Category: Europe

  • MIL-OSI Russia: Financial news: Individual performance indicators of credit institutions (by groups of credit institutions, ranked by asset size)

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    Information on funds attracted by credit institutions

    Volume of deposits from individuals attracted by credit institutions

    More Collapse –

    The volume of funds attracted by credit institutions from legal entities

    More Collapse –

    Volume of savings (deposit) certificates, bonds and bills issued by credit institutions

    More Collapse –

    Data on the amounts of bills of exchange discounted by credit institutions

    More Collapse –

    Data on the amounts of funds of legal entities and individuals attracted by issuing bills of exchange by credit institutions

    More Collapse –

    Data on the volume of attracted bank deposits

    More Collapse –

    Information on the amount of assets and equity (capital) of credit institutions

    More Collapse –

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Banking: BSTDB Backs Renewable Energy Expansion in Bulgaria and Romania with €40 Million Loan to Renalfa IPP

    Source: Black Sea Trade and Development Bank

    Press Release | 24-Jul-2025

    Joint €315 million international financing to accelerate clean energy investments

    The Black Sea Trade and Development Bank (BSTDB) is providing up to €40 million loan to support the development, hybridization, and expansion of Renalfa IPP’s renewable energy assets in Bulgaria and Romania. The financing forms part of a broader €315 million financing package secured from leading development finance institutions and commercial banks, including the European Bank for Reconstruction and Development (EBRD), Kommunalkredit Austria AG, OTP Hungary, NLB Slovenia, and UniCredit BulBank.

    The funds will enable Renalfa IPP to upgrade its portfolio of renewable energy and battery energy storage systems (BESS), contributing to the decarbonization of Bulgaria’s and Romania’s power systems. The project will help diversify the countries’ energy mix, enhance energy security, and accelerate their transition to low-carbon economies. The BSTDB financing will also help catalyze further private and public sector investments, generate employment during both the construction and operation phases, and create long-term value for local communities. The operation represents a major step forward in the region’s transition toward cleaner, more secure, and sustainable energy systems.

    “This investment marks an important milestone in BSTDB’s efforts to support the clean energy transition in the Black Sea region,” said Dr. Serhat Köksal, BSTDB President.  “By backing the development of solar, wind, and battery storage infrastructure in Bulgaria and Romania, we are strengthening the resilience and competitiveness of their electricity sectors. The operation will play a key role in addressing the countries’ growing energy demands, while also reducing carbon emissions and supporting their commitments to climate goals. Moreover, it aligns closely with BSTDB’s Climate Strategy and reinforces our commitment to financing sustainable infrastructure and regional growth.”

    Ivo Prokopiev, CEO of Renalfa IPP, commented: “The successful raising of growth funding is an important milestone for Renalfa IPP and for our whole group. It proves the competitiveness of our integrated model for developing, investing and operating large hybrid assets. The early implementation of long duration co-located BESS allows Renalfa IPP to start offering green baseload products to market in CEE for the first time. We are proud, together with our partners from RGreen, to be on the frontier of energy transition not only in CEE, but in the whole EU.”

    Renalfa IPP is a leading independent power producer based in Vienna, specializing in the development, construction, and operation of renewable energy projects across Central and Eastern Europe. As an established platform with strong business model capabilities, Renalfa IPP works across the full value chains from project origination to asset operation. The company focuses on solar, wind, and Battery Energy Storage Systems (BESS), supporting the region’s transition to a sustainable and low-carbon energy future. Renalfa IPP is a joint venture between Renalfa Solarpro Group and RGREEN INVEST. 

    Renalfa Solarpro Group is a Vienna based clean energy and e-mobility investment group with a focus on renewable energy generation assets. Renalfa Solarpro is an established platform with strong business model capabilities, working across the full solar PV, wind, and BESS value chains from project origination to asset operation.

    RGREEN INVEST is an independent French mission-driven investment management company committed to helping investors channel their capital towards financing projects dedicated to accelerating the energy transition, mitigation, and adaptation to climate change.

    https://www.renalfa.com

    https://www.rgreeninvest.com

     

    The Black Sea Trade and Development Bank (BSTDB) is an international financial institution established by Albania, Armenia, Azerbaijan, Bulgaria, Georgia, Greece, Moldova, Romania, Russia, Türkiye, and Ukraine. The BSTDB headquarters are in Thessaloniki, Greece. BSTDB supports economic development and regional cooperation by providing loans, credit lines, equity and guarantees for projects and trade financing in the public and private sectors in its member countries. The authorized capital of the Bank is EUR 3.45 billion. For information on BSTDB, visit www.bstdb.org.

     

    Contact: Haroula Christodoulou

    : @BSTDB

    MIL OSI Global Banks

  • India-UK FTA a “landmark economic achievement”: TPCI

    Source: Government of India

    Source: Government of India (4)

    The Trade Promotion Council of India (TPCI) has termed the India-UK Free Trade Agreement (FTA) a “landmark economic achievement,” saying it will open up new opportunities for Indian exporters across key sectors.

    Calling the deal “visionary,” TPCI Chairman Mohit Singla said the agreement supports the development of globally competitive Indian brands, while advancing rural growth and India’s integration into global value chains.

    India’s total trade with the United Kingdom touched $23.1 billion in FY2024–25, with exports rising 12.4 per cent to $14.5 billion. Imports grew marginally by 2.3 per cent to $8.6 billion, resulting in a trade surplus of $5.9 billion.

    The FTA is expected to drive agricultural exports, with zero-duty access granted to over 95 per cent of Indian farm and processed food products. These include fruits, vegetables, cereals, coffee, tea, spices, oilseeds, alcoholic beverages, and ready-to-eat items. According to TPCI, this could push agri-exports to the UK up by over 20 per cent in the next three years.

    The seafood industry is also set to benefit, with Indian exporters gaining tariff parity with EU countries like Germany and the Netherlands. The UK’s $5.4 billion marine market will now be accessible duty-free, potentially benefiting fisherfolk in states such as Andhra Pradesh, Odisha, Kerala, Gujarat, and Tamil Nadu.

    In addition to goods, the FTA also addresses mobility and services. Ashish Kumar Chauhan, MD and CEO of the National Stock Exchange (NSE), said Indian professionals working in the UK will be exempt from paying social security tax for up to three years — an annual saving estimated at ₹4,000 crore. He also said the new visa framework would allow for longer professional stays, adding that the agreement sets a precedent for FTAs with other major economies such as the US, EU, and Japan.

    The engineering sector has also welcomed the agreement. EEPC India noted that the UK, India’s sixth-largest engineering export destination, posted 11.7 per cent growth in trade during 2024–25. With the FTA eliminating tariffs of up to 18 per cent on key engineering items, exports are expected to gain further traction.

    EEPC India Chairman Pankaj Chadha said the deal could help double engineering exports to the UK to over $7.5 billion by 2029–30. “It is a strategic breakthrough that will energise the sector, particularly MSMEs, and strengthen India’s role in global supply chains,” he said.

    —IANS

  • PM Modi to unveil development projects worth over ₹4800 crore in Tamil Nadu

    Source: Government of India

    Source: Government of India (4)

    Prime Minister Narendra Modi is set to embark on a two-day visit to Tamil Nadu on July 26 and 27, during which he will lay the foundation stone, inaugurate, and dedicate to the nation a wide array of development projects valued at over ₹4800 crore. His visit underscores the government’s commitment to enhancing infrastructure, regional connectivity, and cultural heritage in southern India.

    Upon his return from state visits to the United Kingdom and the Maldives, the Prime Minister will head directly to Tuticorin on the evening of July 26. There, he will inaugurate several key infrastructure projects designed to improve connectivity, logistics, energy efficiency, and overall quality of life in Tamil Nadu.

    One of the major highlights of his visit will be the inauguration of the New Terminal Building at Tuticorin Airport, constructed at a cost of around ₹450 crore. Spanning 17,340 square meters, the terminal is designed to handle 1,350 passengers during peak hours and up to 20 lakh annually, with provisions for future expansion. Equipped with energy-efficient systems and sustainable facilities, it aims to achieve a GRIHA-4 sustainability rating, promoting eco-friendly aviation infrastructure and boosting tourism and commerce in the region. GRIHA (Green Rating for Integrated Habitat Assessment) is a system for evaluating green buildings. It facilitates the assessment of a building’s performance based on nationally accepted standards or benchmarks.

    To significantly improve travel and trade, the Prime Minister will dedicate two strategically significant projects to the nation.
    The rail sector will also see significant upgrades aimed at reducing travel time and boosting freight movement.

    PM Modi will dedicate two major highway projects. The first is the 4-laning of the 50 km Sethiyathope–Cholapuram section of NH-36, developed at a cost exceeding ₹2,350 crore. This project includes bypasses, bridges, and flyovers and is expected to reduce travel time by 45 minutes between key delta districts. The second project involves the 6-laning of a 5.16 km stretch on NH-138, linking Tuticorin Port and surrounding industrial areas. Built at around ₹200 crore, it is expected to reduce logistics costs and enhance port-led industrial development.

    Further strengthening port infrastructure, the Prime Minister will inaugurate the North Cargo Berth–III at V.O. Chidambaranar Port. With a capacity of 6.96 million metric tonnes per annum (MMTPA), the ₹285 crore facility will meet rising demand for dry bulk cargo and improve cargo handling efficiency.

    PM Modi will dedicate to the nation three major rail infrastructure projects. These include the electrification of the 90 km Madurai–Bodinayakkanur section, the doubling of the 21 km Nagercoil Town–Kanniyakumari section, and doubling of shorter but critical links such as Aralvaymozhi–Nagercoil Junction and Tirunelveli–Melappalayam. Together, these upgrades will reduce travel time, enhance freight and passenger movement, and strengthen links between Tamil Nadu and neighboring Kerala.

    The Prime Minister will also lay the foundation stone for the Inter-State Transmission System (ISTS) for Kudankulam Nuclear Power Plant Units 3 and 4. The ₹550 crore project includes a high-capacity 400 kV double-circuit transmission line, enhancing the national grid and ensuring reliable clean energy supply to Tamil Nadu and other states.

    On July 27, PM Modi will travel to Tiruchirappalli to take part in the Aadi Thiruvathirai Festival at the historic Gangaikonda Cholapuram Temple. As part of the celebration, he will release a commemorative coin honoring Emperor Rajendra Chola I, one of India’s most iconic rulers, and mark the 1,000th anniversary of his maritime expedition to Southeast Asia.

    The event will also commemorate the beginning of the construction of the Gangaikonda Cholapuram temple, a marvel of Chola architecture and a UNESCO World Heritage Site. Rajendra Chola I, who ruled from 1014 to 1044 CE, is remembered for his expansive naval expeditions and for establishing a capital that embodied spiritual devotion and administrative excellence.

    This year’s Aadi Thiruvathirai holds special significance, as it aligns with Rajendra Chola’s birth star, Thiruvathirai, which began on July 23. The celebration also honors Tamil Shaiva Bhakti traditions and the legacy of the 63 Nayanmars, further highlighting the region’s cultural and religious heritage.

     

  • MIL-OSI Russia: Chinese and Russian think tanks should strengthen cooperation – Alexander Lukin

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, July 25 (Xinhua) — In the current complex and changing international situation, think tanks in Russia and China should strengthen cooperation, said Alexander Lukin, research director of the Institute of China and Modern Asia at the Russian Academy of Sciences, on the sidelines of the SCO Media and Think Tank Summit, which is being held from July 23 to 27 in Zhengzhou, capital of Henan Province, central China.

    Many scientific centers in Russia are already working on this, including the Institute of China and Modern Asia of the Russian Academy of Sciences. Analytical centers of China and Russia are strengthening cooperation in such areas as economics, international security, world politics, etc., added A. Lukin.

    “Strengthening cooperation between analytical centers of China and Russia, first of all, contributes to mutual understanding between the peoples, scientists and governments of our countries,” said A. Lukin. “In addition, such cooperation helps to strengthen and improve the quality of analytics and scientific information of both countries, and its promotion both within their countries and in the world as a whole.”

    A. Lukin noted that China’s economic development at the end of the 20th and beginning of the 21st centuries is a completely unique achievement in the history of mankind. Its uniqueness lies in the fact that such a combination of these methods was found that was suitable for such a huge country as China.

