Daily Drop (667): Telegram: Bans, CACTUS: Qlik Sense, CN: LiDAR, IR: Av3ngers, Black Basta, CN: JPMorgan, Lazarus, X: Ad's, Sinbad Crypto, RETVec, DOGE-1 SAT, GOOGLE: CN Surge in Cyber vs Taiwan
11-30-23
Thursday, Nov 30, 2023 // (IG): BB // The Leek Sino-Satire // Coffee for Bob
Telegram's Ineffective Extremism Bans: A Detailed Investigation
Bottom Line Up Front (BLUF): Telegram's attempts to ban extremist channels, such as those used by Hamas, have proven largely ineffective. Despite appearing restricted to some users, these channels remain active and their content continues to spread, undermining the efforts to combat online extremism.
Analyst Comments: WIRED's investigation, in partnership with the Integrity Institute, analyzed over 100 restricted channels, revealing that content from these channels is still widely shared in unrestricted ones. The study highlights the platform's failure to fully enforce its own policies against hate speech and terrorism, with restricted channels continuing to function as hubs for radicalization and extremist content sharing.
FROM THE MEDIA: Founded in 2013, Telegram has become a favored platform for extremists due to its lenient content moderation and unlimited subscriber capacity for channels. The study found that restricted channels, while hidden from search results, remain accessible and active. These channels often share content related to right-wing extremism and other forms of radicalized hate. Despite Telegram's efforts to comply with app store policies against hate speech and terrorism, the study found that restricted channels like Hamas's @qassambrigades remained active, with their content being redistributed in unrestricted channels. Experts argue that Telegram's moderation is largely driven by external pressures from entities like Google and Apple. Telegram's sideloaded version, which bypasses app store restrictions, further complicates the issue, allowing unrestricted access to all channels. The study concludes that while Telegram's actions may give an appearance of compliance with anti-extremism policies, they fall short in effectively curbing the spread of extremist content on the platform.
READ THE STORY: Wired
Rise in CACTUS Ransomware Exploiting Qlik Sense Flaws for Data Theft
Bottom Line Up Front (BLUF): The CACTUS ransomware campaign has been exploiting vulnerabilities in the Qlik Sense cloud analytics and business intelligence platform, marking the first instance of such targeted attacks. These vulnerabilities allow attackers to gain access and control within targeted environments.
Analyst Comments: This campaign represents a significant escalation in the threat landscape, leveraging recently disclosed security flaws in Qlik Sense. The targeted approach and the exploitation of specific vulnerabilities in popular business software underscore the need for heightened cybersecurity measures and prompt patching of known flaws.
FROM THE MEDIA: Researchers at Arctic Wolf have observed a CACTUS ransomware campaign exploiting vulnerabilities in Qlik Sense, a cloud analytics and business intelligence platform. The campaign initially used 40 credential-harvesting apps imitating four major Iranian banks, later expanding to target 12 banks. This marks the first documented instance where CACTUS ransomware utilized Qlik Sense flaws for initial access, exploiting three key vulnerabilities: CVE-2023-41265, CVE-2023-41266, and CVE-2023-48365. These vulnerabilities allow attackers to elevate privileges, access unauthorized endpoints, and execute remote code. The attackers use these vulnerabilities to download additional tools for establishing persistence and remote control, including uninstalling security software and creating remote desktop tunnels. The campaign culminates in the deployment of CACTUS ransomware and data exfiltration.
READ THE STORY: THN
Chinese LiDAR Devices Under Scrutiny for Potential Security Risks in the US
Bottom Line Up Front (BLUF): A US congressional committee is investigating the potential national security risks posed by Chinese-made Light Detection and Ranging (LiDAR) devices, considering whether they warrant similar bans to other Chinese technologies.
Analyst Comments: The scrutiny of Chinese LiDAR technology by US lawmakers indicates growing concerns over the potential for foreign technology to compromise national security. The parallels drawn with previous actions against companies like Huawei suggest a significant level of apprehension about the integration of Chinese tech in sensitive areas.
