Category: Internet Communications Technology

  • MIL-OSI Russia: Financial news: Three Federal Treasury deposit auctions will take place on 01.08.2025

    Translation. Region: Russian Federal

    Source: Moscow Exchange – Moscow Exchange –

    An important disclaimer is at the bottom of this article.

    Application selection parameters
    Date of the selection of applications 01.08.2025
    Unique identifier of the application selection 32025016
    Deposit currency rubles
    Type of funds funds of the Social Fund of Russia (funds of the ROOSS)
    Maximum amount of funds placed in bank deposits, million monetary units 237 862
    Placement period, in days 129
    Date of deposit 01.08.2025
    Refund date 08.12.2025
    Interest rate for placement of funds (fixed or floating) Floating
    Minimum fixed interest rate for placement of funds, % per annum
    Basic floating interest rate for placement of funds Ruonmds
    Minimum spread, % per annum 0.00
    Terms of conclusion of a bank deposit agreement (fixed-term, replenishable or special) Special
    Minimum amount of funds placed for one application, million monetary units 1
    Maximum number of applications from one credit institution, pcs. 5
    Application selection form (open or closed) Open
    Application selection schedule (Moscow time)
    Venue for the selection of applications PAO Moscow Exchange
    Applications accepted: from 16:00 to 16:10
    *Preliminary applications: from 16:00 to 16:05
    *Competition mode applications: from 16:05 to 16:10**
    **Time interval for the end of accepting applications (seconds): 120
    Formation of a consolidated register of applications: from 16:10 to 16:20
    Setting a cut-off percentage rate and/or recognizing the selection of applications as unsuccessful: from 16:10 to 16:30
    Submission to credit institutions of an offer to conclude a bank deposit agreement: from 16:30 to 17:20
    Receiving acceptance of an offer to conclude a bank deposit agreement from credit institutions: from 16:30 to 17:20
    Deposit transfer time In accordance with the requirements of paragraph 63 and paragraph 64 of the Order of the Federal Treasury dated 04/27/2023 No. 10n

    * for the open form of selection of applications from credit institutions for the conclusion of bank deposit agreements.

    ** the end time for accepting applications from credit institutions to conclude bank deposit agreements is set within the time interval and is determined by the exchange’s information software and hardware arbitrarily, within the established time interval.

    RUONmDS = RUONIA – DS, where

    RUONIA – the value of the indicative weighted rate of overnight ruble loans (deposits) RUONIA, expressed in hundredths of a percent, published on the official website of the Bank of Russia on the Internet on the day preceding the day for which interest is accrued. In the absence of a RUONIA rate value published on the day preceding the day for which interest is accrued, the last of the published RUONIA rate values is taken into account.

    DS – discount – a value expressed in hundredths of a percent and rounded (according to the rules of mathematical rounding) to two decimal places, calculated by multiplying the value of the Key Rate of the Bank of Russia by the value of the required reserve ratio for other liabilities of credit institutions for banks with a universal license, non-bank credit institutions (except for long-term ones) in the currency of the Russian Federation, valid on the date for which interest is accrued, and published on the official website of the Bank of Russia on the Internet.

    Application selection parameters
    Date of the selection of applications 01.08.2025
    Unique identifier of the application selection 22025223
    Deposit currency rubles
    Type of funds funds of the single treasury account
    Maximum amount of funds placed in bank deposits, million monetary units 248,000
    Placement period, in days 4
    Date of deposit 01.08.2025
    Refund date 05.08.2025
    Interest rate for placement of funds (fixed or floating) Fixed
    Minimum fixed interest rate for placement of funds, % per annum 17,19
    Basic floating interest rate for placement of funds
    Minimum spread, % per annum
    Terms of conclusion of a bank deposit agreement (fixed-term, replenishable or special) Urgent
    Minimum amount of funds placed for one application, million monetary units 1,000
    Maximum number of applications from one credit institution, pcs. 5
    Application selection form (open or closed) Open
    Application selection schedule (Moscow time)
    Venue for the selection of applications PAO Moscow Exchange
    Applications accepted: from 09:30 to 09:40
    *Preliminary applications: from 09:30 to 09:35
    *Competition mode applications: from 09:35 to 09:40**
    **Time interval for the end of accepting applications (seconds): 120
    Formation of a consolidated register of applications: from 09:40 to 09:50
    Setting a cut-off percentage rate and/or recognizing the selection of applications as unsuccessful: from 09:40 to 10:00
    Submission to credit institutions of an offer to conclude a bank deposit agreement: from 10:00 to 10:50
    Receiving acceptance of an offer to conclude a bank deposit agreement from credit institutions: from 10:00 to 10:50
    Deposit transfer time In accordance with the requirements of paragraph 63 and paragraph 64 of the Order of the Federal Treasury dated 04/27/2023 No. 10n

    * for the open form of selection of applications from credit institutions for the conclusion of bank deposit agreements.

    ** the end time for accepting applications from credit institutions to conclude bank deposit agreements is set within the time interval and is determined by the exchange’s information software and hardware arbitrarily, within the established time interval.

    Application selection parameters
    Date of the selection of applications 01.08.2025
    Unique identifier of the application selection 22025224
    Deposit currency rubles
    Type of funds funds of the single treasury account
    Maximum amount of funds placed in bank deposits, million monetary units 100,000
    Placement period, in days 14
    Date of deposit 01.08.2025
    Refund date 08/15/2025
    Interest rate for placement of funds (fixed or floating) Floating
    Minimum fixed interest rate for placement of funds, % per annum
    Basic floating interest rate for placement of funds Ruonmds
    Minimum spread, % per annum 0.00
    Terms of conclusion of a bank deposit agreement (fixed-term, replenishable or special) Urgent
    Minimum amount of funds placed for one application, million monetary units 1,000
    Maximum number of applications from one credit institution, pcs. 5
    Application selection form (open or closed) Open
    Application selection schedule (Moscow time)
    Venue for the selection of applications PAO Moscow Exchange
    Applications accepted: from 12:00 to 12:10
    *Preliminary applications: from 12:00 to 12:05
    *Competition mode applications: from 12:05 to 12:10**
    **Time interval for the end of accepting applications (seconds): 120
    Formation of a consolidated register of applications: from 12:10 to 12:20
    Setting a cut-off percentage rate and/or recognizing the selection of applications as unsuccessful: from 12:10 to 12:30
    Submission to credit institutions of an offer to conclude a bank deposit agreement: from 12:30 to 13:20
    Receiving acceptance of an offer to conclude a bank deposit agreement from credit institutions: from 12:30 to 13:20
    Deposit transfer time In accordance with the requirements of paragraph 63 and paragraph 64 of the Order of the Federal Treasury dated 04/27/2023 No. 10n

    * for the open form of selection of applications from credit institutions for the conclusion of bank deposit agreements.

    ** the end time for accepting applications from credit institutions to conclude bank deposit agreements is set within the time interval and is determined by the exchange’s information software and hardware arbitrarily, within the established time interval.

    RUONmDS = RUONIA – DS, where

    RUONIA – the value of the indicative weighted rate of overnight ruble loans (deposits) RUONIA, expressed in hundredths of a percent, published on the official website of the Bank of Russia on the Internet on the day preceding the day for which interest is accrued. In the absence of a RUONIA rate value published on the day preceding the day for which interest is accrued, the last of the published RUONIA rate values is taken into account.

    DS – discount – a value expressed in hundredths of a percent and rounded (according to the rules of mathematical rounding) to two decimal places, calculated by multiplying the value of the Key Rate of the Bank of Russia by the value of the required reserve ratio for other liabilities of credit institutions for banks with a universal license, non-bank credit institutions (except for long-term ones) in the currency of the Russian Federation, valid on the date for which interest is accrued, and published on the official website of the Bank of Russia on the Internet.

    Contact information for media 7 (495) 363-3232Pr@moex.kom

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Economics: Facing Earthquakes and Extremes, Asia-Pacific Deepens Disaster Cooperation Incheon, Republic of Korea | 01 August 2025 Issued by the APEC Emergency Preparedness Working Group The meeting’s agenda covered digital-based disaster risk management strategies, community leadership in disaster response and strengthening multi-layered governance.

    Source: APEC – Asia Pacific Economic Cooperation

    A powerful earthquake off the coast of Kamchatka jolted the Asia-Pacific just hours before emergency officials from APEC economies convened in Incheon for the 21st meeting of the APEC Emergency Preparedness Working Group (EPWG), a timely reminder of how disasters can ripple across the region without warning.

    “Disasters know no borders, and they affect not only local communities but have long-term consequences for entire economies,” said Kim Gwang-yong, Vice Minister of Korea’s Ministry of the Interior and Safety, in his welcome address. “Cooperation and solidarity among APEC economies are more important than ever.”

    Vice Minister Kim highlighted Korea’s recent experiences with typhoons, heavy rainfall and wildfires, noting that the country has continuously improved its disaster management systems. 

    He also emphasized Korea’s commitment to sharing these best practices with fellow APEC economies and expanding cooperation in ICT-based early warning systems, disaster prediction models using artificial intelligence (AI), and community-centered disaster resilience strategies.

    The meeting’s agenda covered digital-based disaster risk management strategies, community leadership in disaster response and strengthening multi-layered governance. 

    Experts and officials discussed enhancing early warning systems, leveraging big data and satellite technologies and developing resilient infrastructure that can support disaster-affected communities. 

    Sessions also focused on advancing collaborative governance, bridging gaps in disaster risk management, and preparing communities for emerging risks.

    EPWG co-chair Dayra Carvajal of the United States Federal Emergency Management Agency, urged members to recognize the compounding risks affecting the region’s interconnected systems. 

    “From devastating earthquakes to wildfires and catastrophic flooding, this year has once again underscored the interconnected impacts of disasters in Asia-Pacific,” she said. “These compounding stressors that ripple through shared infrastructure remind us that events in one economy are frequently felt elsewhere.”

    “This year, we must endeavor to identify concrete and practical ways in which to strengthen the systems that sustain regional economic growth and prosperity: our infrastructure, markets and supply chains.”

    The agenda featured project updates and best practice exchanges by member economies including on topics such as disaster risk prediction and whole-community preparedness in urban, coastal and inland areas. Delegates examined how to bridge gaps in early warning systems, scale agile and adaptable governance across central and local levels and enable technology-driven disaster leadership.

    “The more we prepare, the more we can reduce disaster damage. And the more we cooperate, the stronger our response can become,” Vice Minister Kim concluded.

    Looking ahead, the group emphasized that continued collaboration under the newly launched EPWG Strategic Plan 2025–2027 will be essential to turn this momentum into durable systems of protection and preparedness. 

    The EPWG meeting is a key platform for promoting APEC’s vision of a resilient and prosperous future, with discussions expected to result in actionable policies and collaborative projects that can mitigate disaster risks, enhance regional preparedness and protect the lives and livelihoods of the 2.9 billion people who call the APEC region home.


    For more information or media inquiries, please contact:
    [email protected]

    MIL OSI Economics

  • MIL-OSI: MEXC Boosts Stock Futures Selection with TRON, BITF, ICG and More

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Aug. 01, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, has expanded its innovative Stock Futures offering by adding five new trading options: ICG, BITF, ETHWSTOCK, TRON, and CRCL. This move continues MEXC’s mission to bridge the gap between digital assets and traditional finance, providing users with seamless access to U.S. stock market opportunities through the flexibility of crypto-based derivatives.

    MEXC’s Stock Futures product is designed with traders in mind—offering zero trading fees, zero funding fees, and deep global liquidity. With a clean and intuitive user interface, the product removes traditional barriers to stock market access and brings popular equity exposures to a new generation of crypto-native investors. Users can now trade select U.S. stock-linked futures directly on MEXC without the need for a brokerage account.

    Each Stock Futures pair supports up to 5x leverage, allowing users to go long or short based on market sentiment, all settled in USDT. This structure empowers traders to capitalize on market movements with limited capital, while simplifying the trading process through familiar crypto infrastructure. By tokenizing price exposure to traditional stocks like ICG, BITF, and CRCL, MEXC is setting a new standard for global trading accessibility.

    Five Key Features of MEXC Stock Futures:

    0 Fees, Maximum Potential
    To celebrate the launch, MEXC is offering a limited-time “Double 0” promotion: 0 trading fees and 0 funding rates. This drastically reduces transaction costs for both high-frequency traders and long-term investors, helping users maximize profit potential.

    Industry-Leading Depth & Execution Speed
    Built on a high-performance matching engine and deep liquidity pools, MEXC delivers industry-leading trading depth for Stock Futures. Users benefit from ultra-low slippage, tight spreads, and millisecond-level execution, even for large-volume trades.

    Streamlined, User-Friendly Interface
    The platform offers an intuitive UI with one-click leverage adjustment, quick order execution, and real-time risk alerts. Compared to the complexity of traditional CFDs, MEXC’s simplified design and smart tools make it easy for beginners to enter the leveraged trading space.

    Trading Hours Synchronized with U.S. Market Operations
    Unlike platforms that offer 24/7 trading, MEXC’s Stock Futures align with NASDAQ and NYSE trading hours, minimizing volatility during illiquid off-hours and ensuring a more authentic market experience. Real-time price feeds are sourced from official data providers, ensure transparency and minimize the risk of market manipulation.

    Institutional-Grade Asset Protection
    MEXC prioritizes user asset security with a dedicated Futures Insurance Fund to cover potential losses and a robust real-time risk management system to maintain a fair, stable trading environment.

    This guide will walk you through how to trade Stock Futures on MEXC, from opening an account to executing your first order.

    About MEXC

    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official WebsiteXTelegramHow to Sign Up on MEXC

    Risk Disclaimer: Futures trading carries inherent risk. Ensure you fully understand the associated risks involved before investing.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/c3945edd-ad57-47dd-b7fd-8791609ce2c2

    The MIL Network

  • MIL-OSI Banking: Facing Earthquakes and Extremes, Asia-Pacific Deepens Disaster Cooperation Incheon, Republic of Korea | 01 August 2025 APEC Emergency Preparedness Working Group

    Source: APEC Secretariat

    A powerful earthquake off the coast of Kamchatka jolted the Asia-Pacific just hours before emergency officials from APEC economies convened in Incheon for the 21st meeting of the APEC Emergency Preparedness Working Group (EPWG), a timely reminder of how disasters can ripple across the region without warning.

    “Disasters know no borders, and they affect not only local communities but have long-term consequences for entire economies,” said Kim Gwang-yong, Vice Minister of Korea’s Ministry of the Interior and Safety, in his welcome address. “Cooperation and solidarity among APEC economies are more important than ever.”

    Vice Minister Kim highlighted Korea’s recent experiences with typhoons, heavy rainfall and wildfires, noting that the country has continuously improved its disaster management systems. 

    He also emphasized Korea’s commitment to sharing these best practices with fellow APEC economies and expanding cooperation in ICT-based early warning systems, disaster prediction models using artificial intelligence (AI), and community-centered disaster resilience strategies.

    The meeting’s agenda covered digital-based disaster risk management strategies, community leadership in disaster response and strengthening multi-layered governance. 

    Experts and officials discussed enhancing early warning systems, leveraging big data and satellite technologies and developing resilient infrastructure that can support disaster-affected communities. 

    Sessions also focused on advancing collaborative governance, bridging gaps in disaster risk management, and preparing communities for emerging risks.

    EPWG co-chair Dayra Carvajal of the United States Federal Emergency Management Agency, urged members to recognize the compounding risks affecting the region’s interconnected systems. 

    “From devastating earthquakes to wildfires and catastrophic flooding, this year has once again underscored the interconnected impacts of disasters in Asia-Pacific,” she said. “These compounding stressors that ripple through shared infrastructure remind us that events in one economy are frequently felt elsewhere.”

    “This year, we must endeavor to identify concrete and practical ways in which to strengthen the systems that sustain regional economic growth and prosperity: our infrastructure, markets and supply chains.”

    The agenda featured project updates and best practice exchanges by member economies including on topics such as disaster risk prediction and whole-community preparedness in urban, coastal and inland areas. Delegates examined how to bridge gaps in early warning systems, scale agile and adaptable governance across central and local levels and enable technology-driven disaster leadership.

    “The more we prepare, the more we can reduce disaster damage. And the more we cooperate, the stronger our response can become,” Vice Minister Kim concluded.

    Looking ahead, the group emphasized that continued collaboration under the newly launched EPWG Strategic Plan 2025–2027 will be essential to turn this momentum into durable systems of protection and preparedness. 

    The EPWG meeting is a key platform for promoting APEC’s vision of a resilient and prosperous future, with discussions expected to result in actionable policies and collaborative projects that can mitigate disaster risks, enhance regional preparedness and protect the lives and livelihoods of the 2.9 billion people who call the APEC region home.


    For more information or media inquiries, please contact:
    [email protected]

    MIL OSI Global Banks

  • MIL-OSI Banking: APEC Disaster Officials Rally for Joint Action as Regional Risks Escalate Incheon, Republic of Korea | 01 August 2025 Issued by the APEC Senior Disaster Management Officials’ Forum From climate extremes and aging populations to rapid urbanization, the region’s risk landscape is growing more multifaceted, outpacing the capacity of any single economy to respond alone.

    Source: APEC – Asia Pacific Economic Cooperation

    As disasters grow more frequent and complex across the Asia-Pacific, senior officials from APEC member economies convened in Incheon for the 2025 APEC Senior Disaster Management Officials’ Forum (SDMOF), calling for urgent, collective action to reduce disaster risks and protect lives.

    The forum, held under the theme “Advancing Disaster Risk Reduction in Asia-Pacific: Partnerships for a Resilient and Prosperous Future,” focused on strengthening coordination and resilience in the face of increasingly complex threats. From climate extremes and aging populations to rapid urbanization, the region’s risk landscape is growing more multifaceted, outpacing the capacity of any single economy to respond alone.

    “Disasters today cross borders and present transboundary risks that demand collective responses across the APEC region,” said Park Cheon-soo, Director General of the Ministry of the Interior and Safety, Republic of Korea. “In this context, solidarity and cooperation among member economies, in other words, partnership, is no longer optional, but a prerequisite for effective disaster risk reduction.”

    Director General Park urged delegates to move beyond disaster recovery and invest in systems that prevent and mitigate risk. 

    Throughout the forum, officials engaged in crucial policy session on emerging risks, early warning systems, multi-layered governance and technology for disaster leadership. 

    Officials also discussed the fundamental concept, different types and management strategies regarding emerging risks. They also explored to better mobilize private sector capabilities and harnessing emerging technologies to strengthen multi-level governance and leadership during disaster response. 

    In his closing remarks, Director General Park acknowledged the progress made in disaster preparedness and response, but emphasized that future challenges require renewed ambition and high-level commitment. 

    He called on each member economy to develop whole-of-society implementation capabilities aligned with their priorities and domestic contexts, foundations essential for the region’s prosperity. 

    Director General Park also reaffirmed Korea’s commitment to sharing expertise and resources, including advances in ICT-based early warning systems and integrated disaster management.

    Officials emphasized the need to translate the forum’s discussions into concrete actions and deeper collaboration, positioning the dialogue as a springboard for future progress.

    “Disaster risk reduction is not only about enhancing our ability to respond to disasters, but also crucial for ensuring prosperity across economic, social and environmental dimensions,” Director General Park concluded. “Trust-based cooperation among APEC economies is essential for advancing disaster risk reduction.”


    For more information or media inquiries, please contact:
    [email protected]

    MIL OSI Global Banks

  • MIL-OSI: Bitget Surges to 7.2% Global Derivatives Market Share, Ranks Top 3 Highlights Bitcoin.com Report

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Aug. 01, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company, today co-releases with Bitcoin.com an educational flagship titled “Crypto Derivatives 101 – Market Breakdown: Who’s Winning the Race?” designed to help newcomers navigate the fast-growing derivatives market, the guide also highlights Bitget’s leadership as its market share doubles to 7.2% in 2025, up from 4.6% year‑to‑date.

