Daily Drop (740): China’s AI-Enabled Cyber, China-Russia Axis, Exploiting India's UPI for Money Laundering, DPRK Cyber, Claude 3, Ukraine claims it has sunk another Russian warship using high-tech sea
03-05-24
Tuesday, Mar 05 2024 // (IG): BB // ShadowNews // Coffee for Bob // Proxies
*Started adding the Proof Of Concepts (PoC) if available for mentioned CVE’s :
A Proof of Concept (PoC) is a small exercise to test a certain hypothesis or demonstrate that a potential project can be viable. It's primarily used to verify that certain concepts or theories have the potential for real-world application. The purpose of a PoC is to showcase the feasibility, functionality, and potential of a concept before proceeding to the development of the full-scale project. *
China’s AI-Enabled Cyber Capabilities: A New Frontier in Cyber Warfare
Bottom Line Up Front (BLUF): PinnacleOne's latest executive brief delves into China's strategic deployment of artificial intelligence (AI) technologies to enhance its cyber capabilities. The report, authored by Matthew Pines & Dakota Cary, scrutinizes how emerging AI tools are being utilized by China to augment its cyber operations, emphasizing the urgency for Western defenders to adapt and innovate in response.
Analyst Comments: The integration of AI into cyber operations marks a significant shift in the landscape of cybersecurity and cyber warfare. China's investment in AI for cyber purposes, as highlighted by PinnacleOne, signifies not only an escalation in the sophistication of cyber attacks but also a potential transformation in how cyber operations are conducted. The application of AI in vulnerability discovery, malware development, and attack automation could potentially increase the speed, efficiency, and effectiveness of cyber attacks, making it increasingly challenging for defenders to detect and mitigate threats.
FROM THE MEDIA: According to PinnacleOne's report, China's AI-enabled cyber capabilities are focused on augmenting operational tempo and efficiency, particularly in areas like malware and exploit development, vulnerability research, and lateral movement. The use of AI in these domains is expected to be subtle, with the real-world effects difficult to discern and attribute directly to AI involvement. However, the strategic advantages gained through AI-enhanced operations could significantly impact the overall pace and success of cyber campaigns. The report also sheds light on China's development of cyber ranges and hosting of competitions to automate the cyber attack process, further indicating the nation's commitment to leveraging AI in its cyber strategies.
READ THE STORY: SentinelOne
The Strengthening China-Russia Axis: Implications and Concerns
Bottom Line Up Front (BLUF): In 2023, China and Russia have significantly deepened their political, economic, and military ties, presenting challenges to Ukraine and the Western geopolitical landscape. This burgeoning alliance, rooted in shared autocratic governance values and anti-Western sentiment, has accelerated as the West grapples with internal issues, signaling a strategic shift in the global balance of power.
Analyst Comments: The China-Russia axis has reached new heights of cooperation, a development that could reshape global geopolitics and challenge the existing international order. Beijing's unwavering support for Moscow, especially following the International Criminal Court's arrest warrant for Putin regarding Ukraine, underscores a solidified partnership that transcends mere diplomatic alignment. This alliance is strategically positioned to challenge Western influence, particularly as both nations bolster ties with the Global South, aiming to create a counterweight to American and European global dominance.
FROM THE MEDIA: The China-Russia relationship has seen a marked increase in strategic coordination, especially in the realms of defense, trade, and political alignment against Western influence. This partnership has grown stronger amidst the war in Ukraine, with both nations expressing mutual support to safeguard their national interests and resist Western sanctions and diplomatic pressures. Despite China's initial stance of neutrality in the conflict, recent developments suggest a more overt support for Russia, complicating the international response to the Ukraine crisis. Trade between China and Russia soared to a record $240.1 billion in 2023, despite China's decreased trade with the West. This burgeoning economic relationship, coupled with enhanced military cooperation, including joint naval exercises and the exchange of military technologies, signals a strategic pivot that could alter global security dynamics. Beijing's appointment of a pro-Russian defense minister further cements this alliance, positioning China and Russia as formidable counterweights to U.S. and European influence.