FROM THE MEDIA: The US Select Committee on the Chinese Communist Party, led by Mike Gallagher, has raised concerns about the national security implications of Chinese-made LiDAR devices. The committee has requested an investigation into Chinese LiDAR manufacturers and the appropriateness of sanctions on these entities. LiDAR, critical in autonomous systems and robotics, is not currently subject to US export controls or government procurement restrictions. The committee fears that Beijing could potentially access data from LiDAR devices, including information on US infrastructure and military systems. There are also concerns about malware introduction via software updates from Chinese LiDAR-makers. The committee highlighted the use of LiDAR technology in the surveillance of the Uyghur population in China, adding human rights concerns to the mix.
READ THE STORY: The Register
Iranian-Backed Cyber Av3ngers Compromise Water Infrastructure Security
Bottom Line Up Front (BLUF): The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported a cyberattack on the Municipal Water Authority of Aliquippa in Pennsylvania, attributed to the Iranian-backed hacktivist group, Cyber Av3ngers. This incident involved the exploitation of Unitronics programmable logic controllers (PLCs).
Analyst Comments: The attack compromised a critical water monitoring system by exploiting weak password security and internet exposure. This highlights the vulnerability of critical infrastructure to cyberattacks, particularly in sectors with underfunded cybersecurity protections. The response included taking the system offline and switching to manual operations, averting risks to the water supply. CISA's recommendations emphasize stronger password security, multi-factor authentication, and disconnection of critical systems from the internet.
FROM THE MEDIA: Cyber Av3ngers, known for targeting critical infrastructure, manipulated the Unitronics PLCs used in water treatment processes. These PLCs are pivotal in monitoring and controlling water and wastewater treatment facilities. The attack methodology suggests poor cybersecurity practices, including default password usage and internet exposure of critical systems. This incident adds to the growing concerns about cybersecurity in critical infrastructure sectors. CISA's advisory suggests comprehensive security measures to mitigate such risks. The attack's attribution to an Iranian-backed group underscores the geopolitical dimensions of cybersecurity threats in critical infrastructure. Additionally, the incident in North Texas, involving another water utility, raises further concerns about the widespread vulnerability of water systems to cyberattacks. Experts emphasize the need for government regulation and collaborative efforts to enhance cybersecurity in these critical sectors.
READ THE STORY: THN // The Record
Black Basta Ransomware Operation Amasses Over $100 Million in Revenue
Bottom Line Up Front (BLUF): The Black Basta ransomware group, considered an offshoot of the former Conti group, has reportedly generated over $100 million since its inception in April 2022, indicating a significant impact in the ransomware landscape.
Analyst Comments: The financial success of Black Basta underscores the increasing sophistication and profitability of ransomware operations. The group's ability to amass such substantial earnings in a short period highlights the ongoing challenge that ransomware poses to cybersecurity globally. The connection to the Conti group suggests a continuity of skilled cybercriminal activities under new operations.
FROM THE MEDIA: The Black Basta ransomware group has reportedly generated over $100 million in revenue since starting operations in April 2022. This estimate, provided by Corvus Insurance and blockchain analysis company Elliptic, is based on payments to the group's known cryptocurrency wallet addresses. Black Basta is believed to be an offshoot of the now-defunct Conti ransomware group and is comprised partly of former Conti members. The group's ransomware kit has been highly successful, being involved in 14% of successful breaches, tying it for second place among ransomware variants. Notable among Black Basta's attacks was the breach of London-based Capita, leading to significant clean-up costs and a class action lawsuit. Despite the high profile of its attacks, Black Basta's payment rate from victims is roughly in line with the industry average, with about 35% of its victims paying the ransom. This figure could be higher, considering victims who paid early to avoid their data being leaked. The group typically shares around 14% of its ransom payments with its core team, aligning with the ransomware-as-a-service (RaaS) model's standards.
READ THE STORY: The Register
JPMorgan Chase Considers Exit from China Amid Rising US Tensions
Bottom Line Up Front (BLUF): JPMorgan Chase, led by CEO Jamie Dimon, is considering withdrawing from the Chinese market in response to escalating US-China tensions, particularly concerning Taiwan's sovereignty. This decision, if mandated by US authorities, would be a significant shift for the bank, which has deep historical ties in China.
Analyst Comments: JPMorgan's potential exit from China highlights the impact of geopolitical conflicts on global financial institutions. Dimon emphasizes the need to balance engagements with superpowers while adhering to ethical business practices. This move comes amid growing concerns over Taiwan and other international issues affecting multinational corporations. JPMorgan's substantial portfolio in China includes services to major firms like Shein and ByteDance, indicating the depth of its involvement in the Chinese market.
