NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Commerce

  • MIL-OSI: No Credit Check Loans: Small Payday & Emergency Loans from Direct Lenders for Bad Credit – ( Guaranteed Approval Loans ) – HonestLoans

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    Are you in search of funds but concerned about your credit history? No credit check loans may be just the thing for you. No credit check loans are specially crafted for those who have bad credit history or do not wish to have their credit score impacted by hard inquiries. In this detailed guide, we will cover all you want to know about no credit check loans and why HonestLoans is the finest option in this field.

    Why HonestLoans Is The Best Option For No Credit Check Loans

    In the case of no credit check loans, Honest Loans beats other options for several reasons. With a huge network of reliable direct lenders, Honest Loans makes sure that borrowers find themselves connected with lenders who have expertise in offering loans without conventional credit checks.

    Honest Loans provides:

    • Easy and quick application process
    • High approval rates for all credit histories
    • Transparent fee structure with no hidden fees
    • Rapid funding, usually within 24 hours or shorter
    • Multiple loan options to cater to different financial situations

    Unlike most other loan-matching services, HonestLoans values customer satisfaction and financial health, earning them the top preference for acquiring a loan with no credit check from a direct lender.

     <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Understand No Credit Check Loans | Loans Without Credit Checks, Guaranteed Approval From Direct Lender

    What Is A No Credit Check Loan?

    A no credit check loan is a product where the lender will not do a standard “hard pull” of your credit history at the time of application. Rather than considering your credit score, lenders consider other items like:

    • Current income level
    • Job stability
    • Bank account status and activity
    • Debt-to-income ratio
    • Alternative data points

    These loans are tailored for borrowers with bad credit records, thin credit histories, or who do not wish to incur further hard inquiries on their credit reports.

    What Kind Of Loans Don’t Need A Credit Check?

    A number of loan types usually don’t need traditional credit checks:

    • Payday Loans: Short-term, high-interest loans based on your pay
    • Title Loans: Secured loans using your car as collateral
    • Pawn Shop Loans: Secured loans tied to the value of things you lend temporarily
    • Some Installment Loans: More long-term loans with fixed installments that emphasize income verification
    • Cash Advances: Short-term loans against future income or available credit card limits
    • Some Personal Loans: Some alternative lenders provide personal loans without credit checks

    Each of these types of loans has its own merits, needs, and cost factors. HonestLoans allows the borrower to know which type is the best for their own particular financial circumstances.

     <<>>

    How Do Loans With No Credit Check Work?

    No credit check loans are different from bank loans:

    • Application: Fill out simple personal and financial details on the internet via sites such as HonestLoans
    • Verification: Your identity, income, and banking details are confirmed by lenders
    • Alternative Assessment: Rather than credit checks, lenders consider such things as income stability and banking history
    • Approval Decision: Be given a lending decision, often in minutes
    • Loan Agreement: Sign off and agree to the loan terms and conditions
    • Funding: Get paid through direct deposit, often within one business day or sooner

    The whole process is intended to be fast and accessible, particularly for people who could be denied such traditional banking services as a result of credit history problems.

    1 Hour Payday Loans Online No Credit Check Instant Approval From HonestLoans

    For emergency financial needs, 1 hour payday loans provide a savior. HonestLoans puts you in touch with lenders that offer instant approval—at times in under an hour.

    Main features of HonestLoans

    HonestLoans is unique in the no credit check loans market with a number of key features:

    • Friendly Platform
    • 256-bit Encryption
    • Free Service
    • Extensive Lender Network
    • Clear Process
    • Educational Content
    • Good Customer Support
    • Fast Results
    • 24/7 application availability
    • Real-time matching with direct lenders
    • Funds paid through ACH or prepaid card
    • No paperwork or faxing
    • Minimal documentation – ID and proof of income

    These elements work together to provide a hassle-free borrowing process that ranks your financial security and needs first.

     <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    How HonestLoans’ Direct Lender Network Ensures No Denial Loans without credit checks

    In contrast to conventional financial institutions, HonestLoans utilizes a direct lender network that focuses on bad credit and no credit profiles. This decreases the possibility of rejection by matching you with a lender who can accommodate your individual financial profile.

    Why Honestloans Provides Guaranteed Approval Payday Loans Without Credit Check For Bad Credit?

    Although no loan is technically “guaranteed,” HonestLoans increases your chances of approval by:

    • Soliciting non-hard credit checks
    • Sourcing alternative income verification
    • Skipping conventional underwriting models
    • Offering alternatives for self-employed and part-time employees

    Advantages Of Using HonestLoans for Emergency Loans For Bad Credit

    In the event of a financial emergency with poor credit, Honest Loans provides several benefits:

    • Easy application process
    • Good approval rating for bad credit customers
    • Rapid funding, in some cases within 1 hour
    • No collateral needed
    • Clear loan terms

    These advantages make Honest Loans an ideal option for anyone in need of emergency funding irrespective of credit issues.

     <<>>

    HonestLoans’ Application and Funding Process – 1 Hour Payday Loans Online No Credit Check Instant Approval

    HonestLoans simplifies the loan process to obtain funds in the shortest time possible:

    • Go to the Honest Loans website
    • Complete the application form (around 3 minutes)
    • Compare lender deals
    • Digitally agree to terms
    • Fund received in as fast as 60 minutes

    This streamlined process allows borrowers in emergency situations to obtain funds when they are most in need, without delay or burdensome paperwork.

    Various Alternatives Provided for for Small Payday Loans Online With No Credit Check By HonestLoans

    HonestLoans provides borrowers with a range of small loan alternatives, including:

    • Traditional Payday Loans
    • Installment Payday Loans
    • Tribal Loans
    • Flex Loans
    • Cash Advances
    • Bad Credit Personal Loans
    • Paycheck Advances
    • $100 – $500 loans
    • Weekly or biweekly payment plans
    • Optional rollover or extended terms

    This diversity of loan offerings allows borrowers to locate the particular loan product which most closely matches their individual financial profile and repayment capabilities.

     <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    Honest Loans’s No Credit Check Options vs. Traditional Loans

    HonestLoans offers a faster, easier option to banks, especially if you have bad credit.

    Let’s compare the important aspects:

    • Credit: Banks always pull credit. HonestLoans does not, so it’s easier to qualify.
    • Speed: Bank loans take days to receive. HonestLoans approves and deposits your loan within the hour.
    • Eligibility: Banks require good credit and a steady job. HonestLoans considers your income, number of active bank accounts, and not credit history.
    • Loan Amounts: Bank loans are large loans with long repayment terms. HonestLoans offers $100-$1000 short-term loans (today).
    • Application: Bank loan applications take forever. HonestLoans is online and takes minutes to complete.

    HonestLoans is the more convenient option if you want quick, easy financing when traditional financing is not available.

    Features And Benefits Of No Credit Check Loans With Guaranteed Approval From Direct Lender

    No credit check guaranteed approval loans provided by direct lenders possess various important features and advantages that benefit many borrowers:

    Important Features:

    • Direct funding source with no intermediaries
    • Streamlined application process
    • Income-focused instead of credit-based
    • Transparency in fee structure
    • Fast funding term
    • Simple repayment terms

    These features and advantages come together to produce a financial product that benefits those who are usually skipped by conventional banking organizations.

     <<< Bad Credit? No Problem – Get Quick, Hassle-Free Loans from HonestLoans Today>>>

    Eligibility Criteria for Loans Without Credit Check For Borrowers With Poor Credit History

    Although no credit check loans are easier to obtain than regular loans, borrowers must still satisfy basic criteria:

    • Regular Income: Regular source of income (job, benefits, etc.)
    • Active Bank Account: Active check account in good standing for receiving loan funds
    • Age Requirement: At least 18 years old (19 in certain states)
    • Identification: Valid government-issued photo ID
    • Contact Information: Current phone number and email address
    • Residency: U.S. citizenship or permanent residency
    • No Outstanding Payday Loans: Previous payday loans need to be paid in full

    Satisfying these conditions also greatly enhances your chances of loan approval even with bad credit history. HonestLoans cooperates with lenders who are more interested in these factors than with conventional credit scores.

    Various Types of Emergency Loans | Instant Payday Loans For Bad Credit No Credit Check

    Personal Loans

    Bad credit personal loans are unsecured loans with the following characteristics:

    • Amounts ranging from $500 to $5,000
    • Payback periods ranging from months to years
    • Fixed rates and consistent payments
    • Funds used for any expense
    • Possible reporting to credit bureaus to establish or rebuild credit

    Credit Card Cash Advances

    Cash advances permit borrowing against available credit card lines:

    • Instant access via ATMs or banks
    • No separate application process
    • Available up to your cash advance limit
    • Higher interest rates than standard purchases
    • Additional cash advance fees typically apply

      <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Payday Loans

    Payday loans are short-term loans due on your next payday:

    • Typically $100 to $1,000
    • Very short terms (2-4 weeks)
    • Higher interest rates
    • Simple qualification requirements
    • Fast funding (same-day or next-day)
    • Based primarily on income verification

    Title Loans

    Title loans use your vehicle as collateral:

    • Loan amount based on vehicle value (25-50%)
    • Must own vehicle outright
    • Continue driving while repaying
    • Higher loan amounts than unsecured options
    • Longer repayment terms possible
    • Risk of vehicle repossession if unable to repay

    Paycheck Advances

    Paycheck advances offer early access to wages earned:

    • Access portion of wages prior to payday
    • Lower fees than regular payday loan
    • Often through employer program or app
    • Repayment automatically taken from paycheck
    • No credit check needed
    • Limited to amount already earned

      <<>>

    Urgent Loans For Bad Credit: How Long Does It Take to Get Approved?

    With bad credit, timing is everything when dealing with a financial emergency. Here’s what the approval timeframe looks like:

    • Application: 5-10 minutes to finish
    • Initial Decision: Typically instant to 15 minutes
    • Documentation Verification: 1-24 hours
    • Final Approval: As fast as 1 hour, usually within 24 hours
    • Funding: Some lenders provide 1-hour funding, others 24 hours

    HonestLoans partners with lenders who value speed, with most providing same-day approval and financing for approved borrowers.

    Payday Loans Online No Credit Check Instant Approval

    No credit check payday loans online with instant approval have transformed emergency lending by not only making the process quicker and more convenient than ever but also allowing us to disburse funds faster.

    Schedule for Quick Loans No Credit Check Disbursement

    Standard fund disbursement schedule:

    • Same Business Day: Applications received prior to 10:30 AM
    • Next Business Day: Applications received after cut-offs
    • Weekend Requests: Typically processed Monday (weekend funding provided by some lenders)
    • Bank Processing: Depends on the bank

    1 Hour Payday Loans Online No Credit Check Instant Approval

    For the quickest funding, the process is as follows:

    • Fill out HonestLoans’ quick application
    • Get instant pre-qualification
    • Send verification documents online
    • Get final approval, usually in minutes
    • Get funds via expedited bank deposit

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    $255 Payday Loans Online Same Day

    These typical small loans provide:

    • Protection for small emergency costs
    • Simpler qualification terms
    • Faster approval process
    • Same-day funding when applied early
    • Less intimidating repayment amounts

    Pros and Cons of No Credit Check Loans

    As with any financial product, no credit check loans have benefits and drawbacks that are worth considering by the borrower.

    Pros:

    • Available to bad credit holders
    • Rapid application and funding
    • Low documentation needed
    • No hard credit checks
    • For use in multiple kinds of emergencies
    • Can prevent late charges or disconnection of services

    Cons:

    • Increased interest and fees
    • Repayment periods are shorter
    • Risk of debt cycle trap
    • May not establish credit if not reported
    • Smaller loan amounts than traditional ones
    • Predatory lenders exist in the industry

    Some predatory lenders target susceptible borrowers (that is why operations like HonestLoans are worth it)

    No Credit Check Loan Scenario in the USA

    The business landscape consists of:

    • Around 12 million Americans utilize payday loans every year
    • More than 23,000 payday lenders have business in the country
    • State laws differ significantly
    • Online lending opened up access beyond locations
    • Average payday loan amount is roughly $375

    HonestLoans operates within this environment by matching borrowers with solid lenders that work within regulations while ensuring fair terms.

      <<>>

    Alternatives to Small Payday Loans Online No Credit Check and Urgent Loans No Credit Check

    Alternatives to mainstream small payday loans:

    • Installment Microloans: Smaller loans with several payments
    • Cash Advance Apps: Mobile apps for wage advances
    • Credit Union Payday Alternative Loans: Less expensive alternatives
    • Small Personal Loans: Mainstream lenders with less restrictive requirements
    • Family and Friend Loans: Private loan sources

    $500 Cash Advance No Credit Check Loans

    The $500 cash advance is in demand because it:

    • Pays for most typical emergencies
    • Provides affordable payment sizes
    • Is easily accessible from many lenders
    • Typically offers same-day loans
    • Usually asks for $1,000-$1,500 monthly income

    Emergency Loans No Credit Check

    Emergency no credit check loans assist when:

    • Medical conditions need to be paid immediately
    • Car repairs are necessary for work commute
    • Repairs for the home are needed for safety
    • Critical utilities threaten disconnection
    • Other immediate needs loom in the financial future

    Some Risk-Free Alternatives to No Credit Check Loans

    Although no credit check loans have a valuable function, customers should think about these likely lower-cost options:

    Secured Loans

    Secured loans employ collateral to limit lender risk:

    • Less than unsecured rates
    • More available amount of money
    • Longer time to repay
    • Access through traditional credit unions and banks
    • Possibility of losing collateral if cannot repay

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Credit Unions

    Credit unions tend to be more flexible in lending:

    • Member-oriented approach
    • Payday Alternative Loans with caps on lower rates
    • More individualized assessment
    • Financial literacy tools
    • Opportunity to develop positive relationships
    • Demand membership (typically with small fees)

    Peer-to-Peer Lending

    P2P websites bring borrowers together with individual investors:

    • Consider non-credit score factors
    • Competitive rates for most borrowers
    • Flexible qualification
    • Transparent fee practices
    • Diverse loan amounts and durations
    • Easier application process

      <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    What Are the Risks of No Credit Check Loans?