READ THE STORY: GIS
Exploiting India's UPI for Money Laundering: Cybercriminals' New Scheme Uncovered
Bottom Line Up Front (BLUF): Cybersecurity researchers at CloudSEK have unveiled a sophisticated money laundering scheme orchestrated by Chinese cybercriminals exploiting India's Unified Payments Interface (UPI) system. Utilizing an Android-based application named XHelper, the operation recruits and manages a network of money mules across India to funnel illicit funds, bypassing the Prevention of Money Laundering Act (PMLA) protections due to UPI service providers' lack of coverage under the act.
Analyst Comments: This revelation highlights a concerning trend where cybercriminals leverage legitimate financial systems and technologies to conduct illicit activities, exposing significant vulnerabilities in India's UPI system. The recruitment of money mules through Telegram and their management via the XHelper app illustrate the organized and sophisticated nature of this criminal network. The operation's reliance on QR code features of UPI and the exploitation of fake payment gateways underscore the urgent need for enhanced security measures and regulatory oversight to protect against such schemes.
FROM THE MEDIA: The XHelper application is central to the operation, offering a streamlined process for onboarding money mules and facilitating transactions through fraudulent payment channels. Money mules are enticed with commissions and use the app to manage payouts and collections, with orders automatically assigned to launder stolen funds. The operation's use of Telegram for recruitment and the app's referral system for expanding the network of agents and mules reflect a high degree of organization and incentivization driving this illicit activity. Furthermore, XHelper's incorporation of a Learning Management System (LMS) for training mules to open fake corporate bank accounts and evade detection highlights the operation's sophistication and the challenges in combating such schemes.
READ THE STORY: THN
DPRK Cyber Intrusion Targets South Korean Semiconductor Firms
Bottom Line Up Front (BLUF): North Korea's latest cyber espionage targets South Korean chip equipment manufacturers, aiming to pilfer semiconductor technology critical for its weapons development. The intrusion, which unfolded in December and February, saw the theft of product designs and photos, marking a concerning uptick in Pyongyang's cyber capabilities amidst international sanctions and ahead of South Korea's upcoming elections.
Analyst Comments: This incident underscores North Korea's persistent adaptation to sanctions through illicit channels, particularly cyber. Given the centrality of semiconductors in modern weaponry, including missiles and satellites, Pyongyang's focus on acquiring such technology reveals a strategic prioritization of self-reliance in military capabilities. The attacks also hint at North Korea's evolving cyber tactics, notably the use of "living off the land" methods that exploit legitimate tools to avoid detection. This sophistication in cyber operations, combined with the timing ahead of South Korean elections, illustrates a dual aim: undermining Seoul's security infrastructure while advancing its own military tech prowess.
FROM THE MEDIA: According to reports from South Korea's National Intelligence Service (NIS), North Korean hackers orchestrated a sophisticated cyber-attack against South Korean semiconductor equipment manufacturers, stealing sensitive product designs and facility photographs. The NIS highlighted the hackers' objective to bolster North Korea's weapons programs, amidst international sanctions that have severely restricted its access to necessary technologies. The cyber intrusion utilized stealthy "living off the land" tactics, complicating the detection efforts of security systems. While the specific companies targeted were not disclosed, the NIS's announcement follows a warning from President Yoon Suk Yeol about potential North Korean provocations, including cyber-attacks, intended to disrupt upcoming elections. The breach is part of a broader pattern of North Korean cyber activities aimed at financing its regime and advancing its nuclear ambitions, with estimated thefts totaling $3 billion since 2016
READ THE STORY: Aol // BBC // WION
Anthropic Unveils Claude 3, Claiming Superiority Over ChatGPT and Gemini
Bottom Line Up Front (BLUF): Anthropic has released Claude 3, positioning it as a more potent alternative to OpenAI's GPT-4 and Google’s Gemini Ultra. With its three variants – Opus, Sonnet, and Haiku – Claude 3 is tailored to diverse application needs, from deep data analysis to efficient code generation. The model not only surpasses its predecessors in performance benchmarks but also introduces advancements in accuracy and source citation, aiming to redefine user expectations from large language models.
Analyst Comments: Claude 3's introduction marks a significant milestone in the AI sector, challenging the dominance of established players like OpenAI and Google. Anthropic's decision to release different model sizes allows for a tailored approach to AI application, catering to a wide range of business and development needs. The improvements in model comprehension and fluency could have profound implications for fields requiring complex data interpretation, such as scientific research and long-form content creation. However, the higher cost of Opus reflects the premium on advanced AI capabilities, potentially limiting access for smaller enterprises or individual developers.