FROM THE MEDIA: During the DealBook Summit, JPMorgan Chase CEO Jamie Dimon discussed the possibility of the bank leaving China if required by the US, amidst increasing geopolitical tensions, particularly over Taiwan. JPMorgan's extensive involvement in China spans over a century, offering investment banking and advisory services to major Chinese firms. Dimon stated that while the bank is prepared to exit China following US directives, its commitment to ethical business conduct remains steadfast. The potential withdrawal underscores the intricate balance global financial institutions must maintain in the face of political and ethical considerations. JPMorgan Chase, with a robust financial standing, including a market capitalization of $447.12 billion and strong earnings, is positioned to adapt to these geopolitical changes while continuing its commitment to shareholder returns. The bank's readiness to comply with US directives, despite its long-standing presence in China, reflects the complex dynamics of international relations and their impact on the global financial sector.
READ THE STORY: Investing
Lazarus Group's Exploits in Cryptocurrency Sector Yield Billions for North Korea
Bottom Line Up Front (BLUF): North Korean cyber threat actors, particularly the Lazarus Group, have targeted the cryptocurrency sector since 2017 as a major revenue source, circumventing international sanctions and contributing to the country's weapons programs.
Analyst Comments: The extent of the Lazarus Group's activities in the cryptocurrency sector indicates a highly sophisticated and successful operation, generating significant funds for North Korea's regime. This highlights the growing challenge of state-sponsored cybercrime in the global financial landscape.
FROM THE MEDIA: Threat actors from North Korea, particularly the Lazarus Group, have been increasingly targeting the cryptocurrency sector as a key revenue source, bypassing international sanctions. Since at least 2017, they have stolen an estimated $3 billion worth of crypto assets, with about $1.7 billion looted in 2022 alone. The majority of these assets directly fund North Korea's weapons of mass destruction (WMD) and ballistic missile programs. The U.S. Treasury Department has recently imposed sanctions against Sinbad, a virtual currency mixer used by the Lazarus Group for laundering proceeds. The Lazarus Group is known for sophisticated social engineering tactics, targeting employees of online cryptocurrency exchanges and deploying trojanized cryptocurrency apps to steal assets. They also use mixing services to obscure financial trails and evade attribution.
READ THE STORY: THN
U.S.-China Dialogue on AI: Balancing Risks and Opportunities
Bottom Line Up Front (BLUF): The complex U.S.-China relationship, characterized by economic interdependence and geopolitical rivalries, has recently focused on the risks and safety of Artificial Intelligence (AI), highlighting the need for diplomatic and technological cooperation amidst competition.
Analyst Comments: The history of U.S.-China relations, marked by both cooperation and competition, presents a challenging backdrop for current dialogues on AI. These conversations are crucial in a technologically advancing world, where AI's capabilities in various sectors, including military, demand responsible use and ethical frameworks. Both nations' acknowledgment of AI's power and potential risks necessitates a careful approach to develop guidelines ensuring AI's ethical and safe application globally.
FROM THE MEDIA: The U.S.-China relationship has evolved significantly since the early 1900s, marked by trade boycotts and the anti-missionary movement in China. This complex relationship now encompasses a mix of economic interdependence, cultural differences, and geopolitical rivalries. Despite international agreements aimed at fostering unity, China's actions in Xinjiang have raised concerns about its adherence to human rights commitments. The advancement in technology, including satellites, electronic warfare, and hypersonic weapons, further complicates U.S.-China relations. The focus is now on the risks and safety of AI, a powerful tool that could lead to substantial advances in various fields but also poses significant risks. The U.S. and China's recent talks on AI reflect the delicate balance of trust and skepticism that characterizes their relationship. These discussions may help establish 'topic trust' on AI, despite ongoing competition for supremacy. The challenge lies in defining acceptable parameters for AI use, especially in military applications, to prevent mutual destruction. The outcome of these conversations will be crucial in shaping how AI is used responsibly and ethically, reflecting the ongoing complexity and importance of U.S.-China relations in the global arena.
