Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • Lesson Not Learned

    The director of the Canadian Security Intelligence Service said Tuesday that the spy agency avoids racial profiling because it is “fundamentally stupid” and does not knowingly use information gleaned under torture offshore because the practice is “morally repugnant.” James Judd told a gathering of Canadian judges on Tuesday that he is “acutely aware” of complaints…

  • The New Collection / Production Management

    In my embargoed contribution to a pending book on reform, I argue that going the networked/wiki-ed/blogged route is both a nice way to cut out a lot of the overhead associated with the intel process. As it works now it is very hierarchical, with gatekeepers at every turn and operating at a pace that makes tortoises look…

  • Let the Flailing Begin

    So controversial is the forthcoming National Intelligence Estimate on Iraq, say officials and observers, that even the terms of reference are likely to be the subject of intense, but highly secret, discussion and debate. Somewhere in a conference room in Northern Virginia, roughly two-dozen seniors and their backups are sitting around a table and bickering…

  • Here Comes the Judge

    The plot has also revealed the indispensability of good counterterrorism intelligence. A defense against terrorists, as against other enemies of the nation, must be multilayered to have a reasonable chance of being effective. One of the outer defenses is intelligence, designed to detect plots in advance so that they can be thwarted. One of the…

  • As they bloody well should

    The [UK] Government is discussing with airport operators plans to introduce a screening system that allows security staff to focus on those passengers who pose the greatest risk. The passenger-profiling technique involves selecting people who are behaving suspiciously, have an unusual travel pattern or, most controversially, have a certain ethnic or religious background. The system…

  • No connection . . .

    . . . execpt for the tactic. Incredible: The FBI said Monday it had no information to indicate that the three Texas men arrested in Michigan with about 1,000 cell phones in their van had any direct connection to known terrorist groups. Also, a prosecutor in a separate Ohio case said he can¹t prove a…

  • I don’t buy it

    This is what passes for CT analysis at Time. Acceptance that this is less an AQ issue than it is a terrorism issue is a nice change of pace from the class that loves to poo-poo any disrupted plot that doesn’t reveal the perps had wallets full of AQ business cards. Note however the quick…

  • The Difference Between LE and DI

    As a friend from one of the Commonwealth nations points out, “Nice job by the domestic intelligence service,” which is his subtle but well-meaning dig at both our FBI and larger intelligence apparatus. Domestic tip-off; foreign intelligence supplement; and allied intel cooperation all operationalized for the door-kickers inside of a year. Were this a US…

  • Clarity, Quick Hits & A Suggestion

    As I alluded to earlier, it is a little hard to accurately assess things if you’re not prepared to use accurate if un-PC language. US and UK media might have an aversion to mentioning the Muslim connection, but the Italian media apparently does not. Ethnic and religious descriptions are hardly immaterial in situations like this,…

  • More Terror Plot Short Takes

    Bloody day job . . . Surveillance, electronic or otherwise, works:  By late 2005, the probe had expanded to involve several hundred investigators on three continents. They kept dozens of suspects under close surveillance for months, even as some of the plotters traveled between Britain and Pakistan to raise money, find recruits and refine their…

  • Go Big Blue

    As a guy who knows a thing or two about warning systems, I watched again with dismay the misuse and abuse of the homeland security advisory system today. Granted, it isn’t really a “warning” system per se, but the general concept is the same: give people a quick way to assess the threat. The problem…

  • Curious

    This by Evan Kohlmann on the CT Blog yesterday 8/9: Participants on key Arabic-language Al-Qaida chat forums on the Internet have announced their intent to launch collective cyberterrorist attacks tomorrow, August 10, aimed at interrupting or denying service to other pro-Israeli websites–namely the “Internet Haganah” cyberterror watchdog site run by Aaron Weisburd. […] . .…

  • UK Airline Terror Plot

    What a day to sleep in. Some quick hits before I descend into the seventh level of teleconference hell: In the words of Secretary Chertoff this latest plot is “suggestive” of al-Qaida because it is essentially a dusting off of the plans for Operation Bojinka; funded by al-Qaida and put together by two guys whose…

  • Everything you thought you knew . . .

