Daily Drop (671): CN: Myanmar's Rebels, Africa: C-Band, CAS: Guangzhou, LogoFAIL, OpenAI: Spillage, X: Advert, CACTUS: Malware, ISS: MS-25, MPS: India, USS Gifford, Kimsuky, RU: Volnorez, Tengyun
12-04-23
Monday, Dec 04, 2023 // (IG): BB // The Leek Sino-Satire // Coffee for Bob
China's Ambiguous Role in Myanmar's Conflict: Strategic Maneuvers and Rebel Alliances
Bottom Line Up Front (BLUF): The recent developments in Myanmar’s civil war indicate a complex relationship between China and Myanmar's ethnic rebel groups. China's subtle involvement, particularly with groups like the United Wa State Army, seems to be a part of a broader strategy to counter online scams and secure long-term economic and strategic interests, despite official statements of non-interference.
Analyst Comments: China's engagement in Myanmar's internal conflict, especially with ethnic rebel groups, is a nuanced strategy, balancing its immediate security concerns and long-term geopolitical interests. The expulsion of officials wanted by Beijing for online scams by the United Wa State Army hints at an under-the-table alliance. China's history of leveraging neighboring conflicts for strategic advantage is well documented, and its actions in Myanmar appear to be a continuation of this policy. However, the increasing instability along its border and the involvement of Chinese military assets in the region suggest a complex geopolitical calculus where Beijing is trying to maintain a delicate balance between control and chaos.
FROM THE MEDIA: According to Newsweek, China's involvement in Myanmar's civil war is multifaceted, indirectly supporting ethnic rebel groups. This support seems to serve dual purposes: countering cybercrimes and advancing strategic interests. The United Wa State Army's action against individuals implicated in scams targeting Chinese citizens underscores this nexus. Recent military offensives by the Brotherhood Alliance, comprising various ethnic armed groups, against Myanmar's military junta, suggest increasing complexity in the conflict post the 2021 coup. Observers note that China's tolerance of border instability may be a calculated move to secure longer-term goals. Additionally, the presence of the Chinese People's Liberation Army Navy in Myanmar, though officially unrelated to the conflict, adds another layer to this complex situation.
READ THE STORY: Newsweek
C-Band Frequency: A Keystone in Africa's Satellite Communications
Bottom Line Up Front (BLUF): The C-band frequency spectrum plays a crucial role in Africa's satellite services. Its importance lies in its extensive applications across satellite navigation, communications, weather observation, and direct broadcasting. Despite the availability of higher frequency bands, the C-band remains a preferred choice in Africa due to its reliability and wide range of applications.
Analyst Comments: The C-band's prominence in Africa's satellite technology sector underscores the continent's growing reliance on space-based applications for various developmental and strategic purposes. In regions like Africa, where geographical and infrastructural challenges persist, satellite services become vital for bridging communication gaps, enhancing weather forecasting accuracy, and supporting geospatial technologies. The preference for the C-band specifically could be attributed to its relative resistance to rain fade compared to higher frequency bands, making it more reliable in Africa's diverse climatic conditions.
FROM THE MEDIA: This piece from Space in Africa likely highlights the C-band's significant impact on satellite services across the continent. This includes detailing its applications in various technological areas such as satellite navigation, communications, and direct broadcasting. The choice of C-band in Africa may be favored due to its efficiency and effectiveness in meeting the unique geographical and climatic challenges of the continent. The article probably also sheds light on the ongoing advancements in satellite technology and how they are being leveraged in Africa, particularly focusing on the C-band's role in these developments.
READ THE STORY: Space in Africa
China Advances in Space: New Rocket Engine Test Facility in Guangzhou
Bottom Line Up Front (BLUF): China is constructing a new rocket engine testing facility in Guangzhou, Guangdong province. This facility, spearheaded by CAS Space, a company owned by the Chinese Academy of Sciences, is designed for testing liquid-fueled rocket engines. It marks a significant step in China's expanding space capabilities, emphasizing liquid-fueled rocket technology and aiming to meet the growing demands for satellite network deployment.