    As detailed in the newly released report, Bitget has emerged as the third-largest derivatives exchange globally by trading volume. In April 2025 alone, the platform processed $92 billion in futures volume. Bitget’s market share rose from 4.6% at the beginning of the year to 7.2%, placing it just behind Binance and OKX. While Binance continues to lead with a 38% share, Bitget’s rapid ascent reflects both strong retail engagement and increasing institutional preference, particularly for ETH-based derivatives, where Bitget has surpassed Binance in liquidity within key trading ranges.

    “We believe educational access is foundational,” said Gracy Chen, CEO at Bitget. “Crypto derivatives have often been misunderstood or seen as overly complex, especially by new users. With this guide, we aim to change that. We want to make sure that both retail and institutional users feel empowered to understand, navigate, and leverage the powerful tools available to them. Bitget is proud to be leading this industry with a user-first approach, backed by AI-powered tools, liquidity innovations, and a commitment to transparency and accessibility.”

    The Crypto Derivatives 101 report serves as a practical, beginner-friendly guide to understanding how derivatives work and why they matter in today’s markets. It breaks down core instruments such as futures, options, and perpetual swaps, while explaining how these tools are used for hedging, speculation, and arbitrage.

    A standout feature of the report is a comprehensive comparison of centralized (CEX) and decentralized (DEX) perpetual markets, weighing factors like liquidity, slippage, fees, execution speed, and custody. Bitget, Binance, and OKX are shown to lead in areas like liquidity depth and institutional readiness, while platforms like GMX and Hyperliquid offer unmatched transparency and self-custody for DeFi-native users.

    The report also includes real-world trading scenarios that help readers understand which platform type is better suited to their goals. For example, a retail trader managing small-cap positions may benefit from Bitget’s intuitive UI, low fees, and fiat on-ramps. In contrast, DeFi-native users seeking anonymity and composability may prefer permissionless DEXs. Institutions executing large block trades are shown to favor CEXs like Bitget for better capital efficiency, risk management tools, and regulatory compliance. These case studies ground the content in real-world decision-making and make the guide actionable for new users.

    “The crypto industry has come a long way in terms of legitimacy, but education remains a key barrier,” said Eli Bordun, Partnership Director of Bitcoin.com. “This report breaks down step-by-step how the modern crypto markets function. Derivatives are often seen as tools for professionals — but they’re increasingly relevant for everyday users, DAOs, and even traditional financial players exploring the space. By working with Bitget to produce this report, we aim to demystify these instruments and support safe, informed participation in the market.”

    The report also highlights emerging trends set to shape the next era of crypto derivatives. One key theme is the rise of tokenized real-world assets (RWAs), which are increasingly being integrated into derivatives products and yield strategies. Another is the expansion of AI-powered trading platforms, which are revolutionizing how both retail and institutional users manage portfolios, select strategies, and mitigate risk. Regulatory clarity is also improving, with frameworks like the EU’s MiCA and Singapore’s MAS paving the way for responsible innovation.

    Finally, the report explores the evolution of CeDeFi (Centralized-Decentralized Finance) models, where platforms like Bitget offer the best of both worlds: secure custody and intuitive UX alongside permissionless asset access and DeFi integration.

    With this report, Bitget and Bitcoin.com reaffirm their shared commitment to building a more inclusive crypto trading environment. As derivatives become increasingly central to digital finance, Bitget is positioned not only as a market leader — but as a bridge between the next generation of users and the tools that will define their financial future.

    For more information, please see the full report here.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 120 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a leading non-custodial crypto wallet supporting 130+ blockchains and millions of tokens. It offers multi-chain trading, staking, payments, and direct access to 20,000+ DApps, with advanced swaps and market insights built into a single platform.
    Bitget is driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    Aligned with its global impact strategy, Bitget has joined hands with UNICEF to support blockchain education for 1.1 million people by 2027. In the world of motorsports, Bitget is the exclusive cryptocurrency exchange partner of MotoGP™, one of the world’s most thrilling championships.

    For more information, visit: WebsiteTwitterTelegramLinkedInDiscordBitget Wallet
    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/6595d449-33e8-478f-a5d3-67dc9f840558

    The MIL Network

  • MIL-OSI: Bitget Surges to 7.2% Global Derivatives Market Share, Ranks Top 3 Highlights Bitcoin.com Report

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, Aug. 01, 2025 (GLOBE NEWSWIRE) — Bitget, the leading cryptocurrency exchange and Web3 company, today co-releases with Bitcoin.com an educational flagship titled “Crypto Derivatives 101 – Market Breakdown: Who’s Winning the Race?” designed to help newcomers navigate the fast-growing derivatives market, the guide also highlights Bitget’s leadership as its market share doubles to 7.2% in 2025, up from 4.6% year‑to‑date.

    As detailed in the newly released report, Bitget has emerged as the third-largest derivatives exchange globally by trading volume. In April 2025 alone, the platform processed $92 billion in futures volume. Bitget’s market share rose from 4.6% at the beginning of the year to 7.2%, placing it just behind Binance and OKX. While Binance continues to lead with a 38% share, Bitget’s rapid ascent reflects both strong retail engagement and increasing institutional preference, particularly for ETH-based derivatives, where Bitget has surpassed Binance in liquidity within key trading ranges.

    “We believe educational access is foundational,” said Gracy Chen, CEO at Bitget. “Crypto derivatives have often been misunderstood or seen as overly complex, especially by new users. With this guide, we aim to change that. We want to make sure that both retail and institutional users feel empowered to understand, navigate, and leverage the powerful tools available to them. Bitget is proud to be leading this industry with a user-first approach, backed by AI-powered tools, liquidity innovations, and a commitment to transparency and accessibility.”

    The Crypto Derivatives 101 report serves as a practical, beginner-friendly guide to understanding how derivatives work and why they matter in today’s markets. It breaks down core instruments such as futures, options, and perpetual swaps, while explaining how these tools are used for hedging, speculation, and arbitrage.

    A standout feature of the report is a comprehensive comparison of centralized (CEX) and decentralized (DEX) perpetual markets, weighing factors like liquidity, slippage, fees, execution speed, and custody. Bitget, Binance, and OKX are shown to lead in areas like liquidity depth and institutional readiness, while platforms like GMX and Hyperliquid offer unmatched transparency and self-custody for DeFi-native users.

    The report also includes real-world trading scenarios that help readers understand which platform type is better suited to their goals. For example, a retail trader managing small-cap positions may benefit from Bitget’s intuitive UI, low fees, and fiat on-ramps. In contrast, DeFi-native users seeking anonymity and composability may prefer permissionless DEXs. Institutions executing large block trades are shown to favor CEXs like Bitget for better capital efficiency, risk management tools, and regulatory compliance. These case studies ground the content in real-world decision-making and make the guide actionable for new users.

    “The crypto industry has come a long way in terms of legitimacy, but education remains a key barrier,” said Eli Bordun, Partnership Director of Bitcoin.com. “This report breaks down step-by-step how the modern crypto markets function. Derivatives are often seen as tools for professionals — but they’re increasingly relevant for everyday users, DAOs, and even traditional financial players exploring the space. By working with Bitget to produce this report, we aim to demystify these instruments and support safe, informed participation in the market.”

    The report also highlights emerging trends set to shape the next era of crypto derivatives. One key theme is the rise of tokenized real-world assets (RWAs), which are increasingly being integrated into derivatives products and yield strategies. Another is the expansion of AI-powered trading platforms, which are revolutionizing how both retail and institutional users manage portfolios, select strategies, and mitigate risk. Regulatory clarity is also improving, with frameworks like the EU’s MiCA and Singapore’s MAS paving the way for responsible innovation.

    Finally, the report explores the evolution of CeDeFi (Centralized-Decentralized Finance) models, where platforms like Bitget offer the best of both worlds: secure custody and intuitive UX alongside permissionless asset access and DeFi integration.

    With this report, Bitget and Bitcoin.com reaffirm their shared commitment to building a more inclusive crypto trading environment. As derivatives become increasingly central to digital finance, Bitget is positioned not only as a market leader — but as a bridge between the next generation of users and the tools that will define their financial future.

    For more information, please see the full report here.

    About Bitget

    Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 120 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin priceEthereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a leading non-custodial crypto wallet supporting 130+ blockchains and millions of tokens. It offers multi-chain trading, staking, payments, and direct access to 20,000+ DApps, with advanced swaps and market insights built into a single platform.
    Bitget is driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM markets, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.

    Aligned with its global impact strategy, Bitget has joined hands with UNICEF to support blockchain education for 1.1 million people by 2027. In the world of motorsports, Bitget is the exclusive cryptocurrency exchange partner of MotoGP™, one of the world’s most thrilling championships.

    For more information, visit: WebsiteTwitterTelegramLinkedInDiscordBitget Wallet
    For media inquiries, please contact: media@bitget.com

    Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to our Terms of Use.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/6595d449-33e8-478f-a5d3-67dc9f840558

    The MIL Network

  • MIL-OSI Canada: Vicky Eatrides and Rachelle Frenette to CIPPIC Summer Speaker Series

    Source: Government of Canada News

    “Regulatory Riverbanks: Helping Build Canada’s Telecommunications Future”

    Ottawa, Ontario 
    July 30, 2025

    Vicky Eatrides, Chairperson and Chief Executive Officer 
    Canadian Radio-television and Telecommunications Commission (CRTC)

    Rachelle Frenette, General Counsel and Executive Director, Legal Services (CRTC)

    Check against delivery

    Introduction

    Good afternoon, everyone, and thank you, Matt, for the warm welcome.

    Before we begin, I would like to acknowledge that we are gathered on the traditional unceded territory of the Algonquin Anishinaabeg people. Let us take a moment to thank the Anishinaabeg people and to pay respect to their Elders.

    Thank you for inviting us to speak with you today. It is great to be here and to see a number of familiar faces in the room. And a warm hello to everyone joining us online.

    On behalf of the CRTC, I want to thank CIPPIC for your ongoing work to engage students and the academic community in meaningful conversations about Canadian telecommunications policy. By leading various advocacy and research-driven initiatives, CIPPIC continues to make a vital contribution to shaping a more equitable, transparent, and accountable digital landscape.

    And your work is more important than ever.

    Telecommunications shape how we live — how we learn, how we work, how we access healthcare, and how we stay close to loved ones. That is why listening to Canadians grounds telecommunications policy in the lived realities of communities across the country.

    When I think about our role in telecommunications policy, I am reminded of something the Canadian business leader Bonnie Brooks once said: “we build the riverbanks and let the water flow freely.” I think that this is a fitting metaphor for the work of many regulators.  

    At the CRTC, we are building riverbanks in the form of regulatory frameworks that support a healthy and competitive telecommunications industry. And our frameworks are not just built to hold the current — they are meant to guide it.

    We know that effective regulatory policy starts with a clear sense of purpose. So that is where we will start today: our mandate and our place within the broader framework of telecommunications policy.

    Then, let us talk about the CRTC’s ongoing efforts to help connect all Canadians to high-quality Internet and cellphone services. 

    And finally, we will delve into the CRTC’s work on affordability, investment, and consumer protections.

    CRTC mandate

    So let us begin with a quick overview of the CRTC and our mandate, and then briefly touch on the landscape of telecommunications regulation beyond the CRTC.

    Starting with the CRTC.

    The Canadian Radio-television and Telecommunications Commission Act establishes the CRTC as a commission consisting of members appointed by the Governor in Council.

    There are currently nine members — a Chairperson, a Vice-Chairperson for Telecommunications, a Vice-Chairperson for Broadcasting, and six regional Commissioners who are located across the country.

    Commissioners have a team of expert staff supporting them — many of whom have spent their entire careers studying and analyzing the telecommunications and broadcasting industries in both the public and private sectors.

    We have colleagues with consumer, social policy, legal, and other diverse expertise, who help Commissioners make informed decisions that benefit Canadians.

    Now let us turn to our mandate. As you may know, the CRTC is an independent quasi-judicial tribunal that regulates the Canadian communications sector in the public interest. We hold public consultations on telecommunications and broadcasting matters and make decisions based on the record.

    This means taking into account a number of different — and often competing — interests as the Commission makes its decisions. These decisions create regulatory frameworks that guide how telecommunications service providers interact with Canadians and with each other.

    The CRTC regulates the telecommunications industry through the Telecommunications Act. Our decisions are guided by the nine telecommunications policy objectives outlined in the Act. These objectives, established by Parliament, range from foundational goals — such as ensuring reliable, affordable, and high-quality telecommunications services — to more targeted aims, like promoting telecommunications research and development in Canada.

    In the broader landscape, telecommunications regulation in Canada is a shared responsibility. In addition to the CRTC, the Minister of Industry holds key regulatory responsibilities under both the Telecommunications Act and the Radiocommunication Act.

    Most notably, the Minister oversees the management of Canada’s wireless spectrum, which is essential for delivering cellphone services and over-the-air broadcasting.

    I mentioned the policy objectives in the Act earlier. These can be supplemented by Government policy directions to the CRTC. Together, the legislation and policy directions serve as guiding principles the CRTC must take into account when making its decisions.

    The current policy direction was issued in 2023. It contains a number of key themes that drive the CRTC’s policy work, such as using regulation to promote competition, affordability, consumer interests, and innovation. Other parts of the policy direction guide the CRTC on how it should do that work, like asking us to ensure that any measures we impose are efficient and proportionate to their purpose.

    Our frameworks are informed by the broader landscape of telecommunications regulation — by Parliament through the objectives in the Act, by the government through the policy direction, and, importantly, by the evidentiary records we build during our public consultations.

    We value diverse perspectives because each voice contributes to the record and directly influences the decisions the Commission makes. That is why organizations like CIPPIC are essential — you help ensure that the interests of Canadians are heard and reflected in our policies.

    I think that is a good segue to the CRTC’s regulatory work.

    Connecting Canadians

    Let us start with the CRTC’s ongoing efforts to connect Canadians to high-quality Internet and cellphone services.

    Most of us here today have had access to high-speed Internet and the latest cellphone technology for many years. We have come a long way, but there is still more work to do to make Internet access available to everyone across Canada.

    Our latest public information shows that about 750,000 Canadian households still lack access to unlimited Internet plans at speeds of at least 50 megabits per second download and 10 megabits per second upload. While the number of households that lack access continues to drop, we know that rural, remote, and Indigenous communities are disproportionately affected.

    An Internet user in the North told the Competition Bureau during their market study on broadband that this “results in feelings of isolation and as though we aren’t a part of Canada.”

    This is a powerful reminder of the impact a lack of connectivity can have, including on our sense of belonging.

    Let me share another example.

    We know that there are communities in Canada that do not have a high school, and where local education can end at grade 9 or 10. This was the case for Angelina in the Northwest Territories, whose story was reported in the media. Angelina had to move 200 kilometres to Yellowknife to attend in-person high school classes. Most of us cannot imagine having had to leave our families and friends at age 15 to go to school.

    So, what does this have to do with connectivity?

    Well, for students like Angelina who do not have a local school, online schooling can be an alternative. But online schooling is only an option for students who have access to high-quality Internet.

    In 2019, the CRTC launched its Broadband Fund as part of a government-wide effort to help connect rural, remote, and Indigenous communities across Canada.

    To date, the CRTC has allocated over $750 million to projects that provide Internet or cellphone services to nearly 50,000 homes in more than 290 communities. The Broadband Fund has also helped improve cellphone service on more than 630 km of major road and build over 5,500 km of fibre across the country.

    Affordability and investment

    While ensuring that Canadians are connected is an important part of the CRTC’s role, we also work to keep Internet and cellphone services affordable and to preserve incentives for providers to invest in reliable, high-quality networks.

    Our Vice-Chair of Telecommunications, Adam Scott, recently described this work as the “Goldilocks problem” in telecommunications policy: if prices are too high, affordability suffers; if prices are too low, investment is discouraged, risking lower service quality and reduced connectivity.

    Solving this issue starts with listening.

    We have heard firsthand the struggles Canadians face affording their telecommunications services. During our public hearing on high-speed Internet, we learned about an individual named Sandy who lived in British Columbia and whose relatives spent more on telecommunications than on food. And similarly, we heard about Brigitte in Ontario, for whom the Internet was a vital lifeline. It was so essential that she had to cut back on other things to afford it.

    These stories show that making sure Canadians have affordable telecommunications is as important as making sure they are connected through programs like the CRTC’s Broadband Fund.

    While Statistics Canada data shows that Internet and cellphone prices are trending down, our latest public opinion research shows that people feel these services have become less affordable over the past year.

    On the other side of the “Goldilocks problem,” we know that building networks is expensive and that fair returns take time. We also know that in remote areas, connecting a single home can cost telecommunications companies several thousands of dollars.

    So how are we tackling the “Goldilocks problem”?

    We are taking action to encourage competition, while maintaining incentives for companies to invest.

    Let us start with cellphone services.

    The CRTC’s rules let smaller regional cellphone providers offer service across Canada by using the networks of larger companies. These rules are helping to provide Canadians with more options than we had before. They are also helping to increase competition between small and large companies, leading to more affordable services.

    Smaller providers are able to reach new areas they could not serve before. But to make sure they keep investing in their own networks, access to the networks of larger companies is only temporary — they must finish building their own infrastructure by 2030.

    We are also taking action to improve competition for Internet services. Over the past few years, Canadians have had fewer options when it comes to choosing an Internet provider. That is why, last August, the CRTC began allowing companies to offer Internet plans using the fibre networks of Canada’s largest telephone companies in areas where those companies do not have their own networks.

    We also put measures in place to make sure companies keep investing in high-quality networks. That includes setting fair rates so large companies are paid for the cost of building fibre networks, limiting where they can use the new rules so that they keep building their own networks, and delaying competitive access to brand-new fibre until 2029.

    Now that these frameworks are in place, our next steps are to keep a close eye on how they are working and to make changes if needed.

    Consumer protections

    That brings us to the last policy area we will cover today — consumer protections.

    We have heard stories of Canadians facing unexpected increases in their monthly bills. We have also heard of Canadians who want to take advantage of a better deal in the market only to be faced with high fees for cancelling their existing service. And we know that Canadians need simple and convenient self-service mechanisms to modify, right-size, or cancel their plans.

    As part of our mandate to protect and empower consumers in their dealings with service providers, the CRTC put in place codes of conduct that help ensure that Canadians have clear contracts, are not surprised by higher bills, and have the information they need to make the best choices about their Internet, cellphone, and TV services.

    Last year, the CRTC launched a comprehensive Consumer Protections Action Plan to modernize our approach to better serve Canadians. And to bring this Action Plan to life, we initiated four public proceedings.

    The first proceeding focuses on preventing bill shock by ensuring Canadians receive advance notice when their discounts or service plans are about to expire.

    The second aims to limit any fees Canadians might face when cancelling or changing plans.

    The third explores how we can expand self-serve options, so that it is easier to find and choose the best Internet and cellphone plans.

    And the fourth proceeding, which was the subject of a public hearing just last month, aims to make Internet plan details clearer and more consistent.

    This is a crucial area of our work that will continue to be a focus for the CRTC.

    In the coming weeks, we will launch a consultation to consider additional consumer protections, including clearer communications or refunds, when Canadians experience a service outage. And looking out further, we plan to combine our consumer protection codes into a single code that is more clear, simple, and consistent across all services. So, stay tuned.

    Conclusion

    Thank you again for welcoming us today.

    If there is one message we hope you take away, it is this: telecommunications policy is not just about towers or cables — it is about people, and it is about building a healthy industry that serves them well.

    At the CRTC, we know that we do not have all the answers. But we do know this: better policy happens when we listen — to individuals, to businesses, and to organizations like CIPPIC that help bring diverse voices into the conversation.

    So here is where you come in.

    Join our public consultations. Share your stories. Challenge our thinking.

    Because at the end of the day, we know that the most effective regulatory riverbanks are the ones we build together.

    Thank you.