READ THE STORY: Modern Diplomacy
Musk's Bold Message to Advertisers Amidst X's Advertising Crisis
Bottom Line Up Front (BLUF): Elon Musk, in a recent interview at the New York Times’ DealBook Summit, responded aggressively to advertisers withdrawing from the platform X (formerly known as Twitter), following his controversial actions, including endorsing an antisemitic post.
Analyst Comments: Musk's blunt message to companies like Disney, Apple, and IBM, who paused advertising on X, highlights the tension between his leadership style and corporate advertising norms. This response may further strain the platform's financial stability, as it has historically relied heavily on ad revenue. Musk's approach could have significant implications for X's future, especially considering the platform's valuation decline since his takeover.
FROM THE MEDIA: The North Texas Municipal Water District, responsible for serving two million people across multiple cities, is grappling with a significant cyberattack that has disrupted its operations. While most of their business network has been restored, their phone system remains affected. The cybercrime group Daixin Team has claimed responsibility, asserting the theft of customer information. Third-party forensic specialists are actively investigating the incident, but the full extent of the breach remains uncertain. This incident highlights the vulnerability of critical infrastructure organizations to cyberattacks and the potential risks to data security and public services.
READ THE STORY: Wired
Expanding Cyber Attacks on Iranian Banks: Over 200 Fake Mobile Apps Detected
Bottom Line Up Front (BLUF): Cybercriminals have significantly expanded their campaign against Iranian banks, creating over 200 fake mobile apps designed to steal customer information. These apps mimic major Iranian banks and have added new capabilities, including targeting cryptocurrency wallet apps.
Analyst Comments: The scale and sophistication of this cyber attack campaign indicate a significant threat to Iranian banking customers. The focused targeting of Xiaomi and Samsung devices and the potential expansion to iOS devices suggest a strategic and evolving approach by the attackers. The campaign's effectiveness is heightened by its combination of malicious apps and phishing attacks.
FROM THE MEDIA: Cybersecurity firm Zimperium discovered an extensive campaign where over 200 fake mobile apps mimic major Iranian banks to steal customer information. Initially starting with 40 apps in late 2022, the campaign now targets 12 banks and includes capabilities to scan for cryptocurrency wallet apps, indicating a potential future threat vector. These apps, distributed through phishing websites, are designed to steal banking credentials, credit card information, and intercept SMS traffic for one-time passwords. The campaign has evolved, with newer versions of the malware adding more sophisticated data-harvesting capabilities. The focus on specific device brands like Xiaomi and Samsung, along with evidence suggesting development of iOS-targeting malware, reflects the attackers' strategic planning. The cybercriminals are also linked to phishing attacks against the same banks, indicating a comprehensive approach to compromising bank customer security.
READ THE STORY The Record
OpenAI's Leadership Shuffle: Sam Altman Returns as CEO with Microsoft on Board
Bottom Line Up Front (BLUF): Sam Altman has officially returned as the CEO of OpenAI, with the organization announcing a new board that includes a non-voting observer from Microsoft. This reinstatement follows a period of uncertainty and governance changes within the AI research company.
Analyst Comments: Altman's return as CEO marks a significant development in OpenAI's leadership and strategic direction. The inclusion of a Microsoft observer on the board reflects the growing partnership between OpenAI and Microsoft. The organization's immediate priorities, as stated by Altman, focus on advancing research, investing in safety, improving products, and establishing a diverse and effective governance structure.
FROM THE MEDIA: OpenAI has officially announced the return of Sam Altman as CEO, following a period of internal turmoil and leadership changes. In a letter to employees, Altman expressed gratitude for those who supported his return and outlined three immediate priorities for the organization: advancing research and safety, improving products and customer service, and appointing a new, diverse board to enhance governance. Bret Taylor, former co-CEO of Salesforce, retains his position as board chair. The board will also include a non-voting observer from Microsoft, indicating a deepening partnership between OpenAI and the tech giant. However, the board currently lacks diversity, with only white male members, raising questions about the promised diversity. Details on the number of directors to be appointed and specific governance improvements remain unclear. The board's structure, particularly Altman's role in overseeing a review of recent events and the independent committee's function, seems contradictory, suggesting potential governance challenges.