Analyst Comments: China's decision to build a state-of-the-art rocket engine testing facility in Guangzhou reflects its strategic commitment to becoming a leading player in space exploration and satellite technology. The choice of Guangzhou, known for its manufacturing prowess and robust supply chain, aligns with China's broader policy of regional economic integration and technological self-sufficiency. This facility is likely to enhance China's capabilities in liquid-fueled rocketry, a key area where China has been focusing on improving launch efficiency and payload capacity. This move also signals China's ambition to meet the global demand for satellite launches, particularly for large satellite networks, positioning itself as a competitive player in the international space industry.
FROM THE MEDIA: The facility, located in Aotou township, Guangzhou, is designed for comprehensive testing of engines with up to 200 metric tons of thrust and integrated propulsion systems with a maximum thrust of 400 tons. It will also serve as an open platform for domestic institutions, universities, and enterprises. CAS Space aims to produce about 100 engines annually in Guangzhou, responding to the growing demand for deploying large satellite networks. Guangdong's entry into the space sector, marked by the construction of a rocket plant in 2020, represents a significant diversification of the province's industrial base. The ZK 1A, a solid-propellant carrier rocket, was the first rocket manufactured in Guangdong, exemplifying the region's burgeoning role in China's space endeavors.
READ THE STORY: China Daily (State Sponsored)
LogoFAIL: UEFI Vulnerabilities Endanger Device Security
Bottom Line Up Front (BLUF): Newly discovered vulnerabilities in the Unified Extensible Firmware Interface (UEFI) firmware, used by various BIOS vendors, pose a significant threat by allowing malware attacks to bypass robust security measures like Secure Boot and Intel Boot Guard. These vulnerabilities, collectively termed LogoFAIL, can be exploited through image parsing flaws, enabling the delivery of stealth malware during the device boot phase.
Analyst Comments: The LogoFAIL vulnerabilities underscore an evolving threat landscape where attackers exploit deep-seated firmware vulnerabilities, a method that is often more challenging to detect and mitigate. These flaws highlight the persistent risks in firmware security, which can often be overlooked in favor of software-based security solutions. The fact that these vulnerabilities impact a wide range of devices, regardless of their silicon base (x86 or ARM), and are specific to UEFI and independent BIOS vendors, broadens the scope of potential impact.
FROM THE MEDIA: The vulnerabilities discovered by Binarly include a heap-based buffer overflow flaw and an out-of-bounds read, triggered during image parsing. They potentially impact a wide range of consumer and enterprise-grade devices from major vendors such as Intel, Acer, and Lenovo. These flaws are particularly insidious as they enable attackers to maintain persistent control over affected devices, deploying malware that remains undetected by most security solutions. Unlike previous vulnerabilities like BlackLotus or BootHole, LogoFAIL doesn't modify the boot loader or firmware component but utilizes a modified logo image file for malware persistence.
READ THE STORY: THN
OpenAI's Custom Chatbots Reveal Sensitive Data
Bottom Line Up Front (BLUF): OpenAI's recently launched GPTs, enabling users to create custom chatbots, have been found to inadvertently expose sensitive underlying data. This development poses significant privacy and security concerns, as it potentially allows access to the data that these AI models were trained on.
Analyst Comments: The revelation of this data exposure in custom GPTs by OpenAI is a critical reminder of the inherent risks associated with AI and machine learning technologies, especially when they are made widely accessible. This incident underscores the challenges in balancing user-friendliness with data security, particularly in AI models trained on vast datasets. It also highlights the need for robust security protocols and ongoing vigilance in the rapidly evolving AI landscape, where the line between user-generated content and the underlying training data can be unexpectedly blurred.
FROM THE MEDIA: OpenAI's initiative to allow the creation of custom chatbots, known as GPTs, was aimed at democratizing AI technology. However, the process has revealed vulnerabilities where the data used to build these chatbots can be easily exposed. This includes a variety of GPTs designed for diverse purposes, such as providing remote work advice, searching academic papers, or transforming users into Pixar characters. The issue is significant not only because it exposes the data that these models were trained on but also because it raises concerns about the potential misuse of such information.
READ THE STORY: Wired
Elon Musk's Twitter Crisis: Advertiser Backlash and Uncertain Future
Bottom Line Up Front (BLUF): Elon Musk's recent actions and statements, particularly his confrontation with major Twitter advertisers like Apple, IBM, and Comcast, have led to a significant pullback in advertising on the platform. This situation puts Twitter's financial stability at risk and signals a tumultuous period for the social media giant.