    According to him, this successful experiment deserves a thorough study, which is what researchers in many countries around the world are doing. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China’s Yunnan Province Donates Solar Street Lights to Myanmar

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    YANGON, July 25 (Xinhua) — A handover ceremony for solar-powered street lights donated by China was held in Yangon on Thursday.

    40 solar street lamps donated by the Yunnan Provincial People’s Association for Friendship with Foreign Countries were handed over to the head of Taketa Township.

    The move aims to improve safety during nighttime travel and reduce energy costs, and has also helped strengthen the friendship between China and Myanmar. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Chinese company launches pilot autonomous taxi service in Saudi Arabia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    RIYADH, July 25 (Xinhua) — Chinese technology company WeRide on Wednesday launched a pilot autonomous taxi service under the Robotaxi brand in Saudi Arabia.

    Several dozen vehicles serve King Khalid International Airport and several key areas of Riyadh, including major highways and select destinations in the city centre.

    WeRide said it expects to launch full commercial operations by the end of 2025.

    “The pilot launch of the autonomous taxi service reflects the Kingdom’s vision and strategic investment in the future of mobility,” said Saudi Arabia’s Minister of Transport and Logistics Services Saleh bin Nasser Al Jasser. “This step reinforces our commitment to fostering innovation, adopting cutting-edge technologies, and creating a globally competitive, efficient and sustainable transport sector that supports economic growth and improves quality of life for all,” he added.

    “The kingdom’s forward-thinking approach and commitment to innovation make it a natural market for our regional expansion,” said Li Xuan, WeRide’s chief financial officer and head of international. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: 166 trucks with humanitarian aid entered Gaza overnight – Egyptian source

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    CAIRO, July 25 (Xinhua) — About 166 trucks carrying humanitarian aid entered the Gaza Strip on the night from Wednesday to Thursday, Egyptian Al-Qahira Al-Ikhbariya TV reported, citing an anonymous source in the security forces.

    According to him, trucks carrying humanitarian aid entered the besieged enclave through the Zikim and Kerem Shalom /Kerem Abu Salem/ border crossings.

    The aid shipment included flour, food and medicine, the source said. “Egypt has stepped up its efforts with all international parties to deliver more aid to the Gaza Strip during this period,” he added.

    The humanitarian situation in the Palestinian enclave continues to deteriorate, with Israel cutting off supplies and food to Gaza after the first phase of the ceasefire agreement with Hamas expired in January.

    The UN Office for the Coordination of Humanitarian Affairs (OCHA) warned on Wednesday that hunger in the sector is at its worst ever, with aid workers and those they help exhausted, aid agencies say.

    A new round of indirect talks between Hamas and Israel resumed earlier this month in the Qatari capital Doha amid international efforts to end the conflict and resume humanitarian aid deliveries.

    Since October 2023, the Israeli military campaign has killed more than 59,210 Palestinians in the enclave and injured more than 143,040, according to Gaza’s medical authorities. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China’s domestically produced civil search and rescue aircraft Xinzhou-60 completes maiden test flight

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 25 (Xinhua) — China’s independently developed civil search and rescue aircraft MA60 successfully completed its maiden flight, officially starting the flight test and validation stage, according to Aviation Industry Corporation of China (AVIC), a leading Chinese aircraft maker.

    AVIC announced on Thursday that the aircraft successfully completed its daytime testing tasks during the one-hour and 20-minute test flight and landed safely at the airport in Xi’an, capital of northwest China’s Shaanxi Province.

    The new aircraft belongs to the domestically produced Xinzhou family of multi-role aircraft.

    According to AVIC experts, problems such as slow response times and limited coverage of the search system have long hampered the country’s ability to conduct maritime search and rescue operations over vast distances and in challenging conditions.

    Designed for search and rescue, terrain reconnaissance and personnel transportation, the Xinzhou-60 is designed to cover a wide range of application scenarios. It can perform search and rescue missions at sea, in high-altitude areas and in areas affected by natural disasters such as earthquakes and floods.

    The specialized aircraft is expected to greatly enhance China’s maritime search and rescue capabilities, significantly improving response speed and coverage area, AVIC said.

    The Xinzhou-60 aircraft development project was officially launched in December 2021. The production and delivery of major components was completed in December 2024, followed by final assembly and delivery work in May 2025. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Global investors’ confidence in China market is growing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Global sovereign wealth funds are increasing their China holdings, optimistic about China’s advances in digital technology, renewable energy and advanced manufacturing, according to Invesco’s latest Global Sovereign Wealth Management 2025 research report.

    About 60% of Middle Eastern sovereign wealth funds plan to increase their Chinese holdings over the next five years, while sovereign wealth funds from Asia-Pacific, Africa and North America have also said they will increase their investment in the Chinese market.

    Factors contributing to the increase in investment include high returns in the Chinese market, diversification of investment portfolios and improved Chinese policies on market access for foreign investors.

    Respondents acknowledged China’s favorable policies and noted that China’s innovation leadership in science and technology has increased, with digital technology, advanced manufacturing, clean energy, and medicine and health care being the most attractive areas.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Australia: Press conference, Calamvale, Queensland

    Source: Australian Parliamentary Secretary to the Minister for Industry

    Jim Chalmers:

    The purpose of economic reform is to boost incomes and lift living standards over time. When we came to office, living standards were in free fall, inflation was much higher and galloping, real wages were falling, interest rates had already started to come up – and we’ve been turning things around. We’ve got inflation much lower, sustainably within the Reserve Bank’s target band, real wages are growing again, interest rates have started to come down, unemployment is low, we’ve delivered a couple of surpluses and we’ve got the Liberal debt down as well.

    We’ve made a lot of progress together in our economy, but we know that there’s more work to do. We’ve got a big agenda that we are delivering, that we are rolling out. But we know that at a time when people are still under pressure, the global economic environment is uncertain and when we’ve got these persistent structural issues in our economy as well, we’ve got more work to do and that’s what our efforts on economic reform are all about.

    Our Economic Reform Roundtable is all about making our economy more productive and more resilient and our budget more sustainable at the same time. Now, these are long‑standing issues in our economy and there’s no quick fix. We have an agenda that we’re rolling out, and we are looking to build consensus about next steps when it comes to our economy.

    Now, when it comes to the range of views which have been provided, especially in the last couple of days, whether it be from the union movement, the business community, the Productivity Commission, there have been a range of proposals put to us. I know that the Member for Wentworth and the federal parliament is hosting a tax reform discussion today as well.

    I want to make it really clear – we welcome ideas on the future of our economy from every corner of our economy and every part of our communities. This is a good thing to see the kind of engagement and interest that we’ve seen in the government’s Economic Reform Roundtable and all of the processes which surround it. We don’t expect there to be a unanimous view, but we are seeking common ground. We do welcome ideas from all parts of our country and we’re very encouraged by the level of interest and engagement that we are seeing.

    When it comes to the Productivity Commission report released overnight, I wanted to make a couple of points specifically about that. The Productivity Commission makes it really clear that this challenge in our economy has not been just a feature of our economy the last couple of years, but for the last couple of decades. Our productivity challenge is a long‑standing challenge. The weakest decade for productivity growth in the last 60 years was the decade that our political opponents presided over. So, this challenge has been in our economy for some time.

    There are no quick fixes and we want to work with business and unions and the community more broadly to turn that around over time. Making our economy more productive is one of the most important ways that we can boost incomes and lift living standards over time, and that’s why it’s such a priority for us. Our priorities are to make our economy more productive, to make our economy more resilient in the face of all this global uncertainty, and also to make our budget more sustainable. At the same time, the Productivity Commission has provided some thinking to help us work through these issues. We also welcome the input from unions and businesses and others. I suspect that there will be more of this between now and the Roundtable next month, and that’s a very good thing. Happy to take a couple of questions.

    Journalist:

    Minister, I’ve just got a few questions from our journos in Canberra. On productivity, business and unions are already taking shots at each other in the media over the Productivity Roundtable. Are you worried that the process is becoming unconstructive already?

    Chalmers:

    Not at all. There’ll be a range of views about our productivity challenge and that’s a good thing. We welcome engagement and interest and ideas from unions, from business, from the Productivity Commission, from the community sector and from others. It’s a good thing in a country like ours that we can tease out our differences and seek common ground and that’s what we’re seeing right now. This is precisely why we’re seeking to bring people together. Not because we expect everyone to have a unanimous view. But because everyone’s got an interest in strengthening our economy and strengthening our budget, making our economy more productive and more resilient, lifting living standards and boosting incomes.

    Every Australian has an interest in that. Not every Australian will have a unanimous view, but this is our best effort to seek common ground around these big, persistent structural challenges in our economy. We think it’s a good thing that that conversation that people are engaged in is robust. We think it’s a good thing that people are being blunt and upfront about their views. I think that gives us the best possible chance of working out if there’s common ground and where that common ground might exist.

    Journalist:

    How does Queensland benefit from the opening of [INAUDIBLE] beef imports from the US?

    Chalmers:

    Well, this has been a long standing process that has been underway. It’s a scientific process that involves experts and scientists and it makes sure that our arrangements are up to scratch. I see that there’s a lot of commentary around this in the last day or 2. I know that our political opponents want to play their usual low‑rent politics over it but this is a long‑standing scientific process. It’s coming to a conclusion and it’s all about making sure that we have the best arrangements based on the best scientific advice.

    Journalist:

    The ACTU says that workplace managers are dragging down the nation’s productivity. Is that a view you share?

    Chalmers:

    I think it’s obvious that when it comes to decisions taken by managers and by boards and by others, obviously, that has implications for productivity. I think it would be unusual in the extreme if the ACTU representing Australian workers weren’t able to make that view public. And as I said before, and in answer to your colleague’s question here, I think it’s a good thing.

    Whether it’s the unions, the business community, the PC or others, people should be free to express their views about the best way forward when it comes to making our economy more productive. Obviously, decisions taken by managers and by boards and by others are relevant here to the productivity challenge and I think the ACTU should be able to make their views public.

    Journalist:

    Hoping to ask you a question about the ABC’s Four Corners story about the ATO and Paul Keating’s company. Are you confident that ordinary taxpayers would have the same level of access and the opportunity to get a similar outcome on a tax write‑off as the former Prime Minister Paul Keating?

    Chalmers:

    Well, first of all, I want to make it clear that the first I knew about that decision was when I read it on the ABC website. It’s not something that I was involved in or aware of. In fact, the decision, as I understand it, was made about a decade ago in 2015. That’s 3 treasurers ago, 4 if you include Scott Morrison’s sneaky second stint as Treasurer. So, a long time ago under a government of a different persuasion and a few treasurers ago.

    The ATO takes these decisions independently, that’s how the system works, and treasurers of both political persuasions don’t make commentary on the tax affairs of individuals or individual companies. These decisions are rightly taken independently by the ATO. They have their own processes when it comes to reviewing and considering appeals and feedback that they get from different taxpayers. And that is appropriately a matter for them.

    Journalist:

    Will you be contacting them though, and asking them for a full explanation?

    Chalmers:

    Look, I speak regularly with the Commissioner of Tax Rob Heferen. I appointed him not that long ago. We met not that long ago, we catch up relatively frequently, but it’s not for me to second‑guess decisions taken 10 years ago under other treasurers and other tax commissioners. There are good reasons why the ATO takes those sorts of decisions independently, free of political involvement or interference.

    Journalist:

    Do you think that Glencore is bluffing when it says it’s going to close its copper smelter? And if it isn’t bluffing, what is the federal government doing to protect 17,000 indirect jobs through the chain of supply in North Queensland?

    Chalmers:

    This is a very anxious time for the workers of North Queensland and North West Queensland as well. Very anxious time. The Industry Minister, Tim Ayres, gave an update to the Senate yesterday – as I understand it – on these matters. Our priority is to try and find a way through. Minister Ayres, I think, is convening the major players involved here in the next few weeks to try and find a way through.

    I’m not interested in second guessing the explanations that the company might be providing. I’m interested in trying to find a way through, so I work with Tim Ayres. He’s been very focused on this. We’re obviously very aware of it. It’s obviously an anxious time for all of the workers and communities involved and so if we can find a way through, we will. Tim Ayres is bringing people together to try and see what the next steps could be.