    No credit check borrowers must be aware of some possible dangers:

    • Exorbitant prices (interest rates and fees)
    • Short payment periods putting pressure
    • Possible cycles of debt
    • Predatory lenders preying on vulnerable borrowers
    • Differing state laws and consumer protections
    • Limited opportunity to build credit
    • Access to bank account for automatic debit

    Engaging in reputable services such as HonestLoans reduces these risks by linking borrowers with responsible lenders.

    How to Apply for No Denial Payday Loans Direct Lenders Only With No Credit Check?

    The process of application for no denial payday loans by direct lenders is simple:

    1. Gather Required Information:

    • Government ID
    • Proof of income
    • Active checking account info
    • Social Security Number
    • Contact details

    2. Select a Reputable Platform:

    • HonestLoans matches you with reliable direct lenders
    • Free service with no obligation
    • Personal info is secure using encryption

    3. Complete Application:

    • Enter personal and financial information
    • Enter amount of loan desired
    • Enter employment details
    • Enter banking information for funds transfer

    4. Review Offers:

    • Compare offers from various lenders
    • Watch for APR, fees, and terms of repayment
    • Look for hidden fees

    5. Accept Loan Terms:

    • Read the whole loan contract
    • Have questions answered about anything that is unclear
    • E-sign the contract

    6. Receive Funds:

    • Direct deposit into your bank account
    • Funding times from 1 hour to 1 business day

    Why Go For No Credit Check Loans?

    These loans serve important purposes:

    • Perfect for those with damaged credit histories
    • Faster than traditional loans during emergencies
    • Simple online application available 24/7
    • Accessible to those excluded from traditional banking
    • Private way to handle financial challenges
    • Avoid hard inquiries that damage credit scores
    • Bridge financial gaps between paychecks
    • Address urgent situations without delay

    How to Find a Reputable No Credit Check Loan Direct Lender?

    Search for lenders with:

    • Transparent fee terms and clear charges
    • Regulatory compliance
    • Good customer feedback
    • Secure sites (https)
    • Solid history
    • Membership in industry associations
    • Educational materials
    • No charges upfront

    Steer clear of lenders displaying:

    • Guaranteed approval with no conditions
    • High-pressure tactics
    • Sneaky charges or ambiguous charges
    • No address or contact information
    • Requests for unconventional payment options
    • Very high interest charges

    HonestLoans pre-screens their network of direct lenders to guarantee they are held to high standards for good lending practices.

    Where to Find The Best No Denial Payday Loans From Direct Lenders Only With No Credit Check?

    When looking for no denial payday loans from direct lenders with no credit checks, HonestLoans is the best choice for a variety of reasons:

    • Large lender pool boosting chances of approval
    • Vigorous lender screening guaranteeing ethical practices
    • No-charge service with no platform fee
    • Bank-level protection safeguarding your data
    • Easy application process
    • Educational materials to make informed decisions
    • Friendly customer support
    • Clear terms prior to commitment

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Final Words

    No credit check loans offer useful money solutions to persons with credit issues or crises that have to be addressed immediately. Although loans do generally incur more expense compared to conventional lending, they play a necessary role in the financial system by making available funds to persons who would otherwise have no alternative.

    For individuals requiring rapid access to funds without the usual credit checks, HonestLoans provides a trusted, secure portal linking borrowers directly with established direct lenders. Transparency, security, and customer education are their top priorities, and for this reason, they are the best in the no credit check loan market.

    Frequently Asked Questions

    Can I borrow money without a credit check?

    Yes, many online lenders such as HonestLoans offer loans based on your income rather than your credit score.

    Which loan does not require a credit check?

    Payday loans, cash advances, and certain personal installment loans typically don’t involve a credit check.

    How to get instant loan 50000 with low CIBIL score?

    Try to apply with lenders who consider income over credit history or opt for secured loans like HonestLoans.

    What is the easiest loan to get with no credit?

    Cash loans or payday loans are typically the quickest if you have no credit history.

    How can I get a loan in 1 hour?

    Search for lenders online such as HonestLoans that provide fast approvals and can make transfers in an hour.

    Can I get a loan with a 450 credit score in USA?

    Yes, your best option would be no credit check lenders or those who take other factors into consideration such as your income.

    Media Details:

    www.honestloans.net

    • Company: Honest Loans
    • Phone: 888-718-9134
    • Email: support@onlineloannetwork.com

    Attachment

    • HonestLoans

    The MIL Network –

    May 22, 2025
  • MIL-OSI USA: North Dakota Department of Commerce Names Katie Ralston-Howe Deputy Commissioner, Elevating State’s Workforce Development Efforts

    Source: US State of North Dakota

    The North Dakota Department of Commerce today announced the appointment of Katie Ralston-Howe as its new deputy commissioner, effective immediately. She will provide comprehensive leadership and strategic direction for the agency, its divisions, and its vital partners, ensuring alignment with the agency’s core values. Her responsibilities will include marshaling critical agency resources, overseeing financial and program management and serving as the primary liaison for Commerce operations and legislative matters, succeeding interim Deputy Commissioner Al Anderson.

    With five years of dedicated service to Commerce, Ralston-Howe has a proven track record of transformative leadership, most recently as the Director of the Workforce Division. She will continue with those responsibilities, serving as the Chief Workforce Officer for the state and will lead the comprehensive alignment of the state’s workforce ecosystem.

    “Katie’s exceptional leadership and deep understanding of workforce dynamics make her the ideal choice to lead our agency as deputy commissioner,” said Commerce Commissioner Chris Schilken. “Her vision for a cohesive workforce ecosystem and her commitment to fostering strong partnerships will be instrumental in advancing our mission to strengthen the state’s economy and empower its residents.”

    During her tenure, Ralston-Howe has been a driving force behind significant advancements in workforce development. She successfully transformed the Workforce Development Division’s portfolio and, through her leadership of the Workforce Development Council, established a robust system for researching workforce issues and developing data-driven recommendations. These efforts have directly influenced successful workforce policies and secured critical appropriations through the last three legislative cycles.

    Ralston-Howe’s influence extends beyond North Dakota. She currently serves as the vice chair of the National Association of Liaisons for Workforce Development Partnerships, an affiliate of the National Governors Association, demonstrating her commitment to national best practices in workforce solutions.

    A native of Carrington, Ralston-Howe holds a bachelor’s degree in communication from Minnesota State University Moorhead and a master’s degree in communication from North Dakota State University.

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI Africa: Ramaphosa, Trump meeting all set for early evening, SA time

    Source: South Africa News Agency

    President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office. 

    The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.

    The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.

    According to The Presidency of SA,  President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.

    At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.

    President Ramaphosa is expected to depart from the White House at 6:30pm.

    Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.

    The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.

    Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.

    President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.

    In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.

    The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi. 

    They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.

    Meanwhile, President Trump will be flanked by several key officials during his event. 

    These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.

    SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals. 

    President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.  

    A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.

    Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.

    Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.

    Speaking to the media on Tuesday, the President appeared cheerful and optimistic. 

    He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.

    For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za

    MIL OSI Africa –

    May 22, 2025
  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

    May 22, 2025
  • MIL-OSI: Rhizome Secures $6.5M in Seed Funding to Meet Surging Demand for Resilience Planning

    Source: GlobeNewswire (MIL-OSI)

    WASHINGTON, May 21, 2025 (GLOBE NEWSWIRE) — Rhizome, the leading climate resilience planning platform for the power grid, today announced the close of a $6.5 million oversubscribed Seed funding round led by Base10 Partners. The company will use the funding to scale their AI platform and team as they continue to help utilities protect their grid and customers from the impacts of extreme weather events. Rhizome will focus on building out its existing platform, new product research and development, and expanding its geographic footprint domestically and internationally.

    Rhizome, launched in 2023, supports utilities by helping them model the impacts of increasingly severe extreme weather events against their systems. By leveraging AI against climate risk data and digital representations of the physical grid, Rhizome’s platform identifies vulnerabilities and prioritizes resilience investments and upgrades. This fundraise will further fuel Rhizome’s mission to integrate climate intelligence into utility planning workflows at a time when grid resilience has never been more crucial.

    Extreme weather events are rapidly increasing in frequency, intensity, and cost. In 2024 alone, the U.S. faced 27 billion-dollar climate and weather disasters, totaling over $182 billion in damages. For electric utilities, the stakes are particularly high. A McKinsey analysis found that major storms have cost individual utilities an average of $1.4 billion over a 20-year period, underscoring the urgent need for smarter, more resilient infrastructure planning in the face of growing climate volatility.

    At the same time, electric utility capital expenditures hit a record $179 billion, with projections rising to $194 billion in 2025. In an environment where every dollar counts, utilities need advanced planning tools that can simulate a range of climate scenarios — removing the guesswork from resilience planning and helping every dollar go further.

    “We set out to partner with investors who deeply understand the power sector and share our commitment to solving pressing climate resilience challenges,” said Mishal Thadani, Co-founder and CEO of Rhizome. “This funding allows us to scale our work and continue refining a suite of products that help utilities prepare the grid for an increasingly uncertain future.”

    Base10 is joined in the Seed round by first-time Rhizome investors in MCJ and CLAI. They join Convective Capital, El Cap, Streetlife Ventures, Stepchange, and Everywhere in closing out the oversubscribed round, all of whom also participated in prior Rhizome fundraises.

    “Resilience is unquestionably one of the most important factors in ensuring a safe, reliable power grid,” said Rexhi Dollaku, General Partner at Base10 Partners. “Mish, Rahul, and the team bring the right mix of vision, urgency, and technical depth to solve this challenge, and we’re proud to support them.”

    In just under two years, Rhizome has developed and commercialized a suite of mission-specific products used by electric utilities in diverse geographical regions. Its flagship product, gridADAPT, supports long-term infrastructure planning by helping utilities prioritize investments that improve reliability and resilience. This was followed by the launch of gridFIRM, a first-of-its-kind platform for wildfire risk mitigation, and most recently, gridCAVA –– an affordable climate vulnerability assessment tool designed specifically for municipal and cooperative utilities. Built on Rhizome’s scalable, cloud-based Aspen platform, these tools round out a powerful portfolio of climate resilience planning tools designed to model current and future climate risk against utility infrastructure, available to utilities across Rhizome’s expanding geographical footprint.

    Rhizome is actively engaged in utility partnerships across the U.S. and Canada, supporting organizations facing a range of region-specific climate risks. Current customers include Avangrid, Seattle City Light, Vermont Electric Power Company (VELCO), Vermont Electric Cooperative (VEC). Rhizome also has a range of strategic collaborations that include EPRI’s Climate READi, KPMG, Black and Veatch, and the University of Connecticut.

    Rhizome is expanding its platform, growing its team, and partnering with more utilities to strengthen resilience in the face of climate-driven threats. Contact Rhizome or visit here to learn more about the company’s expanding portfolio of climate risk solutions.

    About Rhizome
    Rhizome is an AI-powered software platform that helps utilities identify vulnerabilities from climate threats, quantify risk at high resolutions, and measure the economic and social benefits of grid-enhancing investments. Rhizome provides the highest standard of equitable climate risk mitigation to ensure that communities and businesses are protected against intensifying extreme weather events.

    About Base10 Partners
    Founded by Adeyemi Ajao and TJ Nahigian, Base10 is a San Francisco-based venture capital fund investing in founders who believe purpose is key to profits and companies that are automating sectors of the Real Economy, including transportation, retail, logistics, and construction. Through its program, The Advancement Initiative, Base10 aims to donate 50% of profits to underfunded colleges and universities to support financial aid and other key initiatives. Portfolio companies include Notion, Figma, Nubank, Stripe, Motive, Chili Piper, and Popmenu. Connect via base10.vc.

    Media Contact
    FischTank PR
    rhizome@fischtankpr.com

    Additional Inquiries ** or ** Business Development Inquiries
    Dea Pratt, Head of Marketing
    dea@rhizomedata.com

    The MIL Network –

    May 22, 2025
  • MIL-OSI: No KYC, 100x Leverage, Big Bonuses, Simple Interface — Why Beginners Love BexBack

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, May 21, 2025 (GLOBE NEWSWIRE) — Bitcoin has officially shattered the long-anticipated $100,000 barrier, marking a historic milestone for the crypto market. As shown in the latest TradingView chart, BTC continues to push higher, riding the upper edge of the Bollinger Bands with no signs of slowing down.

    While the bull run creates exciting opportunities, traders are now facing a critical question: Which platform is best positioned to help them capitalize on this volatility?

    Introducing BexBack — A Streamlined Futures Trading Platform Built for This Moment

    In a sea of exchanges that are often overloaded, overcomplicated, or overregulated, BexBack stands out with its fast, frictionless, and fully non-KYC approach to crypto derivatives trading.

    Whether you’re a seasoned leverage trader or just getting started, BexBack delivers a powerful yet simple experience, offering:

    • No KYC Required — Trade anonymously with just an email
    • 100% Deposit Bonus + $100 Trading Bonus — Double your capital and get a head start
    • Up to 100x Leverage — Maximize your position in times of volatility
    • Free Demo Account — Practice with 10 BTC and 1,000,000 USDT risk-free
    • 50+ Perpetual Contracts — Including BTC, ETH, XRP, ADA, SOL and more
    • Zero Spread, No Slippage — What you see is what you get

    Security and Speed in One Package

    BexBack isn’t just fast — it’s secure. With cold wallet fund storage, multi-signature withdrawal approvals, and real-time risk monitoring, the platform ensures your assets and trades are well protected.

    Global Access, Real Freedom

    BexBack proudly serves a global user base. With no mandatory KYC, even traders from regions with limited access to traditional exchanges can participate freely and instantly.

    About BexBack?

    BexBack is a leading cryptocurrency derivatives platform offering up to 100x leverage on futures contracts for BTC, ETH, ADA, SOL, XRP, and over 50 other digital assets. Headquartered in Singapore, the platform also operates offices in Hong Kong, Japan, the United States, the United Kingdom, and Argentina. Like many top-tier exchanges, BexBack holds a U.S. MSB (Money Services Business) license and is trusted by more than 500,000 traders worldwide. The platform accepts users from the United States, Canada, and Europe, with zero deposit fees and 24/7 multilingual customer support, delivering a secure, efficient, and user-friendly trading experience.