FROM THE MEDIA: Claude 3's introduction marks a significant milestone in the AI sector, challenging the dominance of established players like OpenAI and Google. Anthropic's decision to release different model sizes allows for a tailored approach to AI application, catering to a wide range of business and development needs. The improvements in model comprehension and fluency could have profound implications for fields requiring complex data interpretation, such as scientific research and long-form content creation. However, the higher cost of Opus reflects the premium on advanced AI capabilities, potentially limiting access for smaller enterprises or individual developers.
READ THE STORY: The Register
Ukraine claims it has sunk another Russian warship using high-tech sea drones
Bottom Line Up Front (BLUF): Ukraine's Defense Intelligence (DIU) has successfully executed a cyberattack against the Russian Defense Ministry's servers, acquiring a vast array of classified information. This strategic cyber offensive has unveiled significant details about the Russian military's leadership, operations, and communication systems, marking a notable achievement in the ongoing cyber warfare aspects of the Russia-Ukraine conflict.
Analyst Comments: The reported sinking of the Sergey Kotov not only demonstrates Ukraine's growing proficiency in asymmetric warfare but also highlights the strategic importance of the Black Sea in the broader Russo-Ukrainian conflict. By employing domestically-produced Magura V5 drones, Ukraine not only challenges Russian naval superiority in the region but also sends a clear message regarding its capability and resolve to defend its maritime boundaries and interests. These operations, aimed at reducing the operational capabilities of the Russian fleet and disrupting missile launches from the Black Sea, also serve a psychological purpose, undermining the perceived invincibility of Russian military assets and emboldening Ukrainian resistance.
FROM THE MEDIA: Ukraine's military intelligence agency successfully executed a night operation using Magura V5 sea drones to destroy the Russian patrol ship Sergey Kotov near the Kerch Strait, evidencing Ukraine's innovative use of technology in the conflict. The Sergey Kotov, capable of carrying cruise missiles and approximately 60 crew members, represents a strategic target within the context of the ongoing maritime skirmishes in the Black Sea. This incident is part of a series of Ukrainian attacks on Russian naval vessels, including the sinking of the missile-armed corvette Ivanovets and the Caesar Kunikov landing ship earlier this year.
READ THE STORY: US. News // abcNEWS
Former Twitter Executives Sue Elon Musk for $128M in Severance Payments
Bottom Line Up Front (BLUF): Elon Musk faces a $128 million lawsuit from former Twitter executives, including ex-CEO Parag Agrawal and former-CFO Ned Segal, for alleged unpaid severance benefits following his tumultuous acquisition of the social media platform. The plaintiffs accuse Musk of strategic maneuvers to avoid fulfilling severance obligations, a claim backed by their interpretation of events described in Walter Isaacson's biography of Musk.
Analyst Comments: The legal action taken by Twitter's former executives highlights the chaotic aftermath of Elon Musk's acquisition and the resultant mass layoffs. This lawsuit, focused on severance payments, underscores a broader issue of corporate governance and the responsibilities of new ownership to adhere to existing employee agreements. Musk's aggressive approach to restructuring Twitter, now X, raises questions about the balance between entrepreneurial freedom and contractual obligations. This case could set a precedent for how severance policies are handled in high-profile acquisitions, especially in the tech industry where such takeovers are common.
FROM THE MEDIA: Elon Musk's acquisition of Twitter, culminating in a $44 billion deal, has led to a significant legal challenge from the platform's former top executives. They claim Musk owes them severance payments totaling $128 million, as per Twitter's policies prior to the takeover. The lawsuit reveals intricate details of Musk's takeover strategy, particularly his efforts to circumvent severance payments by timing the acquisition's closure. This legal battle not only highlights the financial disputes stemming from Musk's takeover but also sheds light on the internal turmoil and strategic decisions that characterized the transition period.
READ THE STORY: The Register
DPRK Cyberattacks Target South Korea's Presidential Staff and Supreme Court
Bottom Line Up Front (BLUF): South Korean authorities have reported cybersecurity breaches attributed to North Korean hackers, including the personal email compromise of a Presidential staff member and a significant attack on the Supreme Court's network. These incidents underscore the persistent threat posed by North Korea's sophisticated cyber operations, which aim at both financial gain and espionage.