    Journalist:

    Minister, France has announced it will recognise Palestine at the UN General Assembly in September, would that influence Australia’s position?

    Chalmers:

    That’s a matter for the French government. Our Australian position is very clear. We’ve called for an immediate end of the war in Gaza and we support an enduring 2 state solution as the best pathway out of this endless cycle of violence. So the Australian position is clear. I know that Penny Wong will be speaking later on today in the context of the AUKMIN ministers meeting in Sydney, so she might have more to add about that then.

    Journalist:

    Ms Spender is hosting her own tax roundtable today where halting the $3 million super tax will be discussed. Would you be open to hearing those similar sorts of views from that roundtable in your own discussions and roundtable?

    Chalmers:

    I’ve been consulting on that issue for 2 and a half years now. We announced that decision, that policy, 2 and a half years ago. We’ve done 3 rounds of formal consultation, there’s been Treasury‑led technical roundtables, stakeholder roundtables, bilateral engagement, so we’ve been engaging and consulting on that for years now. I know that Allegra has a view about it and she has a right to express that view, as do people participating at the roundtable. I want to say this more broadly, I think it’s absolutely terrific that Allegra Spender is bringing people together as part of the tax component of this Economic Reform Roundtable.

    The Economic Reform Roundtable, as I said, is about productivity, resilience and budget sustainability and obviously, tax has a role to play in all 3 of those things so I think it’s a really good thing that Allegra is bringing those experts together in Canberra today. As I understand it, I will obviously listen to and respect the views put forward around that table today in Canberra. My position on making these generous tax concessions – still generous, still concessional – but fairer and more sustainable is well known, well established.

    Thanks very much.

    Journalist:

    Thank you very much, Treasurer.

    MIL OSI News

  • MIL-OSI: Municipality Finance issues EUR 20 million zero coupon notes under its MTN programme

    Source: GlobeNewswire (MIL-OSI)

    Municipality Finance Plc
    Stock exchange release
    25 July 2025 at 10:00 am (EEST)

    Municipality Finance issues EUR 20 million zero coupon notes under its MTN programme

    Municipality Finance Plc issues EUR 20 million zero coupon notes on 28 July 2025. The maturity date of the notes is 28 July 2065. MuniFin has a right, but no obligation, to redeem the notes early on 28 July 2033.

    The notes are issued under MuniFin’s EUR 50 billion programme for the issuance of debt instruments. The offering circular and the final terms of the notes are available in English on the company’s website at https://www.kuntarahoitus.fi/en/for-investors.

    MuniFin has applied for the notes to be admitted to trading on the Helsinki Stock Exchange maintained by Nasdaq Helsinki. The public trading is expected to commence on 28 July 2025.

    Goldman Sachs Bank Europe SE acts as the dealer for the issue of the notes.

    MUNICIPALITY FINANCE PLC

    Further information:

    Joakim Holmström
    Executive Vice President, Capital Markets and Sustainability
    tel. +358 50 444 3638

    MuniFin (Municipality Finance Plc) is one of Finland’s largest credit institutions. The owners of the company include Finnish municipalities, the public sector pension fund Keva and the State of Finland.
    The Group’s balance sheet is over EUR 53 billion.

    MuniFin builds a better and more sustainable future with its customers. MuniFin’s customers include municipalities, joint municipal authorities, wellbeing services counties, corporate entities under their control, and non-profit organisations nominated by the Housing Finance and Development Centre of Finland (ARA). Lending is used for environmentally and socially responsible investment targets such as public transportation, sustainable buildings, hospitals and healthcare centres, schools and day care centres, and homes for people with special needs.

    MuniFin’s customers are domestic but the company operates in a completely global business environment. The company is an active Finnish bond issuer in international capital markets and the first Finnish green and social bond issuer. The funding is exclusively guaranteed by the Municipal Guarantee Board.

    Read more: https://www.kuntarahoitus.fi/en/

    Important Information

    The information contained herein is not for release, publication or distribution, in whole or in part, directly or indirectly, in or into any such country or jurisdiction or otherwise in such circumstances in which the release, publication or distribution would be unlawful. The information contained herein does not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of, any securities or other financial instruments in any jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration, exemption from registration or qualification under the securities laws of any such jurisdiction.

    This communication does not constitute an offer of securities for sale in the United States. The notes have not been and will not be registered under the U.S. Securities Act of 1933, as amended (the “Securities Act”) or under the applicable securities laws of any state of the United States and may not be offered or sold, directly or indirectly, within the United States or to, or for the account or benefit of, U.S. persons except pursuant to an applicable exemption from, or in a transaction not subject to, the registration requirements of the Securities Act.

    The MIL Network

  • MIL-OSI Economics: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    Source: Securelist – Kaspersky

    Headline: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication, allowed attackers to gain full control over the infected servers, and were performed using an exploit chain of two vulnerabilities: CVE-2025-49704 and CVE-2025-49706, publicly named “ToolShell”. Additionally, on the same dates, Microsoft released out-of-band security patches for the vulnerabilities CVE-2025-53770 and CVE-2025-53771, aimed at addressing the security bypasses of previously issued fixes for CVE-2025-49704 and CVE-2025-49706. The release of the new, “proper” updates has caused confusion about exactly which vulnerabilities attackers are exploiting and whether they are using zero-day exploits.

    Kaspersky products proactively detected and blocked malicious activity linked to these attacks, which allowed us to gather statistics about the timeframe and spread of this campaign. Our statistics show that widespread exploitation started on July 18, 2025, and attackers targeted servers across the world in Egypt, Jordan, Russia, Vietnam, and Zambia. Entities across multiple sectors were affected: government, finance, manufacturing, forestry, and agriculture.

    While analyzing all artifacts related to these attacks, which were detected by our products and public information provided by external researchers, we found a dump of a POST request that was claimed to contain the malicious payload used in these attacks. After performing our own analysis, we were able to confirm that this dump indeed contained the malicious payload detected by our technologies, and that sending this single request to an affected SharePoint installation was enough to execute the malicious payload there.

    Our analysis of the exploit showed that it did rely on vulnerabilities fixed under CVE-2025-49704 and CVE-2025-49706, but by changing just one byte in the request, we were able to bypass those fixes.

    In this post, we provide detailed information about CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, and one related vulnerability. Since the exploit code is already published online, is very easy to use, and poses a significant risk, we encourage all organizations to install the necessary updates.

    The exploit

    Our research started with an analysis of a POST request dump associated with this wave of attacks on SharePoint servers.

    Snippet of the exploit POST request

    We can see that this POST request targets the “/_layouts/15/ToolPane.aspx” endpoint and embeds two parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. Looking at the code of ToolPane.aspx, we can see that this file itself does not contain much functionality and most of its code is located in the ToolPane class of the Microsoft.SharePoint.WebPartPages namespace in Microsoft.SharePoint.dll. Looking at this class reveals the code that works with the two parameters present in the exploit. However, accessing this endpoint under normal conditions is not possible without bypassing authentication on the attacked SharePoint server. This is where the first Microsoft SharePoint Server Spoofing Vulnerability CVE-2025-49706 comes into play.

    CVE-2025-49706

    This vulnerability is present in the method PostAuthenticateRequestHandler, in Microsoft.SharePoint.dll. SharePoint requires Internet Information Services (IIS) to be configured in integrated mode. In this mode, the IIS and ASP.NET authentication stages are unified. As a result, the outcome of IIS authentication is not determined until the PostAuthenticateRequest stage, at which point both the ASP.NET and IIS authentication methods have been completed. Therefore, the PostAuthenticateRequestHandler method utilizes a series of flags to track potential authentication violations. A logic bug in this method enables an authentication bypass if the “Referrer” header of the HTTP request is equal to “/_layouts/SignOut.aspx”, “/_layouts/14/SignOut.aspx”, or “/_layouts/15/SignOut.aspx” using case insensitive comparison.

    Vulnerable code in PostAuthenticateRequestHandler method (Microsoft.SharePoint.dll version 16.0.10417.20018)

    The code displayed in the image above handles the sign-out request and is also triggered when the sign-out page is specified as the referrer. When flag6 is set to false and flag7 is set to true, both conditional branches that could potentially throw an “Unauthorized Access” exception are bypassed.

    Unauthorized access checks bypassed by the exploit

    On July 8, 2025, Microsoft released an update that addressed this vulnerability by introducing additional checks to detect the usage of the “ToolPane.aspx” endpoint with the sign-out page specified as the referrer.

    CVE-2025-49706 fix (Microsoft.SharePoint.dll version 16.0.10417.20027)

    The added check uses case insensitive comparison to verify if the requested path ends with “ToolPane.aspx”. Is it possible to bypass this check, say, by using a different endpoint? Our testing has shown that this check can be easily bypassed.

    CVE-2025-53771

    We were able to successfully bypass the patch for vulnerability CVE-2025-49706 by adding just one byte to the exploit POST request. All that was required to bypass this patch was to add a “/” (slash) to the end of the requested “ToolPane.aspx” path.

    Bypass for CVE-2025-49706 fix

    On July 20, 2025, Microsoft released an update that fixed this bypass as CVE-2025-53771. This fix replaces the “ToolPane.aspx” check to instead check whether the requested path is in the list of paths allowed for use with the sign-out page specified as the referrer.

    CVE-2025-53771 fix (Microsoft.SharePoint.dll version 16.0.10417.20037)

    This allowlist includes the following paths: “/_layouts/15/SignOut.aspx”, “/_layouts/15/1033/initstrings.js”, “/_layouts/15/init.js”, “/_layouts/15/theming.js”, “/ScriptResource.axd”, “/_layouts/15/blank.js”, “/ScriptResource.axd”, “/WebResource.axd”, “/_layouts/15/1033/styles/corev15.css”, “/_layouts/15/1033/styles/error.css”, “/_layouts/15/images/favicon.ico”, “/_layouts/15/1033/strings.js”, “/_layouts/15/core.js”, and it can contain additional paths added by the administrator.

    While testing the CVE-2025-49706 bypass with the July 8, 2025 updates installed on our SharePoint debugging stand, we noticed some strange behavior. Not only did the bypass of CVE-2025-49706 work, but the entire exploit chain did! But wait! Didn’t the attackers use an additional Microsoft SharePoint Remote Code Execution Vulnerability CVE-2025-49704, which was supposed to be fixed in the same update? To understand why the entire exploit chain worked in our case, let’s take a look at the vulnerability CVE-2025-49704 and how it was fixed.

    CVE-2025-49704

    CVE-2025-49704 is an untrusted data deserialization vulnerability that exists due to improper validation of XML content. Looking at the exploit POST request, we can see that it contains two URL encoded parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. We can see how they are handled by examining the code of the method GetPartPreviewAndPropertiesFromMarkup in Microsoft.SharePoint.dll. A quick analysis reveals that “MSOtlPn_Uri”  is a page URL that might be pointing to an any file in the CONTROLTEMPLATES folder and the parameter “MSOtlPn_DWP” contains something known as WebPart markup. This markup contains special directives that can be used to execute safe controls on a server and has a format very similar to XML.

    WebPart markup used by the attackers

    While this “XML” included in the “MSOtlPn_DWP” parameter does not itself contain a vulnerability, it allows attackers to instantiate the ExcelDataSet control from Microsoft.PerformancePoint.Scorecards.Client.dll with CompressedDataTable property set to malicious payload and trigger its processing using DataTable property getter.

    Code of the method that handles the contents of ExcelDataSet’s CompressedDataTable property in the DataTable property getter

    Looking at the code of the ExcelDataSet’s DataTable property getter in Microsoft.PerformancePoint.Scorecards.Client.dll, we find the method GetObjectFromCompressedBase64String, responsible for deserialization of CompressedDataTable property contents. The data provided as Base64 string is decoded, unzipped, and passed to the BinarySerialization.Deserialize method from Microsoft.SharePoint.dll.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    Attackers use this method to provide a malicious DataSet whose deserialized content is shown in the image above. It contains an XML with an element of dangerous type “System.Collections.Generic.List1[[System.Data.Services.Internal.ExpandedWrapper2[…], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]”, which allows attackers to execute arbitrary methods with the help of the well-known ExpandedWrapper technique aimed at exploitation of unsafe XML deserialization in applications based on the .NET framework. In fact, this shouldn’t be possible, since BinarySerialization.Deserialize in Microsoft.SharePoint.dll uses a special XmlValidator designed to protect against this technique by checking the types of all elements present in the provided XML and ensuring that they are on the list of allowed types. However, the exploit bypasses this check by placing the ExpandedWrapper object into the list.