    As Bitcoin Enters Price Discovery, Don’t Get Left Behind

    Markets like this don’t come around often. Whether you’re aiming to ride short-term price swings or position for long-term growth, BexBack provides the tools, leverage, and freedom you need to trade your way.

    Create your account, claim your bonuses, and trade with confidence — all on BexBack.

    Website: www.bexback.com

    Contact: business@bexback.com

    Contact:
    Amanda
    business@bexback.com

    Disclaimer: This content is provided by BexBack The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.
    Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at

    https://www.globenewswire.com/NewsRoom/AttachmentNg/b8f30a8d-29e8-4fb0-80dd-03331565d74c

    https://www.globenewswire.com/NewsRoom/AttachmentNg/6ee01a23-4395-4b2a-abc6-6b0bf1e42222

    https://www.globenewswire.com/NewsRoom/AttachmentNg/7050b1ab-3ad2-439a-8061-df433b50576b

    https://www.globenewswire.com/NewsRoom/AttachmentNg/d5f5e1fb-7fa6-4b9d-9ef5-46780f2a0f40

    https://www.globenewswire.com/NewsRoom/AttachmentNg/9e8b7e7d-1a2a-429a-831b-69b996334ec4

    The MIL Network –

    May 22, 2025
  • MIL-OSI Economics: APAC deal activity down by 2.6% YoY during January-April 2025, finds GlobalData

    Source: GlobalData

    APAC deal activity down by 2.6% YoY during January-April 2025, finds GlobalData

    Posted in Business Fundamentals

    The overall deal activity (comprising mergers & acquisitions (M&A), private equity, and venture financing deals) in the Asia-Pacific (APAC) region has experienced a slight contraction in early 2025. Primarily driven by a downturn in venture financing activities, the total number of deals announced in the APAC region fell by 2.6% during January-April 2025 compared to the same period in the previous year, according to GlobalData, a leading data and analytics company.

    An analysis of GlobalData’s Deals Database revealed that the total number of venture capital (VC) deals announced in the APAC region registered a year-on-year (YoY) decline of 8.2% in the first four months of 2025.

    Conversely, M&A and private equity transactions have remained stable. The number of M&A deals in the region increased by 2.4% during January-April 2025 compared to January-April 2024, whereas private equity deals volume was also up by around 2% YoY during the same period.

    Aurojyoti Bose, Lead Analyst at GlobalData, comments: “The APAC deal landscape is showcasing a mixed trend characterized by a blend of resilience in M&A and private equity, juxtaposed with a fall in VC funding activity. This mixed trend reflects the intricate economic dynamics at play across the region, with varying performances across key markets.”

    The performance of key markets within the APAC region reveals significant disparities. China, the top APAC market in deal-making, has experienced a decline in deal volume of more than 15% during January-April 2025 compared to the first four months of 2024. In contrast, India and Japan have seen an uptick in deal activity, with a YoY growth rate of around 13% and 25%, respectively. Meanwhile, other key APAC markets, including Australia, South Korea and Singapore, also showcased signs of contraction in deal activity.

    Note: Historic data may change in case some deals get added to previous months because of a delay in disclosure of information in the public domain

    MIL OSI Economics –

    May 22, 2025
  • MIL-OSI Economics: MPTS 2025 celebrates largest edition ever with record visitor numbers, reveals MBI, a GlobalData company

    Source: GlobalData

    The UK’s most powerful hub for the creative industries united for two days of engaged networking, passionate debate and exceptional insights into AI, the creator economy, production craft and more – helping attendees stay ahead-of-the-curve for the year ahead.

    London, United Kingdom, 21 May 2025 – After two exceptional days of conversation, collaboration and community, the biggest and buzziest MPTS yet welcomed a record 13,000 attendees from 50 countries, uniting the UK’s media and entertainment industry together in the heart of London, like never before. The exhibition is organized by Media Business Insight (MBI) Ltd, a GlobalData company.

    Hosted at London’s Olympia on 14-15 May, the red-hot editorially driven program delivered 100+ free-to-attend sessions across eight theatres, showcasing the insight and passion of more than 350 expert speakers and guest keynotes. The bustling show floor was packed with more than 300 exhibitors and sponsors, showcasing imagination, determination and standout talent of the UK’s creative and technical communities – at a time of both global challenge and immense opportunity.

    Setting the agenda for MPTS, a State of the Nation Production keynote outlined a media and entertainment landscape in which storytellers had to embrace screens, formats and creators of all kinds.

    Kate Beal, CEO, Woodcut Media, asserted: “TV doesn’t exist anymore in the way we knew it.”

    Derren Lawford, CEO, Dare Pictures, said: “We are in the middle of a decade of profound transition, and we are past the tipping point. TV is part of a wider, connected series of industries around the creation and distribution and funding of content.”

    Headliners at MPTS include:

    • Producer and presenter Ross Kemp, who took us on an exhilarating tour of investigative documentaries on the front lines of conflict, drug cartels and organised crime gangs. “They will know in a second if you are not telling the truth,” he said. “I specialize in telling the truth, it is as simple as that.”
    • Georgie Holt, whose company Flight Story produces the world’s second biggest podcast ‘Diary of a CEO’, declared: “We are in the era of the Founder Creator — creators who are now in charge of media content and able to monetise spectacularly outside of traditional gatekeepers.”
    • NFL professional turned American Football broadcaster Jason Bell explained how sports coverage was evolving into the F1 Drive To Survive model, in which athlete personalities and back stories were the keys to growing audiences.
    • Blockbuster editor Eddie Hamilton gave a masterclass about the precision involved in making Top Gun: Maverick and five Mission: Impossible movies with Tom Cruise. He said: “Every nuance is refined hundreds of times. Sometimes we watch a 10-minute scene 40 times in a day, checking to see where your eye is moving in the frame.”

    Diverse representation is a vital sign of the industry’s health and MPTS is proud to set the benchmark to secure equal representation and attendance from the next generation, not only across the program, but also something clearly witnessed across the show floor amongst exhibitors and attendees.

    MPTS also prioritizes the crucial importance of sustainability and, in continuing association with BAFTA albert brought this conversation to the fore with experts including Peter Okell, Sky Studios Elstree; Luke Seraphin, Sky Studios and Claire O’Neill, A Greener Future speaking in the Sustainability Series.

    Sam Street, Marketing Officer, BAFTA Albert commented: “MPTS is a really key moment in our calendar. It is always so great to connect with suppliers, companies, studios and creatives who share our common passion for sustainability within screen industries. It has also been really valuable to curate our sustainability series of panels across this year’s show, we’ve had some really insightful discussions and emphasised the importance of environmental focus throughout the screen industries.”

    We did not need a machine to predict the high demand for news and information about AI. The brand-new ticketed AI Training program and the expanded AI Media Zone drew exceptional attendance, with exhibitors such as Dot Group, Moments Lab and Software. Conversations in these packed-out sessions revolved around the impact of AI from ideation to VFX, featuring real-world insights and discussions on bridging the gap between theory and practice from speakers including Pete Archer, BBC; Jon Roberts, ITN and Damien Viel, Banijay Entertainment.

    With a record number of exhibitors already rebooking for 2026, MPTS continues to prove its value as the UK’s number one event for media and production professionals, where brands, creatives and decision-makers come together to connect, collaborate and grow.

    Jane Shepard, Senior Channel Marketing Manager, Sandisk, said: “MPTS 2025 was a spectacular showcase of innovation, bringing together the brightest minds and cutting-edge technology in the industry. An unforgettable experience for all attendees.”

    Tom Rundle, Application Engineer, Yamaha Music, said: “It has been very busy for us. We have seen a huge mix of customers from the broadcast sector here, but also customers from the other industries which we serve, whether that’s live or theatre who have deliberately come to the show to seek us out to speak to us. Will we be back next year? Yes, absolutely, this is the first year for us, so it was always a bit of a toe in the water, but it’s been vastly more successful than we thought it was going to be.”

    Peter Alderson, Business Manager, Nikon, said: “This is our second year at MPTS, we’ve gone a little bit bigger on our stands, almost doubling it, and I think it’s definitely been worthwhile doing. We’ve partnered with RED, who we recently purchased, and MRMC so it’s making a lovely statement about where we are in the market, and I think we’re in the right place to make that statement here at MPTS.”

    Jennifer Hudson, Marketing Executive, Videndum, said: “This show is really important in our calendar – we attend nearly every year and find so much value in it. We get to meet with so many different professionals within the industry, and this year has been really, really positive for us. We’ve walked away with quite a few leads and made new relationships. It’s a fantastic show, and we would thoroughly recommend anyone thinking about coming and having a stand here to definitely do it – you won’t regret it.”

    Will Pitt, Head of Sales Solutions, Techex, said: “My impression of the show is that it’s been incredibly busy and very positive. Techex particularly specialise in solving some of the headaches that a lot of the broadcast industry is grappling with at the moment, namely, how they transition into an IP-led architecture from a legacy architecture and what that journey looks like. As such, our standards have been packed pretty much throughout the show to come and look at products, but also to come and talk about ideas and lean into what that journey looks like specifically for them. So not a generic journey, but specific to their drivers and their wants and needs in the short and medium term. We particularly like MPTS because it’s London based and many of the engineers that we speak to and collaborate with are based here and therefore it’s an easy journey for them to take half a day, a day out to come and investigate what we have to offer, but also to have those conversations. And so for organisations like WBD or Sky, the BBC, ITV, etc. They can come here quite easily and engage with us, spend some time talking in real life and not over teams or Zoom.”

    Charlotte Wheeler, Event Director, MPTS said: “Without doubt, 2025 was the most stimulating, ahead-of-the-curve MPTS yet. At a time when we are seeing the industry under real pressure from budget cuts to talent shortages and perpetual change, the conversations and connections on the show floor were positive and demonstrated infectious community spirit. The level of attendance and the quality of attendees from across all sectors of the industry was incredible – not just stakeholders in technology but representatives from production and commissioning, the creator economy, those new to the industry and freelancers were all brought together by MPTS under one roof.

    “A huge amount of work goes into making sure that there is equal representation across our extensive conference programme. I am proud that MPTS is one of – if not the – most diverse shows both in terms of attendees and panellists.

    “Thank you to everyone for exhibiting, sponsoring, speaking, attending and engaging with the show to make MPTS such a thrilling success. We are already planning for 2026, which marks MPTS’ 10th edition, so look forward to a landmark celebration!”

    Save the date for MPTS 2026 when we return to Olympia Grand Hall, London on 13 – 14 May 2026.

    The conversation does not stop when the doors close. MPTS is more than just two days a year – it is a connected, year-round community for the broadcast and media industry. From on-demand content to exclusive events, there’s still so much to explore. Stay connected with us: https://www.mediaproductionshow.com/register-interest

    To enquire about exhibiting at our landmark 10th edition, please go to: https://www.mediaproductionshow.com/stand-enquiry

    MBI is the publisher of market-leading titles including Broadcast, Broadcast Sport, Broadcast Tech, KFTV, The Knowledge and Screen International.

     

    MIL OSI Economics –

    May 22, 2025
  • MIL-OSI Economics: US VC funding more than doubles to $89 billion YoY during January-April 2025, finds GlobalData

    Source: GlobalData

    US VC funding more than doubles to $89 billion YoY during January-April 2025, finds GlobalData

    Posted in Business Fundamentals

    The venture capital (VC) landscape in the US has demonstrated remarkable resilience and growth in funding value in early 2025, despite a slight decline in deal volume. Between January and April 2025, the US recorded a modest decrease of around 4% in VC deal volume compared to the same period in 2024. Despite the fall in volume, the total funding value of these deals more than doubled to reach $89 billion during January-April 2025, according to GlobalData, a leading data and analytics company.

    An analysis of GlobalData’s Deals Database revealed that the total VC funding value in the US was up by a massive year-on-year (YoY) growth of 151% during January-April 2025.

    Aurojyoti Bose, Lead Analyst at GlobalData, comments: “Despite the dip in deal volume, the surge in deal value indicates a strong appetite for larger investments in the US market. And this trend is likely to continue as investors seek to capitalize on high-potential startups.”

    The US continues to account for a significant share of global VC funding, maintaining its position as the top market in terms of both deal volume and value. However, the dominance in terms of value has now become even more pronounced with the massive surge in funding value.

    The US accounted for around 30% of the total number of VC deals announced globally during January-April 2025, while its share of the corresponding value stood much higher at around 70% compared to around 45% during January-April 2024.

    In contrast, other major markets such as China and the UK experienced double-digit declines in deal volume. Moreover, China saw its VC funding value also register a staggering drop of around 50% YoY during January-April 2025. This trend highlights the US’ unique position as a resilient market, attracting big investments even as some other key markets face challenges.

    The US continues to attract big-ticket investments, particularly in the technology sector. Start-ups focusing on technology-driven solutions, particularly in areas such as artificial intelligence (AI), are gaining significant investor traction.

    Some of the notable VC funding deals announced in the US during the first four months of 2025 include $40 billion secured by OpenAI, $3.5 billion raised by Anthropic, and $3 billion raised by Infinite Reality, among others.

    Note: Historic data may change in case some deals get added to previous months because of a delay in disclosure of information in the public domain

    MIL OSI Economics –

    May 22, 2025
  • MIL-OSI Global: Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star

    Source: The Conversation – Global Perspectives – By Gwen Ansell, Associate of the Gordon Institute for Business Science, University of Pretoria

    We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.

    He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.

    As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.

    Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.

    This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.

    The economist who loved jazz

    Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.

    In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.

    Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.

    Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.




    Read more:
    Zakes Mda on his latest novel, set in Lesotho’s musical gang wars


    The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.

    Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.

    Morojele on drums for Andile Yenana.

    Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.

    His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:

    The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.

    Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.

    Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.

    The accidental writer

    He said in an interview:

    I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.

    In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.

    Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.

    There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”

    In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.

    The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.

    The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.

    For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.

    He was working on his third fiction outing – a collection of short stories – at the time of his death.

    The beauty of his work lives on

    Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.

    Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).

    Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star – https://theconversation.com/morabo-morojele-lesothos-swinging-jazz-drummer-who-became-a-literary-star-257256

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI Global: Trump treats laws as obstacles, not limits − and the only real check on his rule-breaking can come from political pressure

    Source: The Conversation – USA – By Andrew Reeves, Professor of Political Science and Director of the Weidenbaum Center, Washington University in St. Louis

    At his inauguration on Jan. 20, 2025, Donald Trump swore to ‘preserve, protect and defend the Constitution of the United States.’ Morry Gash/POOL/AFP, Getty Images

    Lately, the headlines have been clear: President Donald Trump is headed for a showdown with the courts. If he ignores their rulings, the courts have few tools and limited power to make him comply.

    But the real contest is not legal. It is political.

    As a political scientist who studies presidential behavior and public responses to unilateral action, I have spent my career examining the boundaries of executive power.

    Those limits, aimed at constraining the president, are set in law.

    The Constitution outlines the powers of Congress and the president in articles 1 and 2. It formally gives Congress the power of the purse and requires the president to “take Care that the Laws be faithfully executed.”

    Statutes dictate how agencies operate, how appointments are made and how funds must be spent. Courts interpret and enforce these rules.

    These legal constraints reflect the founders’ concern with unchecked executive power. That concern is embedded in the country’s political origins – the Declaration of Independence was a direct rebuke to royal overreach.

    But law alone has never been enough to prevent presidents from abusing their power. The law’s force depends on political will. Presidents often follow the law not simply because they must, but to avoid backlash from Congress, the media or the public.

    What the United States is witnessing in 2025 is not just a president testing the system. It is a transformation of the presidency into a fully political institution. The president acts until political resistance becomes strong enough to stop him.

    President Donald Trump criticizes judges whose decisions he doesn’t like.

    Testing the limits

    These political constraints are informal and fluid.

    They arise from public opinion, media scrutiny, pressure from party leaders and other elected officials, and the threat of electoral consequences. While legal rules rely on institutions, political limits depend on reputation, norms and the willingness of others to resist.

    Trump’s presidency operates within this second framework. Legal boundaries are still present, but they are often treated by his administration as optional and without deference.

    Trump, for example, has sidelined the Office of Legal Counsel, the executive branch’s source of legal guidance. His focus appears to be not on legality, process or constraint, but on headlines, polling and control of the narrative.

    Courts still issue rulings, but their power depends on a broader political culture of compliance, and that culture is weakening.

    Trump is not the first president to test the limits of authority. But the pace and scale of his defiance are without precedent. He appears to be betting that pushing boundaries will continue to pay off.

    Lag between law and action

    The legal challenges facing Trump are real.

    In his first 100 days back in office, he took aggressive steps on federal spending, appointments to key executive branch positions, tariffs and deportations. Trump has announced he will not enforce legislation that the Supreme Court confirmed was constitutional. Many of these actions have already triggered legal challenges.

    These are not isolated incidents. Taken together, they reveal a broader pattern.

    Trump appears to treat legal rules not as limits but as obstacles to be negotiated or ignored. One recent scholarly paper has described Trump’s approach as “legalistic noncompliance,” where the administration uses the language of law to give the appearance of compliance while defying the substance of court orders.

    The executive branch can move quickly. Courts cannot. This structural mismatch gives Trump a significant advantage. By the time a ruling is issued, the political context may have changed or public attention may have moved on.

    Judges have begun to notice. In recent weeks, courts have flagged not only legal violations but also clear signs of intentional defiance.

    Still, enforcement is slow, and Trump continues to behave as though court rulings are little more than political talking points.

    Politics the only real check

    Trump is not guided by precedent or legal tradition. If there is a limit on presidential power, it is political. And even that constraint is fragile.

    In a February 2025 national survey by the Weidenbaum Center, a research institute that I head at Washington University, just 21% of Americans said the president should be able to enact major policy without Congress. The public does not support unchecked presidential power: A further 25% of respondents, including more than one-third of Republicans, neither agreed nor disagreed that a president should have this type of unchecked power. Of those with an opinion, a solid 72% of Americans oppose unilateral presidential action, including 90% of Democrats, 76% of independents and 42% of Republicans.

    These findings align with nine earlier national surveys conducted during the Obama and Trump administrations. Jon Rogowski and I report these results in our book, “No Blank Check.”

    But one important shift stands out in the recent survey. Support for unilateral executive action among the two-thirds of Republicans who expressed an opinion has reached an all-time high, with 58% of them endorsing presidential action without Congress. That is more than 16 points higher than in any previous wave.

    Despite that rise in partisan support, Trump’s broader political position remains weak.

    His approval ratings remain underwater. His policies on tariffs and federal spending cuts are unpopular. Consumer confidence is falling.

    Congressional Republicans continue to offer public support, but many are watching their own polling numbers closely as the midterms approach.

    If the economy falters and public opinion turns more sharply against the president, political resistance could grow. I believe that’s when legal rules may begin to matter again – not because they carry new force, but because violating them would carry higher political costs.

    Real test still ahead

    So far, no judge has held the Trump administration in contempt of court. But the signs of erosion are unmistakable. Trump recently accused the Supreme Court of “not allowing me to do what I was elected to do” after it temporarily blocked his administration’s effort to deport migrants with alleged ties to Venezuelan gangs. Treating the judiciary as just another political adversary and ignoring its rulings risks an even deeper constitutional crisis.

    The most meaningful check on presidential power will be political.

    Courts rely on the broader political system for enforcement. That support can take many forms: elected officials speaking out in defense of the rule of law; Congress using its oversight and funding powers to uphold court rulings; bureaucrats refusing to implement unlawful directives; and a press and public that demand compliance. Without that support, even the clearest legal decisions may be ignored.

    The legal fights unfolding today are serious and must be watched closely. But Trump is not focused on the courts. He is focused on politics – on how far he can go, and whether anyone will make him stop.

    Andrew Reeves is affiliated with Washington University in St. Louis and the Hoover Institution.

    – ref. Trump treats laws as obstacles, not limits − and the only real check on his rule-breaking can come from political pressure – https://theconversation.com/trump-treats-laws-as-obstacles-not-limits-and-the-only-real-check-on-his-rule-breaking-can-come-from-political-pressure-255834

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI USA: FDA takes steps to enhance state importation programs to help lower prescription drug prices

    Source: US Department of Health and Human Services – 3

    For Immediate Release:
    May 21, 2025

    The U.S. Food and Drug Administration is continuing to take steps to help state importation programs provide safe, effective and more affordable drugs for American patients, as part of its efforts to implement Executive Order Lowering Drug Prices by Once Again Putting Americans First. Today, the agency is announcing enhancements to the pathway under section 804 of the Federal Food, Drug and Cosmetic Act that allows states and Indian tribes to import certain prescription drugs from Canada to significantly reduce the cost of these drugs to the American consumer, without imposing additional risk to public health and safety.
    “For too long, Americans have been getting taken advantage of. Drug prices in the U.S. are sometimes 5-10 times higher than in wealthy European countries. “ said FDA Commissioner Marty Makary, M.D., M.P.H. “Today’s actions will support the ability to import drugs at much  lower prices  while also maintaining the high quality and safety of medicines that Americans expect and deserve.”
    The agency will offer individual states and tribes the opportunity to submit a draft proposal for pre-review and meet with the agency to obtain initial feedback from FDA prior to formally submitting their section 804 importation program (SIP) proposal. Meetings between individual states and the FDA will be optional and informal with the goal of reducing the burden on the state or tribe and helping it develop a robust SIP proposal. The agency also will develop a user-friendly tool that will assist states in developing their proposals. These actions will further clarify requirements and enhance the quality of proposals submitted to the agency, shortening the review timeline.  
    Additionally, the agency is working to assist states with options to streamline the required cost savings analysis, and to provide input regarding the information states may rely on as they estimate cost savings for American consumers.
    This fall, the agency anticipates meeting with states that have expressed interest in the program to discuss these enhancements and gather feedback. This meeting will provide a forum to exchange information that will make it easier for states to obtain authorization while protecting public safety.
    Related Information

    Related Information

    Consumer:888-INFO-FDA

    ###

    Boilerplate

    The FDA, an agency within the U.S. Department of Health and Human Services, protects the public health by assuring the safety, effectiveness and security of human and veterinary drugs, vaccines and other biological products for human use and medical devices. The agency also is responsible for the safety and security of our nation’s food supply, cosmetics, dietary supplements, products that give off electronic radiation and for regulating tobacco products.

    Content current as of:
    05/21/2025

    Regulated Product(s)

    Follow FDA

    MIL OSI USA News –

    May 22, 2025
  • MIL-OSI: COMMERCE SPLIT Monthly Payments Declared for Capital Share and Preferred Shares

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, May 21, 2025 (GLOBE NEWSWIRE) — New Commerce Split (The “Company”) declares a monthly distribution of $0.05000 per share for Capital shareholders (YCM), and its regular monthly distribution of $0.02500 per share ($0.30 annually) for Class I Preferred shareholders (YCM.PR.A), and $0.03125 per share ($0.375 annually) for Class II Preferred shareholders (YCM.PR.B). The Class I Preferreds are paid at an annual rate of 6.00% based on their $5 repayment amount. Class II Preferreds are paid at an annual rate of 7.50% based on their $5 repayment amount. Distributions are payable June 10, 2025 to shareholders on record as at May 30, 2025.

    The Company invests in common shares of Canadian Imperial Bank of Commerce, a Canadian financial institution.

       
    Distribution Details  
       
    Capital Share (YCM) $0.05000
    Class I Preferred Share (YCM.PR.A) $0.02500
    Class II Preferred Share (YCM.PR.B) $0.03125
    Record Date: May 30, 2025
    Payable Date: June 10, 2025
           
    Investor Relations: 1-877-478-2372 Local: 416-304-4443 www.commercesplit.com info@quadravest.com

    The MIL Network –

    May 22, 2025
  • MIL-OSI: Graphitic Energy and Technip Energies Form Collaboration to Scale Clean Hydrogen Technology

    Source: GlobeNewswire (MIL-OSI)

    SAN ANTONIO, May 21, 2025 (GLOBE NEWSWIRE) — Graphitic Energy (“Graphitic”), formerly known as C-Zero, has entered into a strategic collaboration with the Claremont office of Technip Energies USA to jointly develop and deploy Graphitic’s innovative methane pyrolysis technology. This innovative process utilizes natural gas to produce clean hydrogen and graphite, a crystalline form of carbon used in batteries, lubricants, refractories, and high-temperature industrial processes. The agreement between Technip Energies and Graphitic includes funding dedicated to testing campaigns to support technology advancement. Later this year, the two companies also plan to enter into a licensing collaboration agreement to accelerate the deployment of Graphitic’s technology around the world.

    Graphitic Energy’s groundbreaking methane pyrolysis technology enables the production of clean hydrogen and solid carbon with no direct CO2 emissions. The process is low-electricity-intensive and can be scaled to produce 100,000 metric tons of hydrogen per year in a single process train. The collaboration will leverage Technip Energies’ leading positions in hydrogen generation and fluidized bed technology.

    “Technip Energies is excited to enter into this cooperation with Graphitic Energy and bring forward our recognized hydrogen production experience and fluidized bed expertise to standardize plants globally for the production of hydrogen and synthetic graphite with minimal direct CO2 emissions. The standardized designs will allow for lower pre-investment costs, accelerated implementation time, high predictability on project economics, and reduced overall capital costs. This cooperation underscores Technip Energies’ commitment to delivering sustainable, innovative, cost-effective low-carbon solutions, strengthening our technology portfolio,” said Mario Tommaselli, Senior Vice President Gas & Low Carbon Energies at Technip Energies.

    Unlike other low-carbon hydrogen production paths, Graphitic’s process economics do not require government subsidies to be cost-competitive, and the company can profitably deliver both hydrogen and graphite at current market prices. In addition, the company’s technology can be sited anywhere natural gas or LNG are available, without the need to source renewable electricity or perform geological CO2 sequestration.

    “Graphitic’s technology enables the production of two critical products from natural gas.  We’ve taken it from an idea, through the lab scale, and into a large pilot generating tonnes of graphitic material.  Collaborating with Technip Energies will enable us to get to market faster and provide interested parties with high-quality engineering packages,” said Graphitic’s Co-Founder and CEO Zach Jones.

    In March 2025, Graphitic commissioned its pilot plant in San Antonio, TX. This state-of-the-art facility is capable of producing several hundred kilograms of hydrogen and up to 1,000 kg of solid carbon per day, with continuous 24/7 operations. It is expected to operate through the end of 2025. The company’s pilot is supported by a recent $15 million extension of its series A funding, bringing its total investment to over $65 million.

    About Technip Energies

    Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality.

    Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last.

    Technip Energies generated revenues of €6.9 billion in 2024 and is listed on Euronext Paris. The Company also has American Depositary Receipts trading over the counter.

    For further information: www.ten.com

    About Graphitic Energy

    Headquartered in Santa Barbara, CA with plant operations in San Antonio, TX, Graphitic Energy has developed a novel methane pyrolysis process for sustainably using natural gas to produce hydrogen and graphite. This delivers low-cost, clean hydrogen alongside high-value, graphitic carbon. Unlike current hydrogen generation technologies, Graphitic’s process converts abundant natural gas into hydrogen and solid carbon with virtually no direct CO2 emissions. The company has raised over $65 million from investors including Breakthrough Energy Ventures, Energy Capital Ventures, Trafigura, SK Gas, Eni, Mitsubishi Heavy Industries, ENGIE, and AP Ventures.

    For more information, visit www.graphitic.com

    Contact Information:
    Sydney Bartone, Business Development Manager
    Sydney.bartone@graphitic.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/92634266-17b9-442c-a832-6dc1f35868e6

    The MIL Network –

    May 22, 2025
  • MIL-OSI: Clear Street Launches Outsourced Trading with Senior Hire from UBS

    Source: GlobeNewswire (MIL-OSI)

    New offering enables clients to optimize their trading function, leveraging Clear Street’s proprietary technology & experienced team

    Clear Street continues rapid roll out, anticipates Outsourced Trading Desk expansion in the coming weeks

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — Clear Street, (“Clear Street”, “the Company”) a cloud-native financial technology firm on a mission to modernize the brokerage ecosystem, today announced the launch of its outsourced trading platform, a fully integrated execution and support offering designed to meet the evolving needs of asset managers, hedge funds and family offices. Morgan Ralph joins the firm as Head of Outsourced Trading to lead the new initiative. Ralph has deep expertise in trading solutions and joins Clear Street from UBS, where he led business development and platform management for the outsourced trading business. Clear Street’s outsourced trading team will operate from 4 World Trade Center in New York City, in new office space acquired for the effort and illustrative of the firm’s rapid build out of new products and services.