    MIL OSI Canada News

  • MIL-OSI Security: Ithaca Man Arrested for Enticement of a Minor and Distribution of Child Pornography

    Source: Office of United States Attorneys

    David Pastorello was Pending Sentencing on State Charges for Disseminating Indecent Material to a Minor

    SYRACUSE, NEW YORK – David Pastorello, age 44, of Ithaca, New York, was arrested Tuesday evening and had his initial appearance on Wednesday on charges of enticement of a minor and distribution of child pornography. Acting United States Attorney John A. Sarcone III and Craig L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI), made the announcement.

    The complaint alleges that Pastorello sent text messages to a girl under the age of 12, repeatedly requesting that the child have sex with him. Pastorello also sent the victim indecent images of himself, in addition to two images constituting child pornography under federal law. Later, Pastorello entered the victim’s apartment without permission before fleeing. The charges in the complaint are merely accusations. The defendant is presumed innocent unless and until proven guilty.

    Prior to this offense, in May 2025, Pastorello was arraigned in Tompkins County Court for the New York State offense of possessing a sexual performance by a child less than 16 years old. In July 2025, just a few days prior to the incident that gave rise to the federal charges, Pastorello pled guilty in Cortland County Court to the New York State offense of disseminating indecent material to a minor. The Cortland County case was reset for sentencing. Pastorello was out on bond in both pending state cases.

    Acting United States Attorney John A. Sarcone III stated: “Thanks to the quick work of federal, state, and local law enforcement, children have been protected and a dangerous predator has been apprehended. Despite having committed other crimes relating to child sexual abuse, Pastorello was allowed by state authorities to be out of custody. His new crimes demonstrate how dangerously unwise that decision was. Pastorello will be held fully accountable for the federal offenses he has committed.”

    FBI Special Agent in Charge Craig L. Tremaroli stated: “Mr. Pastorello, a repeat offender with an alarming criminal history, is a dangerous predator who is now facing serious federal charges. These charges would not have been possible without the incredible assistance and coordination provided by our partners from the Tompkins County Sheriff’s Office, Ithaca Police Department, and New York State Police. Our communities should know the FBI is committed to leveraging these strong partnerships to bring the full weight of the federal government down on these disturbing predators looking to harm our children.”

    Following the initial appearance, Pastorello was remanded to the custody of the United States Marshals Service pending further proceedings.

    If convicted of enticement of a minor, Pastorello faces a maximum term of life in prison and a mandatory minimum term of imprisonment of 10 years, and for distribution of child pornography, a maximum term of imprisonment of 20 years and a mandatory minimum term of imprisonment of 5 years. A defendant’s sentence is imposed by a judge based on the particular statute(s) the defendant is convicted of violating, the U.S. Sentencing Guidelines and other factors. Pastorello would also be required to register as a sex offender if convicted.

    The FBI and New York State Police are conducting this investigation. Assistant U.S. Attorney Ben Gillis is prosecuting the case as part of Project Safe Childhood.

    Project Safe Childhood is a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI USA: Attorney General Labrador Secures Prison Sentence for Child Predator

    Source: US State of Idaho

    Home Newsroom Attorney General Labrador Secures Prison Sentence for Child Predator

    BOISE — Attorney General Raúl Labrador’s Internet Crimes Against Children Unit arrested and secured the conviction of Enrique Galeana, 30, for possessing and distributing child sexual abuse material. Gem County District Judge Brent Whiting sentenced Galeana to 20 years in prison, with eligibility for parole after serving 10 years on July 14, 2025. Upon release, Galeana must register as a sex offender pursuant to Idaho law. “Every predator we remove from our streets makes Idaho families and communities safer,” said Attorney General Labrador. “Our ICAC investigators work relentlessly to protect children in Idaho from those who would exploit and harm them, and we will continue pursuing these criminals with the full force of the law.” In September 2024, Labrador’s ICAC Unit received a CyberTip indicating Galeana was uploading and distributing child sexual abuse material through an account linked to his phone number. After obtaining search warrants and conducting months of surveillance, ICAC investigators searched Galeana’s home, vehicle, and devices. Officers discovered numerous files depicting children ages 4 to 12. During questioning, Galeana admitted attraction to children ages 3-10 and to accessing the material for sexual arousal. During the investigation, authorities learned Galeana was an inadmissible alien and reported him to the appropriate federal authorities. Lead Deputy Attorney General Madison Allen Gourley prosecuted the case. ICAC Investigator Lauren Lane conducted the investigation.

    MIL OSI USA News

  • MIL-OSI USA: Rep. Pettersen Meets With Providers & Administrators at Planned Parenthood Arvada Health Center Following Trump’s Effort to Ban Medicaid-Covered Planned Parenthood Treatments

    Source: United States House of Representatives – Representative Brittany Pettersen (Colorado 7th District)

    SEE PICTURES FROM TUESDAYS EVENT

    LAKEWOOD – U.S. Representative Brittany Pettersen (CO-07) visited the Planned Parenthood of the Rocky Mountain’s (PPRM) Arvada clinic to hear from providers and administrators about the impacts of Trump’s ban on Medicaid coverage for care at Planned Parenthood. The ban was part of Trump’s One Big Beautiful Bill Act, which specifically prohibited Medicaid recipients from using Planned Parenthood for their health care. PPRM therefore had to immediately notify around 15,000 patients, around 25% of their patient base, that they could no longer be treated at Planned Parenthood facilities, and were unable to offer an alternative for care. But on Monday, a federal judge ruled the federal government must allow Medicaid to reimburse Planned Parenthood for patient care.

    During the visit, Pettersen met with providers and administrators to discuss the real consequences of these changes, specifically, how individuals depend on these clinics for more than just reproductive services, and how these increased barriers, especially for rural and low-income individuals, could cause harm when they have access to few alternatives. In the first week alone, this local clinic had to notify 100 patients that they were unable to see them for their appointments that week. For many patients, Planned Parenthood is the only place they’ve ever known for getting the care they need. Pettersen also heard firsthand about the struggles PPRM has experienced with the chaotic implementation and judicial process around this ban. The Arvada clinic has 13 employees and the need for an additional provider, but the situation has created a difficult climate for hiring.

    “Trump not only handpicked the radical Supreme Court justices who voted to overturn Roe vs Wade, he has also stripped coverage for reproductive healthcare away for patients who rely on Medicaid through his “big ugly bill.”  Like so many women, I relied on Planned Parenthood for access to health care when I was uninsured. In many places, Planned Parenthood is the only option people have to access care and Donald Trump and the Republicans are leaving millions of Americans with nowhere to turn” said Rep. Pettersen.  “As a mom, I know there isn’t anything more personal than deciding if you want to start a family and nobody should make that decision for you, especially Donald Trump. I’m outraged by his cruelty and the impacts this will have on women for years to come. Women and Americans deserve so much better than this.”

    “This law was designed to punish people on Medicaid who rely on Planned Parenthood for life-saving reproductive and sexual health care. It’s a cruel and calculated attack on health equity, and it’s having real, devastating consequences for our patients across Colorado.  In just the first nine days after the law took effect, nearly 1,000 patients across our region were denied essential care. These are people who couldn’t pick up their birth control, missed time-sensitive abortion care services, or were turned away from cancer screenings and STI treatment. These aren’t just numbers—they’re our neighbors, our friends, and our family members. Republicans in Congress who voted for this heinous bill should be ashamed of themselves” said Adrienne Mansanares, President and CEO of Planned Parenthood of the Rocky Mountains. 

    Planned Parenthood is the nation’s largest abortion care provider, but they also provide basic care, including annual screenings, birth control, and other gynecological care. Each year, Planned Parenthood of the Rocky Mountains serves nearly 100,000 people at their 23 health centers in Colorado, New Mexico, and Wyoming. Planned Parenthood estimates that 1 in 5 women have relied on Planned Parenthood for care at some point in their lives.

    ###

    MIL OSI USA News

  • MIL-OSI USA: Cherokee County men arrested on Child Sexual Abuse Material* chargesRead More

    Source: US State of South Carolina

    (COLUMBIA, S.C.) – South Carolina Attorney General Alan Wilson announced the arrest of Victor Hugo Lara Rosaldo, 35, of Gaffney, S.C., Caleb Tyler Patterson, 31, of Gaffney, S.C., and Timothy David Anderson, 58, of Chesnee, S.C., on nine total charges connected to the sexual exploitation of a minor. Internet Crimes Against Children (ICAC) Task Force investigators with the South Carolina Attorney General’s Office made the arrests in these unrelated cases. Investigators with the Cherokee County Sheriff’s Office, also a member of the state’s ICAC Task Force, assisted with these investigations.

     

    Investigators received CyberTipline reports from the National Center for Missing and Exploited Children (NCMEC), which led them to Rosaldo, Patterson, and Anderson. Investigators state Rosaldo and Anderson distributed files of child sexual abuse material, and Patterson possessed and distributed files of child sexual abuse material.  

     

    Rosaldo was arrested on July 29, 2025. He is charged with three counts of sexual exploitation of a minor, second degree (§16-15-405), a felony offense punishable by up to 10 years imprisonment on each count.

     

    Patterson was arrested on July 29, 2025. He is charged with three counts of sexual exploitation of a minor, second degree (§16-15-405), a felony offense punishable by up to 10 years imprisonment on each count; and two counts of sexual exploitation of a minor, third degree (§16-15-410), a felony offense punishable by up to 10 years imprisonment on each count.

     

    Anderson was arrested on July 30, 2025. He is charged with one count of sexual exploitation of a minor, second degree (§16-15-405), a felony offense punishable by up to 10 years imprisonment.

     

     

    These cases will be prosecuted by the Attorney General’s Office.

     

    Attorney General Wilson stressed all defendants are presumed innocent unless and until they are proven guilty in a court of law.

     

     

     

    * Child sexual abuse material, or CSAM, is a more accurate reflection of the material involved in these heinous and abusive crimes. “Pornography” can imply the child was a consenting participant.  Globally, the term child pornography is being replaced by CSAM for this reason.

    MIL OSI USA News

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI: The Pink Salt Trick Recipe for Fast Weight Loss Trend in 2025: Why Trimology Is the Science-Backed Alternative

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, July 31, 2025 (GLOBE NEWSWIRE) —

    Pink Salt Trick Recipe Explained: Why It’s Trending for Weight Loss

    A viral wellness trend called the “Pink Salt Trick” has swept social media—particularly TikTok, Instagram, and wellness blogs. The hype: a morning ritual mixing Himalayan pink salt, water, lemon and honey claims to boost metabolism, reduce bloating, and even accelerate fat loss. But credible medical sources now label it a pseudoscientific fad with no proven weight‑loss benefits—and potential risks for high blood pressure sufferers.

    Enter Trimology, a science‑backed supplement brand positioned as a safer, evidence‑based alternative. Rather than quick fixes or social media stunts, Trimology takes its inspiration from a traditional Ugandan weight‑maintenance ritual: women consuming bitter green bananas rich in resistant starch (RS2), which naturally support gut microbiome health and metabolic resilience. Trimology translates that ritual into a modern capsule form by delivering concentrated RS2 plus supporting pre‑ and probiotics. 

    While the Pink Salt Trick rides on viral popularity, Trimology is introduced as a metabolic reset system—one that doesn’t promise overnight miracles, but rather aims for sustainable internal recalibration through gut‑brain‑fat signaling pathways. Want to Learn More About Trimology? Click Here

    Why Trimology Is the Safer, Science‑Backed Alternative

    Enter Trimology — a next‑generation, gut‑first weight‑loss supplement designed to offer credible, long‑term benefit rather than a viral illusion. Unlike the Pink Salt Trick, which hinges on vague mineral magic and untested methods, Trimology is rooted in microbiome science and targeted metabolic support.

    • Biological foundation: Trimology blends resistant starch (RS2), chicory inulin, and a signature probiotic triad (including Clostridium butyricum, Akkermansia muciniphila, Bifidobacterium infantis) to feed fat‑regulating gut bacteria and restore healthy metabolic signals.
    • Ancient inspiration: Derived from research into a traditional Ugandan practice—women consuming bitter green bananas rich in RS2 stayed lean well into older age—Trimology replicates the benefits in a clean capsule instead of a literal banana ritual.
    • Transparent formulation: Ingredients and microbial strains are fully disclosed, sourced at pharmaceutical quality, and backed by peer‑reviewed research—not buried in proprietary blends.
    • User‑friendly delivery: One capsule taken daily with breakfast. No meal‑timing restrictions, no yo‑yo dieting, no fasting requirements—just simple consistency. That ease of use appeals especially to women juggling busy schedules.
    • Safety and clarity: Trimology does not rely on caffeine, stimulants, hormone disruptors, or laxatives. It’s not sold as a cure, but a metabolic reset—respecting the body’s natural systems with traceable ingredients and no outrageous promises.

    While the Pink Salt Trick offers instant visual appeal and anecdotal enthusiasm, Trimology emphasizes measured improvement, restoring the gut‑brain‑fat axis, promoting satiety, and supporting energy through internal recalibration—not by shocking the system or inflating expectations. Unlock the Full Story Behind Trimology– Learn More Now

    Why the Internet Believed Deep‑Fake Celebrities Promoted the Pink Salt Trick

    The Pink Salt Trick’s rapid rise is strongly tied to deep‑fake endorsements and manipulated celebrity faces. Reports indicate that creators used AI‑generated clips mimicking well‑known public figures “trying” or “endorsing” the trend. Sensational headlines and algorithm‑driven reach amplified the illusion of legitimacy.

    The strategy tapped into users’ trust in celebrities, piggy‑backing on FOMO (fear of missing out) by suggesting these are insider weight‑loss secrets. Social platforms prioritized visually compelling before‑after testimonials and simplified recipes—despite medical experts warning the trend is unsupported or potentially unsafe.

    In essence, trust was manufactured—the product had no clinical trials, no published data—but looked persuasive because of faux celebrity endorsement and viral momentum. In contrast, Trimology emphasizes transparency, open ingredient sourcing, and no misleading influencer claims.

    Why the Pink Salt Trick Doesn’t Work — and Might Be Harmful

    At first glance, the Pink Salt Trick Recipe seems harmless. After all, pink Himalayan salt is often marketed as a “natural” source of minerals like magnesium, calcium, and potassium. But when used improperly—or in excess—it becomes not only ineffective, but potentially dangerous.

    Here’s why:

    • Too much sodium: One teaspoon of pink Himalayan salt contains about 2,300 mg of sodium—the maximum daily limit recommended by most health authorities. Those doing the trick multiple times a day (as some videos suggest) could be ingesting well over the safe threshold, increasing risk of high blood pressure, fluid retention, and cardiovascular strain.
    • No real metabolic effect: Despite its reputation, there is no clinical evidence that pink salt boosts metabolism, burns fat, or suppresses appetite in any meaningful way. The minor effects people feel—such as increased fullness or reduced cravings—are likely due to hydration or placebo, not salt-specific properties.
    • Dehydration and electrolyte imbalance: In some versions of the trick, users consume large quantities of saltwater without adjusting their hydration elsewhere. This can disrupt the body’s sodium-potassium balance, especially dangerous for people with kidney conditions, hypertension, or existing heart issues.
    • No support for gut health: While pink salt may contain trace minerals, it offers no prebiotic or probiotic benefit, meaning it does nothing to support the gut microbiome—which scientists now agree plays a crucial role in regulating metabolism, insulin sensitivity, and weight stability.
    • Not FDA-regulated: Most of the Pink Salt Trick kits sold online are unregulated and vary widely in quality. Some are sourced from poorly tested suppliers and may contain microplastics or industrial contaminants.

    In contrast, Trimology was developed to avoid all of these pitfalls. Its probiotic strains and resistant starches are carefully dosed for metabolic safety, backed by lab data, and formulated in cGMP-certified facilities. There’s no sodium loading, no electrolyte disruption, and no gimmicky biohacks.

    Trimology’s gut-first approach helps re-establish satiety signaling, healthy blood sugar control, and long-term fat regulation—all while nurturing the digestive ecosystem, not irritating it. Its gradual, cumulative effects are exactly what the body needs—not a one-time shock that confuses internal systems and creates dependency.

    Perhaps most importantly, Trimology doesn’t promise miracles. It encourages consistency, not urgency, which is critical in breaking the cycle of fad-based dieting that trends like the Pink Salt Trick perpetuate. Trimology provides a more intelligent, research-backed solution

    How Trimology Supports Weight Loss

    Trimology supports weight loss by targeting foundational metabolic pathways—not by temporary suppression or dehydration. Its key strategy: nourish beneficial gut bacteria with RS2 and inulin to optimize butyrate production. Butyrate enhances insulin sensitivity, reduces systemic inflammation, and reinforces the gut lining—helping the body regulate blood sugar and fat storage more effectively.

    The included probiotic strains further support natural hunger regulation: Akkermansia is linked with improved satiety hormone function and better insulin response; Clostridium butyricum promotes sustained butyrate output; and Bifidobacterium infantis may help stabilize mood, reduce food cravings, and normalize ghrelin/leptin balance.

    Users are advised to take a single capsule each morning with water or coffee—no complex fasting windows, no food tracking. Over time (usually 2–4 weeks), users report sharper energy, fewer cravings, less bloating, and gradual weight reduction—consistent with internal metabolic reset before visible change.

    Trimology positions weight loss not as an immediate outcome, but as a secondary benefit of restoring internal harmony and resilience—ideally paired with healthy eating and movement, but not dependent on them.

    Key Ingredients of Trimology

    Trimology’s formula stands on five core active components:

    • Pharmaceutical‐grade RS2 (resistant starch): sourced from green banana or potato starch; resists digestion until it reaches the colon, where specific bacteria ferment it, producing butyrate—a short-chain fatty acid central to metabolic regulation.
    • Chicory root (inulin): a soluble fiber and prebiotic that nourishes a diverse gut microbiome, amplifying butyrate production and improving digestion and glucose response.
    • Clostridium butyricum: a robust butyrate-producer that helps lower inflammation, stabilize gut environment, and support fat-burning pathways.
    • Akkermansia muciniphila: known to improve gut barrier integrity, increase satiety hormone responses, and enhance insulin sensitivity—like a natural appetite regulator.
    • Bifidobacterium infantis: associated with reduced cravings, hormone regulation, better digestion, and mood balance—all supportive of sustainable weight.

    These ingredients were chosen not for hype, but for measurable roles in reactivating the gut‑brain‑fat axis. Together, they form what Trimology refers to as the “Signal Reset Triad”—a synergy that supports calm inflammatory processes, improved satiety, and metabolic resilience.

     Visit Trimology Official Website To Know More About ……..

    What Makes Trimology Different From Other Weight Loss Supplements

    Trimology diverges from traditional fat burners or appetite suppressants in several key ways:

    1. No stimulants or synthetic hormones: unlike energizing fat‑burners loaded with caffeine or hormone‑mimicking compounds, Trimology works through microbiome support—not chemical triggers.
    2. Transparent labeling: ingredients are clearly identified, including specific probiotic strains and prebiotic sources. No proprietary blends or ambiguous fillers—each component was selected based on clinical research.
    3. Simplicity and compatibility: single capsule daily, compatible with most lifestyles and diet plans. No food tracking, no cycles, no loading phases. Reviewers consistently praise its integration ease and non‑aggressive positioning.
    4. Sustainable orientation: Trimology encourages long‑term use to rebuild metabolic signaling—not short bursts of weight loss that fade when the supplement ends.
    5. Gut‑focused rather than symptom focused: Rather than treating appetite or bloating as surface issues, Trimology treats them as symptoms of disrupted gut‑brain communication, aiming for root‑cause recalibration.

    Why Women Over 30 Are More Likely to Fall for These Weight Loss Trends

    Women over 30—especially in their late 30s and 40s—often encounter metabolic shifts as hormonal cycles evolve and gut microbiome diversity diminishes. Age-related declines in resistant starch intake, poorer insulin sensitivity, and changing satiety hormone patterns can make weight less responsive to diet and exercise alone.

    Traditional diet programs often backfire for this demographic, causing fatigue, rebound weight gain, or hormonal disruption. Many women report frustration after trying numerous programs with limited long-term results. This vulnerability makes them more susceptible to quick-fix trends like the Pink Salt Trick—offering false hope with minimal effort and social proof.