    . . . about everything covered in the MSM – especially war – is suspect. Some of you didn’t need confirmation, but since I have a nice side-bar going with former info ops colleagues a post seemed appropriate. Army of Analysts Experts people, Army of Experts . . .

  • Not Serious: Sharing

    It is so easy to get worked up over pieces like this after reading a piece like this. I have watched so many sharing efforts come and go, each purporting to do what the previous efforts were unable to do. Technology is usually a major factor in each effort, but as the second article points…

Briefs

  • Why DeFi Cybersecurity Can Never Sleep

    Having a bug bounty program to pay white hat hackers for reporting vulnerabilities is one thing. But staffing an always-on security desk to respond to those reports can be really expensive, said Immunefi founder and CEO Michell Amador. “Lots of people don’t want to wake up on Sunday at 4 a.m. in the morning to…

  • How This Scammer Stole Over $15M Worth of Crypto

    A hacker has stolen over $15 million from crypto wallets by imitating the website of the HitBTC exchange. The hackers cloned the exchange’s user interface to lure victims into connecting their wallets by clicking “Approve.” According to the crypto tracking platform MistTrack, hackers created a fake website, “hitb2c[.]lol,” to impersonate the original website, “hitbtc[.]com.” After a user connects…

  • US Justice Department on the hunt for DeFi hackers and thieves

    The United States Department of Justice’s (DOJ) crypto tsar is cracking down on Decentralized Finance (DeFi) hackers and exploiters amid a four-year rise in illicit crypto activity. In a Financial Times report published on May 15, Eun Young Choi, director of the Justice Department’s National Cryptocurrency Enforcement Team (NCET), stated that the department is focusing on…

  • North Korean crypto thefts target Japan, Vietnam, Hong Kong

    North Korea is using cyberattacks to target Japanese cryptocurrency assets. Hacker groups affiliated with North Korea have stolen $721 million from Japan since 2017, according to a study by a U.K.-based compliance specialist. That is equal to 30% of the total of such losses worldwide. Pyongyang is believed to have targeted the crypto assets of other…

  • South Korean authorities raid Upbit, Bithumb crypto exchanges after political scandal

    Prosecutors in South Korea raided the offices of two local cryptocurrency exchanges due to investigations surrounding the digital assets of lawmaker Kim Nam-kuk. According to a report from the South Korean news agency Yonhap, a team of prosecutors from the Seoul Southern District Prosecutors Office raided cryptocurrency exchanges Upbit and Bithumb for transaction records and…

  • Erdogan leads as Turkey heads for election run-off

    Turkey’s presidential election appears almost certain to go to a run-off with President Recep Tayyip Erdogan set for a four-point lead in the first round. After 20 years in power, he said he was convinced he would win five more from the balcony of his party headquarters. Opposition challenger Kemal Kilicdaroglu also claims to have…

  • Thailand voters deliver stunning blow to army-backed rule

    Thai voters have voted in favor of an opposition party that is calling for radical reform of the country’s institutions. Early results show Move Forward winning 151 of the 500 seats int he lower house. This is now ten seats ahead of the previous frontrunner, Pheu Thai, led by the daughter of ex-prime minister Thaksin…

  • Capita Cyberattack Hits UK Pension Funds

    A cyberattack targeted Capita, a UK-based outsourcing firm, potentially affecting multiple pension funds that utilize their services. The attack aimed to compromise personal data, including names, addresses, and financial information of pension scheme members. While the extent of the breach is still being investigated, Capita has taken immediate action to mitigate the incident and enhance…

  • Executive Fired From TikTok’s Chinese Owner Says Beijing Had Access to App Data in Termination Suit