Analyst Comments: The recent disclosures by South Korean officials regarding cyberattacks by presumed North Korean hackers are a stark reminder of the multifaceted threat that Pyongyang's cyber operations pose to global security. North Korea's cyber program, one of the most active and sophisticated globally, has long been a tool for both financial heists, particularly through cryptocurrency thefts, and strategic espionage against governments and private entities. The breach of a South Korean Presidential staffer's email and the Supreme Court's network not only highlights the vulnerability of even the most secure systems but also signifies the continuous evolution of cyber warfare tactics. These incidents reflect a broader pattern of aggressive cyber operations by North Korea, amidst international sanctions and diplomatic standoffs, aimed at funding its weapons programs and gaining strategic leverage.
FROM THE MEDIA: In a series of cyberattacks attributed to North Korea, South Korean officials have revealed significant security breaches involving the personal email of a staff member from President Yoon Suk Yeol's office and a malware attack on the Supreme Court's network. The email breach occurred ahead of President Yoon's trip to Europe in November, involving a staffer's use of commercial email services for official duties, which violated security protocols. Although the breach did not compromise the overall security system of the presidential office, it raised concerns over the handling of sensitive information. Separately, the Supreme Court admitted that North Korea's Lazarus hacking group might be behind a malware attack on its network, leading to potential leaks of sensitive data and documents. These incidents are part of a broader pattern of cyberattacks and intrusions by North Korea, which has been linked to significant financial thefts and espionage activities worldwide. A U.N. panel of experts is investigating dozens of suspected North Korean cyber operations, with stolen funds reportedly used to support its weapons of mass destruction programs.
READ THE STORY: AP // Korea JoongAng Daily
TA577 Exploits ZIP Archive Attachments in Phishing Emails for Information Gathering and Follow-on Activities
Bottom Line Up Front (BLUF): Cybersecurity firm Proofpoint has identified a new cyberattack technique employed by the threat actor TA577, involving the use of ZIP archive attachments in phishing emails to steal NT LAN Manager (NTLM) hashes from IT networks. This sophisticated attack vector, observed in campaigns on February 26 and 27, 2024, utilizes thread hijacking to increase its effectiveness, posing a significant threat to organizations worldwide.
Analyst Comments: he recent campaigns by TA577 leveraging thread hijacking and ZIP archive attachments represent a notable evolution in phishing tactics, emphasizing the ongoing innovation among cybercriminals in bypassing traditional security measures. The objective of capturing NTLMv2 Challenge/Response pairs to steal NTLM hashes underscores the strategic importance of this attack for enabling pass-the-hash (PtH) type attacks, which can facilitate unauthorized network access and sensitive data exfiltration. Given TA577's history of distributing malware like QakBot and PikaBot, the adoption of new delivery methods highlights the group's adaptability and resourcefulness. Organizations are advised to remain vigilant and adopt proactive measures, such as blocking outbound SMB traffic, to mitigate the risk posed by such advanced phishing techniques.
FROM THE MEDIA: Proofpoint's discovery of TA577's new phishing strategy involving ZIP archive attachments to steal NTLM hashes through thread hijacking signifies a critical threat to global IT networks. By masquerading as responses to previous emails, the attackers increase their chances of deceiving recipients and compromising systems. The attack's reliance on contacting an actor-controlled SMB server to capture NTLM hashes illustrates a high degree of technical sophistication, emphasizing the need for robust defensive strategies against such threats. With TA577's quick adoption and iteration of new tactics, organizations must stay ahead of the curve in cybersecurity practices to protect against the dynamic landscape of cyber threats.
READ THE STORY: THN
Evolving Dynamics: Russia's Increased Air Operations in Ukraine
Bottom Line Up Front (BLUF): Recent developments in the ongoing conflict between Russia and Ukraine highlight a tactical shift by Russian forces towards greater reliance on close air support operations in Eastern Ukraine. This strategy, while yielding tactical advantages, has also exposed Russian aircraft to heightened risks, as evidenced by Ukraine's successful downing of several Russian fighter jets and a key reconnaissance aircraft.