    Trimology acknowledges these real challenges. Unlike superficial hacks, it works by targeting age‑sensitive systems: gut‑brain communication, butyrate deficit recovery, and hormone stability. Its gentle, supportive approach aligns with women’s busy lives and biological realities: a daily capsule versus restrictive detoxes or influencer‑pushed gimmicks.

    By addressing the invisible drivers of metabolic slowdown—not just calories or fat—Trimology offers a credible alternative for those most affected by modern metabolic.

    Is This Product Backed by Science?

    Yes—while Trimology is a supplement, its formula is built on published scientific research into resistant starch, gut microbiota, and metabolic signaling.

    • RS2 has been shown in multiple studies to increase butyrate production, reduce inflammation, and support healthy glycemic response.
    • Akkermansia muciniphila has clinical data linking it to improved insulin sensitivity and satiety hormone levels.
    • Clostridium butyricum is documented for its resilience and butyrate‑producing capacity.
    • Bifidobacterium infantis has been associated with reduced appetite and improved digestion.

    Although Trimology capsules themselves haven’t undergone large‑scale clinical trials, each ingredient is supported by peer‑reviewed research. Independent reviewers and affiliate health blogs repeatedly cite these scientific underpinnings in endorsement articles.

    Furthermore, Trimology emphasizes ingredient sourcing transparency, avoids false claims or miracle marketing, and communicates realistic expectations—traits aligned with science‑based consumer trust.

    Where To Get Trimology?

    Trimology is available exclusively through its official website. This direct‑to‑consumer model helps ensure authenticity, clarity in pricing and subscription options, and avoids counterfeit distribution common in third‑party marketplaces.

    In contrast to viral “Pink Salt Trick” videos with undisclosed affiliate links, Trimology’s official site provides detailed ingredient listings, FAQ sections, customer support contacts, and opt‑out cancellation policies at no hidden fees.

    Users should purchase only via the official domain to avoid scams or unauthorized resellers. Many reviewers also recommend starting with the introductory offer (typically 30‑day supply) before committing to longer subscriptions.

    Final Thoughts: Why This Trend Matters More Than It Seems

    On the surface, the Pink Salt Trick appears harmless: a pinch of salt, a glass of water, maybe lemon and honey. But beneath the glossy viral veneer lies the risk of misinformation, procedural mimicry, and potential health issues for those with hypertension or kidney conditions.

    This trend exemplifies what happens when social media bypasses scientific validation—when AI‑generated celebrity testimonials and simplified ritual hacks displace rigorous evidence and expert guidance. It’s a warning sign: even well‑meaning health culture can propagate dangerous fads fast.

    Trimology represents the opposite trajectory. It doesn’t promise instant transformation but offers a model of sustainable metabolic realignment rooted in gut science, real‑food traditions, and transparent sourcing. It shifts the narrative from external fixes to internal recalibration.

    In a cultural moment flooded with wellness trends, the difference between viral popularity and scientific credibility matters. The Pink Salt Trick may vanish as its lack of efficacy becomes clearer; Trimology, by contrast, seeks longer‑term trust through measurable ingredients and consumer empowerment.

    For consumers—especially women over 30—it’s a reminder to prioritize evidence over endorsement, gut‑health over gimmicks, and sustainable support over superficial trend chasing.

    Media Contact:
    Brand website: https://trimologyweight.com/
    Project name: Trimology
    Email: support@trimologyweight.com
    Phone: +1 (302) 467-2939

    Attachment

    The MIL Network

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI Russia: Financial news: Decision of the Board of Directors on Amendments to the Type C Account Regime

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    On July 31, 2025, the Board of Directors of the Bank of Russia decided to introduce Decision of the Board of Directors of the Bank of Russia dated November 21, 2022 “On the establishment of the type “C” account regime for settlements and the implementation (execution) of transactions (operations) to which the procedure for fulfilling obligations provided for by Decree of the President of the Russian Federation dated March 5, 2022 No. 95 “On the temporary procedure for fulfilling obligations to certain foreign creditors” applies change, adding the following words to paragraph twelve of subparagraph 1.1 of paragraph 1:

    “; transfers by order of a non-resident for whom a type “C” bank account has been opened in favor of a resident for the purpose of fulfilling the non-resident’s obligation to transfer funds, provided that transactions (operations) related to such transfers are concluded between the said resident and the non-resident from whose type “C” bank account funds are debited, which entail the transfer of ownership of securities to the resident in accordance with permits issued on the basis of decrees of the President of the Russian Federation, if the terms of such transactions (operations) provide for the alienation in favor of the non-resident of property (including property rights) recorded abroad, the disposal of which is restricted due to unfriendly actions of foreign states; transfers at the order of a non-resident for whom a type “C” bank account has been opened, in the amount of dividends previously credited to the type “C” bank account due to this non-resident, in favor of the resident for the purpose of fulfilling the non-resident’s obligation to transfer funds, subject to obtaining permission issued on the basis of decrees of the President of the Russian Federation to pay dividends to the non-resident.”

    The decision of the Board of Directors of the Bank of Russia to amend the decision of the Board of Directors of the Bank of Russia dated November 21, 2022 shall apply from the date of its publication on the official website of the Bank of Russia on the information and telecommunications network “Internet”.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI: 2025 FIRST HALF RESULTS : MOBILIZE FINANCIAL SERVICES DELIVERS SOLID GROWTH

    Source: GlobeNewswire (MIL-OSI)

       
    PRESS RELEASE
     
    Paris, 31st July 2025 

     

     

    2025 FIRST HALF RESULTS :
    MOBILIZE FINANCIAL SERVICES DELIVERS SOLID GROWTH

    Mobilize Financial Services records a progression in new financing by 3.8% in the first semester of 2025 compared to the same period in 2024. This performance reflects a rise in the average amount financed and the commercial dynamics of Renault Group’s brands, Nissan and Mitsubishi, supported by a robust growth in registrations.

    With a progression of pre-tax profit by 9.7%, Mobilize Financial Services confirms the relevance of its strategy and its commitment to more sustainable mobility, in line with new uses.

    This performance confirms Mobilize Financial Services’ ability to efficiently support the strategy of its automotive partners, while meeting the expectations of customers in quest of flexible and competitive financing solutions.

    KEY INDICATORS

    Commercial performance1

    • The amount of new financing progresses by 3.8% compared to the first semester of 2024, driven by a sustained commercial dynamic.
    • 632,994 contracts were financed in the first semester of 2025, a slight increase in volume compared to the same period of the previous year (+0.8%).
    • The penetration rate on electric vehicles reached 43.9% at the end of June 2025, a positive difference of 6.5 points compared to other motorization.

    Financial performance

    • The Average Performing Assets (APAs) register a growth of 7.3% compared to the end of June 2024, confirming the robustness of the portfolio.
    • The Net Banking Income progressed by 5.3% over one year, to reach 1,132 million euros in the first semester of 2025.
    • The pre-tax income of the group increased to 607 million euros, increasing by 9.7% compared to the first semester of 2024.

    In the beginning of the year 2025, we reaffirmed our ambition to support our customers as they transition to more sustainable mobility, by offering products and services in line with new uses. The half-year results support the robustness of our economic model and concretely illustrate our commitment to driving more responsible mobility, fully aligned with the ambitions of Renault Group”, declares Martin Thomas, Chief Executive Officer of Mobilize Financial Services.

    A SUSTAINED COMMERCIAL DYNAMIC, IN A RECOVERING MARKET

    In an automotive market with slight progression by 0.7%, the volumes of Renault Group, Nissan and Mitsubishi reached 1.19 million vehicles, increasing by 2.3% compared to the first semester of 2024. In this context, Mobilize Financial Services records a growth of its new financing by 3.8% (excluding cards and personal loans), for a total of 11.1 billion euros, driven by an increase in registrations and increases of the average financed amount.

    Excluding companies consolidated by equity method, the overall penetration rate stands at 39.6%, slightly down by 0.4 point compared to the same period of last year. The penetration rate on electrified vehicles, as for it, reaches 43.9% at the end of June 2025, +6.5 points compared to other types of motorization.

    In total, 632,994 new contracts were financed in the first semester of 2025, an almost stable volume (+0.8 %) compared to 2024. The financing activity of used vehicles recorded a slight decrease by 0.4% with 153,759 contracts financed.

    Benefitting from a growing operational leasing market, Mobilize Lease&Co financed in the first semester of 2025, 120,039 operational leasing contracts for private and professional customers and reached a fleet under management of 655,000 vehicles, representing a growth by 4% compared to the first semester of 2024.

    The Average Performing Assets (APAs) reached 58.9 billion euros, increasing by 7.3% compared to the first semester of 2024. APAs related to customer activity (private and professional) rose to 47.4 billion euros (+7%), whereas those related to dealership activity progressed by 8.6% to each 11.5 billion euros.

    Finally, 1.8 million insurance and service contracts were sold during the semester, confirming the relevance of the additional offers proposed by Mobilize Financial Services.

    A ROBUST FINANCIAL PERFORMANCE AND A DIVERSIFIED RE-FINANCING STRATEGY

    In the first semester of 2025, the Net Banking Income (NBI) of Mobilize Financial Services amounted to 1,132 million euros, increasing by 5.3 % compared to the end of 2024. This performance is mainly the result of an improvement in the financial margin as well as the growth of outstanding loans.

    The operating costs reached 389 million euros, increasing by 24 million euros compared to last year. This change is explained by the present of non-recurring items having reduced the expenses in the first semester of 2024. Reported to the Average Productive Assets, operating expenses remain stable at 1.33%.

    The pre-tax income stands at 607 million euros, against 553 million, one year earlier, a progression by 9.7 %, driven by the rise of NBI. The share of income from associate companies progressed slightly by +0.9 million euros.

    In a context marked by investor caution in the face of economic and geopolitical uncertainties, the group raised 1.3 billion euros on the bond market in the first semester of 2025. Three public issued were carried out:

    • 2 senior bonds in Euros of 850 million euros (3 years) and 500 million euros (5 years, Green Bond)
    • 1 Tier subordinated debt issue of 500 million euros

    This latest transaction enables expending the maturity profile of the subordinated debt and falls within an active capital management strategy, aiming to maintain a solid financial structure and robust safety margins. Besides, the subsidiaries of the group in Argentina, Brazil, Korea, Morocco and Poland raised a total of 500 million euros on local bond markets.
    In the securitization market, the group placed 624 million euros in automobile loan-backed securities via its German branch. Private securitization transactions in the United States (automobile loans) and in Germany (leasing) saw their revolving period extended by two years.

    Finally, the savings collection activity, launched in 2012 and present in seven European countries (France, Germany, Austria, United Kingdom, Spain, the Netherland and Poland) continues to play a key role in the diversification of financing sources. The deposits collected reached 30.5 billion euros representing 49.1% of net assets at the end of June 2025.

    1 The factoring contracts for short-term rental companies were excluded from 2025 onwards. These contracts represented 32,000 contracts in the first half of 2024, representing a positive impact of 2.8 points on the penetration rate. A hypothetical calculated based on the 2024 figures.

    Press contacts

    William Servigne

    william.servigne@mobilize-fs.com

    Hopscotch PR for Mobilize Financial Services

    +33 (0)1 41 34 23 06

    mobilize@hopscotch.fr

    About Mobilize Financial Services

    Attentive to the needs of all its customers, Mobilize Financial Services, a subsidiary of Renault Group, creates innovative financial services to build sustainable mobility for all. Mobilize Financial Services, which began operations over 100 years ago, is the commercial brand of RCI Banque SA, a French bank specializing in automotive financing and services for customers and networks of Renault Group, and also for the brands Nissan and Mitsubishi in several countries. 

    With operations in 35 countries and over 4,000 employees, Mobilize Financial Services financed more than 1,2 million contracts (new and used vehicles) in 2023 and sold 3,7 million service contracts. 

    At the end of June 2025, average earning assets stood at58.9 billion euros of financing and the pre-tax income at 607 million Euros.

    Since 2012, the group has deployed deposits collecting activity in several countries. At the end of June 2025, the net amount of deposits collected represented 30.5 billion euros, representing 49.1% of the company’s net assets.

    To find out more about Mobilize Financial Services: www.mobilize-fs.com/

    Attachment

    The MIL Network

  • MIL-OSI USA: Fischer, Cortez Masto Introduce MAP for Broadband Funding Act

    US Senate News:

    Source: United States Senator for Nebraska Deb Fischer

    Provides fresh oversight over FCC’s Broadband Funding Map, originally created by Fischer, Cortez Masto

    Today, U.S. Senators Deb Fischer (R-Neb.) and Catherine Cortez Masto (D-Nev.) introduced the Modernization, Accountability, and Planning (MAP) for Broadband Funding Act, to provide oversight of the Federal Communication Commission’s (FCC) Broadband Funding Map to ensure it is functioning effectively for the public, federal agencies, and broadband providers.

    Fischer and Cortez Masto originally created the Broadband Funding Map as part of the Bipartisan Infrastructure Law. With oversight needed to ensure federal agencies are utilizing the Map to its full potential, the MAP For Broadway Funding Act will ensure that these agencies are reliably reporting their funding data to the FCC.

    “I have worked diligently for years to close the digital divide for unserved and underserved communities. My work with Senator Cortez Masto was underscored by the Broadband Funding Map, which we created in 2021. While I’m pleased the FCC launched the Map in 2023, it is clear oversight is needed here to ensure all federal agencies are utilizing the Map to its full potential. I won’t relent in my efforts to expand Internet connectivity for those who lack access—this is a critical step in that mission,”
     Fischer said. 

    “As we work to expand broadband access across the country, it’s critical that we do with as much transparency, accountability, and coordination as possible. Reliable access to the internet is already so important for people to work and take care of their everyday tasks. Congress must ensure we continue to expand its access efficiently,” Cortez Masto said.

    “Big thanks to Senators Fischer and Cortez Masto for their work in bringing about the MAP for Broadband Funding Act. By improving the accuracy and transparency of the Broadband Funding Map, we can more effectively target federal funding for broadband deployment where it’s truly needed. Plus, requiring federal agencies to report broadband deployment data to the FCC and NTIA will strengthen coordination and accountability across programs,” USTelecom President and CEO Jonathan Spalter said. 

    “Senator Fischer should be commended for marshaling the Federal Communications Commission and the Government Accountability Office to ensure that precious federal broadband dollars are spent as efficiently as possible. CostQuest appreciates the Senator’s data-driven approach to ensuring accountability for broadband spending across the government,”CostQuest Associates said.

    Background
    :

    The MAP for Broadband Funding Act provides fresh oversight for the FCC’s Broadband Funding Map to ensure the Map is functioning effectively, efficiently, and transparently as possible for the public, federal agencies, and broadband providers alike.

    To meet this goal, the bill:
     

    1. Directs the FCC to conduct a Notice of Inquiry on the Map’s function and data it displays for maximum usability, assessing any necessary updates from a user-experience perspective, and 
    1. Directs the Government Accountability Office (GAO) to evaluate how well federal agencies are populating the Map in compliance with current law, identifying any gaps in reporting for its optimum functionality. 

    MIL OSI USA News

  • MIL-OSI Security: Two Men Charged For Nationwide Fraud Scheme Targeting Hundreds Of Elderly Victims

    Source: Office of United States Attorneys

    Jingbin Jiang and Su Jian Liu Are Charged With Participating in a Scheme That Attempted to Steal Over $18 Million From Over 350 Victims

    United States Attorney for the Southern District of New York, Jay Clayton; Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), Christopher G. Raia; and Commissioner of the New York City Police Department (“NYPD”), Jessica S. Tisch,  announced charges against JINGBIN JIANG and SU JIAN LIU, a/k/a “Fatty,” a/k/a “Ah Pang,” for a scheme to defraud elderly victims across the United States, which attempted to steal over $18 million from over 350 victims and resulted in actual losses of over $5 million to over 70 victims.  JIANG was arrested in Staten Island this morning and will be presented today before U.S. Magistrate Judge Stewart D. Aaron.  LIU is still at large.  The case is assigned to U.S. District Judge Mary Kay Vyskocil.

    “As alleged, Jingbin Jiang and Su Jian Liu worked together with others to steal the hard-earned money of some our most vulnerable New Yorkers and others around the country,” said U.S. Attorney Jay Clayton.  “Taking advantage of our elderly after they have worked so hard to save and contributed so much to our city and this country is heartless and despicable.  These charges, and the efforts of the FBI and the NYPD, should serve as a warning to fraudsters and cybercriminals: New Yorkers want you held accountable for your crimes, and the women and men of our Office are committed to doing so.”

    “Jingbin Jiang and Su Jian Liu allegedly defrauded elderly victims of more than $5 million by utilizing extortionate tactics to coerce withdrawals of significant cash or purchases of gold,” said FBI Assistant Director Christopher G. Raia.  “This alleged conspiracy wielded fear of bankruptcy and arrest to ensure victims complied with the unlawful requests for money.  The FBI is committed to apprehending any individual who utilizes online platforms to target and exploit vulnerable victims across the country.”

    “These defendants allegedly led a nationwide fraud scheme with the goal of targeting innocent, elderly victims and stealing millions of their hard-earned savings,” said NYPD Commissioner Jessica S. Tisch.  “Jingbin Jiang and Su Jian Liu allegedly participated in a plot involving elaborate, fictitious narratives to manipulate elderly victims and trick them into participating in their scheme, which involved attempts to steal over $18 million from 350 people.  I am grateful to the members of the NYPD, FBI, and the U.S. Attorney’s Office for holding these alleged predatory fraudsters accountable.”

    According to the allegations in the Indictment unsealed today in Manhattan federal court:[1]

    Between at least in or about 2023 and in or about July 2025, JIANG and LIU participated with others in a fraudulent scheme that primarily targeted elderly victims located all across the United States, including in New York, New Jersey, Pennsylvania, Massachusetts, Texas, Washington, Wisconsin, California, Connecticut, Arizona, North Carolina, South Carolina, Missouri, Mississippi, Kentucky, Utah, Oregon, Colorado, and Montana.

    The scheme proceeded in the following manner: First, victims would typically see a pop-up message on their computers indicating that they needed to call a particular phone number controlled by members of the scheme.  The pop-up message would typically claim to come from a technology company, a bank, or the government.  Second, when victims called the phone number, they were told a fictitious narrative that would ultimately lead to a suggestion that the victims withdraw money from their bank account.  For example, some victims were falsely told that their computers had a virus, or that their computers had been hacked into and used to commit serious crimes, like downloading child sexual abuse material.  Others were falsely told that their bank accounts had been compromised and were vulnerable to unauthorized withdrawals.  To avoid arrest or protect their bank accounts from being compromised, victims were instructed to withdraw large amounts of cash from their bank accounts or purchase large quantities of gold.  Some victims were even told that their money would be safely held in the custody of a consumer protection agency like the Federal Trade Commission, and they were sent notices on fake federal government letterhead purporting to bear the signature of a federal government official:

    Third, many victims were told that a courier would be arriving at their home (or other coordinated pick-up location) to retrieve the gold and/or cash.  Victims were often provided with the courier’s name (which was fictitious), a description of the courier’s clothing, and sometimes a password, purportedly to ensure the courier was authorized to pick up the gold and/or cash.  Other victims were told to purchase and transfer cryptocurrency or gift cards, which did not require a courier.  Victims were typically under the impression that this gold and/or cash would then be deposited, on the victims’ behalf, into a new, safe, uncompromised bank account (or with the Federal Trade Commission, as noted above) that they could access without concern in the future.  In reality, these funds were stolen and never returned to the victims.  Some victims engaged in multiple transactions before realizing the fraudulent nature of the scheme.

