Daily Drop (726): UA UAV VS RU EW, MPS Leak Github, Winter Vivern, Charming Kitten, CN Gray Zone Operations, Anatsa Android Trojan, DPRK CNO, U.S. Chip Manufacturing, CN: EV, CN IO Ops, AMD's Zen 5
02-19-24
Monday, Feb 19 2024 // (IG): BB // ShadowNews // Coffee for Bob // Proxies
*Started adding the Proof Of Concepts (PoC) if available for mentioned CVE’s :
A Proof of Concept (PoC) is a small exercise to test a certain hypothesis or demonstrate that a potential project can be viable. It's primarily used to verify that certain concepts or theories have the potential for real-world application. The purpose of a PoC is to showcase the feasibility, functionality, and potential of a concept before proceeding to the development of the full-scale project. *
Ukraine's Use of UAVs Overwhelms Russian Electronic Warfare Capabilities
Bottom Line Up Front (BLUF): Russian electronic warfare (EW) systems are reportedly failing to effectively counter Ukrainian unmanned aerial vehicles (UAVs or drones). Despite deploying multiple generations of EW systems, including the RP-377 and "Volnorez," Russian forces have struggled to disrupt the operation of Ukrainian drones, which have become a significant asset in Ukraine's military strategy. This issue highlights the evolving nature of modern warfare and the challenges faced by traditional EW systems in adapting to new threats.
Analyst Comments: The ineffectiveness of Russian EW systems against Ukrainian drones represents a significant shift in the dynamics of the Ukraine conflict. Ukraine's reliance on drones, due to a shortage of ammunition and lack of American aid, has proven to be an effective strategy, undermining the Russian military's technological advantages. The drones, being inexpensive and produced in large numbers, offer Ukraine a critical edge. The failure of Russian EW systems like the "Volnorez" due to poor construction, overheating issues, and other technical shortcomings underscores the challenges faced by conventional military technologies in countering asymmetric warfare tactics. The introduction of the newer "Saniya" stations indicates Russia's continued efforts to adapt, but the effectiveness of these systems remains to be seen. This development is a testament to the innovative use of technology by Ukrainian forces and the evolving nature of electronic warfare.
FROM THE MEDIA: Ukraine has adapted to the ongoing conflict by extensively utilizing drones, which are both cost-effective and strategically effective. The drones have been used to target Russian equipment and personnel, exploiting the limitations of Russian EW systems. The first-generation Russian EW system, the RP-377, and its successor, "Volnorez," have both failed to reliably jam the drones. "Volnorez" has a limited range and is prone to overheating, while its antennas create a dead zone that drones can exploit. Russia is now reportedly shifting to the "Saniya" system, which promises a longer range and potentially more effective jamming capabilities. However, the success of "Saniya" in the field remains uncertain. Meanwhile, Ukraine's air defense has successfully destroyed all drones during Russia's recent night attack, showcasing their capability in countering aerial threats. The situation highlights the ongoing technological arms race in the conflict, where the effectiveness of electronic warfare tools and countermeasures plays a crucial role in determining military success.
READ THE STORY: Online.UA
Alleged MPS Breach Reveals Espionage Operations and Spyware Details
Bottom Line Up Front (BLUF): A significant data breach from a contractor of the Chinese Ministry of Public Security (MPS), iSoon (Anxun), has surfaced on GitHub, revealing sensitive information potentially impacting espionage operations. The leak includes spyware details, espionage operation insights, and references to a "Twitter Monitoring Platform," drawing parallels in magnitude to the NTC Vulkan leak.
Analyst Comments: This data breach represents a critical security lapse within the MPS and potentially exposes the inner workings of Chinese state-sponsored cyber operations. The specificity of the leaked information, including spyware and detailed operational plans, suggests a high level of access by the leaker. This incident underscores the increasing risks associated with cyber espionage and the vulnerability of even the most secure government entities to data leaks. The focus on espionage, including tools and tactics, indicates the sophistication of state-level cyber capabilities and the ongoing global cyber arms race. The revelation of a "Twitter Monitoring Platform" hints at the extensive reach of state surveillance and its focus on social media platforms for intelligence gathering. As with any such leak, the authenticity and full context of the information are crucial for understanding its implications. This breach could have far-reaching geopolitical consequences, especially for countries and organizations targeted by these espionage operations.