    Now, to find out why the exploit worked on our SharePoint debugging stand with the July 8, 2025 updates installed, let’s take a look at how this vulnerability was fixed. In this patch, Microsoft did not really fix the vulnerability but only mitigated it by adding the new AddExcelDataSetToSafeControls class to the Microsoft.SharePoint.Upgrade namespace. This class contains new code that modifies the web.config file and marks the Microsoft.PerformancePoint.Scorecards.ExcelDataSet control as unsafe. Because SharePoint does not execute this code on its own after installing updates, the only way to achieve the security effect was to manually run a configuration upgrade using the SharePoint Products Configuration Wizard tool. Notably, the security guidance for CVE-2025-49704 does not mention the need for this step, which means at least some SharePoint administrators may skip it. Meanwhile, anyone who installed this update but did not manually perform a configuration upgrade remained vulnerable.

    CVE-2025-53770

    On July 20, 2025, Microsoft released an update with a proper fix for the CVE-2025-49704 vulnerability. This patch introduces an updated XmlValidator that now properly validates element types in XML, preventing exploitation of this vulnerability without requiring a configuration upgrade and, more importantly, addressing the root cause and preventing exploitation of the same vulnerability through controls other than Microsoft.PerformancePoint.Scorecards.ExcelDataSet.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    CVE-2020-1147

    Readers familiar with previous SharePoint exploits might feel that the vulnerability CVE-2025-49704/CVE-2025-53770 and the exploit used by the attackers looks very familiar and very similar to the older .NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability CVE-2020-1147. In fact, if we compare the exploit for CVE-2020-1147 and an exploit for CVE-2025-49704/CVE-2025-53770, we can see that they are almost identical. The only difference is that in the exploit for CVE-2025-49704/CVE-2025-53770, the dangerous ExpandedWrapper object is placed in the list. This makes CVE-2025-53770 an updated fix for CVE-2020-1147.

    DataSet with XML content exploiting CVE-2020-1147

    Conclusions

    Despite the fact that patches for the ToolShell vulnerabilities are now available for deployment, we assess that this chain of exploits will continue being used by attackers for a long time. We have been observing the same situation with other notorious vulnerabilities, such as ProxyLogon, PrintNightmare, or EternalBlue. While they have been known for years, many threat actors still continue leveraging them in their attacks to compromise unpatched systems. We expect the ToolShell vulnerabilities to follow the same fate, as they can be exploited with extremely low effort and allow full control over the vulnerable server.

    To stay better protected against threats like ToolShell, we as a community should learn lessons from previous events in the industry related to critical vulnerabilities. Specifically, the speed of applying security patches nowadays is the most important factor when it comes to fighting such vulnerabilities. Since public exploits for these dangerous vulnerabilities appear very soon after vulnerability announcements, it is paramount to install patches as soon as possible, as a gap of even a few hours can make a critical difference.

    At the same time, it is important to protect enterprise networks against zero-day exploits, which can be leveraged when there is no available public patch for vulnerabilities. In this regard, it is critical to equip machines with reliable cybersecurity solutions that have proven effective in combatting ToolShell attacks before they were publicly disclosed.

    Kaspersky Next with its Behaviour detection component proactively protects against  exploitation of these vulnerabilities. Additionally, it is able to detect exploitation and the subsequent malicious activity.

    Kaspersky products detect the exploits and malware used in these attacks with the following verdicts:

    • UDS:DangerousObject.Multi.Generic
    • PDM:Exploit.Win32.Generic
    • PDM:Trojan.Win32.Generic
    • HEUR:Trojan.MSIL.Agent.gen
    • ASP.Agent.*
    • PowerShell.Agent.*

    MIL OSI Economics

  • MIL-OSI Economics: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    Source: Securelist – Kaspersky

    Headline: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication, allowed attackers to gain full control over the infected servers, and were performed using an exploit chain of two vulnerabilities: CVE-2025-49704 and CVE-2025-49706, publicly named “ToolShell”. Additionally, on the same dates, Microsoft released out-of-band security patches for the vulnerabilities CVE-2025-53770 and CVE-2025-53771, aimed at addressing the security bypasses of previously issued fixes for CVE-2025-49704 and CVE-2025-49706. The release of the new, “proper” updates has caused confusion about exactly which vulnerabilities attackers are exploiting and whether they are using zero-day exploits.

    Kaspersky products proactively detected and blocked malicious activity linked to these attacks, which allowed us to gather statistics about the timeframe and spread of this campaign. Our statistics show that widespread exploitation started on July 18, 2025, and attackers targeted servers across the world in Egypt, Jordan, Russia, Vietnam, and Zambia. Entities across multiple sectors were affected: government, finance, manufacturing, forestry, and agriculture.

    While analyzing all artifacts related to these attacks, which were detected by our products and public information provided by external researchers, we found a dump of a POST request that was claimed to contain the malicious payload used in these attacks. After performing our own analysis, we were able to confirm that this dump indeed contained the malicious payload detected by our technologies, and that sending this single request to an affected SharePoint installation was enough to execute the malicious payload there.

    Our analysis of the exploit showed that it did rely on vulnerabilities fixed under CVE-2025-49704 and CVE-2025-49706, but by changing just one byte in the request, we were able to bypass those fixes.

    In this post, we provide detailed information about CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, and one related vulnerability. Since the exploit code is already published online, is very easy to use, and poses a significant risk, we encourage all organizations to install the necessary updates.

    The exploit

    Our research started with an analysis of a POST request dump associated with this wave of attacks on SharePoint servers.

    Snippet of the exploit POST request

    We can see that this POST request targets the “/_layouts/15/ToolPane.aspx” endpoint and embeds two parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. Looking at the code of ToolPane.aspx, we can see that this file itself does not contain much functionality and most of its code is located in the ToolPane class of the Microsoft.SharePoint.WebPartPages namespace in Microsoft.SharePoint.dll. Looking at this class reveals the code that works with the two parameters present in the exploit. However, accessing this endpoint under normal conditions is not possible without bypassing authentication on the attacked SharePoint server. This is where the first Microsoft SharePoint Server Spoofing Vulnerability CVE-2025-49706 comes into play.

    CVE-2025-49706

    This vulnerability is present in the method PostAuthenticateRequestHandler, in Microsoft.SharePoint.dll. SharePoint requires Internet Information Services (IIS) to be configured in integrated mode. In this mode, the IIS and ASP.NET authentication stages are unified. As a result, the outcome of IIS authentication is not determined until the PostAuthenticateRequest stage, at which point both the ASP.NET and IIS authentication methods have been completed. Therefore, the PostAuthenticateRequestHandler method utilizes a series of flags to track potential authentication violations. A logic bug in this method enables an authentication bypass if the “Referrer” header of the HTTP request is equal to “/_layouts/SignOut.aspx”, “/_layouts/14/SignOut.aspx”, or “/_layouts/15/SignOut.aspx” using case insensitive comparison.

    Vulnerable code in PostAuthenticateRequestHandler method (Microsoft.SharePoint.dll version 16.0.10417.20018)

    The code displayed in the image above handles the sign-out request and is also triggered when the sign-out page is specified as the referrer. When flag6 is set to false and flag7 is set to true, both conditional branches that could potentially throw an “Unauthorized Access” exception are bypassed.

    Unauthorized access checks bypassed by the exploit

    On July 8, 2025, Microsoft released an update that addressed this vulnerability by introducing additional checks to detect the usage of the “ToolPane.aspx” endpoint with the sign-out page specified as the referrer.

    CVE-2025-49706 fix (Microsoft.SharePoint.dll version 16.0.10417.20027)

    The added check uses case insensitive comparison to verify if the requested path ends with “ToolPane.aspx”. Is it possible to bypass this check, say, by using a different endpoint? Our testing has shown that this check can be easily bypassed.

    CVE-2025-53771

    We were able to successfully bypass the patch for vulnerability CVE-2025-49706 by adding just one byte to the exploit POST request. All that was required to bypass this patch was to add a “/” (slash) to the end of the requested “ToolPane.aspx” path.

    Bypass for CVE-2025-49706 fix

    On July 20, 2025, Microsoft released an update that fixed this bypass as CVE-2025-53771. This fix replaces the “ToolPane.aspx” check to instead check whether the requested path is in the list of paths allowed for use with the sign-out page specified as the referrer.

    CVE-2025-53771 fix (Microsoft.SharePoint.dll version 16.0.10417.20037)

    This allowlist includes the following paths: “/_layouts/15/SignOut.aspx”, “/_layouts/15/1033/initstrings.js”, “/_layouts/15/init.js”, “/_layouts/15/theming.js”, “/ScriptResource.axd”, “/_layouts/15/blank.js”, “/ScriptResource.axd”, “/WebResource.axd”, “/_layouts/15/1033/styles/corev15.css”, “/_layouts/15/1033/styles/error.css”, “/_layouts/15/images/favicon.ico”, “/_layouts/15/1033/strings.js”, “/_layouts/15/core.js”, and it can contain additional paths added by the administrator.

    While testing the CVE-2025-49706 bypass with the July 8, 2025 updates installed on our SharePoint debugging stand, we noticed some strange behavior. Not only did the bypass of CVE-2025-49706 work, but the entire exploit chain did! But wait! Didn’t the attackers use an additional Microsoft SharePoint Remote Code Execution Vulnerability CVE-2025-49704, which was supposed to be fixed in the same update? To understand why the entire exploit chain worked in our case, let’s take a look at the vulnerability CVE-2025-49704 and how it was fixed.

    CVE-2025-49704

    CVE-2025-49704 is an untrusted data deserialization vulnerability that exists due to improper validation of XML content. Looking at the exploit POST request, we can see that it contains two URL encoded parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. We can see how they are handled by examining the code of the method GetPartPreviewAndPropertiesFromMarkup in Microsoft.SharePoint.dll. A quick analysis reveals that “MSOtlPn_Uri”  is a page URL that might be pointing to an any file in the CONTROLTEMPLATES folder and the parameter “MSOtlPn_DWP” contains something known as WebPart markup. This markup contains special directives that can be used to execute safe controls on a server and has a format very similar to XML.

    WebPart markup used by the attackers

    While this “XML” included in the “MSOtlPn_DWP” parameter does not itself contain a vulnerability, it allows attackers to instantiate the ExcelDataSet control from Microsoft.PerformancePoint.Scorecards.Client.dll with CompressedDataTable property set to malicious payload and trigger its processing using DataTable property getter.

    Code of the method that handles the contents of ExcelDataSet’s CompressedDataTable property in the DataTable property getter

    Looking at the code of the ExcelDataSet’s DataTable property getter in Microsoft.PerformancePoint.Scorecards.Client.dll, we find the method GetObjectFromCompressedBase64String, responsible for deserialization of CompressedDataTable property contents. The data provided as Base64 string is decoded, unzipped, and passed to the BinarySerialization.Deserialize method from Microsoft.SharePoint.dll.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    Attackers use this method to provide a malicious DataSet whose deserialized content is shown in the image above. It contains an XML with an element of dangerous type “System.Collections.Generic.List1[[System.Data.Services.Internal.ExpandedWrapper2[…], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]”, which allows attackers to execute arbitrary methods with the help of the well-known ExpandedWrapper technique aimed at exploitation of unsafe XML deserialization in applications based on the .NET framework. In fact, this shouldn’t be possible, since BinarySerialization.Deserialize in Microsoft.SharePoint.dll uses a special XmlValidator designed to protect against this technique by checking the types of all elements present in the provided XML and ensuring that they are on the list of allowed types. However, the exploit bypasses this check by placing the ExpandedWrapper object into the list.