    In a termination lawsuit, a former executive of TikTok’s Chinese owner, ByteDance, alleges that Beijing had access to app data, including user information and content censorship capabilities. The executive claims that these arrangements were made as part of compliance with Chinese laws, which raised concerns about user privacy and potential surveillance. The lawsuit adds to…

  • Advantech’s industrial serial device servers open to attack

    Researchers from Claroty have uncovered vulnerabilities in Advantech’s serial device servers, which could pose significant risks to critical infrastructure systems. The flaws include weak authentication measures and the absence of encryption, making the servers susceptible to unauthorized access and manipulation. As these servers are widely used in industries like energy and transportation, Advantech is working…

  • SquareX’s vision: A future where internet security is a non-issue

    Vivek Ramachandran, a seasoned professional in the field, has introduced SquareX, a new cybersecurity company. SquareX has been established to meet the escalating demand for robust cybersecurity solutions in our increasingly interconnected world. With the rapid proliferation of Internet of Things (IoT) devices, SquareX aims to address the unique security challenges posed by these connected…

  • EU Crypto Tax Plans Include NFTs, Foreign Companies, Draft Text Shows

    The European Union plans to force crypto companies to give tax authorities details of their clients’ holdings, according to a draft bill released to CoinDesk under freedom of information laws. The data-sharing law, based on a model from the Organization for Economic Cooperation and Development (OECD), is set to be agreed by finance ministers next…

  • Privacy Is the Achilles Heel of Ethereum

    In the ever-evolving cryptocurrency industry, Ethereum has emerged as a pioneering force. Its revolutionary approach to smart contracts and decentralized applications (dApps) has set a precedent for other blockchain networks. Yet, amid all the groundbreaking innovations, Ethereum grapples with a serious concern that could undermine its potential: privacy. The concept of privacy in the context of…

  • Crypto Security: A Beginner’s Guide

    One of crypto investing’s biggest hurdles is convincing investors that it’s safe. Safety is especially relevant for investing in bitcoin and other crypto assets, which are by nature bearer assets with varying degrees of anonymity. There are four other complicating factors: The education curve for crypto can be steep Most investment advisors and brokerages do…

  • Memes Are Wreaking Havoc on Cryptocurrency Apparently

    Cryptocurrency has had some tough times recently, from FTX founder Sam Bankman-Fried’s criminal charges to the crash that has caused digital currency holders to rush toward investments that are more stable. Now they’re facing a new challenge: memes. Binance, one of the biggest crypto exchanges in the world, recently suspended withdrawals after it experienced “a congestion…

  • IRS Trains Ukraine Law Enforcement to Track and Trace Russia’s Cryptocurrency Moves

    Amid the ongoing Russian invasion of Ukraine, the U.S. and its private sector partners want to lend a hand to Ukrainian authorities looking to hinder Russian actors using cryptocurrencies to skirt sanctions—something European authorities have already tried to address. Today the Internal Revenue Service’s Criminal Investigations (IRS-CI) unit and blockchain analytics firm Chainalysis kicked off…

  • How can AI know what no one told it?

    Abstract The article at the link below discusses the recent advances in artificial intelligence (AI) and how they are being used to develop large language models (LLMs). LLMs are trained on massive datasets of text and code, and they can generate text, translate languages, write different kinds of creative content, and answer your questions in…

  • Pakistan Court Orders Imran Khan’s Release on Bail, Lawyer Says

    In April 2022, Imran Khan was removed as prime minister after a parliamentary no-confidence vote. Khan was arrested on May 9 by the anti-graft agency following a land fraud case. The Pakistan Supreme Court deemed the arrest unlawful the day prior, and Khan has repeatedly stated he was illegally abducted. Khan remains the most popular…

  • Erdogan Rival Says Has Evidence of Russia’s Online Campaign Ahead of Turkey Vote

    Kemal Kilicdaroglu, head of the Republican People’s Party (CHP), stated his party has evidence of Russian plans to release deep fakes ahead of the presidential election. Kilicdaroglu has consolidated support from multiple parties to serve as the primary challenger to President Erdogan in Sunday’s elections. Russian spokesman Dmitry Peskov said Kilicdaroglu’s advisors were liars and…

