEDIA: A new supply chain attack has affected nearly 100 victims, with evidence pointing towards China as the origin. The hackers, primarily targeting individuals in Hong Kong, exploited Microsoft's trust model to make their malware more challenging to detect. The Threat Hunter Team at Symantec discovered that a hacker group named CarderBee was responsible for this attack. They compromised the software updates of a Chinese-origin security software called Cobra DocGuard, affecting about 100 computers mainly in Hong Kong. While there are indications linking CarderBee to previous Chinese state-sponsored hacking operations, Symantec has not definitively identified them as a previously known group. The malware used in this attack was also digitally signed by Microsoft, making it harder to detect. Cobra DocGuard, distributed by EsafeNet, has about 2,000 users. The hackers' selective targeting suggests a meticulous approach in choosing their victims.
READ THE STORY: Wired
WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders
Analyst Comments: The unmasking of EVLF and their malware products highlights the ongoing challenges in the cybersecurity landscape. The fact that such sophisticated tools can be sold as a service to other cybercriminals underscores the organized and commercial nature of modern cybercrime. The ability of these RATs to access a wide range of information on a victim's device is concerning, especially given the increasing reliance on mobile devices for both personal and professional activities.
FROM THE MEDIA: A Syrian threat actor named EVLF has been identified as the creator of the Android malware families CypherRAT and CraxsRAT. These Remote Access Trojans (RATs) allow attackers to remotely control a victim's device, including accessing the camera, location, and microphone. Cybersecurity firm Cyfirma revealed that these RATs are being sold to other cybercriminals as part of a malware-as-a-service (MaaS) scheme. Over the past three years, approximately 100 unique threat actors have purchased these tools on a lifetime license. EVLF has been operating a web shop to market their products since September 2022. CraxsRAT is particularly dangerous, with features like bypassing Google Play protect, live screen view, and a shell for command execution. The malware also seeks permissions to access a variety of information from the victim's device. EVLF has a Telegram channel named "EvLF Devz" with over 10,000 subscribers. Following the public disclosure of their activities, EVLF announced on August 23, 2023, that they would be discontinuing the project.
READ THE STORY: THN
Can an Algorithm Write a Better News Story Than a Human Reporter?
Analyst Comments: The rise of algorithms in journalism, as presented in the article, underscores the rapid advancements in AI and its potential implications for traditional professions. While the capabilities of Narrative Science's software are impressive, the ethical and professional implications of such technology are vast. On one hand, it can democratize information, making it possible to have reports on events that might not have been covered due to resource constraints. On the other hand, the potential loss of human touch, nuance, and the critical perspective that journalists bring to stories could be a significant drawback. Furthermore, the assurance that these algorithms won't replace human jobs might be optimistic, given the consistent trend of automation across industries.
FROM THE MEDIA: The software can produce articles ranging from sports updates to financial previews, with some of these articles being published on reputable platforms like Forbes. The quality of these articles is such that they don't appear robotic, and they can even generate human-like summaries of events like Little League games. Kristian Hammond, the CTO and cofounder of Narrative Science, predicts that in the next 15 years, over 90% of news could be computer-generated. Beyond journalism, the technology is finding applications in various industries, such as fast-food companies using it to analyze sales data. The software's design allows for customization in tone, from formal reporting to informal blog-like narratives. The process involves gathering high-quality data, understanding the broader context, and then using journalist-created templates to structure the stories. Despite its capabilities, Hammond emphasizes that the technology isn't aiming to replace human journalists but to fill gaps in reporting, especially in areas where human reporters might not be present.
READ THE STORY: Wired
Criminals go full Viking on CloudNordic, wipe all servers and customer data
Analyst Comments: The ransomware attack on CloudNordic underscores the vulnerabilities faced by cloud providers and the potential cascading effects on their customers. The company's decision not to pay the ransom is commendable from an ethical standpoint, as paying ransoms can incentivize further attacks. However, the loss of data is a significant blow to both the company and its customers. The fact that the breach occurred during a server transfer highlights the importance of robust cybersecurity measures, especially during transitional phases. The incident serves as a stark reminder for businesses to have comprehensive backup and disaster recovery plans in place.
FROM THE MEDIA: CloudNordic, a prominent Danish cloud provider, has informed its customers that their data is likely lost due to a ransomware attack that encrypted the company's servers. The cyberattack occurred on August 18, shutting down all of CloudNordic's systems, including company and customer websites and email systems. Despite efforts to restore the data, the prognosis remains grim. CloudNordic has refused to meet the ransom demands of the hackers. The company believes that while the data was encrypted, it was not exfiltrated. The breach reportedly occurred as servers were being transferred between data centers. Some servers were already infected before the move, and during the transfer, they were connected to CloudNordic's internal network, granting the attackers access to vital systems. CloudNordic is now working to get customers' web and email servers back online, though without the original data. They have advised critically affected customers to seek alternative providers to reduce downtime.
READ THE STORY: The Register
Items of interest
The local government debt that threatens China’s economy
Analyst Comments: The escalating local government debt in China, especially through mechanisms like LGFVs, is a looming threat to the nation's economic stability. The proactive involvement of the central government underscores the gravity of the situation. While strategies like swapping "hidden debt" might provide a temporary reprieve, they don't address the root of the problem. The hesitancy of local governments to liquidate assets, even in the face of potential benefits, indicates deeper systemic and perhaps political challenges. The tangible repercussions of this debt, as evidenced by the compromised services in places like Heilongjiang, highlight the urgent need for both immediate interventions and long-term structural reforms.
FROM THE MEDIA: Guizhou, once among China's most impoverished provinces, has seen a significant transformation due to its heavy investment in infrastructure, particularly bridges. However, this development has come at a steep price, with the province accumulating a debt of Rmb1.2tn ($165.7bn) by the end of 2022. This situation is reflective of a broader issue in China, where many provinces have accrued substantial debts through Local Government Financing Vehicles (LGFVs). These LGFVs, designed to raise debt for infrastructure projects, have contributed to China's official local government debt reaching Rmb94tn by 2022. The financial strain on local governments was further exacerbated by the pandemic, which led to increased public spending and a decline in revenue from land sales. In response, Beijing is taking measures, including sending officials to financially weak provinces to assess and potentially reduce their debts.
READ THE STORY: FT
Why is China's economy struggling? (Video)
FROM THE MEDIA: China has cut one of its key lending rates to spur the recovery of the world's second-largest economy. China's economy is still growing but at a slower rate than was previously expected, due to a worsening property slump, weak consumer spending, and tumbling credit growth. The country's central bank has now cut its one-year loan prime rate while leaving some others untouched, surprising experts who had expected further-reaching measures. DW speaks to George Magnus of Oxford University’s China Center to find out more.
Can China still become the world’s largest economy? (Video)
FROM THE MEDIA: China managed the fastest sustained growth of any major economy ever recorded - catapulting it to second place behind the United States. But today, its GDP growth is at near-historic lows. For the first time in two decades, its output fell behind that of the rest of Asia. Analysts believe that even the end of Zero Covid won’t signal the revival of Chinese economic growth as we know it.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.