Analyst Comments: Musk's approach to managing Twitter's advertiser relationships reflects his often controversial and unconventional leadership style, seen previously in his handling of SpaceX and Tesla. However, this latest episode with Twitter reveals the complexities and sensitivities involved in managing a social media platform reliant on advertising revenue. The reaction of major advertisers withdrawing their support could have far-reaching implications for Twitter's business model.
FROM THE MEDIA: The situation escalated following Musk's remarks in an interview where he expressed his frustrations with the advertisers' decision to pause their campaigns on Twitter. This reaction is part of a broader story of Musk's acquisition and management of Twitter, marked by rapid changes and public controversies. The advertisers' pullback is not just a financial setback for Twitter but also a significant indicator of the corporate world's response to Musk's leadership style and the platform's direction under his ownership. The withdrawal of these major advertisers, combined with the ongoing public and media scrutiny, places Twitter in a precarious position, potentially impacting its user base, revenue stream, and overall standing in the social media landscape.
READ THE STORY: The Register
Microsoft Alerts on Rising CACTUS Ransomware Attacks via Malvertising
Bottom Line Up Front (BLUF): Microsoft has identified a new malvertising campaign used to distribute CACTUS ransomware. This campaign employs DanaBot, a multifunctional malware, as the initial entry point. The malware then enables ransomware operators, identified as Storm-0216 (also known as Twisted Spider or UNC2198), to deploy CACTUS ransomware. These developments highlight the evolving tactics of cybercriminals and the increased threat to cybersecurity.
Analyst Comments: The latest CACTUS ransomware campaign signifies a critical shift in cyberattack strategies, emphasizing the sophistication of threat actors. DanaBot, similar in functionality to notorious malware like Emotet and TrickBot, exemplifies the modular nature of modern cyber threats. Historically, UNC2198 has been associated with deploying ransomware via IcedID infections, indicating a pattern of evolving methodologies among cybercriminal groups.
FROM THE MEDIA: Microsoft's Threat Intelligence team has tracked the recent activities of DanaBot, labeled as Storm-1044, marking it as a versatile tool used in the deployment of subsequent malware payloads. The transition from QakBot to DanaBot by UNC2198, possibly due to a law enforcement crackdown on QakBot's infrastructure in August 2023, signals a strategic shift in the cybercriminal ecosystem. This change is further complicated by the use of a private version of DanaBot, differing from the typical malware-as-a-service model. The harvested credentials from DanaBot infections led to extensive network compromise, ultimately resulting in the deployment of CACTUS ransomware. Additional revelations include Arctic Wolf's discovery of CACTUS ransomware exploiting vulnerabilities in the Qlik Sense data analytics platform and the emergence of a new macOS ransomware strain named Turtle.
READ THE STORY: THN
Successful Docking of Russia's Progress MS-25 with ISS
Bottom Line Up Front (BLUF): Russia's Progress MS-25 cargo spacecraft, launched from the Baikonur Cosmodrome, successfully docked with the International Space Station's Poisk module. The spacecraft, carrying vital supplies including food, fuel, and scientific equipment, will remain in orbit for 179 days, supporting the multinational crew aboard the ISS.
Analyst Comments: The successful docking of the Progress MS-25 spacecraft is a significant event in the realm of international space cooperation. This mission, essential for resupplying the ISS, highlights the ongoing collaboration in space exploration despite geopolitical tensions on Earth. The ISS remains a symbol of international partnership, hosting astronauts from Russia, the U.S., Denmark, and Japan. The exchange of cargo and personnel via missions like Progress MS-25 is crucial for maintaining the ISS as a hub for scientific research and international cooperation in space.
FROM THE MEDIA: Roscosmos announced the successful docking of the Progress MS-25, also known as Progress 86, with the ISS. The spacecraft, replacing the previously undocked Progress MS-23, was launched using a Soyuz-2.1a vehicle and carried over 2,500 kilograms of supplies. The current crew on the ISS includes Russian astronauts Oleg Kononenko, Nikolai Chub, and Konstantin Borisov, Americans Loral O’Hara and Jasmin Moghbeli, Denmark's Andreas Mogensen, and Japan's Satoshi Furukawa. This event is part of ongoing operations to support the ISS, which relies on regular cargo deliveries for its continued function as an international space laboratory.