    Now, to find out why the exploit worked on our SharePoint debugging stand with the July 8, 2025 updates installed, let’s take a look at how this vulnerability was fixed. In this patch, Microsoft did not really fix the vulnerability but only mitigated it by adding the new AddExcelDataSetToSafeControls class to the Microsoft.SharePoint.Upgrade namespace. This class contains new code that modifies the web.config file and marks the Microsoft.PerformancePoint.Scorecards.ExcelDataSet control as unsafe. Because SharePoint does not execute this code on its own after installing updates, the only way to achieve the security effect was to manually run a configuration upgrade using the SharePoint Products Configuration Wizard tool. Notably, the security guidance for CVE-2025-49704 does not mention the need for this step, which means at least some SharePoint administrators may skip it. Meanwhile, anyone who installed this update but did not manually perform a configuration upgrade remained vulnerable.

    CVE-2025-53770

    On July 20, 2025, Microsoft released an update with a proper fix for the CVE-2025-49704 vulnerability. This patch introduces an updated XmlValidator that now properly validates element types in XML, preventing exploitation of this vulnerability without requiring a configuration upgrade and, more importantly, addressing the root cause and preventing exploitation of the same vulnerability through controls other than Microsoft.PerformancePoint.Scorecards.ExcelDataSet.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    CVE-2020-1147

    Readers familiar with previous SharePoint exploits might feel that the vulnerability CVE-2025-49704/CVE-2025-53770 and the exploit used by the attackers looks very familiar and very similar to the older .NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability CVE-2020-1147. In fact, if we compare the exploit for CVE-2020-1147 and an exploit for CVE-2025-49704/CVE-2025-53770, we can see that they are almost identical. The only difference is that in the exploit for CVE-2025-49704/CVE-2025-53770, the dangerous ExpandedWrapper object is placed in the list. This makes CVE-2025-53770 an updated fix for CVE-2020-1147.

    DataSet with XML content exploiting CVE-2020-1147

    Conclusions

    Despite the fact that patches for the ToolShell vulnerabilities are now available for deployment, we assess that this chain of exploits will continue being used by attackers for a long time. We have been observing the same situation with other notorious vulnerabilities, such as ProxyLogon, PrintNightmare, or EternalBlue. While they have been known for years, many threat actors still continue leveraging them in their attacks to compromise unpatched systems. We expect the ToolShell vulnerabilities to follow the same fate, as they can be exploited with extremely low effort and allow full control over the vulnerable server.

    To stay better protected against threats like ToolShell, we as a community should learn lessons from previous events in the industry related to critical vulnerabilities. Specifically, the speed of applying security patches nowadays is the most important factor when it comes to fighting such vulnerabilities. Since public exploits for these dangerous vulnerabilities appear very soon after vulnerability announcements, it is paramount to install patches as soon as possible, as a gap of even a few hours can make a critical difference.

    At the same time, it is important to protect enterprise networks against zero-day exploits, which can be leveraged when there is no available public patch for vulnerabilities. In this regard, it is critical to equip machines with reliable cybersecurity solutions that have proven effective in combatting ToolShell attacks before they were publicly disclosed.

    Kaspersky Next with its Behaviour detection component proactively protects against  exploitation of these vulnerabilities. Additionally, it is able to detect exploitation and the subsequent malicious activity.

    Kaspersky products detect the exploits and malware used in these attacks with the following verdicts:

    • UDS:DangerousObject.Multi.Generic
    • PDM:Exploit.Win32.Generic
    • PDM:Trojan.Win32.Generic
    • HEUR:Trojan.MSIL.Agent.gen
    • ASP.Agent.*
    • PowerShell.Agent.*

    MIL OSI Economics

  • MIL-OSI Russia: Large-scale summer school “Cryptography and information security” ended in St. Petersburg

    Translation. Region: Russian Federal

    Source: Novosibirsk State University –

    An important disclaimer is at the bottom of this article.

    For more than two weeks, “Boiling Point – St. Petersburg. GUAP” was truly “boiling”, despite the midsummer. In each of the halls, the participants of the summer school “Cryptography and Information Security” were working. The traditional event, organized by the Cryptographic Center (Novosibirsk), International Mathematical Center in Akademgorodok, this year the GUAP venue hosted the event. The summer school was held for the seventh time, it brought together more than 35 teachers and over 165 students, postgraduates and schoolchildren from 35 cities of Russia. The geography of the participants is extensive: Tver, Novosibirsk, Voronezh, Khanty-Mansiysk, Sevastopol, St. Petersburg, Moscow, Ufa, Rostov-on-Don, Tyumen, Kaliningrad and other cities of our country.

    The head of the school is Natalia Tokareva, associate professor of the Department of Theoretical Cybernetics. Faculty of Mechanics and Mathematics of NSU, head of the Cryptographic Center (Novosibirsk). The organizers and partners of the summer school in 2025 were the St. Petersburg State University of Aerospace Instrumentation, Southern Federal University, Special Technology Center LLC, Practical Security Systems LLC, Infotex JSC, Enseucrypto-lab LLC and NeoQUEST. Vice-Rector for Educational Work and Youth Policy Larisa Nikolaeva and the GUAP team were responsible for the organizational issues of the large-scale event.

    Participants received knowledge from leading experts in the scientific and business fields, visited key enterprises in St. Petersburg and interesting excursions, and also united through training and sports games.

    The event’s partners — universities and companies working in the field of cryptography and information security — provided the summer school participants with not only new and useful knowledge, expert lectures, but also career opportunities and development prospects in the profession. The students were able to learn everything about internships and future careers in companies such as OOO Special Technology Center, OOO Systems of Practical Security, AO Infotex, OOO Enseucrypto-lab and NeoQUEST. Representatives of these organizations personally talked to the students, answered all their questions and told them what steps they should take to take their first career steps in the field of information security.

    The basis of the summer school was work on projects. Divided into teams, in which scientific research was carried out under the supervision of curators, the guys were preparing to present each of the projects at the final conference. The topics of the projects touched upon various issues of modern cryptography and information security: algorithms of symmetric and asymmetric cryptography, issues of constructing cryptographic protocols for solving authentication, identification, key transfer, and messaging problems. The topics of the projects were suitable for both beginners in the field of cryptography and information security, and for advanced students who had already acquired knowledge as part of their studies.

    On July 21, the summer school’s final conference took place, where the teams presented the results of their work. 23 research projects developed by the participants were combined by the organizers into a collection of papers. It can be found on the event website.

    Participants shared what projects they worked on and what new things they learned during these two busy weeks.

    Daria Severukhina, Novosibirsk:

    — Our project was dedicated to the topic of post-quantum cryptography. We were engaged in the analysis of the vulnerability of a cryptosystem based on the “lattice theory”, namely, the study of side-channel attacks. Post-quantum cryptography is very relevant now, and the topic we were working on is one of the most promising in this area. I study at the Faculty of Mechanics and Mathematics and I study cryptography only in special courses that are held at our university. Therefore, this summer school is a great start to skills and knowledge in this area. In these two weeks, I learned so much information, met leading scientists in this area, I managed to work with them, which is very valuable. I am very glad that I got the opportunity to acquire this knowledge in practice.

    Alina Skibina, Saint Petersburg:

    — In our project on the topic of “Development of a prototype of a cryptographic hash function,” we developed a prototype of a hash function called “Gorynych.” We tried to create a hash function based on the Russian standard “Stribog,” inspired by the SURF function of Bernstein. This function has a simple design, high stability, and speed. These are the properties that modern hash functions should have. The team turned out to be friendly, well-coordinated, I enjoyed our interaction, I did not feel discomfort. There were many jokes, funny moments that diluted the intense work. I am very pleased with my participation in the summer school. This is not my first participation in such an event, so I was ready for intensive work. The most important skill is experience working in a team. And the lectures are very informative and interesting in that they touch on many areas of cryptography, and perhaps I will work in some of them in the future.

    Anna Kozubova, Novorossiysk

    — I finished the 9th grade and got to the summer school. Thanks to my participation, I decided on the direction that I would choose to study at GUAP — “Information Security”. Many useful lectures were held for us, and although they were more focused on people who were already studying in this specialty, I was able to study this topic additionally and become interested in it. I want to thank my team, where friendly and working relationships were formed over these two weeks. It was precisely because we united that we were able to prepare such a wonderful project. But none of this would have happened if it were not for our mentor — a true master of his craft — Bezzateev Sergey Valentinovich. In a word, the summer school became an important event for me.

    Kirill Gromov, Tver:

    — Our project was dedicated to electronic signatures of documents. We considered post-quantum algorithms, which have a higher complexity and are designed so that with the next stage of computer technology development they will not be hackable. We also considered vulnerabilities that are better known at the moment. This is a very good experience to find out what will change in this area now. The scientific community, the experts who supported our projects are, first of all, our like-minded people and people who are interested in the development of this area. To communicate and work with such people almost on equal terms is a very good experience. A wonderful team, new knowledge, a beautiful city, and, despite the fatigue, there was strength for communication.

    Artem Kolbeev, Sevastopol:

    — This is my second time participating in the summer school “Cryptography and Information Security” and working with the same scientific supervisor — Oleg Sergeevich Zaikin. He guides the team in the right direction. We managed to choose a promising topic for study. I really liked the organization of the summer school — everything was organized competently, and we were given time not only for work, but also for excursions, recreation, and sports. The venue is suitable for comfortable work. We were given a number of very interesting lectures. And several ideas for further scientific developments arose.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI: 39/2025・Trifork Group: Reporting of transactions made by persons discharging managerial responsibilities

    Source: GlobeNewswire (MIL-OSI)

    Company announcement no. 39 / 2025
    Schindellegi, Switzerland – 25 July 2025

    Reporting of transactions made by persons discharging managerial responsibilities

    Pursuant to the Market Abuse Regulation Article 19, Trifork Group AG (Swiss company registration number CHE-474.101.854) (“Trifork”) hereby notifies receipt of information of the following transactions made by persons discharging managerial responsibilities in Trifork in connection with fixed salaries paid in shares. Reference is made to company announcement no. 1/2025 on 21 January 2025.

    1. Details of the person discharging managerial responsibilities/person closely associated
    a) Name Jørn Larsen
    2. Reason for the notification
    a) Position/status CEO
    b) Initial notification/
    Amendment
    Initial notification
    3. Details of the issuer, emission allowance market participant, auction platform, auctioneer or auction monitor
    a) Name Trifork Group AG
    b) LEI 8945004BYZKXPESTBL36
    4.1 Details of the transaction(s)
    a) Description of the financial instrument, type of instrument

    Identification code

    Shares

    ISIN CH1111227810

    b) Nature of the transaction A share of 25% of the fixed monthly salary is paid out in shares as described in the company announcement no. 1/2025.
    c) Price(s) and volume(s) Price(s) Volume(s)
    DKK 0 1,142
    d) Aggregated information

    Aggregated volume —
    Price
    N/A
    e) Date of the transaction 25 July 2025
    f) Place of the transaction Outside a trading venue
    1. Details of the person discharging managerial responsibilities/person closely associated
    a) Name Kristian Wulf-Andersen
    2. Reason for the notification
    a) Position/status CFO
    b) Initial notification/
    Amendment
    Initial notification
    3. Details of the issuer, emission allowance market participant, auction platform, auctioneer or auction monitor
    a) Name Trifork Group AG
    b) LEI 8945004BYZKXPESTBL36
    4.1 Details of the transaction(s)
    a) Description of the financial instrument, type of instrument

    Identification code

    Shares

    ISIN CH1111227810

    b) Nature of the transaction A share of 10% of the fixed monthly salary is paid out in shares as described in the company announcement no. 1/2025.
    c) Price(s) and volume(s) Price(s) Volume(s)
    DKK 0 304
    d) Aggregated information

    Aggregated volume —
    Price
    N/A
    e) Date of the transaction 25 July 2025
    f) Place of the transaction Outside a trading venue


    Investor and media contact

    Frederik Svanholm, Group Investment Director, frsv@trifork.com, +41 79 357 73 17

    About Trifork
    Trifork (Nasdaq Copenhagen: TRIFOR) is a pioneering global technology company, empowering enterprise and public sector customers with innovative digital products and solutions. With 1,215 professionals across 71 business units in 16 countries, Trifork specializes in designing, building, and operating advanced software across sectors such as public administration, healthcare, manufacturing, logistics, energy, financial services, retail, and real estate. The Group’s R&D arm, Trifork Labs, drives innovation by investing in and developing synergistic, high-potential technology companies. Learn more at trifork.com.