  • New Phishing-as-a-Service Tool Used in the Wild to Target Organizations

    Cisco Talos researchers recently discovered that threat actors are targeting Microsoft 365 via the Greatness Phishing-as-a-Service (PhaaS) platform. The Greatness platform surged operations between December 2022 and March 2023, targeting Microsoft 365 users in the U.S., U.K. Canada, Australia, and South Africa. The victims primarily came from the manufacturing, healthcare, technology, and education sectors in…

  • China Completes Warship Deliveries to Pakistan as Military Alliance Grows

    China agreed to supply Pakistan with four warships in 2018. On May 11, two of these frigates were sent to Pakistan as part of expanded military cooperation. According to Chinese media, the Type 054A frigates would be deployed to guard the China-Pakistan Economic Corridor (CPEC). If Chinese ships are barred from the Strait of Malacca,…

  • Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs

    Multiple ransomware groups have adapted the Babuk Locker code to target VMware ESXi virtual machines, according to researchers at security firm ESET. The Babuk Locker ransomware was first identified in January 2021 and gained notoriety for its use in high-profile attacks against organizations such as the Washington DC Metropolitan Police Department. The updated versions of…

  • US Probing Cybersecurity Risks of Rockwell Automation’s China Operations: Report

    The United States is reportedly investigating the cybersecurity risks posed by the Chinese operations of industrial automation firm Rockwell Automation. The probe, which is being led by the Committee on Foreign Investment in the United States (CFIUS), is focused on Rockwell’s joint venture with Chinese state-owned enterprise Xi’an Hengsheng Science & Technology, which produces industrial…

  • CISA, FBI: Ransomware Gang Exploited PaperCut Flaw Against Education Facilities

    The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning to US educational institutions about a ransomware group that has been exploiting vulnerabilities in the popular printing software PaperCut to infiltrate their networks. The group, known as PYSA/Mespinoza, has been active since at least 2017 and has…

  • France Punishes Clearview AI For Failing To Pay Fine

    Clearview AI, a US-based facial recognition company, has been fined €10 million by French data privacy regulator CNIL for violating EU data protection laws. The company failed to cooperate with CNIL’s investigations and ignored multiple requests to stop collecting and using biometric data from individuals without their consent. Clearview AI also failed to appoint a…

  • China’s Grand Strategy For Global Data Dominance: Overview of Hoover Insitution Report

    The following is a summary of the Hoover Institution report titled China’s Grand Strategy For Global Data Dominance. It is based on extensive research into China’s statements on intentions in using data, including using data to further foreign policy and economic objectives. Executive Summary: The United States and China are currently competing to shape the…

  • Cardano’s Liqwid Labs’ Discord Compromised: How to Stay Safe

    Hackers continue to run rampant in 2023. After stealing over $100 million in April and over half a billion dollars over the year, there are no signs of scams and attacks slowing down. In the latest attack, Liqwid Labs, a DeFi protocol operating on Cardano, fell prey to malicious actors who have taken over the company’s…

  • The US Securities and Exchange Commission Is Unfit to Regulate Crypto

    The dawn of digital finance has seen the rise of a new asset class – cryptocurrencies, challenging traditional financial norms and regulations. However, their volatility, speculative nature, and potential for misuse have necessitated regulatory oversight by the US Securities and Exchange Commission (SEC). The SEC, a body traditionally responsible for securities oversight, has found itself…

  • How the IRS seized $10B worth of crypto using blockchain analytics

    Blockchain analysis has been key in helping the United States Internal Revenue Service (IRS) seize an estimated $10 billion worth of cryptocurrency since it began investigating a broad body of crimes involving digital assets. This was a key point raised by IRS Criminal Investigations (IRS-CI) Chief Jim Lee in a wide-ranging, exclusive interview with Cointelegraph…