    JIANG and LIU participated in the scheme by managing and supervising the couriers that traveled to meet the victims to pick up the cash and gold, which was then transported back to New York City.  JIANG and LIU received information about potential victims from other members of the scheme on text-messaging platforms, in messages that typically included the zip codes and the amounts of cash or gold to be collected from each victim. JIANG and LIU could then decide whether to accept the pick-up, and if they did, the other members of the scheme would provide more specific details about the victim and when and where to pick up the cash or gold.  After arranging for couriers to make the pick-ups, JIANG and LIU would provide updates to other members of the scheme about the couriers’ progress.  After the victims provided the criminal proceeds to the couriers, JIANG and LIU arranged for the criminal proceeds to be distributed to other members of the scheme, including by converting cash and gold into cryptocurrency to be easily transmitted to members of the scheme located overseas, including in India and China.  In total, members of the conspiracy have attempted to steal at least approximately $18 million from over 350 victims, and they have successfully stolen at least approximately $5 million from over 70 victims.

    If you or someone you know has been victimized by this scheme, please file a complaint with the FBI’s Internet Crime Complaint Center, which is available at ic3.gov.

    *                *                *

    JIANG, 37, of Staten Island, New York, and LIU, 38 of Edmond, Oklahoma, are both charged with one count of wire fraud conspiracy, which carries a maximum sentence of 20 years in prison; and one count of conspiracy to commit interstate transportation of stolen property, which carries a maximum sentence of five years in prison.

    The maximum potential sentences in this case are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendants will be determined by the judge.

    Mr. Clayton praised the investigative work of the FBI and NYPD’s Joint Organized Crime Task Force.  Mr. Clayton also thanked the New York State Police and the Bedford Police Department for their assistance in the investigation of this case.

    This case is being handled by the Office’s Violent & Organized Crime Unit. Assistant U.S. Attorneys Andrew K. Chan and Angela Zhu are in charge of the prosecution. 

    The charges contained in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the description of the Indictment set forth herein constitute only allegations, and every fact described herein should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: Andover Man Pleads Guilty for Producing and Possessing Child Sexual Abuse Images

    Source: Office of United States Attorneys

    CONCORD – An Andover man pleaded guilty yesterday in federal court for producing and possessing child sexual abuse material (CSAM), Acting U.S. Attorney Jay McCormack announces.

    Dale Howe, age 37, pleaded guilty in federal court to three counts of Production of Child Pornography and one count of Possession of Child Pornography. U.S. District Court Judge Paul J. Barbadoro scheduled sentencing for November 5, 2025.

    According to the charging documents and statements made in court, the defendant provided the minor victim with drugs and sexually assaulted the minor victim. The defendant created images of the sexual abuse, which were found during a search of his phone. The defendant distributed at least three of the child sexual abuse images through a social media platform. The defendant was also in possession of more than 3,500 files of unrelated CSAM.

    The charges for Production of Child Pornography provide for a sentence with a minimum term of imprisonment of 15 years and a maximum term of imprisonment of 30 years, a maximum fine of $250,000, and a term of supervised release of at least 5 years. The charge for Possession of Child Pornography provides for a sentence with a maximum term of imprisonment of 10 years, a maximum fine of $250,000, and a term of supervised release of at least 5 years. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    Homeland Security Investigations, the Andover Police Department, and the New Hampshire State Police, the Merrimack County Sheriff’s Office, New Hampshire Internet Crimes Against Children (ICAC) and the Derry Police Department provided valuable assistance. Assistant U.S Attorneys Heather A. Cherniske and Anna Z. Krasinski are prosecuting the case.

     

    ###

    MIL Security OSI

  • MIL-OSI Security: Man Sentenced to Federal Prison for Distribution of Child Pornography

    Source: Office of United States Attorneys

    WACO – A Mississippi man was sentenced in federal court to 240 months in prison for distribution of child pornography, involving the sexual exploitation of a minor.

    According to court documents, Foster Denzel Harris, aided and abetted by another, knowingly distributed and attempted to distribute visual depictions of a minor engaging in sexually explicit conduct in violation of federal statute.

    In 2022, the victim in this case reported to FBI that she had been exploited when she was 16 years old, and living in Killeen, Texas. Between 2016 and 2022, while using KiK social media application on her phone, Harris extorted $21,000 dollars from her, threatening to expose her if she didn’t pay.

    “Today’s sentencing sends a clear message that those who exploit children by distributing child sexual abuse material will be held fully accountable,” said FBI Special Agent in Charge Aron Tapp. “The pain these victims silently endure is immeasurable, and the FBI will relentlessly pursue anyone who preys on them. We applaud the extraordinary courage of the victim in this case, whose fortitude to come forward enabled us to obtain a measure of justice and put a stop to the continues abuse. If you have information about child exploitation, contact your local FBI office or submit a tip at tips.fbi.gov.”

    This 20-year sentence is the maximum sentence allowed under the statute. Harris was also ordered to pay $31,429.00 in restitution to the victim and placed on lifetime supervised release. This case was investigated by the FBI San Antonio Child Exploitation and Human Trafficking Task Force, and Assistant U.S. Attorney Gregg Gloff prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI: Asure Announces Second Quarter 2025 Results

    Source: GlobeNewswire (MIL-OSI)

    Second Quarter 2025 Total Revenues Increased 7% to $30.1 million

    Recurring Revenues Grew 6% from Prior Year

    AUSTIN, Texas, July 31, 2025 (GLOBE NEWSWIRE) — Asure Software, Inc. (“we”, “us”, “our”, “Asure” or the “Company”) (Nasdaq: ASUR), a leading provider of cloud-based Human Capital Management (“HCM”) software solutions, today reported results for the second quarter ended June 30, 2025.

    Second Quarter 2025 Financial Highlights

    • Revenue of $30.1 million, up 7% year over year, excluding ERTC up 10% from the prior year second quarter
    • Recurring revenue of $28.6 million versus $27.1 million during the prior year second quarter
    • Net loss of $6.1 million versus a net loss of $4.4 million during the prior year second quarter
    • EBITDA(1) of $1.4 million versus $1.3 million during the prior year second quarter
    • Adjusted EBITDA(1) of $5.2 million versus $4.1 million during the prior year second quarter
    • Gross profit of $19.9 million versus $18.9 million during the prior year second quarter
    • Non-GAAP gross profit(1) of $21.9 million (Non-GAAP gross margin(1) of 73%) versus $20.4 million (and 73% in prior year second quarter)

    First Half 2025 Financial Highlights

    • Revenue of $65.0 million, up 9% from prior year first half
    • Revenue (excluding ERTC revenue) of $64.8 million, up 11% from prior year first half
    • Recurring revenue of $61.8 million, up 8% from prior year first half
    • Net loss of $8.5 million versus a net loss of $4.7 million in the prior year first half
    • EBITDA(1) of $5.6 million versus $5.7 million in the prior year first half
    • Adjusted EBITDA(1) of $12.6 million versus $10.9 million in the prior year first half
    • Gross profit of $44.5 million versus $41.5 million in the prior year first half
    • Non-GAAP gross profit(1) of $48.1 million (margin of 74%) versus $44.2 million (margin of 74%) in prior year first half

    Recent Business Highlights

    • On July 1, 2025 Asure acquired Lathem Time Corporation, a trusted name in employee time and attendance solutions with more than a century of innovation for a purchase price of $39.5 million. The company has transformed into a modern software provider delivering cloud-based time and attendance solutions through its flagship platform PayClock® Online. Lathem’s customer base and go to market strategy of selling direct and via a strong reseller network are complementary to Asure’s focus on growing businesses.

    (1)This financial measure is not calculated in accordance with GAAP and is defined on page 3 of this press release. A reconciliation of this non-GAAP measure to the most applicable GAAP measure begins on page 11 of this release.

    Management Commentary

    “We are pleased to report another solid performance for the second quarter where our revenues of $30.1 million increased 7% from the prior year second quarter and excluding the impact of ERTC, revenue growth was 10%. Our results were driven by continued strong performances coming from our Payroll Tax Management product line and improving attach rates of our HCM products,” said Asure Chairman and CEO Pat Goepel.

    “We are excited to have completed the acquisition of Lathem Time Corporation on July 1, 2025 which we believe will be a great addition to the Asure product offering. The acquisition is expected to add to the scale of our existing time and attendance business with additional high margin recurring revenue and drive the ability to accelerate further cross-selling opportunities of Asure’s suite of HCM products. Our continued positive momentum, the investments we have made in our technology plus recently acquired products we believe position us well for the continued growth of Asure.”

    Third Quarter 2025 and Full Year 2025 Revenue Guidance Ranges

    The Company provides guidance for the third quarter of 2025 and increases the full year 2025 revenue range based on the Company’s year-to-date results and recent business trends, including the acquisition of Lathem Time Corporation.

    New Guidance for 2025

    Guidance Range   Q3-2025   PRIOR FY-2025 NEW FY-2025
    Revenue $ 35.0 M – 37.0 M $ 134.0-138.0 M $138.0 M -142.0 M
    Adjusted EBITDA(1) $ 7.0M -9.0 M   23%-24% 22% -24%
               

    Management uses GAAP, non-GAAP and adjusted measures when planning, monitoring, and evaluating the Company’s performance. The primary purpose of using non-GAAP and adjusted measures is to provide supplemental information that may prove useful to investors and to enable investors to evaluate the Company’s results in the same way management does.

    Management believes that supplementing GAAP disclosures with non-GAAP and adjusted disclosures provides investors with a more complete view of the Company’s operational performance and allows for meaningful period-to-period comparisons and analysis of trends in the Company’s business. Further, to the extent that other companies use similar methods in calculating adjusted financial measures, the provision of supplemental non-GAAP and adjusted information can allow for a comparison of the Company’s relative performance against other companies that also report non-GAAP and adjusted operating results.

    Management has not provided a reconciliation of guidance of GAAP to non-GAAP or adjusted disclosures because management is unable to predict the nature and materiality of non-recurring expenses without unreasonable effort.

    Management’s projections are based on management’s current beliefs and assumptions about the Company’s business, and the industry and the markets in which it operates; there are known and unknown risks and uncertainties associated with these projections. There can be no assurance that our actual results will not differ from the guidance set forth above. The Company assumes no obligation to update publicly any forward-looking statements, including its 2025 earnings guidance, whether as a result of new information, future events or otherwise. Please refer to the “Use of Forward-Looking Statements” disclosures on page 5 of this press release as well as the risk factors in our quarterly and annual reports on file with the Securities and Exchange Commission for more information about risk that affect our business and industry.

    (1)This financial measure is not calculated in accordance with GAAP and is defined on page 3 of this press release. A reconciliation of this non-GAAP measure to the most applicable GAAP measure begins on page 11 of this release.

    Conference Call Details

    Asure management will host a conference call on Thursday, July 31, 2025, at 3:30 pm Central (4:30 pm Eastern). Asure Chairman and CEO Pat Goepel and CFO John Pence will participate in the conference call followed by a question-and-answer session. The conference call will be broadcast live and available for replay via the investor relations section of the Company’s website. Analysts may participate on the conference call by dialing 877-407-9219 or 201-689-8852.

    About Asure Software, Inc.

    Asure (Nasdaq: ASUR) provides cloud-based Human Capital Management (HCM) software solutions that assist organizations of all sizes in streamlining their HCM processes. Asure’s suite of HCM solutions includes HR, payroll, time and attendance, benefits administration, payroll tax management, and talent management. The company’s approach to HR compliance services incorporates AI technology to enhance scalability and efficiency while prioritizing client interactions. For more information, please visit www.asuresoftware.com

    Non-GAAP and Adjusted Financial Measures

    This press release includes information about non-GAAP gross profit, non-GAAP sales and marketing expense, non-GAAP general and administrative expense, non-GAAP research and development expense, EBITDA, EBITDA margin, adjusted EBITDA, and adjusted EBITDA margin. These non-GAAP and adjusted financial measures are measurements of financial performance that are not prepared in accordance with U.S. generally accepted accounting principles and computational methods may differ from those used by other companies. Non-GAAP and adjusted financial measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures and should be read only in conjunction with the Company’s Condensed Consolidated Financial Statements prepared in accordance with GAAP. Non-GAAP and adjusted financial measures are reconciled to GAAP in the tables set forth in this release and are subject to reclassifications to conform to current period presentations.

    Non-GAAP gross profit differs from gross profit in that it excludes amortization, share-based compensation, and one-time items.

    Non-GAAP sales and marketing expense differs from sales and marketing expense in that it excludes share-based compensation and one-time items.

    Non-GAAP general and administrative expense differs from general and administrative expense in that it excludes share-based compensation and one-time items.

    Non-GAAP research and development expense differs from research and development expense in that it excludes share-based compensation and one-time items.

    EBITDA differs from net income (loss) in that it excludes items such as interest, income taxes, depreciation, and amortization. Asure is unable to predict with reasonable certainty the ultimate outcome of these exclusions without unreasonable effort.

    Adjusted EBITDA differs from EBITDA in that it excludes share-based compensation, other income (expense), net and one-time expenses. Asure is unable to predict with reasonable certainty the ultimate outcome of these exclusions without unreasonable effort.

    All adjusted and non-GAAP measures presented as “margin” are computed by dividing the applicable adjusted financial measure by total revenue.

    Specifically, as applicable to the respective financial measure, management is adjusting for the following items when calculating non-GAAP and adjusted financial measures as applicable for the periods presented. No additional adjustments have been made for potential income tax effects of the adjustments based on the Company’s current and anticipated de minimis effective federal tax rate, resulting from the Company’s continued losses for federal tax purposes and its tax net operating loss balances.

    Share-Based Compensation Expenses. The Company’s compensation strategy includes the use of share-based compensation to attract and retain employees and executives. It is principally aimed at aligning their interests with those of our stockholders and at long-term employee retention, rather than to motivate or reward operational performance for any particular period. Thus, share-based compensation expense varies for reasons that are generally unrelated to operational decisions and performance in any particular period.

    Depreciation. The Company excludes depreciation of fixed assets. Also included in the expense is the depreciation of capitalized software costs.

    Amortization of Purchased Intangibles. The Company views amortization of acquisition-related intangible assets, such as the amortization of the cost associated with an acquired company’s research and development efforts, trade names, customer lists and customer relationships, and acquired lease intangibles, as items arising from pre-acquisition activities determined at the time of an acquisition. While these intangible assets are continually evaluated for impairment, amortization of the cost of purchased intangibles is a static expense, one that is not typically affected by operations during any particular period.

    Interest Expense, Net. The Company excludes accrued interest expense, the amortization of debt discounts and deferred financing costs.

    Income Taxes. The Company excludes income taxes, both at the federal and state levels.

    One-Time Expenses. The Company’s adjusted financial measures exclude the following costs to normalize comparable reporting periods, as these are generally non-recurring expenses that do not reflect the ongoing operational results. These items are typically not budgeted and are infrequent and unusual in nature.

    Settlements, Penalties and Interest. The Company excludes legal settlements, including separation agreements, penalties and interest that are generally one-time in nature and not reflective of the operational results of the business.

    Acquisition and Transaction Related Costs. The Company excludes these expenses as they are transaction costs and expenses that are generally one-time in nature and not reflective of the underlying operational results of our business. Examples of these types of expenses include legal, accounting, regulatory, other consulting services, severance and other employee costs.

    Other non-recurring Expenses. The Company excludes these as they are generally non-recurring items that are not reflective of the underlying operational results of the business and are generally not anticipated to recur. Some examples of these types of expenses, historically, have included write-offs or impairments of assets, demolition of office space and cybersecurity consultants.

    Other (Expense) Income, Net. The Company’s adjusted financial measures exclude Other (Expense) Income, Net because it includes items that are not reflective of the underlying operational results of the business, such as loan forgiveness, adjustments to contingent liabilities and credits earned as part of the CARES Act, passed by Congress in the wake of the coronavirus pandemic.

    Use of Forward-Looking Statements

    This press release contains certain statements made by management that may constitute “forward-looking” statements within the meaning of the safe harbor provisions of the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements about our financial results may include expected or projected U.S GAAP and other operating and non-operating results. The words “believe,” “may,” “will,” “estimate,” “projects,” “anticipate,” “intend,” “expect,” “should,” “plan,” and similar expressions are intended to identify forward-looking statements. Examples of forward-looking statements include statements we make regarding our operating performance, future results of operations and financial position, revenue growth, earnings or other projections. We have based these forward-looking statements largely on our current expectations and projections about future events and trends that we believe may affect our financial condition, results of operations, business strategy, short-term and long-term business operations and objectives, and financial needs. The achievement or success of the matters covered by such forward-looking statements involves risks, uncertainties and assumptions, over many of which we have no control. If any such risks or uncertainties materialize or if any of the assumptions prove incorrect, our results could differ materially from the results expressed or implied by the forward-looking statements we make. The risks and uncertainties referred to above include—but are not limited to—risks associated with breaches of our security measures; risks related to material weaknesses; possible fluctuations in our financial and operating results; privacy concerns and laws and other regulations may limit the effectiveness of our applications; the financial and other impact of any previous and future acquisitions; domestic and international regulatory developments, including changes to or applicability to our business of privacy and data securities laws, money transmitter laws and anti-money laundering laws; regulatory pressures on economic relief enacted as a result of the COVID-19 pandemic that change or cause different interpretations with respect to eligibility for such programs; risk of our software and solutions not functioning adequately; interruptions, delays or changes in our services or our Web hosting; potential debt incurred to meet future capital requirements; volatility and weakness in bank and capital markets; access to additional capital; significant costs as a result of operating as a public company; the expiration of Employee Retention Tax Credits (“ERTC”) and the impact of the Internal Revenue Service recent measures regarding ERTC claims and the corresponding cash collections of existing receivables; the inability to continue to release timely updates for changes in laws; the inability to develop new and improved versions of our services and technological developments; customer’s nonrenewal of their agreements and other similar changes could negatively impact revenue, operating results and financial conditions; the exposure of market, interest, credit and liquidity risk on client funds held in trust; our operations in highly competitive markets; risk that our clients could have insufficient funds that could result in limitations in the ability to transmit ACH transactions; impairment of intangible assets; litigation and any related claims, negotiations and settlements, including with respect to intellectual property matters or industry-specific regulations; various financial aspects of our Software-as-a-Service model; adverse effects to our business a result of claims, lawsuits, and other proceedings; issues in the use of artificial intelligence in our HCM products and services; adverse changes to financial accounting standards to us; inability to maintain third-party licensed software; evolving regulation of the Internet, changes in the infrastructure underlying the Internet or interruptions in Internet; factors affecting our deferred tax assets and ability to value and utilize them; the nature of our business model; inability to adopt new or correctly interpret existing money service and money transmitter business status; our ability to hire, retain and motivate employees and manage our growth; interruptions to supply chains and extended shut down of businesses; potential enactment of adverse tax laws, regulation, political, economic and social factors; potential sales of a substantial number of shares of our common stock along with its volatility; risks associate with potential equity-related transactions including dividends, rights under the stockholder plan to discourage certain actions and other impacts as a result of actions of our stockholders.

    Please review the Company’s risk factors in its annual report on Form 10-K filed with the Securities and Exchange Commission (the “SEC”) on March 6, 2025 and its quarterly report on Form 10Q filed with the SEC on May 01, 2025 and July 31, 2025.