    Attachment

    The MIL Network

  • MIL-Evening Report: Leaked document reveals proposed law revisions in NZ, as Western defence of Zionist genocide threatens Pacific

    SPECIAL REPORT: By Mick Hall

    A leaked document has revealed secretive plans to revise terror laws in New Zealand so that people can be charged over statements deemed to constitute material support for a proscribed organisation.

    It shows the government also wants to widen the criteria for proscribing organisations to include groups that are judged to “facilitate” or “promote and encourage” terrorist acts.

    The changes would see the South Pacific nation falling in line with increasingly repressive Western countries like the UK, where scores of independent journalists and anti-genocide protesters have been arrested and charged under terrorism laws in recent months.

    The consultation document, handed over to the New Zealand Council for Civil Liberties (NZCCL), reveals the government has been in contact with a small number of unnamed groups this year over plans to legally redefine what material support involves, so that public statements or gestures involving insignia like flags can lead to charges if construed as support for proscribed groups.

    As part of a proposal to revise the Terrorism Suppression Act, the document suggests the process for designating organisations as terror groups should be changed by “expanding the threshold to enable more modern types of entities to be designated, such as those that ‘facilitate’ or ‘promote and encourage’ terrorist acts”.

    The Ministry of Justice has been contacted in an attempt to ascertain which groups it has been consulting with and why it believed the changes were necessary.

    NZCCL chairman Thomas Beagle told Mick Hall In Context his group was concerned the proposed changes were a further attempt to limit the rights of New Zealanders to engage in political protest.

    ‘What’s going on?’
    “When you look at the proposal to expand the Terrorism Suppression Act, alongside the Police and IPCA conspiring to propose a law change to ban political protest without government permission, you really have to wonder what’s going on,” he said.

    A report by the Independent Police Conduct Authority (IPCA) in February proposed to give police the right to ban protests if they believed there was a high chance of public disorder and threats to public safety.

    That would potentially mean bans on Palestinian solidarity protests if far right counter protestErs posed a threat of violent confrontation.

    The stand-alone legislation would put New Zealand in line with other Five Eyes and NATO-aligned security jurisdictions such as Australia, the United Kingdom, and Canada.

    Beagle points out proposed changes to terror laws would suppress freedom of speech and further undermine freedom of assembly and the right to protest.

    “We’ve seen what’s happening with the state’s abuse of terrorism suppression laws in the UK and are horrified that they have sunk so far and so quickly,” he said.

    More than 100 people were arrested across the UK on suspicion of supporting Palestine Action, a non-violent protest group proscribed as a terrorist organisation by the British government earlier this month.

    Arrests in social media clips
    Social media clips showed pensioners aggressively arrested while attending rallies in Liverpool, London, Manchester, Edinburgh, Bristol and Truro over the weekend.

    Independent journalists and academics have also faced state repression under the UK’s Terrorism Act.

    Among those targeted was Electronic Intifada journalist Asa Winstanley, who had his home raided and devices seized in October last year as part of the opaque counter-terror drive “Operation Incessantness”.

    Independent journalist Asa Winstanley . . . his home was raided and devices seized in October last year as part of “Operation Incessantness”. Image: R Witts Photography/mickhall.substack.com

    In May, the country’s Central Criminal Court ruled the raid was unlawful.

    Journalist Richard Medhurst has had a terror investigation hanging over his head since being detained at Heathrow Airport in August last year and charged under section 8 of the Terrorism Act. Activist and independent journalist Sarah Wilkinson had her house raided in the same month.

    Others have faced similar intimidation and threats of jail. In November 2024, Jewish academic Haim Bresheeth was charged after police alleged he had expressed support for a “proscribed organisation” during a speech outside the London residence of the Israeli ambassador to the UK.

    Meanwhile, dozens of members of Palestine Action are in jail facing terror charges. The vast majority are being held on remand where they may wait two years before going to trial — a common state tactic to take activists off the street and incarcerate them, knowing the chances of conviction are slim when they eventually go to court.

    ‘Targeted amendments’
    The document says the New Zealand government wants to progress “targeted amendments” to the Act, creating or amending offences “to capture contemporary behaviours and activities of concern” like “public expressions of support for a terrorist act or designated entities, for example by showing insignia or distributing propaganda or instructional material.”

    Protesters highlight the proscription of Palestine Action outside the British Embassy at The Hague on July 20. No arrests were made following 80 arrests by Dutch police the week before. Image: Defend Our Juries/mickhall.substack.com

    It proposes to improve “the timeliness of the process, by considering changes to who the decision-maker is” and extending the renewal period from three to five years.

    The document suggests consulting the Attorney-General over designation-related decisions to ensure legal requirements are met may not be required and questions whether the designation process requiring the Prime Minister to review decisions twice is necessary. It asks whether others, like the Foreign Minister, should be involved in the decision-making process.

    Beagle believes the secretive proposals pose a threat to New Zealand’s liberal democracy.

    “Political protest is an important part of New Zealand’s history,” he said.

    “Whether it’s the environment, worker’s rights, feminism, Māori issues, homosexual law reform or any number of other issues, political protest has had a big part in forming what Aotearoa New Zealand is today.

    Protected under Bill of Rights
    “It’s a right protected by New Zealand’s Bill of Rights and is a critical part of being a functioning democracy.”

    The terror laws revision forms part of a wider trend of legislating to close down dissent over New Zealand’s foreign policy, now closely aligned with NATO and US interests.

    The government is also widening the definition of foreign interference in a way that could see people who “should have known” that they were being used by a foreign state to undermine New Zealand’s interests prosecuted.

    The Crimes (Countering Foreign Interference) Amendment Bill, which passed its first reading in Parliament on November 19, would criminalise the act of foreign interference, while also increasing powers of unwarranted searches by authorities.

    The Bill is effectively a reintroduction of the country’s old colonial sedition laws inherited from Britain, the broadness of the law having allowed it to be used against communists, trade unionists and indigenous rights activists.

    Republished from Mick Hall in Context on Substack with permisson.

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Leaked document reveals proposed law revisions in NZ, as Western defence of Zionist genocide threatens Pacific

    SPECIAL REPORT: By Mick Hall

    A leaked document has revealed secretive plans to revise terror laws in New Zealand so that people can be charged over statements deemed to constitute material support for a proscribed organisation.

    It shows the government also wants to widen the criteria for proscribing organisations to include groups that are judged to “facilitate” or “promote and encourage” terrorist acts.

    The changes would see the South Pacific nation falling in line with increasingly repressive Western countries like the UK, where scores of independent journalists and anti-genocide protesters have been arrested and charged under terrorism laws in recent months.

    The consultation document, handed over to the New Zealand Council for Civil Liberties (NZCCL), reveals the government has been in contact with a small number of unnamed groups this year over plans to legally redefine what material support involves, so that public statements or gestures involving insignia like flags can lead to charges if construed as support for proscribed groups.

    As part of a proposal to revise the Terrorism Suppression Act, the document suggests the process for designating organisations as terror groups should be changed by “expanding the threshold to enable more modern types of entities to be designated, such as those that ‘facilitate’ or ‘promote and encourage’ terrorist acts”.

    The Ministry of Justice has been contacted in an attempt to ascertain which groups it has been consulting with and why it believed the changes were necessary.

    NZCCL chairman Thomas Beagle told Mick Hall In Context his group was concerned the proposed changes were a further attempt to limit the rights of New Zealanders to engage in political protest.

    ‘What’s going on?’
    “When you look at the proposal to expand the Terrorism Suppression Act, alongside the Police and IPCA conspiring to propose a law change to ban political protest without government permission, you really have to wonder what’s going on,” he said.

    A report by the Independent Police Conduct Authority (IPCA) in February proposed to give police the right to ban protests if they believed there was a high chance of public disorder and threats to public safety.

    That would potentially mean bans on Palestinian solidarity protests if far right counter protestErs posed a threat of violent confrontation.

    The stand-alone legislation would put New Zealand in line with other Five Eyes and NATO-aligned security jurisdictions such as Australia, the United Kingdom, and Canada.

    Beagle points out proposed changes to terror laws would suppress freedom of speech and further undermine freedom of assembly and the right to protest.

    “We’ve seen what’s happening with the state’s abuse of terrorism suppression laws in the UK and are horrified that they have sunk so far and so quickly,” he said.

    More than 100 people were arrested across the UK on suspicion of supporting Palestine Action, a non-violent protest group proscribed as a terrorist organisation by the British government earlier this month.

    Arrests in social media clips
    Social media clips showed pensioners aggressively arrested while attending rallies in Liverpool, London, Manchester, Edinburgh, Bristol and Truro over the weekend.

    Independent journalists and academics have also faced state repression under the UK’s Terrorism Act.

    Among those targeted was Electronic Intifada journalist Asa Winstanley, who had his home raided and devices seized in October last year as part of the opaque counter-terror drive “Operation Incessantness”.

    Independent journalist Asa Winstanley . . . his home was raided and devices seized in October last year as part of “Operation Incessantness”. Image: R Witts Photography/mickhall.substack.com

    In May, the country’s Central Criminal Court ruled the raid was unlawful.

    Journalist Richard Medhurst has had a terror investigation hanging over his head since being detained at Heathrow Airport in August last year and charged under section 8 of the Terrorism Act. Activist and independent journalist Sarah Wilkinson had her house raided in the same month.

    Others have faced similar intimidation and threats of jail. In November 2024, Jewish academic Haim Bresheeth was charged after police alleged he had expressed support for a “proscribed organisation” during a speech outside the London residence of the Israeli ambassador to the UK.

    Meanwhile, dozens of members of Palestine Action are in jail facing terror charges. The vast majority are being held on remand where they may wait two years before going to trial — a common state tactic to take activists off the street and incarcerate them, knowing the chances of conviction are slim when they eventually go to court.

    ‘Targeted amendments’
    The document says the New Zealand government wants to progress “targeted amendments” to the Act, creating or amending offences “to capture contemporary behaviours and activities of concern” like “public expressions of support for a terrorist act or designated entities, for example by showing insignia or distributing propaganda or instructional material.”

    Protesters highlight the proscription of Palestine Action outside the British Embassy at The Hague on July 20. No arrests were made following 80 arrests by Dutch police the week before. Image: Defend Our Juries/mickhall.substack.com

    It proposes to improve “the timeliness of the process, by considering changes to who the decision-maker is” and extending the renewal period from three to five years.

    The document suggests consulting the Attorney-General over designation-related decisions to ensure legal requirements are met may not be required and questions whether the designation process requiring the Prime Minister to review decisions twice is necessary. It asks whether others, like the Foreign Minister, should be involved in the decision-making process.

    Beagle believes the secretive proposals pose a threat to New Zealand’s liberal democracy.

    “Political protest is an important part of New Zealand’s history,” he said.

    “Whether it’s the environment, worker’s rights, feminism, Māori issues, homosexual law reform or any number of other issues, political protest has had a big part in forming what Aotearoa New Zealand is today.

    Protected under Bill of Rights
    “It’s a right protected by New Zealand’s Bill of Rights and is a critical part of being a functioning democracy.”

    The terror laws revision forms part of a wider trend of legislating to close down dissent over New Zealand’s foreign policy, now closely aligned with NATO and US interests.

    The government is also widening the definition of foreign interference in a way that could see people who “should have known” that they were being used by a foreign state to undermine New Zealand’s interests prosecuted.

    The Crimes (Countering Foreign Interference) Amendment Bill, which passed its first reading in Parliament on November 19, would criminalise the act of foreign interference, while also increasing powers of unwarranted searches by authorities.

    The Bill is effectively a reintroduction of the country’s old colonial sedition laws inherited from Britain, the broadness of the law having allowed it to be used against communists, trade unionists and indigenous rights activists.

    Republished from Mick Hall in Context on Substack with permisson.

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Leaked document reveals proposed law revisions in NZ, as Western defence of Zionist genocide threatens Pacific

    SPECIAL REPORT: By Mick Hall

    A leaked document has revealed secretive plans to revise terror laws in New Zealand so that people can be charged over statements deemed to constitute material support for a proscribed organisation.