    Andy Volz, Chief Commercial Officer said, “Morgan’s experience launching and growing outsourced trading businesses at some of the world’s top financial institutions aligns perfectly with Clear Street’s vision to deliver a flexible, scalable solution for today’s institutional investors. Outsourced trading is a direct response to our clients’ needs, allowing the flexibility to scale up, or down, as business ebbs and flows, a common occurrence for small and emerging managers. By pairing this offering with our proprietary technology, delivered via Clear Street Studio, we can help our clients more confidently navigate markets.”

    Clear Street’s independent outsourced trading solution is designed to help fund managers—ranging from emerging startups to established institutions—scale operations efficiently while reducing costs. Available across the full spectrum of on-demand to full outsourcing of trading operations, outsourced trading clients gain access to a global broker network, seasoned trading professionals and Clear Street Studio (“Studio”), the firm’s proprietary cloud-based platform that serves as an all-in-one portfolio management system. Through Studio, clients can access real-time trading, risk, and portfolio management tools, enabling seamless collaboration between portfolio managers and traders.

    Ralph commented, “I am beyond thrilled to join Clear Street and to work alongside the excellent team here to bring forward the premier outsourced trading platform on the market. The blend of world-class proprietary technology and an incredibly experienced team of professionals gives us a distinct edge, and our clients will benefit significantly from the unique set of resources this firm can offer. We also have imminent plans to grow, with several exciting hires soon to be announced.”

    Ralph, a CFA Charterholder, brings nearly two decades of trading and platform development experience to this role. Prior to joining Clear Street, he led business development and platform management for the outsourced trading business at UBS, overseeing strategic growth, daily operations and client relationships across the Americas. Previously, he helped launch the outsourced trading offering at State Street Global Markets, serving as Head of Business Development for the Americas. Earlier in his career, Ralph held roles in equity sales and trading at Brown Brothers Harriman and in equity capital markets at Lehman Brothers. He holds a B.A. in Economics from New York University.

    The team behind the offering brings a unique blend of strategic leadership and hands-on expertise, having built and led outsourced trading businesses at firms including UBS, Wells Fargo and State Street Global Markets. With deep execution experience across asset classes, they are focused on delivering high-touch service and operational excellence through scalable, flexible trading solutions tailored to meet the evolving needs of fund managers.

    To learn more about Clear Street’s outsourced trading services, please visit https://www.clearstreet.io/pages/outsourced-trading.

    About Clear Street:

    Clear Street is modernizing the brokerage ecosystem with financial technology and services that empower market participants with real-time data and best-in-class products, tools and teams, to navigate capital markets around the world. Complemented by white-glove service, Clear Street’s cloud-native, proprietary product suite delivers financing, derivatives, execution and more to power client success, adding efficiency to the market and enabling clients to minimize risk, redundancy and cost. Clear Street’s goal is to create a single platform for every asset class, in every country and in any currency. For more information, visit https://clearstreet.io.

    Contact:

    press@clearstreet.io

    The MIL Network –

    May 22, 2025
  • MIL-OSI Global: Why is it so hard for young people to get jobs?

    Source: The Conversation – UK – By Farooq Mughal, Senior Lecturer (Associate Professor), Management Strategy & Organisation, University of Bath

    antoniodiaz/Shutterstock

    For generations, young people have been told the path to opportunity is clear. Study hard, get a degree, and success will follow. This promise – central to the idea of “meritocracy” – has shaped the aspirations and investments of millions (though in reality, access to university and employment is also shaped by factors like family income, schooling and geography).

    Today, however, many graduates in the UK and elsewhere find they are struggling to land a job – and it’s a problem which extends far beyond roles that match their qualifications. In some cases, graduates are being turned down for roles in supermarkets or warehouses – not because they’re unqualified, but because they’re seen as overqualified, too risky or surplus to requirements.

    In terms of the UK economy, this isn’t just a problem of job shortages. It signals a deeper breakdown in the social contract – the long-held promise that education leads to opportunity. And it exposes how the connection between learning and labour is coming undone.

    As the focus of employers, higher education providers and the state has shifted towards the notion of “employability” – the skills and attitudes that help people get and keep jobs – labour markets have become highly competitive and spoilt for choice.

    At the same time, it’s worth remembering that while employment remains a key concern, the value of education extends far further – shaping personal growth and civic engagement, for example.



    This article is part of Quarter Life, a series about issues affecting those of us in our twenties and thirties. From the challenges of beginning a career and taking care of our mental health, to the excitement of starting a family, adopting a pet or just making friends as an adult. The articles in this series explore the questions and bring answers as we navigate this turbulent period of life.

    You may be interested in:

    Five tips from an expert for choosing a self-help book that will actually work

    How to handle difficult conversations in your early career, from salary negotiation to solving conflict

    Five things young professionals can do today to promote gender equality at work


    Employability places the burden squarely on young people to become work-ready while ignoring the wider barriers they face. These include hiring algorithms, labour market saturation as graduate numbers remain high while vacancies dry up, and uneven access to opportunity.

    Even with degrees and internships, many young people are finding themselves locked out of meaningful work. Research I undertook with colleagues on education-to-work transitions shows how graduates often invest heavily in becoming employable through a mix of soft skills, adaptability and professionalism. But these efforts now rarely guarantee a job.

    Instead, graduates frequently enter a labour market that is both oversaturated and under-responsive. Over the past two decades, the number of graduates in the UK has grown sharply. This surge has intensified competition, pushing many into roles below their qualification level.




    Read more:
    Britain has almost 1 million young people not in work or education – here’s what evidence shows can change that


    The UK government’s Get Britain Working white paper recognises this disconnect. It also highlights the legacy effects of the COVID pandemic, especially among young people aged 16–24 who are not in education, employment or training (Neets) – of which there are now estimated to be 987,000, and rising.

    But while the government’s proposed youth guarantee scheme offers basic training and apprenticeships, it does little for those already in the labour market.

    What’s blocking the way?

    Despite the emphasis on developing skills, many young people – both graduates and non-graduates – struggle to progress in the labour market. For example, the number of entry-level roles in retail, hospitality and logistics is shrinking due to rising costs, automation and algorithmic hiring systems that privilege some over others.

    Recent increases to employer national insurance contributions and the national minimum wage are putting pressure on payrolls, reducing already limited opportunities for young people.

    UK chancellor Rachel Reeves’s 2024 budget contained some shocks for employers.
    Fred Duval/Shutterstock

    This highlights the limits of the popular narrative that effort always leads to reward. The idea that young people just need to try harder collapses under the weight of such constraints.

    Businesses are also facing tight margins, as well as the problems that come with high staff turnover due to a lack of career development opportunities, as rising costs make it harder to invest in staff. But our research shows that even highly motivated graduates – those who network, gain skills, take internships and are adaptable – can struggle to get a foot in the door.

    The UK employment rights bill, which is making its way through parliament, is designed to curb exploitative labour market practices. But professional bodies and trade associations warn that some employers may respond by cutting staff and reducing flexible work.

    While reforms such as reframing the purpose of Jobcentres are critical in making unemployment seem unattractive, they are likely to fall short of creating sustained opportunities.

    Policy paradox

    All of this reveals a paradox. In trying to clamp down on job precarity, the UK government may be shutting young people out of the entry points they need, skilled or otherwise. Well-intentioned policies such as the youth guarantee and employment rights bill risk failure when the labour market often rewards privilege over merit.

    Today’s labour market can penalise young people twice over. First, they’re expected to be employable with the right skillset. Yet even when they are, many find the door shut.

    In my view, the way forward is to create new, accessible roles that reflect a broader duty of care on the part of employers, universities and policymakers. This includes building skills pathways along the lines of the Youth Futures Foundation programme, which works in deprived areas to create pathways that connect young people with support and jobs.

    It also means embedding hiring practices that ensure a closer focus on someone’s potential, such as blind recruitment or diverse hiring panels.

    Incentivising employers to hire and value young talent could be transformative, as could forging partnerships between universities and industry which focus on building the skills needed for employment.

    Government initiatives such as the Trailblazers scheme, which identifies young people at risk of falling out of education or employment, are a good start. But they could be more effective alongside a combination of digital tools that bring together mobile apps for tracking career progress, a skills dashboard, and AI career advice.

    Restoring the social contract means sharing responsibility. Our research finds that employers should regularly review how they assess talent and design career pathways.

    Universities should collaborate with industry to ensure graduate skills align with employer expectations. And the government must address deep-seated inequalities shaped by region, class, race and institutional prestige.

    Ignoring these issues mean they will continue to largely dictate who gets in, who gets ahead, and who gets left out. A collective responsibility ensures that education is recognised not just as a route to employment, but as a cornerstone of a fair, thoughtful and inclusive society.

    Farooq Mughal works for the University of Bath. He is also a Trustee and Director in a non-executive capacity for the Bath Royal Literary and Scientific Institution.

    – ref. Why is it so hard for young people to get jobs? – https://theconversation.com/why-is-it-so-hard-for-young-people-to-get-jobs-256532

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI Global: The psychology of climate traps and how to avoid them

    Source: The Conversation – UK – By Lucrezia Nava, Assistant Professor, Climate Psychology, Carbon Dioxide Removals, Business School, University of Exeter

    Victor Guerrero Diez/Shutterstock

    Each year, the world loses around 5 million hectares of forest, with 95% of this deforestation occurring in tropical regions. South America is a major hotspot, with Brazil in particular facing severe forest loss — much of it driven by cattle ranching, which accounts for more than 70% of all Amazon deforestation.

    Many of these clearings are carried out by farmers, particularly smallholders, who are trying to cope with intensifying drought and other effects of climate change. This leads to a paradox: the people most exposed to climate threats are often pushed by survival pressures to make choices that further degrade the environment.

    Imagine standing in a field of dry, cracked soil, watching the crops you planted with hope fail to grow. It hasn’t rained in months. You know that planting trees could help protect your land and water sources in the long run. But you need food next week.

    So instead, you clear some forest to sell timber and raise a few cows — a choice that might get you through the season, even if it further reduces soil moisture and water retention on your own farm.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    As one farmer told me: “The problem is: does the agricultural producer die now, or does he die later? Now, he dies of hunger. Later, he dies of thirst. He prefers to die later of thirst.”

    This is what my team of environmental researchers calls a “climate trap”: a vicious cycle where short-term survival decisions deepen long-term climate vulnerability. Our recent study investigates this phenomenon among smallholder cocoa producers in the south of the Brazilian state of Bahia.

    We tracked more than 3,000 farms over four years and conducted dozens of interviews with farmers. One of our most striking findings was that those most affected by droughts were less likely to employ adaptive strategies such as reforestation, and more likely to make environmentally harmful choices such as clearing forest for pasture.

    This contrasts sharply with research from high-income countries, where more exposure to climate risks typically encourages protective action. Why the difference?

    The answer, according to our research, lies in emotion. Many farmers spoke of fear and hopelessness. One told us: “We plant, replant and it dies. Plant, replant, it dies. There’s no rain! Everything we took care of, everything we watered, everything we did with love. It’s no use!”

    These emotions influence decisions. When fear and hopelessness set in, people naturally narrow their focus to the short term — what can I control today?

    Climate shocks such as drought trigger emotional distress, which can lead to environmentally harmful choices that increase vulnerability.
    Scott Book/Shutterstock

    The future becomes too uncertain, too frightening to plan for. As one farmer explained: “Today, I work more in the short term. I’m worried about today’s drought, okay? I’m not starting to think about next year’s drought or in two years’ time.”

    Even when farmers understand that long-term strategies like reforestation would help, those solutions can feel unattainable under emotional and economic stress.

    We call this a maladaptive feedback loop: climate shocks trigger emotional distress, which limits long-term thinking, leading to environmentally harmful choices that further increase vulnerability to future shocks. And the cycle repeats.

    Learning from the loop

    Climate traps are real and probably more widespread than many people realise. Similar dynamics have been reported in parts of Africa, Asia and across the developing world. These are the communities facing the brunt of climate change with the fewest resources to respond.

    To spot climate traps, businesses and governments need to recognise when short-term incentives are driving long-term harm. If a decision solves an immediate problem but increases climate risk over time, it may be part of a trap.

    They need to watch out for indicators such as repeated deforestation after droughts, or a shift from sustainable crops to quick-fix options such as cattle pasture. In areas heavily affected by climate change, these responses often signal a deeper cycle of short-term survival and long-term vulnerability.

    Also, listen out for resignation. Phrases like “there’s no point” and “we just survive however we can” or “there’s nothing we can do except pray for a change” may signal emotional fatigue — which points to a loss of agency and diminished belief in the usefulness of long-term action.

    When people no longer believe their efforts can make a difference, even the best technical solutions are likely to be ignored.

    Climate adaptation is about more than just providing technical solutions. In our study, producers were well aware of the pros and cons of their practices. The real barriers were emotional.

    We believe interventions need to address fear and hopelessness directly — through the use of safety nets, financial buffers and community-led support systems, as well as narratives that rebuild a sense of control and agency. Reducing hopelessness requires not just money but presence. Trusted advisors, peer learning networks and visible examples of successful adaptation can all help.

    Avoiding climate traps isn’t easy. But for climate adaptation to succeed — especially where it’s needed most — we have to stop treating emotions as a side issue. They’re central. The solutions we offer must speak to both the mind and the heart.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Lucrezia Nava does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. The psychology of climate traps and how to avoid them – https://theconversation.com/the-psychology-of-climate-traps-and-how-to-avoid-them-255832

    MIL OSI – Global Reports –

    May 22, 2025
  • MIL-OSI United Kingdom: Council leaders visit Portakabin HQ to champion local skills and apprenticeships

    Source: City of York

    The Deputy Leader of City of York Council, alongside senior council officers, recently visited the Portakabin head office in York.