    The forward-looking statements, including the financial guidance and 2025 outlook, contained in this press release represent the judgment of the Company as of the date of this press release, and the Company expressly disclaims any intent, obligation or undertaking to release publicly any updates or revisions to any forward-looking statements to reflect any change in the Company’s expectations with regard to these forward looking statements or any change in events, conditions or circumstances on which any such statements are based. © 2025 Asure Software, Inc. All rights reserved

     
    ASURE SOFTWARE, INC.
    CONDENSED CONSOLIDATED BALANCE SHEETS
    (in thousands, except per share amounts)
           
      June 30, 2025   December 31, 2024
           
    ASSETS      
    Current assets:      
    Cash , cash equivalents, and restricted cash $ 66,000     $ 21,425  
    Accounts receivable, net of allowance for credit losses of $7,279 and $6,328 at June 30, 2025 and December 31, 2024, respectively   13,623       18,154  
    Inventory   142       195  
    Prepaid expenses and other current assets   5,838       4,888  
    Total current assets before funds held for clients   85,603       44,662  
    Funds held for clients   213,972       192,615  
    Total current assets   299,575       237,277  
    Property and equipment, net   23,282       19,669  
    Goodwill   94,724       94,724  
    Intangible assets, net   69,596       69,114  
    Operating lease assets, net   4,748       4,041  
    Other assets, net   13,640       11,813  
    Total assets $ 505,565     $ 436,638  
    LIABILITIES AND STOCKHOLDERSEQUITY      
    Current liabilities:      
    Current portion of notes payable $ 3,032     $ 7,008  
    Accounts payable   1,595       1,364  
    Accrued compensation and benefits   2,881       4,485  
    Operating lease liabilities, current   1,452       1,438  
    Other accrued liabilities   7,784       6,600  
    Deferred revenue   3,724       8,363  
    Total current liabilities before client fund obligations   20,468       29,258  
    Client fund obligations   214,839       194,378  
    Total current liabilities   235,307       223,636  
    Long-term liabilities:      
    Deferred revenue   2,635       3,430  
    Deferred tax liability   3,746       2,612  
    Notes payable, net of current portion   64,350       5,709  
    Operating lease liabilities, noncurrent   4,200       3,578  
    Other liabilities   1,075       358  
    Total long-term liabilities   76,006       15,687  
    Total liabilities   311,313       239,323  
    Stockholders’ equity:      
    Preferred stock, $0.01 par value; 1,500 shares authorized; none issued or outstanding          
    Common stock, $0.01 par value; 44,000 shares authorized; 27,365 and 26,671 shares issued, 27,365 and 26,671 shares outstanding at June 30, 2025 and December 31, 2024, respectively   274       267  
    Treasury stock at cost, zero(1)shares at June 30, 2025 and December 31, 2024          
    Additional paid-in capital   509,630       504,849  
    Accumulated deficit   (315,747 )     (307,226 )
    Accumulated other comprehensive income (loss)   95       (575 )
    Total stockholders’ equity   194,252       197,315  
    Total liabilities and stockholders’ equity $ 505,565     $ 436,638  
    (1) The aggregate Treasury stock of prior repurchases of the Company’s own common stock was retired and subsequently issued effective January 1, 2024. See the Consolidated Statement of Changes in Stockholders’ Equity for the impact of this transaction.
     
     
    ASURE SOFTWARE, INC.
    CONDENSED CONSOLIDATED STATEMENTS OF COMPREHENSIVE LOSS
    (in thousands, except per share amounts)
           
      Three Months Ended
    June 30,
      Six Months Ended
    June 30,
      2025   2024   2025   2024
                   
    Revenue:              
    Recurring $ 28,596     $ 27,051     $ 61,783     $ 57,324  
    Professional services, hardware and other   1,528       993       3,195       2,372  
    Total revenue   30,124       28,044       64,978       59,696  
    Cost of sales   10,213       9,176       20,459       18,221  
    Gross profit   19,911       18,868       44,519       41,475  
    Operating expenses:              
    Sales and marketing   8,149       6,924       16,535       14,691  
    General and administrative   10,968       10,118       22,868       20,181  
    Research and development   1,273       1,962       3,302       3,731  
    Amortization of intangible assets   4,173       4,046       8,481       7,495  
    Total operating expenses   24,563       23,050       51,186       46,098  
    Loss from operations   (4,652 )     (4,182 )     (6,667 )     (4,623 )
    Interest income   277       261       448       597  
    Interest expense   (809 )     (208 )     (1,260 )     (388 )
    Other income, net   (96 )           92       10  
    Loss from operations before income taxes   (5,280 )     (4,129 )     (7,387 )     (4,404 )
    Income tax expense   843       231       1,134       264  
    Net loss   (6,123 )     (4,360 )     (8,521 )     (4,668 )
    Other comprehensive income (loss):              
    Unrealized gain (loss) on marketable securities   228       9       670       (235 )
    Comprehensive loss $ (5,895 )   $ (4,351 )   $ (7,851 )   $ (4,903 )
                   
    Basic and diluted loss per share              
    Basic $ (0.22 )   $ (0.17 )   $ (0.31 )   $ (0.18 )
    Diluted $ (0.22 )   $ (0.17 )   $ (0.31 )   $ (0.18 )
                   
    Weighted average basic and diluted shares              
    Basic   27,237       25,840       27,100       25,587  
    Diluted   27,237       25,840       27,100       25,587  
                                   
     
    ASURE SOFTWARE, INC.
    CONDENSED CONSOLIDATED STATEMENTS OF CASH FLOWS
    (in thousands)
       
      Six Months Ended June 30,
      2025   2024
    Cash flows from operating activities:      
    Net loss $ (8,521 )   $ (4,668 )
    Adjustments to reconcile loss to net cash provided by (used in) operations:      
    Depreciation and amortization   12,155       10,359  
    Amortization of operating lease assets   740       677  
    Amortization of debt financing costs and discount   537       302  
    Non-cash interest expense   724        
    Net accretion of discounts on available-for-sale securities   (236 )     (170 )
    Provision for expected losses   20       107  
    Provision for deferred income taxes   1,134       255  
    Loss on extinguishment of debt   103        
    Net realized gains on sales of available-for-sale securities   (1,310 )     (1,294 )
    Share-based compensation   3,754       3,390  
    Gain on disposals of long-term assets   (7 )      
    Changes in operating assets and liabilities:      
    Accounts receivable   4,512       (2,178 )
    Inventory   53       (108 )
    Prepaid expenses and other assets   (1,462 )     (1,636 )
    Operating lease right-of-use assets   21       98  
    Accounts payable   232       (1,330 )
    Accrued expenses and other long-term obligations   (1,039 )     (1,858 )
    Operating lease liabilities   (825 )     (374 )
    Deferred revenue   (5,434 )     (3,291 )
    Net cash provided by (used in) operating activities   5,151       (1,719 )
    Cash flows from investing activities:      
    Acquisition of intangible assets   (6,346 )     (4,097 )
    Purchases of property and equipment   (393 )     (375 )
    Software capitalization costs   (6,470 )     (5,042 )
    Purchases of available-for-sale securities   (12,304 )     (6,462 )
    Proceeds from sales and maturities of available-for-sale securities   7,699       8,617  
    Net cash used in investing activities   (17,814 )     (7,359 )
    Cash flows from financing activities:      
    Proceeds from notes payable, net of issuance costs   57,982        
    Payments of notes payable   (5,000 )      
    Debt extinguishment costs   (100 )      
    Payments made on amounts due for the acquisition of intangibles   (1,280 )     (236 )
    Net proceeds from issuance of common stock   1,034       572  
    Capital raise fees         (46 )
    Net change in client fund obligations   20,461       (28,225 )
    Net cash provided by (used in) financing activities   73,097       (27,935 )
    Net increase in cash, cash equivalents, restricted cash, and restricted cash equivalents   60,434       (37,013 )
    Cash, cash equivalents, restricted cash and restricted cash equivalents, beginning of period   145,712       177,622  
    Cash, cash equivalents, restricted cash and restricted cash equivalents, end of period $ 206,146     $ 140,609  
                   
     
    ASURE SOFTWARE, INC.
    CONDENSED CONSOLIDATED STATEMENTS OF CASH FLOWS (continued)
    (in thousands)
       
      Six Months Ended June 30,
      2025
      2024
           
    Reconciliation of cash, cash equivalents, restricted cash, and restricted cash equivalents to the Condensed Consolidated Balance Sheets
    Cash, cash equivalents, and restricted cash $ 66,000     $ 20,736  
    Restricted cash and restricted cash equivalents included in funds held for clients   140,146       119,873  
    Total cash, cash equivalents, restricted cash, and restricted cash equivalents $ 206,146     $ 140,609  
           
    Supplemental information:      
    Cash paid for interest $ 498     $  
           
    Non-cash investing and financing activities:      
    Acquisition of intangible assets $ 1,884     $ 5,450  
    Notes payable issued for acquisitions $ 1,150     $ 1,423  
    Shares issued for acquisitions $     $ 4,863  
                   
     
    ASURE SOFTWARE, INC.
    RECONCILIATION OF NON-GAAP AND ADJUSTED FINANCIAL MEASURES
    (unaudited)
                     
    (in thousands) Q2-25 Q1-25 Q4-24 Q3-24 Q2-24 Q1-24 Q4-23 Q2-23
    Revenue(1) $ 30,124   $ 34,854   $ 30,792   $ 29,304   $ 28,044   $ 31,652   $ 26,264   $ 30,420  
                     
    Gross Profit to non-GAAP Gross Profit                
    Gross Profit $ 19,911   $ 24,608   $ 20,928   $ 19,704   $ 18,868   $ 22,607   $ 17,839   $ 22,018  
    Gross Margin   66.1 %   70.6 %   68.0 %   67.2 %   67.3 %   71.4 %   67.9 %   72.4 %
                     
    Share-based Compensation   46     44     44     44     43     40     32     46  
    Depreciation   1,378     1,369     1,190     1,232     1,145     1,110     921     1,309  
    Amortization – intangibles   370     50     50     50     50     50     50     50  
    One-time expenses                
    Settlements, penalties & interest   46     29     25     2     3         (6 )    
    Acquisition and transaction costs       167     221     367     264     39          
    Other non-recurring expenses   106         84                      
    Non-GAAP Gross Profit $ 21,857   $ 26,267   $ 22,542   $ 21,399   $ 20,373   $ 23,846   $ 18,836   $ 23,423  
    Non-GAAP Gross Margin   72.6 %   75.4 %   73.2 %   73.0 %   72.6 %   75.3 %   71.7 %   77.0 %
                     
    Sales and Marketing Expense to non-GAAP Sales and Marketing Expense
    Sales and Marketing Expense $ 8,149   $ 8,386   $ 6,945   $ 6,680   $ 6,924   $ 7,767   $ 6,422   $ 8,515  
                     
    Share-based Compensation   332     322     251     269     237     243     180     149  
    Depreciation   1     1         1         1     1      
    One-time expenses                
    Settlements, penalties & interest   40     51     78     (5 )   5     18     6     4  
    Acquisition and transaction costs   30     30     9     68     37     11          
    Other non-recurring expenses   164         52                     180  
    Non-GAAP Sales and Marketing Expense $ 7,582   $ 7,982   $ 6,555   $ 6,347   $ 6,645   $ 7,494   $ 6,235   $ 8,182  
                     
    General and Administrative Expense to non-GAAP General and Administrative Expense
    General and Administrative Expense $ 10,968   $ 11,900   $ 9,940   $ 10,378   $ 10,118   $ 10,063   $ 9,747   $ 10,336  
                     
    Share-based Compensation   1,419     1,407     1,081     1,187     1,122     1,535     980     1,298  
    Depreciation   261     244     269     264     256     251     225     234  
    One-time expenses                
    Settlements, penalties & interest   365     492     142     377     304     98     284     432  
    Acquisition and transaction costs   812     491     282     371     245     57     51      
    Other non-recurring expenses   189     136     220     253         86     53     453  
    Non-GAAP General and Administrative Expense $ 7,922   $ 9,130   $ 7,946   $ 7,926   $ 8,191   $ 8,036   $ 8,154   $ 7,919  
                     
    Research and Development Expense to non-GAAP Research and Development Expense
    Research and Development Expense $ 1,273   $ 2,029   $ 2,103   $ 1,973   $ 1,962   $ 1,769   $ 1,739   $ 1,325  
                     
    Share-based Compensation   94     90     87     90     86     85     69     89  
    Depreciation   (1 )   1       $   $   $   $   $  
    One-time expenses                
    Settlements, penalties & interest   33     9     21         27     31          
    Acquisition and transaction costs       91     153     195     369     147          
    Other non-recurring expenses   35         29                      
    Non-GAAP Research and Development Expense $ 1,112   $ 1,838   $ 1,813   $ 1,688   $ 1,480   $ 1,506   $ 1,670   $ 1,236  
                                                     

    (1)Note that first quarters are seasonally strong as recurring year-end W2/ACA revenue is recognized in this period.

     
    ASURE SOFTWARE, INC.
    RECONCILIATION OF NON-GAAP AND ADJUSTED FINANCIAL MEASURES (cont.)
    (unaudited)
                     
    (in thousands) Q2-25 Q1-25 Q4-24 Q3-24 Q2-24 Q1-24 Q4-23 Q3-23
    Revenue(1) $ 30,124   $ 34,854   $ 30,792   $ 29,304   $ 28,044   $ 31,652   $ 26,264   $ 29,334  
                     
    GAAP Net Loss to Adjusted EBITDA
    GAAP Net Loss $ (6,123 ) $ (2,398 ) $ (3,204 ) $ (3,901 ) $ (4,360 ) $ (308 ) $ (3,582 ) $ (2,206 )
                     
    Interest expense, net   532     280     211     109     (53 )   (156 )   (24 )   782  
    Income taxes   843     291     499     170     231     33     (158 )   (123 )
    Depreciation   1,640     1,614     1,460     1,497     1,402     1,361     1,148     1,185  
    Amortization – intangibles   4,543     4,358     4,482     4,345     4,096     3,499     3,743     3,384  
    EBITDA $ 1,435   $ 4,145   $ 3,448   $ 2,220   $ 1,316   $ 4,429   $ 1,127   $ 3,022  
    EBITDA Margin   4.8 %   11.9 %   11.2 %   7.6 %   4.7 %   14.0 %   4.3 %   10.3 %
                     
    Share-based Compensation   1,891     1,863     1,463     1,591     1,488     1,902     1,260     1,251  
    One Time Expenses                
    Settlements, penalties & interest   484     581     266     375     339     147     283     140  
    Acquisition and transaction costs   842     779     665     1,001     914     254     51      
    Other non-recurring expenses   494     136     385     253         86     53      
    Other expense (income), net   96     (188 )   2             (10 )   1     1,800  
    Adjusted EBITDA $ 5,242   $ 7,316   $ 6,229   $ 5,440   $ 4,057   $ 6,808   $ 2,775   $ 6,213  
    Adjusted EBITDA Margin   17.4 %   21.0 %   20.2 %   18.6 %   14.5 %   21.5 %   10.6 %   21.2 %
                                                     

    (1)Note that first quarters are seasonally strong as recurring year-end W2/ACA revenue is recognized in this period.

    Investor Relations Contact
    Patrick McKillop
    Vice President, Investor Relations
    617-335-5058
    patrick.mckillop@asuresoftware.com 

    The MIL Network

  • MIL-OSI USA: Luján Presses President Trump’s New NTIA Administrator on Day One: Stop Delaying Broadband Funds for New Mexico

    US Senate News:

    Source: United States Senator Ben Ray Luján (D-New Mexico)

    Washington, D.C. – U.S. Senator Ben Ray Luján (D-N.M.), Ranking Member of the Subcommittee on Telecommunications and Media, called on Arielle Roth, the recently confirmed Administrator of the National Telecommunications and Information Administration (NTIA), to fulfill her responsibility to fully implement programs authorized and funded by Congress – specifically, the Digital Equity Act and the Broadband Equity, Access, and Deployment (BEAD) Program. Senator Luján urged Roth to make her first act as Administrator the immediate restoration of suspended digital equity grants and the release of approved federal funding to connect all New Mexicans to broadband.

    “Now that you have been confirmed as Administrator of the National Telecommunications and Information Administration (NTIA), I urge you to fulfill your commitments to Congress that you will ‘follow the law,’ ‘act impartially,’ and ‘deliver the best broadband service possible for all Americans,’” said Senator Luján. “Your first act as Administrator should be to immediately restore the suspended digital equity grants and swiftly approve and release BEAD funding to states like New Mexico.”

    “Congressionally appropriated funds for the Digital Equity Act and the BEAD program are not optional – they are essential.  They represent not only a historic investment in our infrastructure, but a statutory obligation to the people of New Mexico and every unserved and underserved community across this country,” concluded Senator Luján.

    As Ranking Member of the Commerce Subcommittee on Telecommunications and Media, Senator Luján is a strong champion for 100% broadband connectivity. Senator Luján has  pressed Commerce Secretary Lutnick multiple times and called on President Trump directly to release funding for the BEAD program.

    In the 118th Congress, Senator Luján introduced the bipartisan Tribal Connect Act to make it easier for Tribes to secure high-speed internet access at Tribal Essential Community-Serving Institutions through the Federal Communications Commission’s (FCC) Universal Service Fund (USF) Schools and Libraries Program, or E-Rate program. 

    In the 117th Congress, Senator Luján introduced legislation to help close the homework gap by equipping school buses with Wi-Fi technology and improving financing options for broadband deployment.

    The full letter can be found here or below:

    Dear Ms. Roth: 

    Now that you have been confirmed as Administrator of the National Telecommunications and Information Administration (NTIA), I urge you to fulfill your commitments to Congress that you will “follow the law,” “act impartially,” and “deliver the best broadband service possible for all Americans.”

    This responsibility includes fully implementing programs authorized and funded by Congress under the Bipartisan Infrastructure and Investment and Jobs Act (IIJA), specifically the Digital Equity Act and the Broadband Equity, Access, and Deployment (BEAD) Program. Your first act as Administrator should be to immediately restore the suspended digital equity grants and swiftly approve and release BEAD funding to states like New Mexico. 

    The Digital Equity Act represents a Congressionally mandated $2.75 billion investment to advance digital inclusion for historically underserved populations across this county. New Mexico, a state with deep rural divides, Tribal lands, and persistent poverty, was awarded more than $8 million to launch programs such as digital navigators, workforce development, and cybersecurity training. These funds were designed to reach nearly two million residents who still face significant barriers that prevent them from fully participating in the digital world. 

    As you noted, “[m]aking sure Americans have the resources and skills they need to participate in the digital economy was part of the IIJA and I will follow the law.” 2 You also stated that once confirmed you would “commit to implementing NTIA’s statutory requirements, including with respect to the Digital Equity Act.” 3 Distribution of these digital equity funds is not a discretionary choice, it is a statutory obligation. You must uphold your commitment to follow the law by immediately reinstating and resuming the disbursement of funds awarded under the Digital Equity Act.

    Congress also created the $42.45 billion BEAD Program to finish the job of connecting nearly 25 million Americans that continue to wait for affordable, high-speed, reliable internet service. The BEAD program is our once-in-a-century opportunity to finish closing the digital divide and states have already invested years in developing implementation plans tailored to local needs, technical realities, and the bipartisan intent of Congress. 

    As NTIA Administrator you must uphold the statutory flexibility given to the states. This includes:

    1. No new delays. The BEAD Restructuring Policy Notice should not be used to further delay approvals or revisit established allocations—such as the over $675 million allocated to New Mexico.
    2. A meaningful low-cost service option. Internet service providers that win BEAD funding must offer a low-cost service option that is affordable and high-speed, not just a box checking exercise. 
    3. Deference for local expertise. States are best suited to determine what technology is appropriate for their terrain and therefore must be afforded deference on priority project determinations, so long as they meet the speed, latency and scalability requirements of IIJA.

    Failing to adhere to these statutory requirements and current approval timeline risks setting broadband deployment back by years.

    Moreover, Congress also explicitly authorized states to use BEAD funding for a variety of uses beyond deployment. These uses include data collection, broadband mapping, planning, installation of Internet connections within multifamily residential buildings where low-income residents live, broadband adoption efforts, including programs to provide affordable internet-capable devices, and other uses as determined by the Assistant Secretary. It is important to follow the law and release non-deployment guidance as soon as possible.

    I request that you respond to these questions by August 15, 2025.

    1. The IIJA included $2.75 billion to support three grant programs under the Digital Equity Act to equip individuals and communities with the skills and tools needed for full participation in all aspects of society. Earlier this year, the states’ Capacity Grants were wrongfully terminated as were the Competitive Grant grantees and the others recommended for an award. In accordance with the law, when will you reinstate the grant programs under the Digital Equity Act? Please provide a specific date.
    2. States would already have shovels in the ground if not for the delays this administration introduced with the initial 90 day extension and subsequent June 6th Public Notice. Will you commit to no further delays and approve States’ BEAD Plans within 90 days of submission?
    3. Congress authorized BEAD funds for non-deployment uses, including affordability and adoption. Further guidance from NTIA should not hinder states’ ability to exercise discretion granted by statute to use funds for non-deployment. When will you release the updated guidance for these uses? Please provide a specific date.