    It shows the government also wants to widen the criteria for proscribing organisations to include groups that are judged to “facilitate” or “promote and encourage” terrorist acts.

    The changes would see the South Pacific nation falling in line with increasingly repressive Western countries like the UK, where scores of independent journalists and anti-genocide protesters have been arrested and charged under terrorism laws in recent months.

    The consultation document, handed over to the New Zealand Council for Civil Liberties (NZCCL), reveals the government has been in contact with a small number of unnamed groups this year over plans to legally redefine what material support involves, so that public statements or gestures involving insignia like flags can lead to charges if construed as support for proscribed groups.

    As part of a proposal to revise the Terrorism Suppression Act, the document suggests the process for designating organisations as terror groups should be changed by “expanding the threshold to enable more modern types of entities to be designated, such as those that ‘facilitate’ or ‘promote and encourage’ terrorist acts”.

    The Ministry of Justice has been contacted in an attempt to ascertain which groups it has been consulting with and why it believed the changes were necessary.

    NZCCL chairman Thomas Beagle told Mick Hall In Context his group was concerned the proposed changes were a further attempt to limit the rights of New Zealanders to engage in political protest.

    ‘What’s going on?’
    “When you look at the proposal to expand the Terrorism Suppression Act, alongside the Police and IPCA conspiring to propose a law change to ban political protest without government permission, you really have to wonder what’s going on,” he said.

    A report by the Independent Police Conduct Authority (IPCA) in February proposed to give police the right to ban protests if they believed there was a high chance of public disorder and threats to public safety.

    That would potentially mean bans on Palestinian solidarity protests if far right counter protestErs posed a threat of violent confrontation.

    The stand-alone legislation would put New Zealand in line with other Five Eyes and NATO-aligned security jurisdictions such as Australia, the United Kingdom, and Canada.

    Beagle points out proposed changes to terror laws would suppress freedom of speech and further undermine freedom of assembly and the right to protest.

    “We’ve seen what’s happening with the state’s abuse of terrorism suppression laws in the UK and are horrified that they have sunk so far and so quickly,” he said.

    More than 100 people were arrested across the UK on suspicion of supporting Palestine Action, a non-violent protest group proscribed as a terrorist organisation by the British government earlier this month.

    Arrests in social media clips
    Social media clips showed pensioners aggressively arrested while attending rallies in Liverpool, London, Manchester, Edinburgh, Bristol and Truro over the weekend.

    Independent journalists and academics have also faced state repression under the UK’s Terrorism Act.

    Among those targeted was Electronic Intifada journalist Asa Winstanley, who had his home raided and devices seized in October last year as part of the opaque counter-terror drive “Operation Incessantness”.

    Independent journalist Asa Winstanley . . . his home was raided and devices seized in October last year as part of “Operation Incessantness”. Image: R Witts Photography/mickhall.substack.com

    In May, the country’s Central Criminal Court ruled the raid was unlawful.

    Journalist Richard Medhurst has had a terror investigation hanging over his head since being detained at Heathrow Airport in August last year and charged under section 8 of the Terrorism Act. Activist and independent journalist Sarah Wilkinson had her house raided in the same month.

    Others have faced similar intimidation and threats of jail. In November 2024, Jewish academic Haim Bresheeth was charged after police alleged he had expressed support for a “proscribed organisation” during a speech outside the London residence of the Israeli ambassador to the UK.

    Meanwhile, dozens of members of Palestine Action are in jail facing terror charges. The vast majority are being held on remand where they may wait two years before going to trial — a common state tactic to take activists off the street and incarcerate them, knowing the chances of conviction are slim when they eventually go to court.

    ‘Targeted amendments’
    The document says the New Zealand government wants to progress “targeted amendments” to the Act, creating or amending offences “to capture contemporary behaviours and activities of concern” like “public expressions of support for a terrorist act or designated entities, for example by showing insignia or distributing propaganda or instructional material.”

    Protesters highlight the proscription of Palestine Action outside the British Embassy at The Hague on July 20. No arrests were made following 80 arrests by Dutch police the week before. Image: Defend Our Juries/mickhall.substack.com

    It proposes to improve “the timeliness of the process, by considering changes to who the decision-maker is” and extending the renewal period from three to five years.

    The document suggests consulting the Attorney-General over designation-related decisions to ensure legal requirements are met may not be required and questions whether the designation process requiring the Prime Minister to review decisions twice is necessary. It asks whether others, like the Foreign Minister, should be involved in the decision-making process.

    Beagle believes the secretive proposals pose a threat to New Zealand’s liberal democracy.

    “Political protest is an important part of New Zealand’s history,” he said.

    “Whether it’s the environment, worker’s rights, feminism, Māori issues, homosexual law reform or any number of other issues, political protest has had a big part in forming what Aotearoa New Zealand is today.

    Protected under Bill of Rights
    “It’s a right protected by New Zealand’s Bill of Rights and is a critical part of being a functioning democracy.”

    The terror laws revision forms part of a wider trend of legislating to close down dissent over New Zealand’s foreign policy, now closely aligned with NATO and US interests.

    The government is also widening the definition of foreign interference in a way that could see people who “should have known” that they were being used by a foreign state to undermine New Zealand’s interests prosecuted.

    The Crimes (Countering Foreign Interference) Amendment Bill, which passed its first reading in Parliament on November 19, would criminalise the act of foreign interference, while also increasing powers of unwarranted searches by authorities.

    The Bill is effectively a reintroduction of the country’s old colonial sedition laws inherited from Britain, the broadness of the law having allowed it to be used against communists, trade unionists and indigenous rights activists.

    Republished from Mick Hall in Context on Substack with permisson.

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Russia: D. Trump visits Fed headquarters, calls again for lower interest rates

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    WASHINGTON, July 25 (Xinhua) — U.S. President Donald Trump visited the Federal Reserve’s headquarters in Washington on Thursday and reiterated his call for lower interest rates.

    “We have to lower interest rates,” Trump told reporters. “People can hardly buy a home because interest rates are too high,” he added.

    “We have no inflation, we have a lot of money coming in… We should have the lowest interest rate of any country,” the president emphasized. “We can speak for everybody, frankly, we want interest rates to go down. Our country is growing rapidly, and the interest rate is the last little hurdle,” D. Trump said.

    The White House chief said he had a “very productive conversation” with Fed Chairman Jerome Powell about rates. “He’ll be able to tell you about that at the next meeting, but I will say he did say that the country is doing very well,” he added. “I trust the chairman to do the right thing. I mean, it may be a little late, as they say, but I trust him to do the right thing,” the president said.

    Local media see D. Trump’s visit to the Fed as an attempt by the administration to increase pressure on J. Powell to lower interest rates. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Thai army says clashes in Cambodian border areas

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BANGKOK, July 25 (Xinhua) — Clashes broke out in several areas along the Thai-Cambodian border on Friday morning, the Thai army said.

    The Second Military District, which controls part of the border, advised the population on social media to avoid traveling to border areas.

    Artillery sounds were heard again near the border on Friday morning, the National Broadcasting Service of Thailand reported, citing a local official in Surin province.

    As of 9 p.m. Thursday local time, 14 Thais had been killed and 46 injured in military clashes near the Cambodian border, a deputy spokesman for Thailand’s Ministry of Public Health said.

    Cambodia did not release any information on casualties at the time.

    The situation escalated after shootings began on Thursday morning, with both sides accusing each other of violating international law. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Death toll from Thais in Cambodian border clashes rises to 14

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BANGKOK, July 25 (Xinhua) — Fourteen Thais have been killed and 46 injured in military clashes near the border with Cambodia as of 9 p.m. Thursday local time, a deputy spokesman for Thailand’s Public Health Ministry said.

    Cambodia did not release any information on casualties at the time.

    The situation escalated after shootings began on Thursday morning, with both sides accusing each other of violating international law. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Media and think tanks strengthen the construction of the SCO community of common destiny

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, July 25 (Xinhua) — The Shanghai Cooperation Organization (SCO) Media and Think Tank Summit is being held in Zhengzhou, capital of central China’s Henan Province, from July 23 to 27, where building a community with a shared future for the SCO has become an important topic among leading media outlets and well-known think tanks from the SCO countries.

    Irina Akulovich, Director General of the Belarusian Telegraph Agency (BELTA), said that according to calculations, in recent months their agency has already published several hundred articles about the SCO, for the latest of which the key word has become “building a just world.”

    “The countries of the organization have different visions of solving many problems, but it is China that is becoming the center that helps strengthen dialogue, hear each other and develop solutions,” noted Irina Akulovich, adding that “when we talk about the SCO, we talk about it as an organization that is capable of influencing a new, fair construction of the world thanks to the initiatives that China is taking, and I am confident that Belarus will also have its say as a full member of the organization.”

    Director of the Institute of Russia, Eastern Europe and Central Asia of the Chinese Academy of Social Sciences (CASS) Sun Zhuangzhi noted that humanitarian cooperation within the SCO plays a particularly important role. The difference between the SCO community of common destiny and traditional regional cooperation is that its formation is promoted not only by the government, but also with the active participation of non-governmental organizations, especially the media and youth.

    Sun Zhuangzhi said that through various cultural and humanitarian exchange activities, the influence and prestige of the SCO as a whole has been enhanced, and the sense of accomplishment and confidence of ordinary people has been strengthened, which has laid a favorable foundation for public opinion in building a community with a shared future for the SCO.

    “The SCO is, without exaggeration, a unique association in which not only states but also civilizations have met. And the “Shanghai spirit” is not just recorded on paper. It manifests itself in trust,” noted Marina Dmitrieva, Deputy Director of the Oriental Institute for Science at the Far Eastern Federal University.

    In her opinion, in modern conditions, cooperation between representatives of the journalistic community and academic experts is becoming especially relevant in the formation of a community of common destiny for the SCO.

    “This helps to convey to the general public the goals and objectives of the organization, the principles of its work and the results of its interaction. Thanks to this, the idea of common challenges and mutual interest in sustainable development is beginning to take root in the public discourse of the SCO countries,” she added.

    “When we talk about the SCO, it is important to realize that we are not just talking about a regional security or economic cooperation structure, but an emerging civilizational platform,” said Professor Saida Agzamkhodjaeva of the Mirzo Ulugbek National University of Uzbekistan, noting that Uzbekistan, acting within the SCO framework, is contributing to the formation of a community of common destiny for the SCO.

    According to her, the uniqueness of the SCO lies in the fact that it unites states representing different cultures and systems of thought, but at the same time striving for common foundations of interaction – trust, prevention of conflicts and ensuring sustainable development.

    “The media and think tanks play a huge role in properly conveying objectivity,” said Cholpon Koichumanova, director of the E. Zh. Maanaev Institute of History and Social and Legal Education at the I. Arabaev Kyrgyz State University.

    “The political and economic core of the SCO is China, which became one of the initiators of the creation and co-founder of the organization,” noted Denis Mukha, director of the Institute of Economics of the National Academy of Sciences of Belarus.

    According to him, the SCO format opens up opportunities for developing and implementing new forms of Belarusian-Chinese economic cooperation with the participation of other partners of the organization, launching the process of creating favorable conditions in the field of trade and investment and forming a new economic macroregion as an element of a multipolar world order. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Three days of mourning declared in Amur Region and Khabarovsk Krai due to plane crash

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Vladivostok, July 25 (Xinhua) — A three-day mourning has been declared in Russia’s Amur Region and Khabarovsk Krai over the crash of the An-24 plane, Amur Region Governor Vasily Orlov and Khabarovsk Krai Governor Dmitry Demeshin announced on their Telegram channels on Thursday.

    As V. Orlov wrote, on July 25, 26 and 27, flags will be lowered in all territories of the Amur Region. Also, entertainment events will be cancelled in the region, and a memorial service for the victims of the air crash will be held in all churches of the Blagoveshchensk Diocese.

    According to D. Demeshin, a three-day mourning has been declared in Khabarovsk Krai from July 25 — flags will be lowered throughout the region as a sign of grief. The families of the victims will receive a million rubles each, and they will also be paid for travel to the crash site, he noted.