    Portakabin, the market leader in the manufacture and construction of modular buildings, is one of York’s largest employers, with over 1,000 people working across its head office and manufacturing facility in the city. The company has proudly called York home for more than 60 years.

    As a globally recognised brand, Portakabin recently welcomed local leaders to its York headquarters to discuss future growth opportunities, the importance of strong public-private partnerships, and to reflect on recent successes, including a thriving apprenticeship scheme that is opening skilled career paths for young people across the region.

    The apprenticeship scheme at Portakabin offers its people development opportunities, with 98% of apprentices offered a full-time career with the company once their apprenticeship completes.

    Apprenticeships range from the required skills for modular building construction such as electrical apprenticeships, to product design, quantity surveying, finance, and marketing.

    Councillor Pete Kilbane, Deputy Leader of the Council with responsibility for Economy and Culture, said:

    I was delighted to accept the invitation from Portakabin to visit their head office and hear about the work taking place to provide skilled and well-paid jobs.

    “York is a fantastic place to do business, we have a highly skilled population, and it is a great place to live.

    “A key priority of this council is for the city to have a fair, thriving, green economy for all, which provides opportunities and well-paid jobs. Portakabin are one of many amazing businesses in York who will help us to achieve that ambition. It was particularly good to hear so much about their apprenticeship schemes and how that is turning into long-term careers for our young people.”

    Dan Ibbetson, CEO at Portakabin said:

    We were delighted to welcome Councillor Pete Kilbane to our Head Office here in York. We are proud to be a York based business, delivering exceptional spaces across the UK and Northern Europe from our home here in Huntington.

    “Our successes are testament to the people that work here, the highly skilled and motivated teams that deliver a meaningful impact both in work and the wider York community. It was a pleasure to give Councillor Kilbane and other senior leaders from the council an insight into the people, community and spaces we deliver here at Portakabin.” 

    For businesses big and small there’s lots of support available to help your business prosper and thrive through the council’s Growth Managers. For more information visit:  https://www.york.gov.uk/GrowYourBusiness or email economicgrowth@york.gov.uk.

    MIL OSI United Kingdom –

    May 22, 2025
  • MIL-OSI Russia: China and ASEAN Complete Negotiations on CAFTA Version 3.0 /Detailed Version-1/

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 21 (Xinhua) — China and 10 ASEAN countries have fully concluded negotiations on the China-ASEAN Free Trade Area (CAFTA) 3.0, the Ministry of Commerce said Wednesday.

    The achievement was announced on Tuesday during a special online meeting of China-ASEAN economy and trade ministers.

    CAFTA 3.0 will send a strong signal in support of free trade and open cooperation, the Commerce Ministry official said, noting that it will bring greater certainty to regional and global trade and play a guiding and exemplary role for different countries in upholding the principles of openness, inclusiveness and mutually beneficial cooperation.

    Negotiations on CAFTA version 3.0, which began in November 2022, were substantially concluded in October 2024 after nine rounds of formal negotiations.

    Version 3.0 contains nine new chapters covering areas such as the digital economy, green economy and supply chain connectivity, according to the ministry.

    CAFTA 3.0 will create an inclusive, modern, comprehensive and mutually beneficial free trade agreement. The new additions will provide the parties with the opportunity to advance regional economic integration in a broader and deeper manner and effectively facilitate the deep integration of their production and supply chains in the new environment.

    Moreover, CAFTA 3.0 will provide important institutional guarantees for the construction of the China-ASEAN mega market, thereby giving a steady impetus to the building of a China-ASEAN community with a shared future and promoting the common prosperity and development of both sides, the MOC noted.

    The parties will actively advance their respective internal signature and ratification procedures with a view to formally signing the CAFTA Modernization Protocol version 3.0 by the end of this year, the department added. -0-

    MIL OSI Russia News –

    May 22, 2025
  • MIL-OSI: NordVpn Cost (73% Coupon Code) How Much Does Nord Vpn Cost

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, May 21, 2025 (GLOBE NEWSWIRE) — NordVpn : Is It Still the Best VPN for Privacy & Security? NordVpn Cost | NordVpn Discount Code

    If you’re looking for top-tier online privacy, fast streaming, and unbeatable security, NordVPN remains one of the most trusted names in the VPN industry. With millions of users globally and a strong reputation, many are asking: What is NordVPN and is it still worth it in 2025? In this in-depth guide, we cover everything from features to pricing, performance, and why NordVPN might be the right VPN for you.

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    What Is NordVPN?

    NordVPN is a virtual private network (VPN) service that helps protect your internet activity by encrypting your connection and masking your IP address. Based in Panama—a country with no mandatory data retention laws—NordVPN has a strict no-logs policy, which means your browsing activity is never stored or tracked.

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

     

    If you’re wondering how much is NordVPN, you’re in the right place. NordVPN is one of the most trusted virtual private networks globally, offering fast speeds, strong security, and wide compatibility with various devices including Firestick, Windows, Android, iOS, and more. Whether you’re streaming, browsing, or securing your online data, knowing the exact NordVPN cost per month, along with the best nord vpn sdiscount code, can help you make an informed decision and buy nordvpn plans at lowest price with exclusive Nordvpn Discount Code.

    To avoid counterfeits, it’s best to purchase from the official link given below

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    NordVPN Subscription Overview | How Much Is Nordvpn

    So, how much does NordVPN cost? The cost of a NordVPN subscription varies based on the length of the plan you choose. Whether you want a monthly plan for short-term use or prefer a long-term subscription to save more, NordVPN offers flexible options.

    When exploring the cost of NordVPN subscription, users typically choose between a 1-month, 1-year, or 2-year plan. Each plan includes full access to NordVPN’s features like encrypted browsing, no-logs policy, fast-speed servers, and the ability to connect on multiple devices.

    To avoid counterfeits, it’s best to purchase from the official link given below

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    How Much Is a NordVPN Subscription | Nordvpn cost per Month/Yearly?

    If you’re searching how much is a NordVPN subscription or how much is NordVPN yearly, you’ll find that Nordvpn Price often provides significant discounts through coupons and seasonal deals. These discounts can drastically reduce the NordVPN price, especially if you subscribe for longer term Nord vpn deals.check & buy from below official link to get highest discount.

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    NordVPN on Firestick. Windows, Android, iOS, and More – What’s the Price? Nordvpn coupon

    If you’re streaming content on Firestick. Windows, Android, iOS, and More and want to protect your privacy, NordVPN works seamlessly with it. Many users ask about the Nord VPN on Firestick price – but there’s no separate pricing. Once you subscribe to any NordVPN plan, you can use it on multiple devices, including Firestick, at no additional cost. Check & Buy from below official link to get the highest discount.

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    Why Choose NordVPN?

    • One of the fastest VPN in the world.
    • Strict no-logs policy
    • Double VPN and advanced encryption
    • Best customer support from Nordvpn com
    • User-friendly apps for all platforms

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    Final Thoughts: Is NordVPN Worth the Cost? | Nordvpn plans | Nordvpn Price

    Absolutely. When you consider the level of security, speed, and features included, the cost of NordVPN subscription is justified. Whether you’re curious about how much is NordVPN yearly or looking for a great NordVPN deal, the current 73% offer is the best time to subscribe.

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends (Click Below Link to Buy Now).

    Click Here to Visit The Official Website (73% Discount)

    So, if you’re still wondering, “NordVPN, how much does it cost?” – now you know!

    Use NordVpn Coupon right now (Limited Stock)!!

    To avoid counterfeits, it’s best to purchase from the official link given below

    Because so many people are buying it, discount stock is running out quickly—so it’s a smart idea to order yours before the deal ends.

    Click Here to Visit The Official Website (73% Discount)

    Project Name: NordVPN
    Company Name: Nord Security
    Address: 8th Floor, Green Tower Business Center, 425 Market Street, San Francisco, CA 94105, USA
    Contact Person: Brian Thomson
    Designation: Public Relations Manager
    Phone Number: +1-628-555-0143

    Email: Brian@nordvpn.com
    Company Email: press@nordvpn.com

    Website: https://nordvpn.com

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at:
    https://www.globenewswire.com/NewsRoom/AttachmentNg/409c665a-3a79-42e5-83fa-dae90b8f4629

    The MIL Network –

    May 22, 2025
  • MIL-OSI: LPL Financial Expands Wealth Planning Leadership with New EVP Tara Thompson Popernik

    Source: GlobeNewswire (MIL-OSI)

    SAN DIEGO, May 21, 2025 (GLOBE NEWSWIRE) — LPL Financial LLC, a leading wealth management firm, has appointed Tara Thompson Popernik as Executive Vice President and Head of Wealth Planning. Additionally, Monte Tomasino has joined the company as Executive Vice President of Service Digital Enablement, further solidifying LPL’s commitment to delivering top-tier wealth planning and service solutions.

    Tara Thompson Popernik: Elevating Wealth Planning
    Thompson Popernik will lead a team of highly specialized professionals to expand and evolve LPL’s wealth planning offering. In her new position, she will oversee LPL’s Financial Planning, High-Net-Worth and Product Management teams. Her role will focus on enhancing the firm’s ability to serve high-net-worth and ultra-high-net-worth clients more effectively.

    “Tara’s extensive experience and deep understanding of the unique needs of high-net-worth clients will be invaluable as we continue to grow and refine our wealth planning value, ensuring we provide personalized and sophisticated advice to all our clients,” said Aneri Jambusaria, Group Managing Director of Wealth Management at LPL Financial.

    Most recently, Thompson Popernik served as Senior Vice President of the Wealth Strategies team at Bernstein Private Wealth, where she spent 21 years in various leadership roles. Her expertise in managing complex financial needs and her commitment to client-centric solutions will be instrumental in elevating LPL’s client experience and thought leadership in the industry. Thompson Popernik holds a Bachelor of Arts in Comparative Literature from Dartmouth College and is a Chartered Financial Analyst (CFA) and Certified Financial Planner (CFP®). She holds FINRA Series 7, 63, 9, and 10 licenses. Additionally, she is a member of CHIEF, a leading professional network for women executives.

    Monte Tomasino: Driving Digital Transformation in Service
    Monte Tomasino is an experienced service executive with a strong background in strategic planning, digital transformation and operational delivery. He joins LPL from Dell Technologies, where he most recently served as Vice President of Digital Enablement and Engagement. Prior to that, he managed all Dell contact centers and technical support services. Tomasino is a former U.S. Army Aviation Commander and a graduate of the United States Military Academy at West Point. He earned his Master of Business Administration degree from the University of Texas at Austin.

    These appointments underscore LPL Financial’s commitment to providing elevated wealth planning and service solutions, ensuring that financial advisors and their clients receive top-tier resources and support.

    About LPL Financial

    LPL Financial Holdings Inc. (Nasdaq: LPLA) is among the fastest growing wealth management firms in the U.S. As a leader in the financial advisor-mediated marketplace, LPL supports over 29,000 financial advisors and the wealth management practices of approximately 1,200 financial institutions, servicing and custodying approximately $1.8 trillion in brokerage and advisory assets on behalf of approximately 7 million Americans. The firm provides a wide range of advisor affiliation models, investment solutions, fintech tools and practice management services, ensuring that advisors and institutions have the flexibility to choose the business model, services, and technology resources they need to run thriving businesses. For further information about LPL, please visit www.lpl.com.

    Securities and advisory services offered through LPL Financial LLC (“LPL Financial”), a registered investment adviser and broker-dealer. Member FINRA/SIPC.

    Throughout this communication, the terms “financial advisors” and “advisors” are used to refer to registered representatives and/or investment advisor representatives affiliated with LPL Financial.

    We routinely disclose information that may be important to shareholders in the “Investor Relations” or “Press Releases” section of our website.

    Media Contact: 
    Media.relations@LPLFinancial.com 
    (402) 740-2047 

    Tracking #: 743016 

    The MIL Network –

    May 22, 2025
  • MIL-OSI: xSuite Benelux to Host 2025 User Conference in Eindhoven

    Source: GlobeNewswire (MIL-OSI)

    Under the motto “One Team. One Journey.”, the business process optimization expert will present innovations and solutions for finance professionals this June.

    Eindhoven, Netherlands – May 21, 2025. xSuite Benelux will host its annual User Conference on June 25, 2025, at the Philips Museum in Eindhoven. The event will focus on future-oriented technologies for finance and IT decision-makers. Topics will include Artificial Intelligence, mandatory e-invoicing, SAP S/4HANA, cloud transformation, and Clean Core strategies. The conference will also feature a partner presentation showcasing the use of xSuite solutions in finance departments.

    Innovative technologies such as cloud computing and AI are increasingly shaping the finance function. At the event, xSuite will present product innovations, outline its roadmap, and provide insights into current and emerging technology trends. A presentation by xSuite partner Flexo will illustrate the implementation of xSuite solutions at Sumitomo for automated invoice processing. The case study will address the initial setup, challenges encountered, applied solutions, and measurable outcomes.

    In-Depth Sessions on Key Technology Topics:

    1. Artificial Intelligence in SAP Invoice Processing
    The session will present xSuite’s Prediction Server, an AI-based tool for invoice processing in SAP. It will also cover the growing role of Large Language Models (LLMs) in document recognition and process automation.

    2. E-Invoicing Compliance
    With upcoming e-invoice mandates in various EU countries – including the e-invoice obligation in Belgium in the beginning of 2026 – this session will focus on practical implementation insights and optimization strategies. The presentation will also look ahead to platform-based models and potential CTC (Continuous Transaction Control) reporting frameworks, including a preview of eDNA (electronic Document Network Adapter).

    3. SAP S/4HANA and Cloud Transformation
    Many organizations are already migrating to SAP S/4HANA or preparing to do so. Even companies using Private Cloud environments are encouraged to align with SAP’s Clean Core approach to minimize technical debt. This session will introduce xSuite’s SAP-integrated Business Solutions 6.0 and applications on the SAP Business Technology Platform (BTP).