READ THE STORY: PL
China's Secret Police Stations Worldwide: A Major Security Threat?
Bottom Line Up Front (BLUF): A report reveals the existence of Chinese secret police stations in 21 countries, including India, raising significant security concerns. Operated by China’s Ministry of Public Security, these stations allegedly monitor and intimidate Chinese expatriates and are involved in covert intelligence activities, posing a potential threat to national security in host countries.
Analyst Comments: The revelation of Chinese secret police stations globally, including in India, underscores a sophisticated level of international espionage and influence exertion by Beijing. These stations, purportedly aimed at monitoring Chinese expatriates, could also serve as nodes for cyber espionage and diplomatic intelligence gathering, challenging the sovereignty and internal security of host nations. This development reflects China's strategic approach to extending its surveillance apparatus beyond its borders, which could have significant implications for international relations and global security dynamics.
FROM THE MEDIA: The International Forum for Rights and Security (IFFRS) reported that China operates 54 police stations across 25 cities in at least 21 countries, managed by police agencies from the Chinese provinces of Jiangsu, Zhengjiang, and Fujia. These stations primarily focus on controlling the Chinese diaspora, often coercing them to return to China. The first such station was reported in Johannesburg, South Africa, in 2004, and since then, the network has expanded worldwide. The report raises questions about China's intentions and the extent of its surveillance and intelligence operations globally. The revelation has not only security implications for the host countries but also raises concerns about the infringement of the rights of Chinese expatriates.
READ THE STORY: Pro IQRA
U.S. Warship's Presence in South China Sea Sparks Tensions
Bottom Line Up Front (BLUF): China accused the U.S. of violating its territorial sovereignty by sending the USS Gabrielle Giffords into the disputed South China Sea waters near the Second Thomas Shoal. The U.S. Navy countered, stating the warship was conducting routine operations in international waters, consistent with international law.
Analyst Comments: The incident involving the USS Gabrielle Giffords in the South China Sea is emblematic of the ongoing maritime territorial disputes in the region. China's claim over nearly the entire South China Sea, despite the 2016 United Nations tribunal ruling against its expansive territorial claims, reflects Beijing's assertive stance in the Indo-Pacific region. This event highlights the friction between U.S. freedom of navigation operations and China's expanding military presence and territorial claims. The U.S.'s operations, viewed as a challenge to China's assertions, are likely to continue as part of its commitment to a free and open Indo-Pacific, potentially leading to further tensions.
FROM THE MEDIA: China’s Southern Theater Command reported that the USS Gabrielle Giffords, a littoral combat ship, entered waters near the Second Thomas Shoal, prompting China to send a naval force to monitor and accusing the U.S. of escalating regional tensions. The U.S. Navy maintains that their operations were routine and lawful, aimed at promoting a free and open Indo-Pacific region. The South China Sea is a strategically significant and resource-rich area, with overlapping territorial claims from Taiwan, Brunei, Malaysia, the Philippines, and Vietnam. Recent activities by China in the region, including the alleged swarming of a reef off the Philippine coast with over 135 boats, have intensified disputes. The U.S. and the Philippines, a treaty ally, have had confrontations with China in the area, especially regarding the resupply of a Philippine military outpost.
READ THE STORY: NBC News
U.S. Sanctions North Korean 'Kimsuky' Hackers Following Surveillance Satellite Launch
Bottom Line Up Front (BLUF): The U.S., in collaboration with Australia, Japan, and South Korea, imposed sanctions on North Korea's Kimsuky cyber espionage group and eight North Korean agents. These sanctions are in response to the launch of a North Korean surveillance satellite and the group's involvement in cyber espionage and illicit revenue generation activities.
Analyst Comments: The sanctions against North Korea's Kimsuky group highlight the ongoing geopolitical tension surrounding North Korea's cyber capabilities. Kimsuky, operational since 2012 and part of North Korea's primary foreign intelligence service, has been involved in various cyber espionage activities globally. These actions, including targeting governments, think tanks, and academic institutions, are indicative of the broader strategy of North Korea to leverage cyber operations in advancing its national interests, especially in missile procurement and intelligence gathering. The sanctions, supported by multiple nations, underscore the international community's growing concern over North Korea's cyber activities and its impact on global security.