FROM THE MEDIA: The MPS data breach involved a mix of contents including spyware, espionage operation details, and a "Twitter Monitoring Platform." Initially surfacing on GitHub, the legitimacy of these documents is yet to be verified. The leaked messages include sensitive conversations and operational details, hinting at the extensive scope of the breach. The GitHub repository, I-S00N, contained 66 links with diverse information including complaints from employees, financial issues of An Xun, and chat records between top executives. The data also encompassed discussions on An Xun’s low-quality products, infiltration into overseas government departments, and employee information. The conversations cover a span from 2018, involving multiple vendors from China and other nations. This leak highlights the complexity of modern cyber espionage and the vulnerability of confidential state-level information.
READ THE STORY: The Cyber Express // I-S00N
Winter Vivern (TAG-70) Exploits Roundcube Vulnerabilities in Europe and Central Asia
Bottom Line Up Front (BLUF): A cyber espionage campaign linked to Russian interests, named Winter Vivern or TAG-70, has exploited vulnerabilities in Roundcube webmail servers, targeting over 80 organizations primarily in Georgia, Poland, and Ukraine. The campaign, active since at least December 2020, is aimed at gathering intelligence on European political and military activities, including actions against Iranian embassies and Georgian government entities.
Analyst Comments: This recent campaign by Winter Vivern (also known as TA473 and UAC0114) signifies a concerning escalation in cyber espionage, focusing on geopolitical intelligence gathering. The targeting pattern, aligning closely with Russian geopolitical interests, particularly amidst the Ukraine conflict, indicates a strategic approach to cyber warfare. This is not an isolated incident; Russian-linked cyber groups like APT28, APT29, and Sandworm have historically targeted email software for espionage purposes. The complexity of the attacks, involving social engineering and exploitation of software vulnerabilities, underlines the sophistication of these threat actors. The focus on sensitive geopolitical areas like Ukraine, Georgia, and Iran reflects an attempt to gather intelligence that could influence or disrupt ongoing regional conflicts and diplomatic efforts.
FROM THE MEDIA: Recorded Future's analysis identifies TAG-70's campaign as a significant cybersecurity threat, highlighting its potential to compromise sensitive information related to the Ukraine war, diplomatic relations, and EU and NATO aspirations of targeted countries. The campaign, mirroring tactics of other Russian-aligned groups, uses cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers. TAG-70's activities also include targeting Iranian embassies in Russia and the Netherlands, indicating a broader geopolitical interest. This underscores the need for robust cybersecurity measures, proactive threat intelligence, and vigilance among government and military entities. The extensive nature and potential impact on national security of TAG-70's activities call for immediate action in patching vulnerabilities and hunting for indicators of compromise.
Charming Kitten (APT35) Deploys Sophisticated Social Engineering in New Cyber Attacks
Bottom Line Up Front (BLUF): Iranian cyber espionage group Charming Kitten, also known as APT35, has initiated a new series of attacks targeting Middle East policy experts using a novel backdoor named BASICSTAR. This campaign involves the creation of a fake webinar portal, utilizing elaborate social engineering tactics to deploy various malware tools like BASICSTAR and KORKULOADER for intelligence gathering.
Analyst Comments: Charming Kitten's recent campaign illustrates a significant escalation in cyber espionage sophistication and social engineering complexity. Their methodical approach, involving prolonged email conversations before deploying malicious content, demonstrates a high level of commitment to manipulating targets. This campaign underscores the group's evolving tactics, adapting to increased public exposure and cybersecurity measures. The targeting of policy experts indicates a focused interest in obtaining strategic political intelligence, particularly concerning Middle Eastern affairs. The involvement of Iranian Revolutionary Guard Corps (IRGC) in these operations signifies state-level backing, amplifying the potential geopolitical impact of these cyber activities. Charming Kitten's persistence and innovation in cyber operations pose a notable threat to global cybersecurity, especially for entities involved in sensitive geopolitical areas.