  • What Is Staking In Crypto: How Does It Work

    With cryptocurrency, one way to make a profit is to sell your investment when the market price increases. There are other ways to make money in crypto, like staking. With staking, you can put your digital assets to work and earn passive income without selling them. In some ways, staking is similar to depositing cash…

  • Pepe memecoin frenzy gets unwanted attention from scammers

    As the hype surrounding the Pepe memecoin intensifies, bad actors have started to take notice, resulting in scam attempts now plaguing the crypto space. According to blockchain security firm PeckShield, there have been at least 10 memecoin scams created in the last three days alone. The firm detected and reported scam tokens that recently had…

  • Global Food Chain Company Hacked – Attackers Stole Sensitive Details

    Major food distributor Sysco announced it was attacked by threat actors in an internal memo on May 2. The data breach impacted business operations and the personal data of employees and customers. This includes social security numbers and financial information. Sysco believes the breach began on January 14 when a threat actor first claimed to…

  • How Russia’s Rich Get Their Luxuries Now

    Western sanctions have damaged Russia’s economy but not crippled it. More than a year after Russia’s invasion of Ukraine, the web of global trade has adjusted to Western sanctions. This has allowed Putin to deliver on a key promise, which was that the war would not drastically disrupt the lifestyle of consumption for Russian elites.…

  • Sudan Peace Talks Make Progress, Mediation Source says: Reuters

    Peace talks between Sudan’s warring Armed Forces and Rapid Support Forces (RSF) have made progress, and an agreement on a ceasefire to the conflict is expected soon, a mediation source told Reuters on Wednesday. This conflict started in mid-April. Weeks after fighting broke out, the leaders of Sudan’s army and the paramilitary group, RSF, agreed…

  • China and US Debt Woes may Dominate G7 Finance Chiefs’ Talks

    At this week’s Group of Seven (G7) finance leaders, they will be seeking to diversify supply chains away from China, but also trying to get Beijing’s cooperation in solving global debt problems. The conflicting goals come on top of vulnerabilities the G7 rich democracies face due to their heavy reliance on China. The heightening risk…

  • US Approves First Transfer of Seized Russian Funds to Ukraine

    United States Attorney General Merrick Garland has authorized the first transfer of funds seized from Russian oligarchs to aid Ukraine. Following Russia’s full-scale invasion of Ukraine in 2022, Garland announced a new task force, dubbed KleptoCapture, that specifically targeted Russian oligarchs who sought to evade the deluge of U.S. sanctions imposed against Russian entities. Last…

  • Microsoft Fixes Failed Patch for Exploited Outlook Vulnerability

    Bad actors have exploited a critical privilege-escalation bug in Microsoft Outlook that appeared in March. Microsoft’s May security update includes a patch for the bug called CVE-2023-23397. The vulnerability allowed attackers to steal user passwords when Microsoft Outlook clients connected to hacker-controlled servers. Microsoft patched the bug by preventing Outlook clients from making these connections.…

  • Capita Says Ransomware Attack Will Cost It Up to $25 Million

    Capita is a business process outsourcing company based in the UK. The company announced Wednesday that a cybersecurity incident will cost them between $19 million and $25 million, but did not specify whether the loss is due to business disruptions or extortion. Capita confirmed the ransomware group Black Basta stole internal files on April 20.…

  • Dragos Says Ransomware Gang Accessed Limited Data but Failed at Extortion Scheme

    ICS vendor Dragos announced a ransomware group breached its defenses on Wednesday. The hackers acquired information from threat intel reports, a customer support system, and a SharePoint portal. Dragos decided to ignore communications and ransom demands from the hackers despite threats to publicly release stolen data. The ransomware group attacked the personal email of a…

  • Verisign gets patent for cryptocurrency-backed sale and transfer of domain names