    We share the goals of connecting every American to broadband and ensuring that broadband is affordable to low-income Americans. Congressionally appropriated funds for the Digital Equity Act and the BEAD program are not optional – they are essential. They represent not only a historic investment in our infrastructure, but a statutory obligation to the people of New Mexico and every unserved and underserved community across this country. 

    I look forward to your response.

    Respectfully,

    MIL OSI USA News

  • MIL-OSI: iRhythm and Lucem Health Partner to Introduce Predictive AI Solution for Early Detection of Arrhythmias in Patient Populations with Comorbid Conditions

    Source: GlobeNewswire (MIL-OSI)

    • Partnership aims to utilize predictive AI to help identify arrhythmias earlier in patient populations with an elevated risk for arrhythmias to enable timely care for millions who remain undiagnosed
    • Commercial offering from this collaboration designed to support scalable population health and value-based care strategies

    SAN FRANCISCO, July 31, 2025 (GLOBE NEWSWIRE) — iRhythm Technologies, Inc. (NASDAQ:IRTC), a digital health leader focused on creating trusted solutions that detect, predict, and prevent disease, today announced a strategic partnership with Lucem Health, a leader in AI-driven early disease detection, to accelerate early identification of undiagnosed arrhythmias in patient populations with an elevated risk for arrhythmias.

    “Healthcare is entering an era where the goal is no longer just to detect disease, but to predict it,” said Quentin Blackford, iRhythm President and CEO. “Together with Lucem Health, iRhythm is helping lead a new way forward in care, with the goal of reaching patients before symptoms surface and before complications arise. This is a bold step toward predictive, preventive, and precise care powered by AI, informed by data, and designed for scale. We believe more than 27 million people in the U.S. alone could benefit from proactive cardiac monitoring1 — and this is just the beginning.”

    Traditional care models often rely on reactive diagnosis and can leave arrhythmias undetected until stroke, hospitalization, or worse. This partnership brings together Lucem Health’s Reveal AI powered early disease detection platform and iRhythm’s proven diagnostic service to shift that paradigm. By identifying risk earlier and enabling targeted cardiac monitoring, the goal is to help clinicians intervene sooner, improve outcomes across patient populations with elevated arrhythmia risk, and support scalable, data-driven strategies for health systems focused on value-based care.

    “Each day, clinicians find themselves reacting to the circumstances of the patients in their exam rooms — they often don’t have the time or the information they need to deliver truly proactive care,” said Sean Cassidy, founder and CEO of Lucem Health. “Together with iRhythm, we’re bringing predictive intelligence to healthcare’s front lines — enabling earlier action, smarter resource allocation, and better outcomes for patients.”

    This strategic partnership, supported by iRhythm’s direct investment in Lucem Health, reflects a shared commitment to advancing predictive innovation for population-level impact.

    Introducing a Predictive AI Solution for Smarter, Earlier Arrhythmia Detection

    The first commercial offering from the collaboration is an exclusive, AI-powered solution that analyzes subtle patterns in clinical and electronic health record (EHR) data to help identify elevated arrhythmia risk in individuals with Type 2 diabetes (T2D), chronic kidney disease (CKD), chronic obstructive pulmonary disease (COPD), and coronary artery disease (CAD) — individuals who may otherwise not be flagged as candidates for ambulatory cardiac monitoring. This offering enables healthcare organizations to proactively pinpoint patients with one or more specifically diagnosed or undiagnosed clinical conditions who could benefit from earlier cardiac monitoring and intervention.

    Once identified, appropriate patients can be monitored using iRhythm’s clinically proven Zio® ECG monitors and service. The Zio ECG device is worn for up to 14 days, enabling continuous, uninterrupted heart rhythm monitoring, and the end-to-end service, powered by an advanced FDA-cleared AI algorithm, delivers actionable insights, reviewed and curated by qualified cardiac technicians, to help clinicians make the right diagnosis the first time and support timely care.

    By integrating predictive AI, the new offering builds on iRhythm’s existing proactive monitoring programs deployed with healthcare systems focused on population health management and should enable even earlier arrhythmia risk identification and targeted intervention. The solution is designed to support accountable care organizations (ACOs), integrated health systems, payviders, and other managed care organizations that take on financial responsibility for the cost and quality of care as they pursue scalable value-based care strategies.

    Early pilot testing conducted by iRhythm, in collaboration with Lucem Health, suggests promising improvement in targeting patient populations with elevated arrhythmia risk and enabling earlier clinical engagement with greater precision. Both organizations anticipate that use of the AI-powered predictive tool will increase arrhythmia detection among an estimated 27 million undiagnosed patients in the U.S. alone,1 helping reduce healthcare resource utilization (HCRU) and costs, and improve patient outcomes.

    The Cost of Missed Arrhythmias and the Case for Earlier Detection

    Cardiac arrhythmias, conditions in which the heart beats too fast, too slow, or irregularly,2 affect roughly 1 in 20 U.S. adults3. Left undetected and untreated, they can lead to stroke, heart failure, hospitalization, or death,4 making early identification and intervention critical. Yet in many care pathways for individuals with T2D and/or other comorbid conditions, arrhythmias are not routinely screened for, despite elevated risk.5

    A growing body of evidence highlights the opportunity to detect arrhythmias earlier in at-risk populations — particularly around key clinical turning points in disease progression, as seen in recent data on patients with T2D.

    New research presented at the American Diabetes Association’s 85th Scientific Sessions (ADA 2025), based on a real-world study of more than 30 million U.S. adults, found that arrhythmias — often asymptomatic — frequently cluster around key moments in disease progression, particularly in T2D patients. Many arrhythmias were identified just before or shortly after diagnoses of CKD or major adverse cardiovascular events (MACE) such as stroke or heart failure.6

    Additional findings reinforce the broader clinical and economic impact of arrhythmias across chronic conditions like T2D and COPD, and the value of earlier detection and monitoring.

    Data presented at the American Heart Association’s 2024 Scientific Sessions revealed that patients with T2D and/or COPD who develop arrhythmias experience up to 2x higher hospitalization rates, 35–50% higher emergency care costs, and an average of $46,000 in annual healthcare expenses — compared to $30,000 for those without arrhythmias.7

    Adding to this evidence, new research presented at the American Thoracic Society (ATS) International 2025 conference, based on a real-world study of more than 2.5 million U.S. adults, found that COPD patients with arrhythmia have greater HCRU and costs compared to those without arrhythmia. However, among COPD patients with arrhythmia, those who were monitored had lower HCRU and costs compared to those who were never monitored.8

    Together, these findings underscore the clinical and economic impact of earlier, smarter detection — and the opportunity for predictive solutions like this initial offering from the iRhythm–Lucem Health collaboration to support value-based care models, reduce unnecessary healthcare utilization, and improve outcomes at scale for patient populations with elevated arrhythmia risk.

    Predictive AI-Powered Solution for Population Health and Value-Based Care
    U.S.-based innovative care delivery organizations, accountable care organizations (ACOs), integrated health systems, payviders, and other managed care organizations that assume financial responsibility for the cost and quality of care can learn more about the predictive AI solution9 and how it may support their population health strategies and value-based care goals by visiting iRhythm’s Value-Based Care page to connect with the iRhythm team.

    Forward-Looking Statements
    This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, and the Private Securities Litigation Reform Act of 1995. An investor can identify these statements by the fact that they do not relate strictly to historical or current facts. They use words such as ‘anticipate,’ ‘estimate,’ ‘expect,’ ‘intend,’ ‘will,’ ‘project,’ ‘plan,’ ‘believe,’ ‘target’ and other words and terms of similar meaning in connection with any discussion of future actions or operating or financial performance. In particular, these include statements regarding market opportunity, ability to penetrate the market and expectations for growth. Such statements are based on current assumptions that involve risks and uncertainties that could cause actual outcomes and results to differ materially. These risks and uncertainties, many of which are beyond our control, include risks described in the section entitled “Risk Factors” and elsewhere in our filings made with the Securities and Exchange Commission, including those on the Form 10-Q expected to be filed on or about July 31, 2025. These forward-looking statements speak only as of the date hereof and should not be unduly relied upon. iRhythm disclaims any obligation to update these forward-looking statements.

    About iRhythm Technologies
    iRhythm is a leading digital health care company that creates trusted solutions that detect, predict, and prevent disease. Combining our Zio® wearable biosensors and cloud-based data analytics with powerful proprietary algorithms, iRhythm distills data from millions of heartbeats into clinically actionable information. Through a relentless focus on patient care, our vision at Rhythm is to deliver better data, better insights, and better health for all.

    About Lucem Health
    Lucem Health helps healthcare providers accelerate disease detection and treatment using practical, responsible AI, so they can improve patients’ lives and increase the clinical and financial yield from today’s scarce care delivery resources. We envision a world in which clinicians detect problems before they become life-threatening and patients get world-class care, everywhere. Learn more at www.lucemhealth.com.

    Media Contact
    Kassandra Perry
    irhythm@highwirepr.com

    Investor Contact
    Stephanie Zhadkevich
    investors@irhythmtech.com

    1. iRhythm internal estimate based on analysis of public and proprietary sources, including U.S. Census Bureau data, CDC healthcare utilization data, Medicare Public Use Files, IQVIA, Komodo Health, Definitive Healthcare, and peer-reviewed literature on arrhythmia prevalence, symptom presentation, and diagnostic pathways. Full source list available upon request.
    2. What is an arrhythmia? National Heart Lung and Blood Institute, 2022. https://www.nhlbi.nih.gov/health/arrhythmias
    3. Desai et al. Arrhythmias. StatPearls [Internet], 2023. https://www.ncbi.nlm.nih.gov/books/NBK558923/
    4. Ataklte et al. Meta-analysis of ventricular premature complexes and their relation to cardiac mortality in general populations. The American Journal of Cardiology, 2013.
    5. Bhave, P. D., & Soliman, E. Z. (2024). Should patients with diabetes be routinely screened for atrial fibrillation? Expert Review of Cardiovascular Therapy, 22(1–3), 5–6. https://doi.org/10.1080/14779072.2024.2328645
    6. Russo P, Nathan R, Pfeffer D, Kamdar S, Wright B, Boyle K. Incidence and Timing of Major Arrhythmias in T2D and CKD: A Real-World Analysis [poster presentation]. Presented at: American Diabetes Association (ADA) 85th Scientific Sessions; June 20–23, 2025; Chicago, IL, USA.
    7. Russo P, Nathan R, Pfeffer D, Kamdar S, Wright B, Boyle K. Real-World Evidence on Health Care Resource Utilization and Economic Burden of Arrhythmias in Patients with Diabetes and COPD [poster presentation]. Presented at: American Heart Association (AHA) Scientific Sessions; November 16-18, 2024; Chicago, IL. Available at: https://s205.q4cdn.com/296879096/files/doc_events/2024/11/1/120-001752-003_DA_2024-AHA-Poster-iRhythmtech_RWE-HCRU-Arrhythmias_v2.pdf
    8. Russo P, Nathan R, Pfeffer D, Poh J, Jha V, Singh H, Wright B, Boyle K. Real-World Evidence on Health Care Resource Utilization and Economic Burden of Arrhythmias in Patients with COPD [poster presentation]. Presented at: American Thoracic Society (ATS) 2025 International Conference; May 16–21, 2025; San Francisco, CA, USA.
    9. The predictive-AI solution does not represent the functionality of any Zio branded medical device.

    The MIL Network

  • MIL-OSI: Aspen Aerogels to Participate in August Investor Conferences

    Source: GlobeNewswire (MIL-OSI)

    NORTHBOROUGH, Mass., July 31, 2025 (GLOBE NEWSWIRE) — Aspen Aerogels, Inc. (NYSE: ASPN) (“Aspen” or the “Company”), a technology leader in sustainability and electrification solutions, today announced that the Company is scheduled to participate in the following investor events in August: (i) Oppenheimer 28th Annual Technology, Internet & Communications Conference, and (ii) Canaccord Genuity 45th Annual Growth Conference. The presentation materials utilized during the conferences will be available on the Investor Relations section of Aspen’s website at www.aerogel.com.

    Oppenheimer 28thAnnual Technology, Internet & Communications Conference / August 11, 2025 (Virtual)
    Ricardo C. Rodriguez, CFO & Treasurer, and Neal Baranosky, Senior Director, Head of Investor Relations & Corporate Strategy, will be hosting one-on-one meetings with investors at the Oppenheimer 28th Annual Technology, Internet & Communications Conference, to be held virtually on Monday, August 11, 2025.

    In addition, the conference will feature a virtual Presentation with Messrs. Rodriguez and Baranosky. The Presentation is scheduled for 11:35 a.m. – 12:15 p.m. ET. A live webcast of the Presentation can be accessed on the Investor Relations section of Aspen’s website and will be available for one year.

    For those interested in arranging a one-on-one meeting with Aspen management, please contact your Oppenheimer representative.

    Canaccord Genuity 45thAnnual Growth Conference / August 12-13, 2025 (Boston, MA)
    Donald R. Young, President & CEO, and Ricardo C. Rodriguez, CFO & Treasurer, will be hosting one-on-one meetings with investors at Canaccord Genuity’s 45th Annual Growth Conference, to be held at the InterContinental Boston Hotel, Boston, MA, on Tuesday, August 12, and Wednesday, August 13, 2025.

    In addition, the conference will feature a Fireside Chat with Messrs. Young and Rodriguez on the afternoon of August 12. The Fireside Chat is scheduled for 1:30 p.m. – 2:00 p.m. ET. A live webcast of the panel can be accessed on the Investor Relations section of Aspen’s website and will be available for one year.

    For those interested in arranging a one-on-one meeting with Aspen management, please contact your Canaccord representative.

    About Aspen Aerogels, Inc.
    Aspen is a technology leader in sustainability and electrification solutions. The Company’s aerogel technology enables its customers and partners to achieve their own objectives around the global megatrends of resource efficiency, e-mobility and clean energy. Aspen’s PyroThin® products enable solutions to thermal runaway challenges within the electric vehicle (“EV”) market. The Company’s Cryogel® and Pyrogel® products are valued by the world’s largest energy infrastructure companies. Aspen’s strategy is to partner with world-class industry leaders to leverage its Aerogel Technology Platform® into additional high-value markets. Aspen is headquartered in Northborough, Mass. For more information, please visit www.aerogel.com.

    Investor Relations Contacts
    Neal Baranosky
    Phone: (508) 691-1111 x 8
    nbaranosky@aerogel.com

    Georg Venturatos / Patrick Hall
    Gateway Group
    ASPN@gateway-grp.com
    Phone: (949) 574-386

    The MIL Network

  • MIL-OSI: Brief Presentation Examines Potential August 13 Announcement of Elon Musk’s Starlink “Super-IPO”

    Source: GlobeNewswire (MIL-OSI)

    Baltimore, MD, July 31, 2025 (GLOBE NEWSWIRE) — prediction released by tech entrepreneur James Altucher explores what he calls “a trillion-dollar technological revolution” involving Elon Musk’s Starlink network and predicts an announcement could arrive as soon as August 13, 2025.

    Evidence Mounts for a Historic Reveal

    The presentation outlines three pieces of what Altucher calls “smoking gun” evidence that Starlink is preparing for a major public move:

    1. Direct Comments from Elon Musk:
      Musk previously stated he planned to take Starlink public once its cash flow became predictable. “The company has now officially crossed that milestone,” Altucher states
    2. Financial Drivers:
      He then cites Barron’s coverage: “What Musk really needs is another publicly traded company that would allow him to unlock some of his wealth and take the pressure off Tesla”
    3. Bloomberg Reporting:
      Reports note that “SpaceX is discussing an initial public offering for its fast-growing Starlink satellite business as soon as late 2024… in a bid to capitalize on robust demand for communications via space”

    Altucher argues that these developments, combined with “a major industry conference scheduled for August 13, 2025,” point to what he calls “a likely venue for a historic announcement.”

    A Radical Shift in Global Internet Access

    The presentation highlights Starlink as a transformative leap in communications technology. Altucher describes it as “the radical new future of the internet” that beams “fast, reliable, unlimited internet through the air… directly to your device” without traditional networks or towers.

    “For consumers like you and I, Elon’s Starlink is a godsend… for the $2.18 trillion telecom industry, it’s their worst nightmare,” he states.

    Altucher suggests the technology could connect “billions of previously un-connected people” to the global economy, calling it “one of the greatest innovations of the 21st century.”

    Economic and Technological Stakes

    The briefing compares Starlink’s industry-disrupting potential to previous inflection points in internet history:

    • AOL’s early internet access, which “soared a rare, massive 81,844% in about seven years”
    • EarthLink’s DSL rollout, which “shot up 6,638% over the next three years”
    • Comcast’s cable internet expansion, where shares “catapulted 46,222%” between 1980 and 2017

    “These examples demonstrate the extreme, life-changing potential when you get into the right technology at the right time,” Altucher explains

    About James Altucher

    James Altucher is a tech entrepreneur, venture capitalist, and Wall Street Journal bestselling author known for identifying major technology shifts ahead of the curve. He has been recognized as “one of the best venture capitalists, angel investors, and tech entrepreneurs in the world.”

    Altucher was an early backer of companies such as TicketFly and Buddy Media and has been a public voice on breakthrough trends including video streaming, social media, and cryptocurrency. He is the founder of Altucher’s Investment Network and host of The James Altucher Show, downloaded more than 40 million times worldwide.

    The MIL Network

  • MIL-OSI USA: Senators Coons, Tillis, colleagues introduce framework to combat foreign online piracy, protect American copyright holders

    US Senate News:

    Source: United States Senator for Delaware Christopher Coons

    WASHINGTON – Today, U.S. Senators Chris Coons (D-Del.), Thom Tillis (R-N.C.), Marsha Blackburn (R-Tenn.), and Adam Schiff (D-Calif.) introduced a discussion draft of the Block Bad Electronic Art and Recording Distributors (Block BEARD) Act of 2025, bipartisan legislation that would allow copyright owners who have had their property stolen to seek U.S. federal court action in order to block dedicated foreign online piracy operations from making that stolen content available to American households.

    “Foreign websites pirating American movies, TV shows, art, and books steal tens of billions of dollars from the U.S. economy each year,” said Senator Coons. “This costs our creative community hundreds of thousands of jobs. Today, the United States takes an important step to join the many other nations around the world that have begun to crack down on foreign IP theft. This bipartisan legislation will give Americans the tools they need to protect their intellectual property rights, while ensuring the internet remains a vibrant forum for free speech. I look forward to working with my colleagues and with stakeholders on all sides of this issue to advance this much-needed bill.”

    “Foreign piracy sites are stealing from American creators, threatening good-paying jobs, and exposing U.S. consumers to real online harms via malware, identity theft, and the like,” said Senator Tillis. “The Block BEARD Act gives us a smart, targeted tool to stop these criminal operations at the source without infringing on legitimate speech or due process. I’m proud to lead this bipartisan discussion to protect our creative economy and digital security and I look forward to continuing to work with my colleagues in the House to address this important matter.”

    “Tennessee’s thriving creative community must be protected from the theft of creative works by foreign criminals,” said Senator Blackburn. “Foreign piracy operations jeopardize the American creative industry through phishing, identity theft, and financial fraud, and the Block BEARD Act would protect creators by enabling them to pursue legal action in U.S. federal courts against these criminals.”

    “I’m proud to join my colleagues in this effort to protect creators and consumers alike from foreign criminal enterprises seeking to steal our intellectual property and exploit Americans,” said Senator Schiff. “As Ranking Member of the Senate Judiciary Subcommittee on Intellectual Property and a steadfast advocate for the creative community, I understand that robust protections are essential for innovation and economic growth in the digital age. This commonsense approach will provide the courts with the tools they need to combat foreign piracy operations and help level the playing field for American artists and creators who deserve to be fairly compensated for their work.”