READ THE STORY: The Register
US Treasury Sanctions Sinbad Cryptocurrency Mixer Linked to North Korean Hacks
Bottom Line Up Front (BLUF): The U.S. Treasury Department has sanctioned Sinbad, a cryptocurrency mixer, for its role in laundering funds stolen by the North Korean-linked Lazarus Group. This action is part of broader efforts to curb state-backed actors and cybercriminals from exploiting digital currencies.
Analyst Comments: The sanctioning of Sinbad by the U.S. Treasury highlights the increasing focus on dismantling financial networks that support state-sponsored cybercrime. The connection of Sinbad to the Lazarus Group's extensive crypto theft operations underlines the strategic use of mixers in obfuscating illicit financial transactions.
FROM THE MEDIA: The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions on Sinbad.io, a cryptocurrency mixer extensively used by North Korea's Lazarus Group to launder stolen virtual currency. These sanctions follow the group's involvement in several high-profile crypto thefts, including those against Horizon Bridge and Axie Infinity. Sinbad.io, known for concealing transaction origins and destinations, has been a key tool for the Lazarus Group in processing millions from their cyberattacks. This action against Sinbad aligns with the U.S. government's broader strategy to limit the capabilities of state-backed actors and cybercriminals in using digital currencies for illicit purposes. The Lazarus Group has been operating for over a decade, stealing more than $2 billion to fund North Korea's government activities, including weapons programs.
READ THE STORY: The Record
Google Introduces RETVec to Enhance Gmail's Defense Against Spam and Malicious Emails
Bottom Line Up Front (BLUF): Google has unveiled a new multilingual text vectorizer, RETVec (Resilient and Efficient Text Vectorizer), designed to improve the detection of spam and malicious content in Gmail.
Analyst Comments: RETVec represents a significant advancement in Google's effort to combat evolving cybersecurity threats in email communication. Its ability to process over 100 languages and handle character-level manipulations enhances Gmail's resilience against sophisticated spam and phishing tactics.
FROM THE MEDIA: Google has revealed RETVec, a novel multilingual text vectorizer, to bolster Gmail's defenses against spam and malicious emails. RETVec is specifically designed to be resilient against various character-level manipulations such as insertion, deletion, typos, homoglyphs, and LEET substitution. Trained on a unique character encoder capable of encoding all UTF-8 characters and words, RETVec aims to support more resilient and efficient server-side and on-device text classifiers. This vectorization technique in natural language processing (NLP) maps words or phrases to a numerical representation for analysis, including text classification and sentiment analysis. RETVec's implementation in Gmail has already shown a 38% improvement in spam detection and a 19.4% reduction in false positives, while significantly lowering computational costs and latency.
READ THE STORY: THN
Ex-Motorola Employee Admits to Phishing Attack and Attempted Passport Fraud
Bottom Line Up Front (BLUF): Andrew Mahn, a former Motorola technician, has pleaded guilty to charges of wire fraud for a cyberattack on Motorola and passport fraud while awaiting trial.
Analyst Comments: Mahn's case is a notable example of insider threats where former employees exploit their knowledge and access to carry out cyberattacks against their previous employer. Additionally, his attempt to obtain a fraudulent passport while awaiting trial highlights the lengths individuals may go to evade legal consequences.
FROM THE MEDIA: Andrew Mahn, a 28-year-old ex-Motorola technician from Derry, New Hampshire, has pleaded guilty to wire fraud and passport fraud charges. Mahn was initially indicted for breaking into Motorola's computer network and stealing data. While employed at Massachusetts Port Authority (Massport), he sent phishing emails to Motorola employees, using a fake Motorola payroll portal to capture their login credentials. Mahn then gained access to Motorola's network and its Bitbucket repository, stealing source code for unlocking radio equipment features. The cyber intrusion was traced back to Mahn through an IP address and his Massport email. After being charged for the Motorola attack, Mahn was detained and later indicted for passport fraud, having applied for a passport under a fake name to potentially flee abroad. His sentencing is scheduled for March next year, with the wire fraud charge carrying a maximum sentence of 20 years and passport fraud up to ten years, along with potential fines.
READ THE STORY: The Register
Cryptocurrency-Funded DOGE-1 Satellite Set for SpaceX Launch in January 2024
Bottom Line Up Front (BLUF): The DOGE-1 satellite, funded by the cryptocurrency Dogecoin, has received approval from the National Telecommunications and Information Administration (NTIA) and is scheduled for a SpaceX Falcon 9 launch in January 2024.