Analyst Comments: The China-Russia axis has reached new heights of cooperation, a development that could reshape global geopolitics and challenge the existing international order. Beijing's unwavering support for Moscow, especially following the International Criminal Court's arrest warrant for Putin regarding Ukraine, underscores a solidified partnership that transcends mere diplomatic alignment. This alliance is strategically positioned to challenge Western influence, particularly as both nations bolster ties with the Global South, aiming to create a counterweight to American and European global dominance.
FROM THE MEDIA: Russia's adaptation of its air warfare tactics to include close air support and the use of guided glide bombs represents a significant shift in its military strategy in the Ukraine conflict. Initially, the Russian air force maintained a cautious distance, utilizing long-range missiles due to the effective Ukrainian air defenses. The recent transition towards direct air support, notably in the capture of Avdiivka, underscores Russia's attempt to leverage its aerial firepower to achieve ground objectives. However, this approach has its costs, both in terms of aircraft losses and potential impacts on pilot morale and operational capabilities. The destruction of an A-50 radar plane, a crucial asset for coordinating air operations, marks a strategic setback for Russia, potentially diminishing its aerial situational awareness and bombardment coordination.
READ THE STORY: The New York Times
Amazon Acquires Nuclear-Powered Datacenter Campus for $650M
Bottom Line Up Front (BLUF): Amazon Web Services (AWS) has expanded its cloud infrastructure with a strategic $650 million acquisition of Cumulus Data's nuclear-powered datacenter campus, situated adjacent to the Susquehanna nuclear power plant in Pennsylvania. This move signifies Amazon's commitment to sustainable, carbon-free energy sources for its datacenter operations, aligning with its ambitious sustainability targets.
Analyst Comments: Under the acquisition deal, Amazon will gain control over the Cumulus datacenter campus, which boasts an initial 48 megawatts of capacity with plans to expand up to 475 megawatts. The deal includes a commitment from Talen Energy to supply Amazon with direct access to electricity generated by the Susquehanna nuclear power plant, ensuring a substantial supply of clean energy for AWS's operations. This acquisition not only highlights Amazon's dedication to powering its vast datacenter network with renewable and carbon-free energy sources but also marks a significant investment in the infrastructure required to support the growing demand for cloud services.
FROM THE MEDIA: As AWS integrates the Cumulus facility into its global infrastructure, the industry may witness a shift towards more sustainable and innovative energy solutions for datacenters. This acquisition could inspire other companies to explore nuclear energy as a reliable and clean power source, potentially leading to new partnerships and investments in nuclear technology. Moreover, Amazon's commitment to sustainability and carbon neutrality may accelerate the development of advanced nuclear technologies, such as small modular reactors (SMRs), offering scalable and flexible options for powering datacenters. The success of AWS's nuclear-powered campus could also influence policy and regulatory frameworks, fostering a supportive environment for nuclear energy in the tech sector.
READ THE STORY: The Register
Critical Vulnerabilities in JetBrains TeamCity On-Premises Could Lead to Server Takeovers
Bottom Line Up Front (BLUF): JetBrains has patched two critical security vulnerabilities in its TeamCity On-Premises software that could allow threat actors to gain administrative control over affected systems. The vulnerabilities, identified as CVE-2024-27198 and CVE-2024-27199, have been fixed in version 2023.11.4. Users are urged to update their servers immediately to mitigate the risk of unauthorized access and potential server takeovers.
Analyst Comments: The discovery of these critical vulnerabilities in JetBrains TeamCity On-Premises software highlights the ongoing security challenges faced by development and CI/CD tools. The high severity of CVE-2024-27198, with a CVSS score of 9.8, points to the potential for full server compromise by remote, unauthenticated attackers, posing a serious risk to the integrity of software development pipelines. CVE-2024-27199's path traversal issue further underscores the importance of rigorous security practices in the design and maintenance of such systems. Rapid7's discovery and JetBrains' prompt response exemplify the crucial role of responsible vulnerability disclosure and swift patch management in maintaining the security of critical infrastructure.
FROM THE MEDIA: Cybersecurity firm Rapid7 identified and reported two significant vulnerabilities in JetBrains TeamCity On-Premises, prompting an immediate response from the software vendor. The first vulnerability, CVE-2024-27198, allows attackers to bypass authentication checks and gain administrative control, while CVE-2024-27199 enables attackers to manipulate the server's HTTPS certificate via a path traversal flaw. These vulnerabilities expose servers to potential supply chain attacks, denial of service, and adversary-in-the-middle scenarios. JetBrains' swift patching of these issues in version 2023.11.4 mitigates the immediate threat, but the incident serves as a reminder of the critical importance of cybersecurity vigilance in software development tools.