    Networking and Exchange
    The conference will conclude with opportunities for networking and discussion of customer requirements, the role of xSuite as a strategic partner, and best practices in digital transformation projects.

    Event Details:

    xSuite User Conference Benelux
    June 25, 2025
    Philips Museum, Emmasingel 31, 5611 AZ Eindhoven
    10:00 AM – 3:00 PM

    More information and registration:
    https://news.xsuite.com/en/user-conference-2025-eindhoven

    About xSuite Group

    xSuite is a software manufacturer of applications for document-based processes and provides standardized, digital solutions worldwide that enable simple, secure, and fast work. We focus mainly on the automation of important work processes in conjunction with end-to-end document management. Our core competence lies in accounts payable (AP) automation in SAP (including
    e-invoicing), for leading companies worldwide, as well as for public clients. This is supplemented by applications for purchasing and order processes as well as archiving – all delivered from a single source, including both software components and services. xSuite solutions operate in the cloud or in hybrid scenarios. We take pride in the high-quality solutions we offer, as evidenced by the regular certifications we receive for our SAP solutions and deployment environments.” With over 300,000 users benefitting from our solutions, xSuite processes more than 80 million documents per year in over 60 countries.

    Founded in 1994 and headquartered in Ahrensburg, Germany, xSuite has around 300 staff across nine locations worldwide – in Europe, Asia, and the United States. Our company has an established information security management system that is certified in accordance with ISO 27001:2022.

    Press Contact Headquarters:
    Barbara Wirtz
    xSuite Group GmbH
    Tel. +49 4102 883836
    barbara.wirtz@xsuite.com
    www.xsuite.com

    Contact xSuite Benelux:
    Hans Willems
    Managing Director
    xSuite Benelux BV
    Gelissendomein 8-10, Box 8
    6229 GJ Maastricht, Netherlands
    Tel +31 (43) 760 01-20
    info.benelux@xsuite.com
    www.xsuite.com

    Attachment

    • xSuite-UC-2025-Eindhoven 880×450

    The MIL Network –

    May 21, 2025
  • MIL-OSI: VanEck Prepares to Launch PurposeBuilt Fund to Invest in Real-World Applications on Avalanche

    Source: GlobeNewswire (MIL-OSI)

    The information contained in the private placement memorandum (the “PPM”) for the VanEck PurposeBuilt Fund, L.P. is not complete and may be changed. Van Eck may not solicit subscriptions until the limited partnership’s interests are available for purchase. The private placement memorandum is not an offer or a solicitation for subscriptions referenced therein and is not a solicitation for an offer or solicitation for subscriptions in any state where the offer is not permitted. Please view the PPM here: VanEck PurposeBuilt Fund Private Placement Memorandum.

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — VanEck, a leading asset manager, is today announcing the upcoming launch of the VanEck PurposeBuilt Fund, a private digital assets fund that will invest in businesses building on Avalanche and launching tokens designed to create long-term value and utility. The Fund is expected to launch in June 2025.

    The Fund will invest in liquid tokens and venture-backed projects—spanning industries that include gaming, financial services, payments and AI—typically around or after a Token Generation Event, with a fundamentals-first strategy focused on long-term outcomes. Idle capital will be deployed onchain through Avalanche-native real-world asset (RWA) products, including tokenized money market funds, to maintain liquidity while reinforcing the broader onchain economy.

    The Fund will be managed by the team behind the VanEck Digital Assets Alpha Fund (DAAF), one of the strongest-performing directional liquid token funds in the market, with over $100 million in assets under management. Since launching in 2022, DAAF has focused on investing in liquid tokens tied to scalable products, economic alignment and real adoption. This same approach is being applied to the PurposeBuilt Fund, with a focus on the Avalanche ecosystem, currently valued at nearly $50 billion. The team sees a growing concentration of serious builders leveraging the Avalanche network to pioneer new markets, while generating onchain economic activity. The PurposeBuilt Fund reflects VanEck’s conviction in the “GDP onchain” thesis: that blockchain technology will eventually be core to global economic and financial systems and that the projects that align with this vision will be the most durable.

    “The next wave of value in crypto will come from real businesses, not more infrastructure,” said Pranav Kanade, Portfolio Manager of VanEck Digital Assets Alpha Fund. “Avalanche has become a magnet for thoughtful builders, and with the VanEck PurposeBuilt Fund, we’re bringing capital and conviction to the founders creating lasting value, not chasing momentum.”

    The Fund is designed to address a persistent challenge in today’s crypto market. Founders launching legitimate blockchain-enabled businesses often struggle to stand out in an environment dominated by short-term speculation. This distorts incentives, undermines token credibility and slows real adoption. The Fund offers strategic, differentiated capital and long-term alignment, empowering mission-driven founders to stay focused, remain long-term oriented and scale effectively.

    “VanEck’s launch of the PurposeBuilt Fund marks a pivotal moment for the Avalanche ecosystem,” commented John Nahas, Chief Business Officer at Ava Labs. “We’re seeing a shift away from speculative hype toward real utility and sustainable token economies, and the VanEck PurposeBuilt Fund aims to bring the kind of long-term capital and strategic conviction that builders need to lead that shift. This fund reinforces the strength of Avalanche as the home for serious founders who are scaling real businesses and driving meaningful onchain adoption.”

    Avalanche continues to attract teams creating real-world applications across sectors, including DeFi, RWAs, AI, gaming, payments and FinTech. These builders are delivering enterprise-grade products already being adopted by web2 platforms and traditional institutions. The VanEck PurposeBuilt Fund ensures they have the capital, support and signal they need to succeed.

    About VanEck

    VanEck has a history of looking beyond the financial markets to identify trends that are likely to create impactful investment opportunities. We were one of the first U.S. asset managers to offer investors access to international markets. This set the tone for the firm’s drive to identify asset classes and trends — including gold investing in 1968, emerging markets in 1993, and exchange traded funds in 2006 — that subsequently shaped the investment management industry.

    Today, VanEck offers active and passive strategies with compelling exposures supported by well-designed investment processes. As of 4/30/2025, VanEck managed approximately $116.6 billion in assets, including mutual funds, ETFs and institutional accounts. The firm’s capabilities range from core investment opportunities to more specialized exposures to enhance portfolio diversification. Our actively managed strategies are fueled by in-depth, bottom-up research and security selection from portfolio managers with direct experience in the sectors and regions in which they invest. Investability, liquidity, diversity, and transparency are key to the experienced decision-making around market and index selection underlying VanEck’s passive strategies.

    Since our founding in 1955, putting our clients’ interests first, in all market environments, has been at the heart of the firm’s mission.

    About Avalanche

    Avalanche is an ultra-fast, low-latency blockchain platform designed for builders who need high performance at scale. The network’s architecture allows for the creation of sovereign, efficient and fully interoperable public and private layer 1 (L1) blockchains which leverage the Avalanche Consensus Mechanism to achieve high throughput and near-instant transaction finality. The ease and speed of launching an L1, and the breadth of architectural customization choices, make Avalanche the perfect environment for a composable multi-chain future.

    Supported by a global community of developers and validators, Avalanche offers a fast, low-cost environment for building decentralized applications (dApps). With its combination of speed, flexibility, and scalability, Avalanche is the platform of choice for innovators pushing the boundaries of blockchain technology.

    General Disclosures

    This is not an offer to buy or sell, or a recommendation to buy or sell any of the securities, financial instruments or digital assets mentioned herein. The information presented does not involve the rendering of personalized investment, financial, legal, tax advice, or any call to action. Certain statements contained herein may constitute projections, forecasts and other forward-looking statements, which do not reflect actual results, are for illustrative purposes only, are valid as of the date of this communication, and are subject to change without notice. Actual future performance of any assets or industries mentioned are unknown. Information provided by third party sources are believed to be reliable and have not been independently verified for accuracy or completeness and cannot be guaranteed. VanEck does not guarantee the accuracy of third party data. The information herein represents the opinion of the author(s), but not necessarily those of VanEck or its other employees. 

    Important Disclosures – VanEck PurposeBuilt Fund and VanEck Digital Assets Alpha Fund

    The VanEck PurposeBuilt Fund and the VanEck Digital Assets Alpha Fund (together, the “Funds”) are not registered investment companies under the Investment Company Act of 1940 and are therefore not subject to the same regulatory requirements as mutual funds or ETFs. Both Funds rely on an exemption from registration as Commodity Pool Operators under CFTC Rule 4.13(a)(3) and are subject to related trading limitations, investor suitability requirements, and offering and marketing restrictions.

    VAN ECK ABSOLUTE RETURN ADVISERS CORPORATION (“VEARA”), THE INVESTMENT MANAGER OF THE FUNDS, IS A MEMBER OF NFA AND IS SUBJECT TO NFA’S REGULATORY OVERSIGHT AND EXAMINATIONS. VEARA HAS ENGAGED OR MAY ENGAGE IN UNDERLYING OR SPOT VIRTUAL CURRENCY TRANSACTIONS IN THE FUNDS. ALTHOUGH NFA HAS JURISDICTION OVER VEARA, YOU SHOULD BE AWARE THAT NFA DOES NOT HAVE REGULATORY OVERSIGHT AUTHORITY FOR UNDERLYING OR SPOT MARKET VIRTUAL CURRENCY PRODUCTS OR TRANSACTIONS OR VIRTUAL CURRENCY EXCHANGES, CUSTODIANS OR MARKETS. YOU SHOULD ALSO BE AWARE THAT GIVEN CERTAIN MATERIAL CHARACTERISTICS OF THESE PRODUCTS, INCLUDING LACK OF A CENTRALIZED PRICING SOURCE AND THE OPAQUE NATURE OF THE VIRTUAL CURRENCY MARKET, THERE CURRENTLY IS NO SOUND OR ACCEPTABLE PRACTICE FOR NFA TO ADEQUATELY VERIFY THE OWNERSHIP AND CONTROL OF A VIRTUAL CURRENCY OR THE VALUATION ATTRIBUTED TO A VIRTUAL CURRENCY BY VEARA.

    Each Fund is available to Qualified Purchasers Only. Prospective investors should carefully review the respective Private Placement Memorandum (“PPM”) before investing. There is no guarantee either Fund will achieve its investment objectives, and investors may lose all or a substantial portion of their investment. Past performance is not indicative of future results.

    Both Funds pursue speculative investment strategies and involve significant risks. Individual investor performance may vary materially due to factors such as investment timing, new issue participation, expense structures, and the impact of loss carryforwards. Investor performance will be reflected in monthly statements provided by the Administrator.

    The VanEck PurposeBuilt Fund seeks capital appreciation through investments in Digital Assets, tokenized real world assets (“RWAs”), Digital Asset projects, and companies associated with the Avalanche ecosystem. Investments include equity, equity-like, and debt instruments of early-stage blockchain and Digital Asset companies. The Fund may employ staking, yield-farming, and investments across centralized and decentralized platforms.

    The VanEck Digital Assets Alpha Fund seeks capital appreciation by investing in 5 to 30 Digital Assets with high perceived upside relative to current valuations and generally with market capitalizations above $100 million. It also invests in public and private securities of Digital Asset companies. The Fund intends to generate yield through staking and DeFi-based lending, maintaining a general allocation of 70–90% in Digital Assets with the remainder focused on yield-generating strategies.

    VanEck Purpose Build Fund and VanEck Digital Assets Alpha Fund: Investments may include a wide variety of digital instruments and structures, including cryptocurrencies, stablecoins, NFTs, tokens, RWAs, DeFi protocols, DAOs, ICOs, SAFTs, SAFEs, token warrants, and synthetic assets. These technologies are new, may be untested, and are subject to competitive pressures, adoption challenges, and technological obsolescence.

    General Digital Asset Risk Disclosures

    Cryptocurrencies and digital assets are not suitable for all investors. Investments in digital assets and Web3 companies are highly speculative and involve a high degree of risk. These risks include, but are not limited to: the technology is new and many of its uses may be untested; intense competition; slow adoption rates and the potential for product obsolescence; volatility and limited liquidity, including but not limited to, inability to liquidate a position; loss or destruction of key(s) to access accounts or the blockchain; reliance on digital wallets; reliance on unregulated markets and exchanges; reliance on the internet; cybersecurity risks; and the lack of regulation and the potential for new laws and regulation that may be difficult to predict. Moreover, the extent to which Web3 companies or digital assets utilize blockchain technology may vary, and it is possible that even widespread adoption of blockchain technology may not result in a material increase in the value of such companies or digital assets. 

    Digital asset prices are highly volatile, and the value of digital assets, and Web3 companies, can rise or fall dramatically and quickly. If their value goes down, there’s no guarantee that it will rise again. As a result, there is a significant risk of loss of your entire principal investment. 

    Digital assets are not generally backed or supported by any government or central bank and are not covered by FDIC or SIPC insurance. Accounts at digital asset custodians and exchanges are not protected by SPIC and are not FDIC insured. Furthermore, markets and exchanges for digital assets are not regulated with the same controls or customer protections available in traditional equity, option, futures, or foreign exchange investing. 

    Digital assets include, but are not limited to, cryptocurrencies, tokens, NFTs, assets stored or created using blockchain technology, and other Web3 products. 

    Web3 companies include but are not limited to, companies that involve the development, innovation, and/or utilization of blockchain, digital assets, or crypto technologies. 

    This communication is for informational purposes only and does not constitute financial, tax, or legal advice, nor a recommendation to buy or sell any cryptocurrency or fund interest.

    ©️ Van Eck Securities Corporation, Distributor, a wholly owned subsidiary of Van Eck Associates Corporation
    666 Third Avenue, New York, NY 10017
    Phone: 800.826.2333
    Email: info@vaneck.com

    Media Contact

    Kayla Gill
    Serotonin
    kayla@serotonin.co

    The MIL Network –

    May 21, 2025
  • MIL-OSI: Atos positioned as a Leader in the 2025 Gartner® Magic Quadrant™ for Outsourced Digital Workplace Services report

    Source: GlobeNewswire (MIL-OSI)

    Press Release

    Atos positioned as a Leader in the 2025 Gartner® Magic Quadrant™ for Outsourced Digital Workplace Services report

    Paris, France – May 21, 2025 – Atos today announces that it has been positioned as a Leader by Gartner® in its 2025 Magic Quadrant™for Outsourced Digital Workplace Services (ODWS), based on its Completeness of Vision and Ability to Execute. This is the ninth consecutive year that Atos has been placed in the Leaders quadrant in a Gartner Magic Quadrant report dedicated to Outsourced Digital Workplace Services (ODWS)1.