    The U.S. Patent and Trademark Office has granted patent number 11,645,370 to Verisign for “Transferring a domain name on a secondary blockchain market and in the DNS.” The patent describes a way to transfer domains in both the DNS and a blockchain network when a sale with cryptocurrency occurs. The method can handle the transaction from…

  • Twitter Scammer Pleads Guilty to $794,000 Celeb Crypto Theft

    A British citizen has pleaded guilty to computer intrusion and stealing cryptocurrencies using SIM-swap fraud. Joseph James O’Connor and accomplices hacked the Twitter accounts of names like Elon Musk and Michael Bloomberg in 2020 to send a Bitcoin link promising high returns quickly. The attack differed from other impersonation scams in that they used the…

  • Are Crypto Firms Running Out of Patience Trying to Keep Up With Changing Regulations?

    Crypto firms have faced immense pressure to comply with and adapt to ever-shifting regulations. Around 400 firms in the Baltic region have faced serious repercussions as a result of tightened oversight. They may have no choice but to head for the door in the face of stricter requirements, a new report suggests. Many cryptocurrency firms…

  • Ex-Coinbase manager Ishan Wahi sentenced to prison in insider trading case

    Ishan Wahi, a former Coinbase Global Inc product manager, was sentenced on Tuesday to two years in prison in what US prosecutors have called the first insider trading case involving cryptocurrency. US District Judge Loretta Preska sentenced Ishan Wahi, 32, in Manhattan federal court after the defendant pleaded guilty in February to two counts of…

  • Half of North Korean missile program funded by cyberattacks and crypto theft, White House says

    About half of North Korea’s missile program has been funded by cyberattacks and cryptocurrency theft, a White House official said Tuesday. A sweeping US federal government effort is ongoing to understand how “a country like [North Korea] is so darn creative in this space,” Anne Neuberger, deputy national security adviser for cyber and emerging technology, said…

  • IBM Delivers Roadmap for Transition to Quantum-safe Cryptography

    IBM has released a roadmap outlining the steps organizations can take to transition to quantum-safe cryptography. The document, titled “The IBM Roadmap for Cryptography,” provides guidance for organizations to prepare for the potential threat posed by quantum computers, which could render current encryption methods obsolete. The roadmap details five stages of preparation for quantum-safe cryptography,…

  • US Disrupts Russia’s Sophisticated ‘Snake’ Cyberespionage Malware 

    The United States Cyber Command has disrupted the operations of a Russian hacking group known as “Snake,” which was behind a sophisticated malware campaign targeting the US government and private sector organizations. The malware, also known as “Turla,” is believed to have been used by the Russian intelligence agency, SVR. The disruption was achieved through…

  • Microsoft Patches 2 Zero-Day Vulnerabilities

    Microsoft has issued an out-of-band patch for two zero-day vulnerabilities in Windows, both of which have been actively exploited. The first flaw (CVE-2021-31166) is a remote code execution vulnerability in the HTTP Protocol Stack, while the second (CVE-2021-31194) is a privilege escalation vulnerability in the Windows Kernel. The vulnerabilities are rated as “Important” and “Moderate”…

  • White House addresses AI’s risks and rewards as security experts voice concerns about malicious use

    The White House is taking a proactive approach to harnessing the potential of AI for innovation and economic growth while addressing concerns around privacy and fairness. Their strategy includes investing in research and development, education and workforce development, and collaborating with industry and international partners to ensure responsible AI development. Key initiatives include the National…

  • Israel Strikes Gaza Again, Saying It Is Targeting Islamic Jihad Rockets

    The Israeli military carried out airstrikes in the Palestinian coastal enclave of Gaza on Wednesday aimed at the rocket-launching infrastructure of the militant group Islamic Jihad. Shortly after, militants in Gaza began firing salvos of rockets towards Israel. These strikes and rocket attacks came after an attack on Islamic Jihad by Israel on Tuesday that…