    On Thursday at about 13:00 local time, contact was lost with the crew of the An-24 of Angara Airlines, which was flying from Khabarovsk to Blagoveshchensk to Tynda. The wreckage of the missing plane was found on a mountain slope 16 km from Tynda. All those on board the plane — 43 passengers and 6 crew members — died. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Security: Man sentenced for the manslaughter of Marc Allen

    Source: United Kingdom London Metropolitan Police

    A man has been jailed for 13 years at the Old Bailey on Thursday, 24 July after robbing and running over a man, leaving him to die in the street in Erith in 2019. He will serve a further 5 years on license.

    Errol Woodger, 38 (18.12.1986) of Mottisfont Road, Abbey Wood, was found guilty at the same court of robbery and manslaughter of 51-year-old Marc Allen following a three-week trial that concluded on Tuesday, 15 April 2025.

    On Sunday, 29 December 2019, Marc Allen interrupted Errol Woodger robbing items from his flat on Peareswood Road, Erith, including his car keys.

    Mr Allen attempted to stop Woodger driving off in his car, but Woodger deliberately drove the car at him, running him over and causing him fatal injuries. Mr Allen was taken to hospital but never regained consciousness and died on Wednesday, 29 January 2020.

    Woodger was charged with robbery and murder on Wednesday, 19 June 2024 and was remanded into custody.

    At trial, Woodger was found guilty of one count of manslaughter and one count of robbery.

    Detective Sergeant Nick Bale, of the Met’s Homicide Command, said:

    “Our thoughts remain with Marc’s family and loved ones.

    “I’d like to thank the Homicide team who led on this investigation and the members of the public who were able to help us. The response we received to our appeal for information and witnesses following Marc’s senseless death directly led to Mr Woodger’s arrest and charges nearly five years after this tragic incident.

    “A man was fatally injured in a brutal way and died as a result – outside his home where he should have felt safe. I can only hope that this sentence goes some way in providing a sense of justice to Marc’s family.”

    MIL Security OSI

  • MIL-OSI: BW Energy: Invitation to Q2 2025 and half-year results presentation 01 August 

    Source: GlobeNewswire (MIL-OSI)

    Invitation to Q2 2025 and half-year results presentation 01 August  

    BW Energy will release its second quarter and half-year 2025 results on Friday, 01 August at 07:00 CEST.  

    A conference call followed by Q&A will be hosted by CEO Carl K. Arnet and CFO Brice Morlot the same day at 14:00 CEST. 

    You can follow the presentation via webcast:

    https://events.webcast.no/viewer-registration/qQC1bQEB/register

    Call-in information

    Participants dial in numbers:

    DK: +45 7876 8490
    SE: +46 8 1241 0952
    NO: +47 2195 6342
    UK: +44 203 769 6819
    US: +1 646-787-0157
    Singapore: 65-3-1591097
    France: 33-1-81221259

    Conference code: 980877

    For further information, please contact:

    Martin Seland Simensen, VP Investor Relations BW Energy

    +47 416 92 087, martin.simensen@bwenergy.no

    About BW Energy:

    BW Energy is a growth E&P company with a differentiated strategy targeting proven offshore oil and gas reservoirs through low risk phased developments. The Company has access to existing production facilities to reduce time to first oil and cashflow with lower investments than traditional offshore developments. The Company’s assets are 73.5% of the producing Dussafu Marine licence offshore Gabon, 100% interest in the Golfinho and Camarupim fields, a 76.5% interest in the BM-ES-23 block, a 95% interest in the Maromba field in Brazil, a 95% interest in the Kudu field in Namibia, all operated by BW Energy. In addition, BW Energy holds approximately 6.6% of the common shares in Reconnaissance Energy Africa Ltd. and a 20% non-operating interest in the onshore Petroleum Exploration License 73 (“PEL 73”) in Namibia. Total net 2P+2C reserves and resources were 599 million barrels of oil equivalent at the start of 2025.

    This information is subject to the disclosure requirements pursuant to Section 5-12 the Norwegian Securities Trading Act

    The MIL Network

  • MIL-OSI: BW Energy: Invitation to Q2 2025 and half-year results presentation 01 August 

    Source: GlobeNewswire (MIL-OSI)

    Invitation to Q2 2025 and half-year results presentation 01 August  

    BW Energy will release its second quarter and half-year 2025 results on Friday, 01 August at 07:00 CEST.  

    A conference call followed by Q&A will be hosted by CEO Carl K. Arnet and CFO Brice Morlot the same day at 14:00 CEST. 

    You can follow the presentation via webcast:

    https://events.webcast.no/viewer-registration/qQC1bQEB/register

    Call-in information

    Participants dial in numbers:

    DK: +45 7876 8490
    SE: +46 8 1241 0952
    NO: +47 2195 6342
    UK: +44 203 769 6819
    US: +1 646-787-0157
    Singapore: 65-3-1591097
    France: 33-1-81221259

    Conference code: 980877

    For further information, please contact:

    Martin Seland Simensen, VP Investor Relations BW Energy

    +47 416 92 087, martin.simensen@bwenergy.no

    About BW Energy:

    BW Energy is a growth E&P company with a differentiated strategy targeting proven offshore oil and gas reservoirs through low risk phased developments. The Company has access to existing production facilities to reduce time to first oil and cashflow with lower investments than traditional offshore developments. The Company’s assets are 73.5% of the producing Dussafu Marine licence offshore Gabon, 100% interest in the Golfinho and Camarupim fields, a 76.5% interest in the BM-ES-23 block, a 95% interest in the Maromba field in Brazil, a 95% interest in the Kudu field in Namibia, all operated by BW Energy. In addition, BW Energy holds approximately 6.6% of the common shares in Reconnaissance Energy Africa Ltd. and a 20% non-operating interest in the onshore Petroleum Exploration License 73 (“PEL 73”) in Namibia. Total net 2P+2C reserves and resources were 599 million barrels of oil equivalent at the start of 2025.

    This information is subject to the disclosure requirements pursuant to Section 5-12 the Norwegian Securities Trading Act

    The MIL Network

  • MIL-OSI: Management changes in Inbank’s subsidiary companies

    Source: GlobeNewswire (MIL-OSI)

    AS Inbank has updated its group-wide governance principles, including the articles of association, resulting in changes to the management across several significant subsidiaries.

    As of 10 July 2025, AS Inbank CFO and Member of the Management Board Marko Varik was recalled from the Supervisory Board of AS Inbank Finance and appointed to its Management Board. AS Inbank Finance Management Board consists of Marko Varik, AS Inbank Head of Growth and Business Development Piret Paulus and Head of Baltic Business and Member of the Management Board Margus Kastein. On the same date, AS Inbank Chief of Staff and Member of the Management Board Ivar Kurvits, was appointed to the Supervisory Board. The three-member Supervisory Board of AS Inbank Finance now includes AS Inbank CEO and Chairman of the Management Board Priit Põldoja, Head of Risk Control and Member of the Management Board Evelin Lindvers and Ivar Kurvits.

    As of 26 May 2025, the new Management Board Members of Inbank Ventures OÜ are Margus Kastein and Ivar Kurvits. The three-member Management Board of Inbank Ventures OÜ also includes Marko Varik. 

    As of 2 June 2025, Inbank’s Head of Baltic Credit Underwriting Gatis Bergs, was recalled from the Management Board of Inbank Latvia SIA. The three-member Management Board of Inbank Latvia SIA now consists of Inbank Latvia Country Manager Dainis Skrinda, Head of Credit Risk Control Juris Filipovs and Margus Kastein.

    Inbank is a financial technology company with an EU banking license that connects merchants, consumers and financial institutions on its next generation embedded finance platform. Partnering with more than 5,600 merchants, Inbank has 941,000+ active contracts and collects deposits across 7 markets in Europe. Inbank bonds are listed on the Nasdaq Tallinn Stock Exchange.

    Additional information:
    Styv Solovjov
    Inbank
    Head of Investor Relations
    +372 5645 9738
    styv.solovjov@inbank.ee

    The MIL Network

  • MIL-OSI Russia: International Environmental Conference

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    The theme of the plenary session is “Environmental challenges: towards sustainable development”.

    Previous news Next news

    Joint photo session of the heads of delegations of the International Environmental Conference

    The International Environmental Conference is taking place on July 25 in the Altai Republic on the territory of the Manzherok resort. Eight countries are participating in it: the Russian Federation, the Republic of Armenia, the Republic of Belarus, the Kyrgyz Republic, the Republic of Kazakhstan, the Republic of Tajikistan, the Republic of Uzbekistan and Turkmenistan. All states are long-standing partners and interact on environmental issues both bilaterally and within the framework of international associations.

    The international conference will open with a plenary session entitled “Environmental Challenges: Towards Sustainable Development,” in which the prime ministers of Russia, Armenia, Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan will talk about the environmental and ecological agendas of their countries.

    Ministers of natural resources, ecology and the environment will speak at the expert session “How to maintain the global water balance?”. The heads of departments will discuss how climate change affects water resources and what measures need to be taken now to minimize the consequences.

    Drive

    The thematic session “Ecological tourism: the calling card of the state” is devoted to issues of regulating anthropogenic load on natural complexes, the role of ecotourism in economic development, issues of developing and equipping ecological routes and the functioning of transboundary reserves and national parks, and joint projects.

    The conference will also discuss the development of transboundary ecotourism, protection of specially protected natural areas and conservation of biodiversity. For example, the joint efforts of five countries to restore the snow leopard population: the rare cat lives only in Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • Sensex, Nifty fall as FPI selling, weak global cues weigh on sentiment

    Source: Government of India

    Source: Government of India (4)

    India’s benchmark indices declined in early trade on Friday, weighed down by sustained selling by Foreign Portfolio Investors (FPIs) and weak global cues.

    The Nifty fell 110 points, or 0.44 per cent, to 24,943, while the Sensex shed 290 points, or 0.35 per cent, to 82,065.76.

    Ajay Bagga, Banking and Market Expert, said, “Indian markets are pointing to a continued negative outlook as per the traded futures. FPIs remain sellers while DIIs are absorbing the selling. Key support levels are being tested, making today’s price action crucial for the market’s health.”

    He added, “Earnings have largely remained weak, and with no India–US trade deal expected before the August 1 deadline, markets are entering a zone of concern. Fasten seat belts—we are seeing key support holding mainly due to resilient Indian retail investors, who continue to buy on dips and maintain faith in domestic management and the economy.”

    Broad market indices were also under pressure, with the Nifty 100 down 0.53 per cent, the Nifty Midcap 100 slipping 0.34 per cent, and the Nifty Smallcap 100 losing 0.56 per cent.

    Among sectors, only Nifty Pharma stayed in the green, up 0.26 per cent. Others posted losses: Nifty Auto fell 0.66 per cent, Nifty IT 0.19 per cent, Nifty Media 0.40 per cent, and Nifty Metal 0.46 per cent.

    Akshay Chinchalkar, Head of Research at Axis Securities, said, “The Nifty erased all its Wednesday gains on Thursday, dropping 159 points to close at 25,062. Yesterday’s candle formed another bearish engulfing: two in quick succession, which is rare. The key levels now are 25,000 as vital support and 25,245 as resistance. Bears will retain control unless we see a close above 25,340.”

    On the earnings front, several major companies are scheduled to report their quarterly results today, including Bajaj Finserv, Bank of Baroda, Cipla, Shriram Finance, SBI Cards, Schaeffler India, SAIL, Petronet LNG, Laurus Labs, Poonawalla Fincorp, Tata Chemicals, Aadhar Housing Finance, Grindwell Norton, and ACME Solar Holdings.

    Meanwhile, global cues remained weak. Upcoming US–China trade talks in Sweden on Monday are expected to shape the tone for US–India trade negotiations, particularly amid discussions on Russian oil supplies.

    With the RBI’s monetary policy meeting scheduled for August 6, investors are bracing for a potentially weak end to the week.

    Across Asia, markets traded lower. Japan’s Nikkei 225 was down 0.79 per cent, Singapore’s Straits Times slipped 0.48 per cent, Hong Kong’s Hang Seng dropped 1.19 per cent, and Taiwan’s Weighted Index edged down 0.08 per cent. South Korea’s KOSPI was the lone gainer, rising 0.35 per cent.

    (With inputs from ANI)