FROM THE MEDIA: Charming Kitten, affiliated with Iran's IRGC, has executed phishing attacks impersonating the Rasanah International Institute for Iranian Studies (IIIS) between September and October 2023. These attacks utilize RAR archives containing LNK files to distribute malware, tricking targets into joining a fake webinar. BASICSTAR, a Visual Basic Script (VBS) malware, gathers system information and executes commands from a command-and-control (C2) server. The group has also shown capability to target different operating systems, deploying POWERLESS on Windows and NokNok on macOS systems. This multifaceted approach, including Multi-Persona Impersonation (MPI) and compromised legitimate contacts, highlights the group's sophisticated social engineering and technological adaptability. Additionally, Charming Kitten has been linked to other backdoors such as PowerLess, BellaCiao, POWERSTAR, and NokNok, reflecting their determination in cyber espionage activities. The variety of tools and methods employed by Charming Kitten underscores the necessity for heightened cybersecurity vigilance and robust countermeasures, especially for individuals and organizations involved in Middle East policy and diplomacy.
READ THE STORY: Iran International // Volexity // THN
China Intensifies Gray Zone Operations to Challenge Taiwan's Sovereignty
Bottom Line Up Front (BLUF): China has escalated its efforts to challenge Taiwan's sovereignty through a series of gray zone operations, including altering a flight path near the Taiwan Strait's median line and increasing patrols near Taiwan’s Kinmen island. These moves signal Beijing's intention to erode Taiwan's control over its offshore islands and the Taiwan Strait, potentially straining relations and disrupting the regional status quo.
Analyst Comments: China's recent actions represent a strategic shift in its approach towards Taiwan, signaling an escalation in tensions across the Taiwan Strait. By challenging the unofficial demarcation line and increasing maritime patrols, Beijing is testing Taiwan's response and resolve. This approach departs from previous practices where both sides maintained a tacit understanding over the control of certain areas, such as Kinmen and Matsu islands. The intensification of gray zone tactics, including the deployment of the Chinese Coast Guard and unilateral changes in flight paths, underscores China's efforts to assert its dominance and challenge the existing status quo. These actions may provoke a regional response and heighten the need for diplomatic and military readiness from Taiwan and its allies. As Taiwan prepares for a new administration, it faces the challenge of responding effectively to China's provocations without escalating tensions to a full-blown conflict.
FROM THE MEDIA: China's recent announcement to increase patrols in waters near Xiamen and Kinmen, along with claims of unrestricted fishing rights around Kinmen Island, directly challenges Taiwan's maritime authority. The Chinese Coast Guard's increased presence could disrupt Taiwanese fishing activities and heighten tensions in the area. The alteration of the flight path west of the Taiwan Strait's median line is viewed by Taiwan as a direct challenge to the status quo and an erosion of its sovereignty. These actions are seen as part of Beijing's broader strategy to weaken Taiwan's control and influence in the region, with the potential to escalate into more overt confrontations. The gray zone operations initiated by China are likely to increase regional tensions and could prompt a united response from countries concerned about Beijing's aggressive posture. As Taiwan's new administration prepares to take office, it faces the dual challenge of maintaining its sovereignty and navigating the increasingly complex and tense cross-strait relations.
READ THE STORY: VOA
Anatsa Android Trojan Expands Reach, Bypassing Google Play Security
Bottom Line Up Front (BLUF): The Anatsa Android banking trojan, also known as TeaBot and Toddler, has broadened its operational scope to include Slovakia, Slovenia, and Czechia. This campaign, observed in November 2023, exploits accessibility service vulnerabilities in Android, bypassing Google Play's detection mechanisms. The campaign has seen over 100,000 installations across various apps, known as droppers, on the Google Play Store.
Analyst Comments: Anatsa's expansion into new European regions highlights the evolving threat landscape in mobile banking security. The trojan's ability to bypass Google Play's enhanced security protocols underscores a significant concern for Android users. Anatsa's targeting of banking customers through seemingly innocuous apps on the Play Store, with dropper apps like "Phone Cleaner - File Explorer," showcases the sophistication and stealth of modern cyber threats. The malware's capabilities, including full control over infected devices and credential theft, pose a high risk for fraudulent transactions and significant financial losses. This situation underlines the critical need for ongoing vigilance and advanced security measures in the mobile banking sector, as well as the importance of awareness among users about the potential risks of downloading apps from unofficial sources.
FROM THE MEDIA: In November 2023, Anatsa's deployment involved dropper apps like "Phone Cleaner - File Explorer," which initially appeared harmless but later received an update introducing malicious code. This code alteration enabled the app to perform malicious actions like automatically clicking buttons upon receiving configurations from a command-and-control server. Notably, the dropper's abuse of the accessibility service was specifically tailored to target Samsung devices, although other droppers in the campaign were not manufacturer-specific. These droppers are also capable of circumventing Android 13's restricted settings, mimicking legitimate marketplaces to install new applications without disabled accessibility service functionalities. The campaign demonstrates a targeted approach, focusing on specific regions, which enables concentrated attacks on a limited number of financial organizations, leading to a high number of fraud cases in a short time. The Anatsa trojan's expanding reach and evolving tactics highlight the need for enhanced cybersecurity awareness and measures among Android users, especially those in the targeted regions.
READ THE STORY: The Register // Threat Fabric // THN
DPRK Hackers Employ AI in Sophisticated Cyber Operations
Bottom Line Up Front (BLUF): North Korean hackers are increasingly using artificial intelligence to conduct more sophisticated cyber operations, including stealing technologies and securing funds for the country's nuclear weapons program. These AI-enhanced operations target global defense, cybersecurity, and crypto companies, employing tactics like phishing and social engineering on platforms like LinkedIn.
Analyst Comments: The integration of AI into North Korea's cyber operations marks a significant escalation in their cyber capabilities. Utilizing AI for tasks like creating credible online profiles and generating content for spear-phishing campaigns, North Korean hackers are overcoming previous limitations such as language barriers in social engineering attacks. This advancement reflects a growing trend among state-sponsored cyber actors to leverage cutting-edge technology for espionage, intellectual property theft, and financial gain. The use of AI by North Korean hackers aligns with Pyongyang's longstanding focus on developing sophisticated cyber tools to support its strategic objectives, including its nuclear and ballistic missile programs. The international community, especially entities in defense, cybersecurity, and finance, must be vigilant and adapt their security measures to counter these evolving threats.
FROM THE MEDIA: North Korean hackers have notably targeted employees of defense and crypto companies, orchestrating significant breaches like the Bangladesh Bank heist and the WannaCry attack on the UK's NHS. They are now leveraging AI services from companies like OpenAI and Microsoft to enhance their cyber operations. This includes creating profiles on LinkedIn to gain the trust of their targets and conducting complex phishing campaigns. South Korea's intelligence has tracked an increase in such AI-driven activities, with a significant portion of hacking attempts in the country traced back to North Korea. The use of AI is helping North Korean hackers to develop more credible social engineering tactics, including improved language usage and the creation of detailed online personas. This shift towards AI-powered operations presents new challenges in cybersecurity, demanding more sophisticated defense mechanisms and international cooperation to mitigate these threats.
READ THE STORY: FT // The Guardian
Delays Challenge U.S. Plans to Expand Domestic Chip Manufacturing
Bottom Line Up Front (BLUF): The ambitious U.S. plans to expand domestic chip manufacturing are facing significant obstacles, with delays in completing new factories becoming a growing concern. Despite the Biden administration's efforts to stimulate domestic production through financial incentives, companies like Taiwan Semiconductor Manufacturing Company (TSMC) and Intel are adjusting their production schedules amid a sales slump in the semiconductor industry.
Analyst Comments: The challenges faced by TSMC, Intel, and other chip manufacturers in expanding their U.S. operations underscore the complexities of scaling up semiconductor production domestically. These delays could potentially impact the U.S. government's strategy to reduce reliance on chip manufacturing in East Asia. The situation highlights the intricate balance between ambitious government policy, industry dynamics, and global market conditions. The semiconductor industry is inherently volatile, with fluctuating demand and enormous capital requirements for new facilities. These delays not only pose a risk to the U.S.'s strategic objectives in the tech sector but also raise questions about the effectiveness of government subsidies in catalyzing such large-scale industrial projects. Moving forward, the U.S. may need to recalibrate its approach, considering the global nature of the semiconductor supply chain and the inherent risks of the industry.
FROM THE MEDIA: The U.S. government's initiative to bolster domestic semiconductor production, as part of the CHIPS Act, has begun allocating funds to various projects. However, key players in the industry are facing delays. TSMC, for instance, has pushed back the start of manufacturing in its Arizona factory to 2025, citing workforce challenges, and now expects its second plant to start production in 2027 or 2028. Intel also adjusted its expansion plans, delaying the start of manufacturing in its new Ohio factories. These setbacks are occurring amidst a broader industry slowdown, with companies like Microchip Technology experiencing sales declines, prompting them to manage spending and delay further expansion. The delays and adjustments by these major chip manufacturers indicate the challenges in rapidly scaling up semiconductor production in the U.S. and reflect broader issues in the global semiconductor market.
READ THE STORY: The New York Times // CSIS
Concerns Over China's Industrial Overcapacity and Potential Impact on International Trade
Bottom Line Up Front (BLUF): The European Union has initiated an anti-subsidy investigation into China’s electric vehicle (EV) industry, a move aimed at protecting European car manufacturers from being undercut by their Chinese counterparts. This probe follows concerns over rapidly increasing imports of Chinese electric vehicles, which, bolstered by Beijing's substantial subsidies, could potentially dominate the EU market similarly to the solar panel sector a decade ago.
Analyst Comments: This development marks a significant moment in the ongoing economic tensions between the U.S. and China. The U.S. is essentially signaling its readiness to take protective measures against what it perceives as unfair trade practices that could disrupt global markets and harm domestic industries. This stance reflects a broader strategic shift in U.S. policy towards greater scrutiny of China's economic policies and their global impact. The move may lead to heightened trade tensions and could potentially trigger retaliatory actions from China. It also underscores the complexity of the global supply chain, where overproduction in one country can have ripple effects across multiple economies. The U.S. approach suggests a more assertive posture in safeguarding its economic interests, which could set a precedent for other nations grappling with similar challenges posed by China's economic policies.
FROM THE MEDIA: The probe by the EU is expected to focus on whether Chinese EV manufacturers are benefiting from unfair subsidies, allowing them to offer their products at significantly lower prices in Europe. If the European Commission finds evidence of harm to domestic producers, tariffs ranging from 10-15% could be imposed. This situation is reminiscent of the EU's experience with solar panels when cheap imports from China led to a collapse of the European solar industry. The investigation highlights the EU's determination to not repeat past mistakes, especially given the automotive sector's critical role in the EU economy, responsible for nearly 13 million jobs and 7% of its GDP. However, there's also concern about potential retaliatory measures from Beijing, which could affect European businesses operating in China. The situation is further complicated by the EU's reliance on Chinese-made batteries for EVs, a sector harder to protect through tariffs. This development comes amidst a broader context of the EU and US taking a tougher stance on China, partly influenced by Beijing's support for Russia in the Ukraine conflict.
READ THE STORY: FT
Over 100 Websites in Europe, Asia, and Latin America Used to Disseminate Pro-China Messages
Bottom Line Up Front (BLUF): China is reportedly employing a sophisticated online influence campaign, utilizing over 100 websites across 30 countries, designed to spread pro-Beijing propaganda. These sites, appearing as local news outlets, intersperse genuine local news with pro-China content, including anti-U.S. conspiracy theories and defenses against criticism of Beijing. This campaign, revealed by Citizen Lab, is seen as part of China's escalating efforts to shape global narratives in its favor.
Analyst Comments: This strategy underscores a significant shift in China's approach to international propaganda. By embedding its messaging within what seems like local news content, China is attempting to subtly influence public perception and narrative globally. This tactic not only raises concerns about the integrity of information but also signals China's commitment to expanding its soft power. The blending of propaganda with local news could potentially have more profound and insidious effects on public opinion than direct state media broadcasts, given the localized and seemingly authentic nature of the content. The move reflects Beijing's understanding of the power of media and narrative in shaping geopolitical dynamics, especially in regions where it seeks to increase its influence.
FROM THE MEDIA: The campaign, traced back to Beijing-based PR firm Shenzhen Haimaiyunxiang Media Co., Ltd., or Haimai, reportedly began in mid-2020. The websites, including those like Roma Journal, are sophisticated enough to blend in with genuine local media, yet feature pro-China content from sources such as Chinese state media and Times Newswire, linked to another Chinese influence operation. This approach raises concerns about inadvertent amplification of Chinese propaganda by local media and audiences due to the seamless integration of propaganda within local news contexts. Experts note the challenge of combating such covert influence campaigns, which are becoming more common and sophisticated, with China identified as one of the key players alongside Russia and Iran. The effectiveness of Chinese media in shaping perceptions of its governance model, particularly in Latin America and Africa, has been highlighted, indicating a strategic targeting of regions with more vulnerable media ecosystems. The concern extends to the use of artificial intelligence and deepfake technologies, potentially impacting future political events like the U.S. presidential election.
READ THE STORY: Tibetan Review // SEMAFOR
AMD's Zen 5 Chips Set for Mass Production in Summer 2024
Bottom Line Up Front (BLUF): AMD's upcoming Zen 5 chips are reportedly set to enter mass production with TSMC in the summer of 2024, potentially offering significant performance improvements for PC gaming. While there has been no official announcement from AMD, leaks suggest that these new CPUs will utilize TSMC's advanced manufacturing processes, possibly the 3nm node for server-focused Zen 5c chips, and the N4 node for standard Zen 5 chips.
Analyst Comments: This development marks a significant step in AMD's ongoing effort to enhance its CPU technology and maintain competitiveness in the PC gaming market. The Zen 5 architecture, following the efficient and high-performing Zen 4 and 4c designs, is expected to offer even better performance, efficiency, and potentially higher clock speeds. The use of TSMC's advanced manufacturing processes, like the 3nm and N4 nodes, is indicative of AMD's commitment to pushing the boundaries of CPU technology. This move could also lead to a reduction in prices for the current Ryzen 7000 series, making 2024 an ideal time for consumers to upgrade their PCs. For gamers, this means potentially more powerful and efficient gaming rigs, enhancing the overall gaming experience.
FROM THE MEDIA: The anticipated performance improvements in Zen 5 are based on early reports and speculations about increased integer, addressing, and floating point pipelines, which suggest a higher instruction processing capability per clock cycle. The chips are expected to be more potent than the current Zen 4 processors without a proportional increase in energy consumption. This development aligns with the industry trend of pursuing higher efficiency and performance in chip design, as seen with Nvidia's use of TSMC's N4 process node in its Ada Lovelace graphics chips. The potential price reduction of Ryzen 7000 series chips following the release of Zen 5 also indicates that 2024 could be an opportune time for users to upgrade their PCs.
READ THE STORY: PCGAMER
Items of interest
Chinese tech giants face stringent conditions in joint ventures with Saudi Arabia
Bottom Line Up Front (BLUF): Saudi Arabia is intensifying its demands on Chinese technology companies like Alibaba and SenseTime, making investments and technical expertise sharing mandatory in return for access to its market. This strategy aims to bolster Saudi Arabia's domestic tech sector using its petrodollar wealth, while Chinese companies seek new revenue streams amidst funding challenges and declining domestic sales.
Analyst Comments: Saudi Arabia's recent moves in the tech industry reflect a strategic shift, leveraging its economic wealth to foster a more sophisticated technological infrastructure. This mirrors the earlier tactics of Chinese local governments, which exchanged market access for foreign technology and expertise. The kingdom's focus on AI and its collaboration with Chinese firms for its ambitious Neom project highlights a keen interest in advanced technology sectors. However, these partnerships also carry risks and geopolitical implications, especially considering the United States' stance on technology transfer and intellectual property rights. The Saudi approach is part of a broader strategy to diversify its economy beyond oil, aligning with its Vision 2030 objectives.
FROM THE MEDIA: Saudi Arabia's strategy involves stringent conditions for Chinese tech giants like Alibaba and SenseTime, demanding investments and local joint ventures. For instance, SenseTime has to share technical expertise with Saudi partners and has won a contract for Saudi Arabia's Neom megacity project. Similarly, Alibaba Cloud and the Saudi Telecom Group have formed a joint venture. These agreements often include clauses protecting Saudi investments, such as compulsory buy-outs if certain conditions aren't met. The kingdom's approach has evolved from earlier times when Chinese venture capitalists easily secured funds. Now, Saudi Arabia is more selective, focusing on developing its nascent AI industry and diversifying its economy. This strategy includes partnering with foreign tech companies and placing specific conditions on investments, like requiring a portion of funds to be spent on projects within the kingdom. While these partnerships offer opportunities for Chinese firms facing domestic challenges, they also pose risks, particularly in sensitive areas like AI and intellectual property transfer.
READ THE STORY: FT
Saudi Arabia announces billions of dollars in investment deals at Arab-China summit (Video)
FROM THE MEDIA: Saudi Arabia announced on Sunday billions of dollars in investment deals between China and the Arab world, on the first day of the Arab-China business conference in Riyadh.
China's Game-Changing Arms Deals with Saudi Arabia & Egypt (Video)
FROM THE MEDIA: China is reportedly in talks with Saudi Arabia and Egypt for major arms deals as the countries seek to diversify their weapons supplies to become less reliant on the United States and Russia for their defense needs.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.