FROM THE MEDIA: The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned eight North Korean agents and the Kimsuky cyber espionage group. Kimsuky, known to operate under various aliases like APT43, Emerald Sleet, and Velvet Chollima, is part of North Korea's Reconnaissance General Bureau. This group has been active in spear-phishing attacks globally, targeting diverse sectors to support North Korea's strategic objectives. The U.S., along with Australia, Japan, and South Korea, emphasized the collective effort to counter Pyongyang's destabilizing activities, including cyber espionage, the use of overseas laborers, and illicit funding. The group's tactics involve sophisticated social engineering, focusing on collecting intelligence on geopolitical events and foreign policy strategies. The U.S. State Department, in April 2022, offered a reward for information on actors connected to North Korean digital operations, highlighting the ongoing efforts to counter the regime's cyber threats.
READ THE STORY: The Record
China Launches First Undersea Datacenter; India Delays Digital Law; AUKUS to Deploy AI Against Chinese Subs
Bottom Line Up Front (BLUF): China successfully submerged modules for an undersea data center project, aiming for energy efficiency and technological advancement. Meanwhile, India's anticipated Digital India Act faces delays due to the need for extensive consultations, and the AUKUS alliance announces plans to use AI in detecting Chinese submarines, signaling a strategic shift in maritime security and technology deployment.
Analyst Comments: China's undersea data center project represents a significant stride in innovative technology use, potentially setting a precedent for future sustainable and efficient data storage solutions. This project, utilizing the cooling properties of seawater and operating in a dust-free environment, reflects China's commitment to technological advancement and environmental considerations. On another front, India's delay in the Digital India Act highlights the challenges of updating digital laws in a rapidly evolving tech landscape, emphasizing the need for comprehensive deliberation in policy-making. The AUKUS alliance's initiative to employ AI for submarine detection underscores the increasing role of advanced technologies in geopolitical and defense strategies, particularly in the context of the rising tensions in the Indo-Pacific region.
FROM THE MEDIA: China's first undersea data center, part of the Hainan Undersea Data Center Demonstration Development Project, involves sinking over 100 modules housing 60,000 computers near Hainan island, aimed at saving significant electricity compared to terrestrial data centers. Elsewhere, India's long-awaited Digital India Act faces postponement until after the 2024 elections, reflecting the complexities of updating a 23-year-old IT Act amidst broad scope and evolving digital challenges. In security developments, the AUKUS alliance, comprising the UK, Australia, and the USA, plans to use AI technology to detect Chinese submarines, enhancing maritime surveillance and signaling a shift in defense capabilities.
READ THE STORY: The Register
Russia Utilizes Ground Robot for Wounded Soldier Transport in Ukraine
Bottom Line Up Front (BLUF): Recent images shared by Russian sources on Telegram depict a ground robot being used by the Russian military to transport injured soldiers from the battlefield. The robot, bearing a resemblance to Estonia's THeMIS robot, is equipped with an electronic warfare system named Volnorez, designed to neutralize threats from unmanned aerial vehicles. While the robot's specific model and details remain unclear, its use highlights a shift towards unmanned solutions in conflict zones.
Analyst Comments: The use of a ground robot by the Russian military for evacuating wounded soldiers represents a significant advancement in battlefield technology. This approach not only enhances soldier safety but also indicates a strategic shift towards unmanned systems in warfare. The robot's similarity to Estonia's THeMIS suggests a possible adaptation or development of existing robotic technology. Moreover, the incorporation of the Volnorez electronic warfare system highlights a growing focus on countering drone threats, a crucial aspect in modern warfare, especially in the context of the ongoing conflict in Ukraine.
FROM THE MEDIA: According to BulgarianMilitary.com, the Russian military is using a ground robot to transport wounded soldiers from battlefields in Ukraine. The robot, visually similar to Estonia's THeMIS, features a central carrier for the injured and is equipped with an electronic warfare system, Volnorez. This system, identified by its dome-shaped component, is designed to disrupt drone signals and protect tanks. The robot's deployment indicates an evolution in military tactics, prioritizing both soldier safety and technological superiority in electronic warfare. The exact model and specifications of the robot remain unspecified, but its features suggest a significant capability in neutralizing drone threats and enhancing battlefield logistics.