  • Ukraine Claims Gains Near Bakhmut as Deadly Fighting Continues

    Ukraine’s military said it had reclaimed about three square miles outside the eastern city of Bakhmut, which would mark its first significant gains there in weeks. However, it is not clear whether Ukrainian forces will be able to hold that ground or if it marked a turning point in the months-long battle. The fighting around…

  • US Announces $1.2bn in Additional Military Aid for Ukraine

    The United States has announced a new $1.2 billion military aid package for Ukraine that will include air defense systems, conventional artillery and counter-drone ammunition, satellite imagery services and funding for military training. It will also include technology to allow the integration of Western air defense launchers, missiles, and radar with Ukraine’s native air defense…

  • China Woos European Leaders on Trip Overshadowed by Kremlin Ties

    China’s top diplomat set out on a three-nation trip Tuesday to persuade European leaders that they can do business with Beijing, despite their partnership with Russia that has plunged Europe into war. Once arriving in Berlin, Foreign Minister Qin Gang was immediately confronted about the war in Ukraine. German foreign minister, Annalena Baerbock, said Beijing…

  • Warren ‘Bitcoin Is Rat Poison’ Buffett Likens AI to the Atom Bomb

    Bitcoin is rat poison, in the view of Berkshire Hathaway’s chairman and CEO, Warren Buffett, and its vice chair Charlie Munger. But for them, there’s something even worse: AI. The two legends of the business world held their annual meeting in Omaha, Nebraska, joined by Vice Chairs Greg Abel and Ajit Jain, and they spoke…

  • Can Zero-Knowledge Proofs Save Cryptocurrency?

    Blockchain has transformed many industries, from healthcare to real estate to banking. But despite the “unhackable” hype, flaws in Blockchain technology undeniably weaken its goals of bringing greater security, transparency and privacy to the world. Between January and November 2022, hackers stole $4.3 billion worth of cryptocurrency — marking a 37% increase from 2021. It…

  • Microsoft, Goldman Sachs, others partner in new blockchain network

    A new blockchain network aimed at financial institutions is in the works from a conglomerate of participants in the finance and tech space, including the likes of Microsoft and Goldman Sachs. According to the announcement on May 9, the Canton Network will be a privacy-enabled interoperable blockchain network aimed at those working with institutional assets. It…

  • Crypto Exchanges Sell Coins Deemed Illegal by SEC

    U.S. cryptocurrency exchanges list more than a dozen digital coins outlawed by regulators. That’s according to a Monday (May 8) Wall Street Journal (WSJ) report, which also notes that the number of cryptocurrencies labeled by the Securities and Exchange Commission (SEC) has nearly tripled last year. The SEC can only regulate digital coins classified as securities, the…

  • Big Crypto Exchange Goes Bankrupt

    Cryptocurrency exchange Bittrex filed for bankruptcy on May 8, becoming the second largest platform for buying and selling coins to fail after FTX, amid a legal fight with a powerful regulator. The cryptocurrency industry is again overtaken by bankruptcies. Since March, the fledgling financial services industry, powered by Blockchain technology, thought that it had bankruptcies…

  • China’s Crackdown Widens as Police Raid Another Firm With Foreign Ties

    For weeks now, the police have been raiding prominent international consulting firms in China. Now the motivation for these raids, which included some American firms, have come to light after state media on Monday revealed a multi agency crackdown on the consulting industry in the name of national security.  Beijing has also moved to limit…

  • Twitter Admits Leak of Private Circle Tweets

    Twitter Circle is a new platform feature that allows users to handpick who can see their tweets. The tweets are denoted by a green circle and should not be visible to users outside a ‘Close Friends’ list. Multiple Twitter users claimed that their private tweets were exposed outside their Circle in April 2023. Twitter has…

  • Fears Mount for the Arctic as Cooperation with Russia Stalls

    For nearly three decades, the Arctic Council has been a successful example of post-Cold War cooperation. Its eight members, including Russia and the United States, have worked together on climate change research and social development across the ecologically sensitive region. However, now a year after council members stopped working with Russia following its invasion of…