Analyst Comments: The advancement of the DOGE-1 mission reflects the increasing intersection of space technology and cryptocurrency. The NTIA approval marks a significant step toward a Federal Communications Commission (FCC) license, paving the way for the integration of cryptocurrencies in space exploration and marketing initiatives.
FROM THE MEDIA: Geometric Energy Corporation's DOGE-1 satellite, funded by Dogecoin, has received approval from the NTIA for its X-Band frequency, moving closer to obtaining the FCC license needed for its launch. Scheduled for a SpaceX Falcon 9 launch in January 2024, the DOGE-1 mission initially faced delays but is now on track. The satellite will broadcast advertisements from space and is part of a broader initiative involving Intuitive Machines. This project illustrates the growing fusion of space technology and cryptocurrency, with Dogecoin enthusiasts keenly watching the developments. Additionally, a physical Dogecoin token is being prepared by Astrobotic for a lunar mission under NASA's Commercial Lunar Payload Services initiative, set for December 23. This mission will carry various payloads, including the Dogecoin token, a Bitcoin token sponsored by BitMEX, and a Genesis Block replica commissioned by Bitcoin Magazine.
READ THE STORY: Investing
Google Reports Surge in Chinese Cyberattacks Against Taiwan
Bottom Line Up Front (BLUF): Google has reported a substantial rise in cyberattacks from China targeting Taiwan, involving over 100 hacking groups and encompassing various sectors including defense, government, and private industry.
Analyst Comments: The increase in Chinese cyberattacks on Taiwan reflects the escalating digital warfare aspects of geopolitical tensions in the region. The complexity and breadth of these attacks underscore the strategic importance of cybersecurity in national defense and the need for robust international cooperation to counter such threats.
FROM THE MEDIA: According to Google's threat analysis division, there has been a significant increase in cyberattacks from China targeting Taiwan, encompassing various sectors such as defense, government, and private industry. These attacks, attributed to over 100 Chinese hacking groups, involve sophisticated tactics that make tracking difficult. Hackers are known to infiltrate small home and office internet routers, repurposing them for attacks while concealing their origin. The surge in cyberattacks coincides with heightened concerns over potential conflict in Taiwan, given the island's strategic importance and its relationship with the US, Taiwan's main military supporter. The US, while not formally recognizing Taiwan as a nation, has committed to helping the island defend itself against China's growing assertiveness.
READ THE STORY: Bloomberg
Items of interest
Evolving China-based Cyberwarfare Demands Greater Regional Resilience
Bottom Line Up Front (BLUF): China's aggressive expansion in cyberwarfare, targeting Southeast Asia and Australia, necessitates enhanced regional resilience and a robust defense against evolving Chinese cyber espionage and attacks.
Analyst Comments: The escalation of China's cyberwarfare activities in the region represents a significant challenge to national security and commercial interests. Building a comprehensive and unified cyber defense strategy is crucial for mitigating these threats and protecting critical infrastructure and intellectual property.
FROM THE MEDIA: The escalating cyber warfare activities by China in Southeast Asia, targeting various sectors for espionage and intellectual property theft, call for an urgent and robust response to bolster cyber resilience in the region. This growing threat, focusing on strategic intelligence collection and impacting critical sectors aligned with China's Belt and Road Initiative, necessitates comprehensive measures including advanced technology deployment, skilled personnel, and regional collaboration for effective cybersecurity. The need for understanding the human motivations behind these cyber attacks is crucial, making the integration of threat intelligence and expert response teams essential. Implementing AI and machine-learning security solutions, coupled with public-private partnerships and intelligence sharing, forms the cornerstone of this strategy.
READ THE STORY: ASPI
China Starts to Test Deepest Oil and Gas Well in Asia (Video)
FROM THE MEDIA: Located in the Tarim Basin, northwest China's Xinjiang Uygur Autonomous Region, the Yuejin 3-3 well boasts to be the deepest oil and gas well in Asia, with a depth of 9,432 meters.
China expands detention centers in Xinjiang Uighur Autonomous Region (Video)
FROM THE MEDIA: China has built more than 100 new compounds in the Xinjiang Uighur Autonomous Region, where Muslim Uighurs are stuck and forced to work in dedicated factory buildings, according to a new report.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.