READ THE STORY: Bulgarian Military
China's Tengyun Space Plane: Advancing Space Technology and Strategic Implications
Bottom Line Up Front (BLUF): China's Tengyun space plane, an experimental, reusable unmanned spacecraft, represents a significant advancement in the country's space program. Emphasizing hypersonic capabilities and potential for long-duration flights, Tengyun's development reflects China's ambition to lead in aerospace technology. With only a few known missions but considerable secrecy, the program highlights Beijing's strategic focus on space technology, even amid economic challenges.
Analyst Comments: The Tengyun space plane program, while still in early stages, demonstrates China's strategic prioritization of space technology in the global arena. Its capabilities for runway-to-orbit flights and hypersonic speeds indicate a potential shift in the dynamics of space exploration and military applications. The program's secrecy, coupled with its apparent technological advancements, suggests a dual-use capability, potentially encompassing both civilian and military objectives. China's history of rapid progress in space exploration, including landing on the far side of the moon, underscores the significance of this development. The Tengyun's comparison with the U.S. X-37B space plane highlights the growing competition in space technology, where China appears to be gaining an edge. The implications of such advancements on international arms control and space law, particularly concerning anti-satellite capabilities, are noteworthy.
FROM THE MEDIA: The Tengyun, also known as Chongfu Shiyong Shiyan Hangtian Qi, has emerged as a critical component of China's space program. Its ability to perform hypersonic flights and long-duration missions sets it apart in the aerospace industry. Notably, Tengyun's second trip lasted 276 days in orbit, during which it conducted tests on materials exposure, thermal control coating, and radiation-shielding materials. This duration surpasses the initial flights of the U.S. X-37B vehicles. China's approach to combining innovative aerospace technology with secrecy marks a strategic move in its space endeavors. The Tengyun's potential applications, from deploying space-based defense systems to making robotic repairs, point to its versatility and hint at its role in shaping China's future space capabilities. The development of such a platform, especially if it includes anti-satellite technology, could raise significant concerns within the international community regarding arms control and the peaceful use of space.
READ THE STORY: Arab News
Items of interest
China Implements "One Province, One Policy" for Financial Risk Management
Bottom Line Up Front (BLUF): China has introduced a new financial risk management strategy titled "One Province, One Policy," requiring each province to develop individualized plans to handle financial risks. This initiative, led by the National Financial Regulatory Administration, aims to address the unique economic challenges faced by different regions in the country. The move comes in response to increasing financial pressures, including a challenging property market and the aftermath of Covid Zero policies.
Analyst Comments: The "One Province, One Policy" strategy represents a significant shift in China's approach to financial governance, emphasizing regional autonomy in risk management. This decentralized approach allows for more nuanced and effective handling of local economic issues, acknowledging the diverse economic landscapes across China's provinces. The initiative aligns with President Xi Jinping's directives from the Central Financial Work Conference to optimize debt structures and resolve local debt risks. It reflects Beijing's broader efforts to stabilize the economy and prevent systemic risks amid global economic uncertainties and domestic challenges.
FROM THE MEDIA: Li Yunze, head of the National Financial Regulatory Administration, emphasized the need for a differentiated approach to financial risk management, moving away from a one-size-fits-all policy. The directive for each province to create its plan for handling financial risks comes at a time when China's economy is facing multiple challenges, including a sluggish recovery from stringent COVID policies and a persistent property crisis. This approach aims to ensure that risk prevention and management are tailored to the specific economic conditions and challenges of each province. The commitment to such a policy indicates a strategic shift in China's financial governance, focusing on localized solutions to national economic issues. The plan also includes setting up mechanisms for resolving consumer disputes and protecting consumer rights, demonstrating a comprehensive approach to financial stability.
READ THE STORY: BS
The 'One China' Policy Explained (Video)
FROM THE MEDIA: CNN correspondents Will Ripley and Selina Wang explain how US-China relations have evolved since 1949, particularly in relation to diplomatic ties with Taiwan and the 'One China' policy.
India is cleaning up Ganga river. Here’s how (Video)
FROM THE MEDIA: The darkest day in Taiwan’s modern history. On October 25th, 1971, the country known as the Republic of China was expelled from the United Nations General Assembly. The vast majority of the international body voted in favor of recognizing the People’s Republic as the sole representative of China in the UN.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.