    Atos’ digital workplace services provide end-to-end Engaged Employee Experience   through digital collaboration and productivity tools, as well as intelligent customer care services that enable new ways of working and include 20 ‘Tech for Good’ features to address clients’ CSR goals.

    Persona-based employee journeys enable secure and effortless access to applications, resources and devices from any location, allowing every individual to maximize their contribution, regardless of disability or impairment.

    Atos sustainable digital workplace suite, that is included in its ODWS portfolio, fosters more sustainable and cost-effective workplace environments through transparent, responsible sourcing and device lifecycle management to reduce customers’ carbon footprint across the ecosystem.

    Atos Experience Operations Center (XOC) launched in 2024, leverages cognitive analytics, virtual agents, remote diagnostics, innovative device provisioning and robust asset tracking for a secure, frictionless employee device support experience, and also complements Atos’ service desk with proactive issue resolution.

    To quickly identify and address employees’ IT issues before they impact their activity and business operations, the Atos Experience Operations Center (XOC) leverages automation and AI and aggregates data in real time to inform decisions about digital employee experience, allowing agile and responsive decision-making and problem resolution before users are affected.

    Leon Gilbert, EVP & Head of Digital Workplace Business Line, Atos, said: “Gartner recognition is an honor that we believe reflects on our breakthrough approach to human-centric, flexible and hybrid digital workplace environments powered by state-of-the-art technologies and on our commitment to co-create with our customers outcome-driven tailored services. This recognition gives us confidence in our capacity to further transform the future of work.”

    The 2025 Gartner® Magic Quadrant™ evaluated 18 service providers based on their Ability to Execute and Completeness of Vision.

    To download a copy of the report, please go to https://atos.net/en/lp/gartner-magic-quadrant-for-outsourced-digital-workplace-services-2025

    ***

    Disclaimer

    Gartner, Magic Quadrant for Outsourced Digital Workplace Services, By Karl Rosander, Matt Baldino, Biswajit Maity, Andrea Lanzavecchia, Katja Ruud, Tom Sieber, 24 March 2025

    GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    ***

    About Atos

    Atos is a global leader in digital transformation with c. 74,000 employees and annual revenue of c. € 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris.

    The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

    Press contact

    Isabelle Grangé | isabelle.grange@atos.net | +33 (0) 6 64 56 74 88


    1 The 2025 Gartner Magic Quadrant for Outsourced Digital Workplace Services replaces three separate regional Magic Quadrants for North America, Europe and the Asia/Pacific region, called Magic Quadrant for Managed Workplace Services (2017-2021).

    Attachment

    • PR-Atos positioned as a Leader in the 2025 Gartner® Magic Quadrant™ for Outsourced Digital Workplace Services report

    The MIL Network –

    May 21, 2025
  • MIL-OSI United Kingdom: New Chair of the Agriculture and Horticulture Development Board appointed

    Source: United Kingdom – Executive Government & Departments

    News story

    New Chair of the Agriculture and Horticulture Development Board appointed

    Emily Norton will start the role from 1 June

    Emily Norton has been appointed as the new Chair of the Agriculture and Horticulture Development Board (AHDB).

    Emily, who has 25 years of experience in the food and farming sector, will take on the role for three years from 1 June 2025. She will succeed Nicholas Saphir, who is stepping down as Chair after more than five years in the role. AHDB is a statutory levy board funded by around 100,000 farmers and other businesses in the food supply chain. Established in 2008 and classified as a Non-Departmental Public Body, AHDB supports production of Beef, Lamb and Pork in England, Dairy in Great Britain and Cereals & Oilseeds in the UK.

    Appointments to the AHDB board are made by Defra Ministers, with the approval of Ministers in the Scottish, Welsh and Northern Ireland Governments.

    Farming Minister Daniel Zeichner said:

    “Emily Norton’s leadership and extensive experience in a diverse range of sectors will bring fresh perspective and strategic insight to the AHDB. I look forward to working closely with her as we continue to champion our world-class farmers and food producers – driving rural economic growth and strengthening food security.

    “I would also like to express my gratitude to Nicholas Saphir for his dedication, drive and expertise throughout his tenure.”

    Outgoing AHDB Chair Nicholas Saphir said:

    “I have served as AHDB chair for the last five years during which time it has been an honour and a pleasure to have worked with some amazingly dedicated and knowledgeable Board members and staff. 

    “Together we have delivered a significant change in the way in which AHDB serves our levy payers. I leave AHDB, the Board and team, well positioned to play their part in providing ‘the key that unlocks the future of British agriculture’. 

    “I’m delighted that Emily Norton will be stepping into the role as Chair of AHDB. Emily brings a wealth of experience through her background in running a family farming business as well as her work as a highly respected strategic and policy advisor.”

    Emily Norton, new Chair of the AHDB, said:

    “I am proud to take on the role of Chair at such a pivotal time for British agriculture.

    “My professional focus has always been on strengthening the resilience, sustainability, and prosperity of the UK’s food and farming sectors. I look forward to working with stakeholders across the industry to deliver on that mission as part of AHDB.”

    Biographical details

    • Emily Norton is a partner in an 80 ha arable farm in Norfolk and is owner and founder of Farm Foresight Ltd, a strategic advisory service for the rural sector.
    • She has previously held several executive roles including Head of Rural Research at Savills UK, and was Chair of the Oxford Farming Conference in 2023.

    • Emily has extensive board-level experience, with positions at the Soil Association Exchange, the Environmental Markets Board and the Duchy of Lancaster.

    • She is a member of the national policy committee of the Country Land and Business Association, a trustee at the Royal Norfolk Agricultural Association and a member of the Farming Leadership Group of the Food, Farming & Countryside Commission.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom –

    May 21, 2025
  • MIL-OSI Russia: Experts Assess Economic Impact of Moscow’s Tourism Industry

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    Tourism strengthens Moscow’s economic stability and has a positive effect on the development of its infrastructure. This was reported by experts from the capital’s Tourism Committee.

    Tourists regularly buy goods and seek services in the city, which affects the increase in Moscow’s gross regional product. According to the latest data, tourist revenues to the city budget for 2024 are estimated at 235 billion rubles, and the total contribution of the travel sector to the capital’s economy is 1.7 trillion rubles, which exceeds previously announced figures.

    Over the past few years, Moscow has secured its status as a city for all-season travel — from family vacations to business trips. This is confirmed by the growing tourist flow. The successful development of the industry has become possible thanks to investments: 70 percent of budget funds are spent on improving the quality of the urban environment and the lives of Muscovites. Indirectly, this makes the capital more attractive not only for city residents, but also for tourists.

    Tourism, in turn, compensates for infrastructure and improvement costs, thereby strengthening the capital’s financial system. In 2023–2024, every ruble of budget funds directly or indirectly related to increasing Moscow’s tourist attractiveness additionally increased the capital’s economy by 35.7 rubles. Of these, five rubles were budget revenues.

    The positive effect of tourism on the economy is achieved by increasing the number of consumers of goods and services in Moscow. Among them are domestic and international tourists, as well as excursionists. They distribute expenses on transportation, accommodation, food, souvenirs, visiting exhibitions, museums, concerts and other entertainment and cultural events.

    The Moscow Tourism Committee monitors the dynamics of tourism development in the city. In 2024, Moscow’s tourist flow amounted to 26 million people and exceeded pre-pandemic figures.

    Detailed analytical information on the Moscow tourism industry can also be found on the portal “Russpass. Business”.

    Get the latest news quickly official telegram channel the city of Moscow.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/nevs/ite/154116073/

    MIL OSI Russia News –

    May 21, 2025
  • MIL-OSI China: China, ASEAN fully complete negotiations on CAFTA 3.0

    Source: People’s Republic of China – State Council News

    China, ASEAN fully complete negotiations on CAFTA 3.0

    Updated: May 21, 2025 16:20 Xinhua

    BEIJING, May 21 — China and the ten ASEAN countries have fully completed negotiations on the Version 3.0 China-ASEAN Free Trade Area (CAFTA), the Ministry of Commerce announced on Wednesday.

    MIL OSI China News –

    May 21, 2025
  • MIL-OSI United Nations: Digital Product Passport Symposium on Textiles, Batteries, and Other Strategic Sectors

    Source: United Nations Economic Commission for Europe

    Background

    In the face of accelerating global demand for transparency, traceability, and sustainability, the UNECE and ISO have partnered to advance international standardization through the Digital Product Passport (DPP) initiative. At the core of this effort is ISO 25534-1, the first international project jointly launched to define foundational principles for interoperable DPP systems.

    Building on the success of the Kick-off and Ad-hoc meetings, this Industry-Specific DPP Symposium aims to deepen dialogue with key sectors—textile, batteries, and others—to align on requirements and ensure the resulting standards meet real-world needs.

    Objectives

    This symposium series will:

    • Clarify regulatory frameworks, business needs, and data requirements for DPP implementation.

    • Identify sector-specific challenges and opportunities.

    • Facilitate the exchange of best practices and innovations.

    • Address open questions raised in previous meetings.

    • Inform and strengthen the ISO 25534-1 and future standardization efforts.

    Expected Outcomes

    • Agreement on common and sector-specific DPP elements

    • Contributions to ISO 25534-1 content

    • Identification of gaps and key themes for future standardization

    • Publication of findings and recommendations

    Target Audience

    • Government authorities and regulators

    • Industry and supply chain stakeholders

    • Technology solution providers

    • Research institutions and academia

    • International and development organizations

    Structure & Focus Areas

    🧭 Session 1: Scenario-setting 
    Cross-sector DPP requirements – Interoperability, business needs, and regulatory compliance.

    👕 Session 2: Textile Sector 
    Focus: Textile, garment, and fashion industries

    • Traceability of materials and processes

    • Eco-design, recyclability, and digital labelling

    • Consumer engagement through DPP

    🔋 Session 3: Battery Sector 
    Focus: Batteries for EV and energy storage

    • Lifecycle tracking of critical raw materials

    • Second-life use, recycling, and regulatory alignment

    • Integration with EV passports and EU Battery Regulation

    🔄 Session 4: Other Sectors & Wrap-Up
    Cross-sector and legal perspectives

    • Interoperability and governance

    • Legal frameworks and international alignment

    • Brainstorming on future standard components

    Note: If speaker representation is limited in Session 4, it will be merged into the wrap-up session.

    Contact

    For further information, please contact: 📧 Kevin Bishop – [email protected]

    MIL OSI United Nations News –

    May 21, 2025
  • MIL-OSI New Zealand: Economy – RBNZ Stats Alert Business Expectations Survey: June quarter results published

    Source: Reserve Bank of New Zealand

    21 May 2025 – Today marks the launch of Tara-ā-Umanga Business Expectations Survey (BES), with our publication of results for the June quarter (Table M15). BES is a quarterly release that will be published ahead of each Monetary Policy Statement.

    The initial publication includes our Stats Insight, a background note as a guide to interpret the new survey results, and a description of our survey methodology.

    BES includes several hundred businesses from different sectors around the country, from small to large firms. It is separate from the existing Survey of Expectations focusing on expert forecasters, economists and industry leaders (Table M14, from 1987 onwards), which will continue.

    The sample size and design enable new breakdowns by business size and industry, which are published in the data file accompanying Table M15. To facilitate the publication of detailed results by business size and industry, along with common measures of statistical uncertainty, we are using a new file format for the M15 data file. This intentionally differs from the file format of our other statistical releases. A description of the variables published in the M15 data file is available in the background notes to this release.

    Background information

    Inflation expectations are important because households and businesses reflect their expectations in their price- and wage-setting decisions. Improving the quality of our expectation surveys is part of the wider response to our 2022 review of how we formulate and implement our monetary policy. In this review, we identified several areas where better data could support high quality monetary policy decision-making.

    For further information please see: Tara-ā-Umanga Business Expectations Survey: Survey design and development: https://govt.us20.list-manage.com/track/click?u=bd316aa7ee4f5679c56377819&id=ce329fb983&e=f3c68946f8

    MIL OSI New Zealand News –

    May 21, 2025
  • MIL-OSI Russia: China calls US bid to ban Chinese chips ‘unilateral bullying and protectionism’ /more/

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 21 (Xinhua) — China’s Ministry of Commerce on Wednesday described the U.S. attempt to impose a global ban on advanced Chinese computer chips as a typical act of “unilateral bullying and protectionism” that seriously undermines global semiconductor production and supply chains.

    The Chinese side took into account that the US Department of Commerce recently issued a guideline that, under the pretext of so-called “violations of US export controls,” was intended to impose a ban on the use of advanced Chinese computer chips, including Huawei Ascend-specific chips, worldwide, an official representative of the Chinese Ministry of Commerce said.

    The move by the United States deprives other countries of the right to develop advanced computer chips and high-tech industries such as artificial intelligence, a statement from a spokesman for China’s Ministry of Commerce said.

    By abusing export controls to contain and oppress China, the United States violates international law and basic norms of international relations, seriously harms the legitimate rights and interests of Chinese enterprises, and harms China’s development interests, the official said.

    The Chinese side draws special attention to the fact that such measures by the United States may constitute restrictions of a discriminatory nature against Chinese companies. And any organizations and individuals who implement or assist in the implementation of these measures will certainly be held legally liable on suspicion of violating Chinese laws and regulations, the Ministry of Commerce warned.

    As the official representative of the department noted, innovative development and mutually beneficial cooperation are the dominant global trends. The Chinese side urges the United States to immediately correct its erroneous actions, comply with international trade and economic rules, and respect the right of other countries to scientific and technological development, the official representative emphasized.

    The Chinese side will closely monitor the development of the situation regarding the US measures and take decisive measures to protect its legitimate rights and interests, the official representative added. -0-

    MIL OSI Russia News –

    May 21, 2025
←Previous Page
1 … 174 175 176 177 178 … 531
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress