Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • Clapper on the Outs

    The Baltimore Sun reports that Gen (Ret) Clapper is dusting off his fishing pole: After clashing with Defense Secretary Donald H. Rumsfeld, the director of the government’s third largest intelligence agency will be leaving his position in June, according to current and former government officials. For the past four years, James R. Clapper Jr. has…

  • Alas, Poor Russ, I knew him Horatio . . .

    The Washington Times updates us on the latest with former colleague Russ Tice: Russ Tice, a whistleblower who was dismissed from the NSA last year, stated in letters to the House and Senate intelligence committees that he is prepared to testify about highly classified Special Access Programs, or SAPs, that were improperly carried out by…

  • It’s big in Italy

    Just in case you thought CIA officers were in danger of not being able to set foot in Rome any time soon . . . The mainstream U.S. media outlets have failed to report a major terrorist plot against the U.S. – because it would tend to support President Bush’s use of NSA domestic surveillance,…

  • More on Domestic Spying

    I really enjoy reading William Arkin’s Early Warning blog. Our opinions on the intel business don’t always jibe (96Bs and 98Cs will never get along all that well) but in his latest post he hits what I think is a home run: And sorry for being cynical, but when I lived in Washington, from 1978-1993,…

  • Data Mining/OSINT on the Cheap

    Very clever. Makes me wish I’d kept up my script-writing skillz. http://www.applefritter.com/bannedbooks

  • On Sources

    Thomas Joscelyn writes in the Weekly Standard about James Risen and his sources: On NBC’s “Today” show this morning, New York Times scribe Jim Risen told Katie Couric that he hopes he will not have to reveal his sources to a grand jury and declared his story to be the exact opposite of the Plame…

  • Drip, Drip, Drip

    Given my background I may be slightly biased, but I’ve never been a big fan of leakers of classified information. The whole point of keeping stuff classified is that it isn’t supposed to be out on the front page of the NY Times. That we tend to over-classify things is another issue. The bottom line…

  • Dangers of GI Blogs

    From Newsday: Letters home filled with tales of death and danger, bravery and boredom are a wartime certainty. And now, as hundreds of soldiers overseas have started keeping Internet journals about the heat, the homesickness, the bloodshed, word speeds from the battlefront faster than ever. More and more, though, U.S. military commanders in Iraq and…

  • Pshaw!

    And they said that no one from the JTF would ever amount to anything:   The spookiest venture capital firm on the planet has hired a new CEO. In-Q-Tel – the CIA’s venture capital unit – has tapped Amit Yoran as the successor to Gilman Louie, according to a report in the Washington Business Journal.…

  • Post Holiday Catch-Up

    Such an effort is almost a waste of time (almost) since you’re starting long after the gun has gone off, but it is a nice way to reboot the mental OS out of hibernation and get back into the swing of things. So, where to begin?This gem from Reuters is a nice starting point: A…

  • It just came to me . . .

    . . . another reason why the polygraph isn’t a very good tool for screening out potential spies and leakers: Clearly the people who are leaking about Plame, the rendition program, NSA interceptions, etc. are in positions that require periodic testing. Either their kung fu is so strong they can’t be accurately read by the…

  • PATRIOT Act Extension (Sort of)

    A month is what the House thinks is appropriate: The House of Representatives agreed to extend a controversial domestic surveillance law this afternoon, but it limited the extension to one month and rejected a carefully brokered compromise from the Senate that had given the law a six-month reprieve. Prediction I: Post-holiday showdown takes place on…

  • WaPo DHS Expose

    A great start to what is going to be a multi-part series on DHS in the WaPo today: Born out of the attacks of Sept. 11, 2001, DHS was initially expected to synthesize intelligence, secure borders, protect infrastructure and prepare for the next catastrophe. For most of those missions, the bipartisan Sept. 11 commission recently…

  • Imperfect System = Tortured Solutions

    Much rending of hair and gnashing of teeth has been taking place since a leak in the New York Times revealed the existence of a Presidentially authorized secret program to intercept and exploit the communications of suspected terrorists that might be operating in the US. Under a presidential order signed in 2002, [NSA] has monitored…

  • Hezbollah.com

    Via Judeoscope: [Hezbollah] — regarded by many as even more sophisticated than al-Qaeda — has sharpened its counterintelligence expertise over the years by keeping a step ahead of Mossad, Israel’s secret service. [They have] become ever more adept at intercepting electronic surveillance, penetrating cellphone networks and recruiting computer science technicians. “Hezbollah has a long history…

Briefs

  • Thousands of Indian farmers return to New Delhi in fresh protests

    Massive protests have broken out across New Delhi in a renewed show of opposition against Prime Minister Narendra Modi. The protests began on Monday when thousands of farmers gathered to publicly voice their anger over unfulfilled promises made by the government concerning the population. The protests are occurring eight months after a year-long protest was…

  • Iran blames ‘procrastinating’ US for nuclear deal delays

    Iran has confirmed that it has not received a response from the United States on its latest proposals regarding the 2015 nuclear deal and blamed the US for the inaction. On Monday, foreign ministry spokesman Nasser Kanani said that Iran acted timely and responsibly in the nuclear talks, while the US is procrastinating their response. …

  • Hackers Target ATM Maker for Bitcoins

    General Bytes released a security alert on Friday concerning a zero-day bug detected in its Crypto Application Server (CAS). The Bitcoin ATM company explained how the exploit allowed hackers to steal an undisclosed amount of the digital currency. The advisory states that the attacker was able to create an admin user remotely by exploiting the…

  • CEO of Blacklisted Israeli Spyware Maker NSO Steps Down

    The CEO of Israeli spyware company NSO Group has stepped down, according to an announcement made by the company Sunday. Former CEO Shalev Hulio will be replaced by COO Yaron Shohat, who will manage the company’s reorganization in the aftermath. The company is responsible for the controversial Pegasus spyware due to its usage against activists,…

  • How to protect your crypto hot wallets from hackers

    No one likes to lose their hard-earned money from their cryptocurrency investments, however, some unforeseen events do manage to wipe out investors’ wealth from their trade wallets. One of the popular practices would be hackers luring investors into appealing offers on social media platforms making them look like clickbait in a certain cryptocurrency. Just one…

  • Ronin Hackers Have Moved The Stolen $625M to Bitcoin Network: Report

    Ronin hackers have transferred the stolen assets from Ethereum to the Bitcoin network, according to new findings by blockchain investigator and developer ₿liteZero. Recall that after the Ronin bridge hack in March, the attackers moved the $625 million worth of USDC and ETH to Ethereum-based crypto mixer Tornado Cash, making it difficult for authorities to trace…

  • 8 sneaky crypto scams on Twitter right now

    Cybersecurity analyst Serpent has revealed his picks for the most dastardly crypto and nonfungible token (NFT) scams currently active on Twitter. The analyst, who has 253,400 followers on Twitter, is the founder of artificial intelligence and community-powered crypto threat mitigation system, Sentinel. In a 19-part thread posted on Aug. 21, Serpent outlined how scammers target inexperienced crypto…

  • Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug

    Hackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers. When customers would deposit or purchase cryptocurrency via the ATM, the funds would instead be siphoned off by the hackers. General Bytes is the manufacturer of Bitcoin ATMs that, depending on the product, allow people to purchase or sell…

  • Blockchain and Cryptocurrency CPAs—Evolution of the Profession

    The irony about needing accountants who understand digital assets is that blockchains themselves are transaction ledgers with automated record-keeping—a blockchain is a giant check register. The technical properties of blockchains means data can never be deleted, only added or read, while transactions and balances can be instantly verified with 100% certainty through the protocols themselves.…

  • iPhone Users Urged to Update to Patch 2 Zero-Days

    Apple has urged macOS, iPhone, and iPad users to immediately install updates this week that include security updates for two zero-days that are actively under attack, according to the company. The patches fix vulnerabilities that allow attackers to execute arbitrary code and take over devices. The flaws lie in the kernel and WebKit functions. The…

  • Car Dealership Hit by Major Ransomware Attack

    A UK car dealership has confirmed that it suffered from a serious ransomware attack that occurred last month and resulted in data theft and severe damage to some systems. The company is Holdcroft Motor Group, based in Trent. The organization confirmed the attack in an internal email, stating that the company was recovering from the…

  • Russia blames Ukraine for car explosion that killed Putin ally’s daughter

    A car explosion that killed the daughter of an ally of Russian President Vladimir Putin is being blamed on Ukraine by Russia. Ukraine has denied any involvement in the attack and killing of Daria Dugina. The internal security service in Russia, the FSB, said in a statement that the explosion near Moscow was carried out…

  • China-backed APT41 Group Hacked at Least 13 Victims in 2021

    Advanced persistent threat (APT) group known as APT41, Bronze Atlas, Barium, Double Dragon, and Wicked Panda, has been observed targeting at least 13 organizations spanning several countries during the 2021 calendar year. According to new information from Group-IB, the Chinese threat actor targeted organizations in Taiwan, the US, India, Vietnam, and China. The campaigns have…

  • Spy group abuses Microsoft OneDrive to steal credentials in hack-and-leak campaigns

    Microsoft has warned that a Russian threat actor that is highly persistent is targeting NATO nations with cyberattacks such as credential theft campaigns. The cyberattacks aim to compromise OneDrive accounts, steal data, and then leak selective information in order to sway public opinion and push an agenda. The group is referred to as Seaborgium and…

  • It took Somali forces more than 30 hours to end a hotel attack that killed 21 people

    On Sunday, Somali forces worked to end a deadly attack during which 21 individuals were killed and dozens more injured. The attack occurred when gunmen stormed a hotel in the capital and seized the building. It took Somali forces more than 30 hours to contain the gunmen and during this time civilians trapped in the…

  • Law Commission proposes revolutionary rules for ownership of crypto tokens and NFTs

    There is a major earthquake happening in the sphere of digital assets, which is expected to create shockwaves that will impact tech not only in the real world but also in the metaverse. These potentially revolutionary changes appear in an innocuous-looking, if lengthy, consultation paper titled “Digital Assets: Consultation paper,” published by The Law Commission of…

  • Crypto’s collapse isn’t solving the ransomware problem

    It’s going to take more than a months-long cryptocurrency free fall to squash the mounting ransomware problem, cyber incident responders and threat analysts tell Axios. Why it matters: Companies have been struggling to fight off an abundance of ransomware hackers in recent years, but recent optimism over a crypto-crash-fueled drop in attacks might be short-lived. During a…

  • Celer Network shuts down bridge over potential DNS hijacking

    Interoperability protocol Celer Network has asked its users to revoke the approval for several contracts after shutting down its cBridge over a suspected Domain Name System (DNS) hijacking. According to the project’s initial analysis, there was suspicious DNS activity around 7:00 pm UTC on Wednesday. However, at the time of writing, the platform is still…

  • Infamous Lazarus hacking group targeting Mac users with fake job listings

    Infamous North Korean hacking group Lazarus is attempting to target Apple Inc. Mac users via fake job offers. Detailed Aug. 16 by security researchers at ESET s.r.o on Twitter, the new Lazarus campaign involves phony emails impersonating Coinbase Inc. developer job listings. The fake job emails include an attachment containing malicious files that can compromise both…

  • Is Mainstream Adoption of Cryptocurrencies Imminent?

    On Wednesday, March 9, President Joe Biden released an executive order regarding cryptocurrency and how his administration intends to approach the rapidly growing industry in 2022. However, after the release of this executive order, the question remains: Is mainstream adoption of cryptocurrency imminent in the U.S.? It’s evident that Joe Biden and his administration are…

  • Google Patches Chrome’s Fifth Zero-Day of the Year

    Google has patched an insufficient validation input flaw along with 11 other security vulnerabilities. The flaw allows for arbitrary code execution and is currently under active attack, according to Google. This marks the fifth zero-day vulnerability discovered and subsequently patched in Chrome this year. The patch was released on Wednesday of this week in a…

  • Hackers Deploy Bumblebee Loader to Breach Target Networks

    Threat actors associated with the malwares IcedID, TrickBot, and BazarLoader are increasingly turning to the malware Bumblebee to breach target networks, researchers say. The network breaches are followed by post-exploitation activities that aim to collect sensitive information. On Thursday, Cybereason published an advisory about the malware Bumblebee detailing the nature of the tool and the…

  • ATMZOW JS Sniffer Campaign Linked to Hancitor Malware

    Security researchers at Group-IB have made a connection between the ATMZOW JS Sniffer campaign and the Hancitor malware downloader, claiming that the same malicious actors may be behind both threats. The connection was made earlier this week after analyzing roughly 483 websites spanning four continents that had been successfully infected by ATMZOW since 2019. Group-IB…

  • Indian company to develop Nepal hydropower plant left by China

    Nepal signed a pact with an Indian company to develop a hydroelectric power plant in the west of the country after a Chinese firm backed out years ago. Nepal’s rivers have the potential to generate over 42,000 megawatts of hydroelectric power and they have now been opened to foreign players to develop its economy and…

  • Civilians killed in northern Syria marketplace missile attack

    At least 14 civilians were killed in a rocket attack in the town of al-Bab in northern Syria. Dozens others were injured according to the opposition’s Syrian Civil Defense. The town is held by Turkey-backed opposition fighters and the attack came days after an air attack killed Syrian troops and United States- backed Kurdish fighters…

  • Billionaire Xiao Jianhua jailed for 13 years in China

    A court in Shanghai charged a Chinese-Canadian billionaire, Xiao Jianhua, and his company with embezzlement and bribery. His company, Tomorrow Holdings, was fined over $8 billion and Xiao was sentenced to 13 years in prison.  Xiao and Tomorrow Holdings were found guilty of absorbing public deposits, illegal use of funds, and breaching trust in the…

  • North Korea rejects South’s aid offer, calls President Yoon ‘really simple’

    The state media in North Korea reported on Friday that North Korea has rejected South Korea’s offer of economic support in exchange for denuclearization. Kim Yo Jong, a top official in North Korea criticized the offer. President of South Korea Yoon Suk Yeol has raised the idea of the economic cooperation deal since his inauguration…

  • Hack-Prone Blockchain Bridges Expose DeFi’s Achilles Heel

    If 2018 was the Year of the Hack for centralized crypto exchanges, decentralized blockchain bridges seem destined to win that honor this year. Over $1.9 billion was stolen in cross-chain hacks in the first half of 2022, according to a new blog post by crypto analytic firm Chainalysis. Cross-chain bridges have come under fire in recent weeks…

  • How to Trade on sudoswap, the NFT Market’s Answer to Uniswap

    sudoswap is making NFT trading even easier. Launched in May 2022, sudoswap is crypto’s first NFT automated market maker. The Ethereum-based platform functions similarly to Uniswap, letting users trustlessly trade assets through user-funded liquidity pools. However, instead of trading between two fungible tokens, sudoswap users can trade between NFTs and ETH. At first glance, it might be…

  • In Crypto, Base Layer Security Isn’t Enough

    Earlier this week a new type of stablecoin (aUSD), built on a platform (Acala), which itself was built on a blockchain (Polkadot), fell from its $1 peg to $0.009 (which rounds to zero as far as I’m concerned), following an attack on one of the platform’s liquidity pools. If the words following “attack on” seem…

  • deBridge Finance crypto platform targeted by Lazarus hackers

    Hackers suspected to be from the North Korean Lazarus group tried their luck at stealing cryptocurrency from deBridge Finance, a cross-chain protocol that enables the decentralized transfer of assets between various blockchains. The threat actor used a phishing email to trick company employees into launching malware that collected various information from Windows systems and allowed the…

  • Study: Insider trading occurs in 10% to 25% of cryptocurrency listings

    According to a recent study conducted by the University of Technology Sydney, researchers estimated that insider trading occurs in 10% to 25% of cryptocurrency listings. In deriving the conclusion, researchers first sampled 146 token listing announcements on cryptocurrency exchange Coinbase between September 25, 2018, and May 1, 2022. Afterward, researchers examined the price movements of the…

  • ‘Operation Sugarush’ Mounts Concerning Spy Effort on Shipping, Healthcare Industries

    Researchers at Mandiant have identified a Persian-speaking threat group targeting a range of industries such as healthcare and energy. However, the group appears to have a specific focus on the shipping sector. Mandiant has named the group UNC3890. The threat group uses email social-engineering lures and a watering hole hosted on the login page of…

  • APT Lazarus Targets Engineers with macOS Malware

    North Korean advanced persistent threat actor Lazarus is leveraging the current popularity of the blockchain and cryptocurrency industry to target organizations and individuals running Apple and Intel-based systems. The cyber espionage campaign recently identified consists of Lazarus deploying fake job postings for Coinbase. The job posting contains a malicious Mac executable and was identified by…

  • RubyGems Mandates MFA for Top-100 Package Maintainers

    RubyGems, the official package manager for the Ruby programming language, has announced that it will mandate multi-factor authentication to boost security on the top 100 RubyGems packages. The announcement was released on Monday. Owners of gems with over 180 million downloads will be required to enroll in multi-factor authentication. This protects the package itself from…

  • Deadly blast rips through crowded Kabul mosque

    An explosion ripped through a crowded mosque in the capital of Afghanistan, Kabul, killing 21 people and injuring 33. The blast occurred Wednesday evening during evening prayers. The mosque’s imam AMir Muhammad Kabuli is among the people who were killed by the explosion.  It is unclear who executed the attack. The attack occurred one week…

  • Threat Group Ramps-Up Attacks on Travel Sector in 2022

    Researchers have identified new details regarding a prolific threat group that has deployed 15 malware families over the past four years. The group, TA558, is financially motivated and mainly targets organizations in Latin and North America. The group switches between English, Spanish, and Portuguese when it conducts its attacks, according to Proofpoint. The group typically…

  • US and Taiwan agree to start talks on a trade and investment pact

    According to statements released by Washington and Taipei, the United States and Taiwan have agreed to launch negotiations on a new investment and trade pact. The US-Taiwan Initiative of the 21st Century Trade was unveiled in June after US President Joe Biden excluded Taiwan from the Indo-Pacific Economic Framework.  The negotiations will cover 11 topics…

  • TINA Issues Warning Letters to Celeb NFT Endorsers

    From Eminem to Snoop Dog, Tony Hawk to Lionel Messi, William Shatner to Brie Larson, music, sports, and Hollywood celebrities have eagerly jumped on the NFT (non-fungible token) bandwagon. Whether launching their own collections, purchasing an expensive profile pic, or simply endorsing new artists, celebrities have embraced blockchain technology and have been extolling the virtues…

  • This new Wi-Fi 6e mesh router uses the blockchain to secure your passwords

    While most of the best Wi-Fi 6 routers have built-in security, Gryphon’s new Wi-Fi 6E router is one of just a few that will use Blockchain for this purpose; through a project called MetaSafe, it will protect passwords and other valuable information. Although a single Gryphon 6E can provide a strong Wi-Fi signal to a 3,000…

  • Forrester Report Cautions About Web3 Security

    The next generation web — Web3 — has been hailed as more secure than the current incarnation of cyberspace, but a report released Tuesday warns that may not be so. While Web3 may be difficult to subvert on an infrastructure level, there are other points of attack that may offer threat actors more opportunity for mischief…

  • Losses from crypto hacks surged 60% to $1.9 billion in Jan-July: Chainalysis

    Losses arising from cryptocurrency hacks jumped nearly 60% in the first seven months of the year to $1.9 billion, propelled by a surge in funds stolen from decentralized finance (DeFi) protocols, according to a blog post from blockchain analysis firm Chainalysis released on Tuesday. In the same period last year, stolen funds from hacking amounted…

  • Federal Reserve issues guidance for banks considering crypto activities

    The U.S. Federal Reserve on Tuesday issued additional guidance for banks considering activities involving cryptocurrencies, emphasizing that firms must notify the Fed beforehand and make sure whatever they do is legally permitted. The Fed said in a statement that while cryptocurrencies could present “potential opportunities” to banks, firms needed to make sure they had systems in…

  • U.K. Water Supplier Hit with Clop Ransomware Attack

    A UK water supplier has suffered from a ransomware attack that disrupted corporate IT systems. The attackers misidentified the victim in a post on its website containing leaked stolen data, however, the water supplier confirmed the cyberattack. Thankfully, the organization’s water supply was not impacted. The Clop ransomware group claimed that the attack occurred against…

  • Healthcare Provider Issues Warning After Tracking Pixels Leak Patient Data

    Novant Health, a US healthcare provider, has notified patients that their personal information may have been leaked via a tracking tool that has been linked to Facebook. The company announced the data breach in a blog post published last Friday. The organization also apologized for the concern caused to its patients. It is unclear how…

  • Two Additional Malicious Python Libraries Found on PyPI Repository

    Security researchers at Kaspersky have identified two more malicious Python packages in the Python Package Index repository. This occurred just days after Check Point researchers found 10 malicious Python packages. Kaspersky has released a blog post detailing the additional packages, both of which were masquerading as popular open-source packages. The attacker used a description of…

  • FBI, CISA warn over ransomware gang that can make million dollar demands

    Earlier this week, the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a report detailing the tactics of the ransomware group referred to as Zeppelin. The group has been targeting organizations in the US and Europe, often issuing massive ransomware demands once they have compromised an organization’s network.…

  • Cuba bids for foreign investment to tackle goods shortages

    Cuba will allow foreign investors to invest in its wholesale and retail trade for the first time in 60 years. This move overturns a 1960s Fidel Castro policy  of nationalizing retail. Cuba is facing its most severe economic crisis in decades causing rising prices and increasing public discontent.  The change in foreign investment policy is…