READ THE STORY: THN // PoC: CVE-2024-27198
Russia Accuses Western Envoys of Meddling by Attending Navalny's Funeral
Bottom Line Up Front (BLUF): Russia has openly criticized Western ambassadors for attending the funeral of opposition leader Alexei Navalny, viewing it as interference in its domestic affairs. Amidst the ongoing Ukraine conflict, Moscow's relations with the West have further deteriorated, leading to heightened diplomatic tensions and threats of retaliatory actions against foreign journalists.
Analyst Comments: The attendance of Western envoys at Alexei Navalny's funeral marks a notable escalation in the diplomatic rift between Russia and the EU, highlighting the broader geopolitical tensions surrounding Russia's internal politics and its military actions in Ukraine. Moscow's accusatory stance towards the EU ambassadors signifies a deepening crisis in international relations, reminiscent of Cold War-era standoffs. This development is especially significant in the context of the upcoming Russian presidential elections, where the Kremlin is keen on projecting internal unity and sovereignty against perceived Western encroachments. The mutual accusations and threats, including the potential expulsion of German journalists from Russia, underscore the fragile state of diplomatic engagements and the increasing use of media and public diplomacy as tools in the geopolitical arsenal.
FROM THE MEDIA:Russia has expressed its discontent with the presence of Western ambassadors at the funeral of Russian opposition figure Alexei Navalny, interpreting it as an intrusion into its domestic matters. This incident comes amidst already strained relations due to the conflict in Ukraine, with President Putin cautioning against Western involvement in the region. The refusal of EU ambassadors to meet with Russian Foreign Minister Sergei Lavrov before the March presidential elections has been taken by Moscow as a sign of disrespect and meddling. The involvement of Western diplomats in what Russia perceives as internal affairs raises questions about the future of diplomatic relations and the ongoing challenges in navigating the complex international landscape surrounding Russia's actions in Ukraine and its treatment of opposition figures.
READ THE STORY: Reuters
Items of interest
China Targets Ambitious Economic Growth Amidst Modest Stimulus Measures
Bottom Line Up Front (BLUF): China's leadership has announced an ambitious economic growth target of around 5 percent for 2024, maintaining a cautious approach to economic stimulus despite facing significant economic challenges. Premier Li Qiang's report to the National People's Congress emphasized modest measures to stimulate growth, avoiding large-scale deficit spending and focusing on long-term growth drivers such as clean energy, electric vehicles, and artificial intelligence.
Analyst Comments: The setting of a 5 percent growth target, mirroring last year's goal, indicates China's confidence in its economic resilience and the effectiveness of its policy measures. However, the absence of a substantial economic stimulus package raises questions about the government's strategy to address immediate challenges such as the property crisis, declining consumer confidence, and investor wariness. The reliance on a 3 percent fiscal deficit target suggests a continued cautious approach to borrowing and spending. This strategy reflects China's balancing act between stimulating short-term growth and managing long-term risks, including high debt levels and an aging population.
FROM THE MEDIA: During the National People's Congress, Premier Li Qiang outlined China's economic goals and challenges, acknowledging the fragile foundation for sustained recovery. The government's economic plan emphasizes stability and gradual reforms over aggressive stimulus measures. Despite international scrutiny and domestic pressures, China's leadership appears committed to a path of cautious optimism, leveraging strategic industries to drive future growth. The modest increase in bond sales for local governments and the lack of significant social spending initiatives indicate a deliberate choice to prioritize long-term economic health over short-term gains.
READ THE STORY: The New York Times
Uncovering the Truth: Is China's Economy Collapsing (Video)
FROM THE MEDIA: Clay chats with Kyle Bass, the founder and principal of Hayman Capital Management. Hayman’s first major success came from effectively shorting the housing market in 2008, and Kyle was profiled in Michael Lewis’ book The Big Short.
How China's property bubble burst(Video)
FROM THE MEDIA: Desperate property developers in China have resorted to gifts like new cars, free parking spaces, phones and other consumer goods to attract homebuyers and boost flagging sales.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.