  • North Korea fires two cruise missiles toward sea off its west coast, South Korean officials say

    On Wednesday morning, North Korea fired two cruise missiles off its west coast from the coastal town of Onchon. Military  officials from South Korea and the United States were analyzing the launch for further details.  After the launch, South Korea’s national security adviser held a meeting to assess the security situation and examine the South…

  • Cross-chains in the crosshairs: Hacks call for better defense mechanisms

    2022 has been a lucrative year for hackers preying on the nascent Web3 and decentralized finance (DeFi) spaces, with more than $2 billion worth of cryptocurrency fleeced in several high-profile hacks to date. Cross-chain protocols have been particularly hard hit, with Axie Infinity’s $650 million Ronin Bridge hack accounting for a significant portion of stolen…

  • Crypto Mixing Service Caught Up in Storm of Controversy

    Earlier this year, Roman Semenov, co-founder Tornado Cash, a mixing service for cryptocurrencies, said that it would be “technically impossible” for sanctions to be enforced against decentralized protocols. “All we do is write code and publish it on GitHub,” Semenov told Bloomberg, referring to the internet hosting service. “This is pretty close to the definition of…

  • Monero hard fork makes hackers’ favorite coin even more private

    Monero, the privacy-oriented decentralized cryptocurrency project, underwent a planned hard fork event on Saturday, introducing new features to boost its privacy and security. The network upgrade was delayed from July 13, when it was first planned for release, due to multi-sig security fixes, critical security patches, and more time needed to resolve hardware wallet incompatibility issues. Completed…

  • Crypto scams have declined, but hackers remain resilient in bearish markets

    When it comes to crime, illicit activity is still abundant regardless of crypto volatility, according to a new Chainalysis report. “Cryptocurrency transaction volumes this year for both illicit and legitimate entities are tracking behind 2021 through July,” the report stated. “Overall, criminal activity appears to be more resilient in the face of price declines: Illicit volumes…

  • Three Arrows Capital blew through billions with risky cryptocurrency bets

    The now bankrupt Three Arrows Capital (3AC) presented signs of mismanagement before the cryptocurrency hedge fund’s ultimate collapse. A report from New York Magazine reveals that 3AC co-founders Kyle Davies and Su Zhu faced criticism from banks and other traders before the company even entered the crypto market. In its early days, the Singapore-based 3AC got…

  • Xiaomi Phone Bug Allowed Payment Forgery

    In a report published released last week at the annual DEF CON conference in Las Vegas, Check Point researchers revealed that a flaw in the smartphone maker Xiaomi could lead to mobile transactions being disabled, created, and signed by attackers. Xiaomi is the world’s third largest phone maker. The company has since patched the vulnerability,…

  • Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux Systems

    Threat actor Luckymouse has reportedly used a trojanized version of the cross-platform messaging app MiMi to install backdoors on Windows, macOS, and Linux operating systems. The group is also identified as Emissary Panda, APT27, and Bronze Union. The news was reported by Trend Micro. According to the report, Luckymouse modifies installer files and uses the…

  • Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium

    Microsoft has announced that it disrupted a Russian-state backed threat group that is believed to have run espionage campaigns against several different NATO countries. According to the tech giant, the prolific hacking group that is identified by the name “Seaborgium” focuses most of its attacks on entities located in the US and UK. In addition,…

  • Last French troops leave Mali, ending nine-year deployment

    France has announced that its final troops have left Mali, completing a withdrawal after a nine-year operation in the country. The operation was at the center of the Sahel region’s security crisis. On Monday, the French army said it had completed the logistical challenges of the pullout and it was completed in an orderly and…

  • Russia blames sabotage for new Crimea blasts

    A week after a Ukrainian attack on a Russian military base in Crimea, a series of explosions hit an arms store on another depot. Russian officials first said a fire caused the blasts in the Dzhankoi area, but then blamed sabotage.  A separate fire broke out at a power substation and a railway  was damaged.…

  • Chinese research ship Yuan Wang 5 docks at Sri Lanka’s Hambantota port

    Despite security concerns by India about the vessel’s presence, a Chinese research ship docked at a southern Sri Lankan port. The port workers at Hambantota gave the Tuan Wang 5 an enthusiastic welcome. The ship’s arrival has created tensions between New Delhi and Beijing.  New Delhi and Beijing have both  spent billions of dollars on…