    “We are grateful to Senators Tillis, Coons, Blackburn, and Schiff for their leadership in crafting a carefully tailored proposal that empowers US federal courts to protect consumers, rightsholders, and markets from large scale foreign piracy while preserving the protections contained in the DMCA,” said Mitch Glazier, Chairman and CEO, Recording Industry Association of America. “Similar tools have been proven effective around the world over the last ten years with no harm to speech, Internet infrastructure or security, or participation online, and we strongly support this effort to create a simple, effective, judicial remedy with due process in the U.S.”

    “Piracy steals hundreds of thousands of jobs from the film and television industry, drains billions from the U.S. economy, and puts millions of American consumers at risk – and the Block BEARD Act will provide us with a safe and effective way to counter this danger and combat large-scale copyright infringement,” said Charles Rivkin, Chairman and CEO, Motion Picture Association. “With bold leadership from Senators Tillis, Coons, Blackburn, and Schiff, the Block BEARD Act will equip our nation with a tool that’s worked in dozens of countries worldwide: a narrow, targeted means to fight the worst forms of foreign piracy while protecting free speech and the rule of law.”

    The Block BEARD Act would empower copyright owners to seek U.S. federal court orders against foreign websites dedicated to digital piracy, preventing them from making stolen content accessible to American households. To obtain relief, copyright holders must present evidence of specific harm and demonstrate the criminal nature of the targeted site. Courts could then direct internet service providers block access to the identified sites, while granting those providers immunity from liability, including for claims related to the petitioner’s actions. The legislation includes strong public interest safeguards to protect free expression, due process, and legitimate online services operating in compliance with U.S. law. This targeted legal tool mirrors successful approaches used in over 50 democratic countries to curb foreign piracy operations that undermine creative industry jobs and expose users to malware, identity theft, and fraud.

    You can read the full text of the draft here.

    MIL OSI USA News

  • MIL-OSI USA: Cortez Masto, Fischer Introduce MAP for Broadband Funding Act

    US Senate News:

    Source: United States Senator for Nevada Cortez Masto

    Washington, D.C. – Today, U.S. Senators Catherine Cortez Masto (D-Nev.) and Deb Fischer (R-Neb.) introduced the Modernization, Accountability, and Planning (MAP) for Broadband Funding Act, to provide oversight of the Federal Communication Commission’s (FCC) Broadband Funding Map to ensure it is functioning effectively for the public, federal agencies, and broadband providers.

    Cortez Masto and Fischer originally created the Broadband Funding Map as part of the Bipartisan Infrastructure Law. With oversight needed to ensure federal agencies are utilizing the Map to its full potential, the MAP For Broadway Funding Act will ensure that these agencies are reliably reporting their funding data to the FCC.

    “As we work to expand broadband access across the country, it’s critical that we do so with as much transparency, accountability, and coordination as possible,” said Senator Cortez Masto. “Reliable access to the internet is already so important for people to work and take care of their everyday tasks. Congress must ensure we continue to expand its access efficiently.”

    “I have worked diligently for years to close the digital divide for unserved and underserved communities,” said Senator Fischer. “My work with Senator Cortez Masto was underscored by the Broadband Funding Map, which we created in 2021. While I’m pleased the FCC launched the Map in 2023, it is clear oversight is needed here to ensure all federal agencies are utilizing the Map to its full potential. I won’t relent in my efforts to expand Internet connectivity for those who lack access—this is a critical step in that mission.”

    The MAP for Broadband Funding Act provides fresh oversight for the FCC’s Broadband Funding Map to ensure the Map is functioning effectively, efficiently, and transparently as possible for the public, federal agencies, and broadband providers alike. To meet this goal, the bill:

    • Directs the FCC to conduct a Notice of Inquiry on the Map’s function and data it displays for maximum usability, assessing any necessary updates from a user-experience perspective, and
    • Directs the Government Accountability Office (GAO) to evaluate how well federal agencies are populating the Map in compliance with current law, identifying any gaps in reporting for its optimum functionality. 

    As part of her Innovation State Initiative, Senator Cortez Masto has led efforts to improve broadband access and strengthen Nevada’s economy. She successfully called for increased accountability for federal broadband programs through efforts like the FCC broadband map which helped deliver the State of Nevada additional BEAD funding – totaling $416 million – through more accurate broadband accessibility data. The Senator has also passed her bipartisan ACCESS Broadband Act to establish a broadband oversight office in the Commerce Department, which administers the Bipartisan Infrastructure Law BEAD funding, provides technical assistance to communities, and tracks taxpayer dollars. Most recently, the Senator has condemned the Trump Administration’s reckless decision to rescind approval for states to receive their share of BEAD program funding from the U.S. Department of Commerce.

    MIL OSI USA News

  • MIL-OSI: ANNOUNCEMENT OF A VOLUNTARY SHARE EXCHANGE OFFER MADE BY EURONEXT N.V. TO ACQUIRE THE ORDINARY REGISTERED SHARES OF HELLENIC EXCHANGES-ATHENS STOCK EXCHANGE S.A. IN CONSIDERATION FOR SHARES OF EURONEXT N.V.

    Source: GlobeNewswire (MIL-OSI)

    NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, IN WHOLE OR IN PART, DIRECTLY OR INDIRECTLY, IN OR INTO ANY JURISDICTION IN WHICH SUCH RELEASE, PUBLICATION OR DISTRIBUTION WOULD BE PROHIBITED BY, OR CONSTITUTE A VIOLATION OF, THE RELEVANT LAWS OF THAT JURISDICTION OR REQUIRE EURONEXT AND/OR ATHEX TO TAKE ANY FURTHER ACTION.

    PLEASE SEE THE IMPORTANT DISCLAIMERS AT THE END OF THIS ANNOUNCEMENT.

    ANNOUNCEMENT OF A VOLUNTARY SHARE EXCHANGE OFFER MADE BY EURONEXT N.V. TO ACQUIRE THE ORDINARY REGISTERED SHARES OF HELLENIC EXCHANGES-ATHENS STOCK EXCHANGE S.A. IN CONSIDERATION FOR SHARES OF EURONEXT N.V.

    31 July 2025

    Executive Summary

    Euronext N.V. (“Euronext” or the “Offeror”, and together with any and all of its directly, or indirectly, wholly, or partially, owned subsidiaries, the “Euronext Group”) announces today the submission of a voluntary share exchange offer (the “Tender Offer”) to acquire all common registered shares, each having a nominal value of €0.42 (each, an “ATHEX Share”) of HELLENIC EXCHANGES-ATHENS STOCK EXCHANGE S.A. (“ATHEX” or the “Company” and together with its subsidiaries, the “ATHEX Group”), for newly issued ordinary shares in the capital of the Offeror, with a nominal value of €1.60 each (each, a “Consideration Share”) on a ratio of 0.050 Consideration Share for 1 ATHEX Share, in accordance with Greek Law 3461/2006 (the “Law”). Based on Euronext’s 1-week VWAP of €147.24 as of 29 July 2025, the Offer values the entire issued and to be issued ordinary share capital1 of ATHEX at approximately €425.9 million on a fully diluted basis.

    The purpose of the Tender Offer is for the Offeror to acquire direct control over ATHEX and integrate the ATHEX Group into the Euronext Group. Pursuant to the Tender Offer, the Offeror seeks to become the direct parent company of ATHEX and the ultimate parent company of ATHEX Group with a shareholding structure where all ATHEX shareholders will become shareholders of the Offeror.

    The principal objective of the Tender Offer is to acquire and integrate ATHEX into Euronext, a comprehensive pan-European business model characterized by a single liquidity pool, a single order book, a single trading technology platform, a common approach to listing and a unified post-trading framework in order to reduce fragmentation in European financial markets, reinforcing the Savings and Investment Union endeavors, and finance the real European economy effectively.

    The integration of ATHEX Group within the Euronext group is expected to (i) strengthen access to financing for Greek corporates, (ii) embed ATHEX within a pan-European trading framework, (iii) reinforce the operating resiliency of the local capital markets and (iv) create a unified post-trade infrastructure.

    Greek ecosystem to be fully part of the Offeror’s governance and supervision through (i) the CEO of ATHEX joining the Managing Board of Euronext, (ii) HCMC joining Euronext’s College of Regulators and (iii) subject to the Offeror’s shareholders’ and regulatory approvals, an independent director representing the Greek ecosystem will join the Offeror’s Supervisory Board.

    ATHEX Group will maintain its ties to Greece after the Tender Offer, retaining its head office in Athens, while ATHEX’s tax residence will remain in Greece.

    On 30 July 2025, the Offeror and ATHEX entered into a Cooperation Agreement that outlines the terms and conditions under which both the Offeror and ATHEX agree to work together towards the completion of the Tender Offer.

    In addition, all members of the Board of Directors of ATHEX owning ATHEX shares including CEO Yannos Kontopoulos have agreed to tender ATHEX shares they own today or may own during Tender Offer subject to the issuance of a reasoned opinion of ATHEX’s Board of Directors in favour of the Tender Offer.

    Deutsche Bank AG is acting as advisor to Euronext in connection with the Tender Offer.

    The Tender Offer

    In accordance with the Law, Euronext, announces the submission of the Tender Offer to acquire all of the outstanding ordinary registered shares of ATHEX, as at 30 July 2025 (the “Date of the Tender Offer”), i.e. 60,348,000 ATHEX Shares representing 100% of the total issued share capital and voting rights of ATHEX as at that date.

    ATHEX is a Greek société anonyme under the name “HELLENIC EXCHANGES-ATHENS STOCK EXCHANGE S.A.”, registered with the General Commercial Registry with registration number 003719101000 and registered seat at 110 Athinon Ave, 104 42, Athens. The share capital of ATHEX amounts to €25,346,160.00 and is divided into 60,348,000 shares, with a par value of €0.42 each, which has been fully paid-up. The ATHEX’s shares are commonly registered with a voting right. According to the announcements that ATHEX has published until and including 30 July 2025, ATHEX held an aggregate of 2,498,000 of issued ATHEX Shares (the “Treasury Shares”). ATHEX’s shares were admitted to trading on the Athens Stock Exchange in August 2000 and are currently traded on the main market of the Athens Stock Exchange under the trading symbol EXAE.

    The Date of the Tender Offer is the date on which Euronext initiated the Tender Offer process by informing the Hellenic Capital Market Commission (the “HCMC”) and the board of directors of ATHEX of the Tender Offer and submitting to them a draft of the Greek information circular (the “Information Circular”), in accordance with article 10, paragraph 1 of the Law.

    The Offeror will publish by way of separate announcement the commencement of the acceptance period of the Tender Offer (the “Acceptance Period”) and the means to tender.

    The companies of the Euronext Group are acting in concert with the Offeror for the purposes of the Tender Offer, pursuant to article 2, case (e) of the Law .There are no other persons acting in concert with the Offeror for the purposes of the Tender Offer, pursuant to article 2, case (e) of the Law. As at the Date of the Tender Offer, no ATHEX Shares were held, directly or indirectly, by the Euronext Group.

    The Offeror may purchase ATHEX Shares in the market or over-the-counter until and including the end of the Acceptance Period.

    On 30 July 2025, the Offeror and ATHEX entered into a cooperation agreement which details the cooperation between the Offeror and ATHEX in relation to the Tender Offer (the “Cooperation Agreement”). The Cooperation Agreement provides, among others, that ATHEX will not tender the Treasury Shares in the Tender Offer.

    Other than the Cooperation Agreement and the aforementioned written statements received by the Offeror from the ATHEX directors, there are no special agreements relating to the Tender Offer or the exercise of rights arising from the ATHEX Shares to which the Offeror is a party.

    The purpose of the Tender Offer is for the Offeror to acquire direct control over ATHEX and integrate the ATHEX Group into the Euronext Group. Pursuant to the Tender Offer, the Offeror seeks to become the direct parent company of ATHEX and the ultimate parent company of ATHEX Group with a shareholding structure where ATHEX shareholders will become shareholders of the Offeror.

    Consideration and Tender Offer Structure

    In consideration for every ATHEX Share lawfully and validly tendered in the Tender Offer, and in accordance with the first clause of paragraph 1 of article 9 of the Law, Euronext offers five hundredths (0.050) of a Consideration Share for 1 ATHEX Share (the “Offer Consideration”). The shares of the Offeror are held in book-entry form through the Central Securities Depository for the Offeror Shares (“Euronext Securities”).

    The Offer Consideration meets the criteria of “fair and equitable” consideration under article 9, paragraphs 4 and 5 of the Law.

    1. The Offer Consideration of the Tender Offer means the amount of 0.050 Consideration Shares for 1 ATHEX Share, to be issued pursuant to the Tender Offer.
    2. As provided for in article 9, paragraph 5 (a) of the Law, the following shall be taken into account for the price of the ATHEX share:

    a)   its VWAP during the six months preceding the Date of the Tender Offer, where in this case the VWAP of ATHEX’s share during the six months preceding 30 July 2025, is €5.9770.

    b)   the Offeror did not acquire ATHEX Shares during the twelve (12) months preceding the Date of the Tender Offer.

    C. A valuation is not required for ATHEX based on the provisions of par. 6 of article 9 of the Law, as none of the conditions referred to therein are met, namely:

    • no sanctions have been imposed by the Board of Directors of HCMC for manipulation of ATHEX Shares that took place within the 18-month period preceding the Date of the Tender Offer,
    • during the six (6) months preceding the Date of the Tender Offer, (i) Share transactions have been carried out on the Athens Stock Exchange on more than three-fifths (3/5) of the operating days of the relevant market, and specifically, they amounted to 100% of them and (ii) Share transactions that have been carried out exceed ten percent (10%) of the total number of Shares of ATHEX, and specifically, they amounted to 39.1% of them.
    • The “fair and equitable” consideration as determined by the criteria of paragraph 4 of Article 9 of the Law, exceeds eighty percent (80%) of the book value per share, based on the data of the average of the last two published financial statements of Law 3556/2007, on a consolidated basis.

    D.         As provided for in article 9 par. 5 (b) of the Law, for the price of the Offeror’s share provided as consideration, the VWAP of the Offeror’s share during the six months preceding the Date of the Tender Offer is taken into account, where in this case the VWAP of the Offeror’s share during the six months preceding 30 July 2025 is €135.0369.

    E. Therefore, 0.050 of the Offeror’s share provided as consideration is equal to €6.7518 per ATHEX Share, taking into account the VWAP of the Offeror Share. Therefore, the Offer Consideration meets the criteria of “fair and equitable” consideration, as described in Article 9, paragraphs 4 and 5 of the Law.

    This amount on the Date of the Tender Offer exceeds by 13.0% the “fair and equitable” consideration, as defined in Article 9, paragraphs 4 and 5, as on the one hand the VWAP of ATHEX during the six months preceding the Tender Offer is €5.9770, and on the other hand the Offeror did not acquire Shares during the twelve (12) months preceding the Date of the Tender Offer.

    This amount on the Date of the Tender Offer represents a 7.51% discount to the closing price of the ATHEX Share on the Athens Stock Exchange on the date preceding the Date of the Tender Offer, which amounted to €7.3000, as both ATHEX and Euronext shares have appreciated over the past six months.

    In addition:

    • the Offer Consideration calculated on the basis of the price of the Offeror Share on the date preceding the Date of the Tender Offer represents a 1.7% discount to the closing price of the ATHEX Share on the Athens Stock Exchange on the date preceding the Date of the Tender Offer.
    • the Offer Consideration calculated on the basis of the price of the Offeror Share on 27 June 2025, being the date when the Offeror issued a statement confirming its discussions with ATHEX (the “Date of the Initial Statement”) exceeds by 21.3% the closing price of the ATHEX Share on the Athens Stock Exchange on the Date of the Initial Statement.

    On 15 May 2025, the general meeting of the Offeror has designated the Managing Board of the Offeror for a period of eighteen (18) months as the competent body to, subject to the approval of the Supervisory Board of the Offeror, issue ordinary shares and to grant rights to subscribe for ordinary shares up to a total of 10% of the issued ordinary share capital at the date of the annual general meeting held in 2025, and to restrict or exclude the pre-emptive rights of shareholders pertaining to (the right to subscribe for) ordinary shares upon any issuance of ordinary shares (the AGM Delegation). Pursuant to the AGM-Delegation, the Managing Board of the Offeror resolved on 29 July 2025 to issue Consideration Shares, subject to the terms and conditions set forth in this Information Circular. On the same date, the Supervisory Board of the Offeror approved the resolution adopted by the Managing Board in accordance with the AGM-Delegation. The maximum number of Consideration Shares that Euronext will issue in connection with the Tender Offer, the Right of Squeeze-Out and the Right to Sell-Out (being 3,017,400 Consideration Shares) is smaller than the number of Offeror Shares that the Euronext boards are capable of issuing pursuant to such mandate (being 10,423,550 Offeror Shares). Euronext will assume payment of the duties levied in favor of the Hellenic Central Securities Depository S.A. (the “ATHEXCSD”) on the registration of the over-the-counter transfer of the Transferred Shares in accordance with the codified decision 18 (Meeting 311/22.02.2021) of the Board of Directors of ATHEXCSD, which would otherwise be payable by the accepting shareholders of ATHEX. Such duties amount to 0.08% and are calculated in accordance with the provisions of such decision.

    Shareholders who offer the ATHEX Shares they hold in the context of the Tender Offer, including those electing to receive the Cash Consideration in the context of the exercise of the Right of Squeeze-out or the Right to Sell-out, will also be responsible for all charges and taxes that are due in connection with the Tender Offer, and the Offeror assumes no responsibility nor liability in the payment of said charges and taxes other than the duties levied in favor of the ATHEXCSD expressly set forth in this Information Circular. Notably, based on the letter of the circular issued by the Greek Independent Authority for Public Revenue with reference number Ε.2048/2024, the transfer of the Transferred Shares to the Offeror in consideration for Consideration Shares can be excluded from the tax provided for in article 9 paragraph 2 of Law 2579/1998 in favor of the Greek State provided all conditions mentioned therein are met, which amounts to 0.10%, and is imposed on sales of shares listed on the Athens Stock Exchange, since such transfer does not constitute a sale under the abovementioned provision. Shareholders are advised to consult their own tax advisors regarding the tax implications of the Tender Offer that may concern them in Greece or abroad.

    Euronext will publish, through a separate announcement, the commencement of the Acceptance Period and the means to tender.

    If after the end of the Acceptance Period, Euronext possesses the Minimum Number of Shares but less than 52.065.000 ATHEX Shares representing 90% of the voting rights of ATHEX, ATHEX shares will continue to be traded in the Athens Stock Exchange.

    Squeeze-Out and Sell-Out Procedures, Delisting of ATHEX

    If, at the end of the Acceptance Period, Euronext holds at least 52,065,000 ATHEX Shares representing 90% of ATHEX’s total voting rights (the “Relevant Threshold”):

    (a)   Euronext will initiate the squeeze-out procedure under the Law to cause any remaining holders of Company Shares to transfer those ATHEX Shares to Euronext, in accordance with the Law (the “Right of Squeeze-Out”); and

    (b)   holders of ATHEX Shares who have not accepted the Tender Offer will be entitled, within a period of three (3) months from the publication of the results of the Tender Offer, to exercise the right to sell-out, in accordance with the Law (the “Right to Sell-Out”).

    The consideration offered for each Company Share regarding both the Right of Squeeze-Out and the Right to Sell-Out, will be in accordance with the provisions of Articles 27 and 28 of the Law.

    If the Relevant Threshold is reached or exceeded at the end of the Acceptance Period, the Offeror expects that the Right of Squeeze-out process will be completed within four to eight weeks after Closing. The Offeror intends to apply for the commencement of unconditional listing and trading on Euronext Amsterdam, Euronext Brussels, Euronext Lisbon and Euronext Paris of any Offeror Shares which may be issued as consideration in connection with the Right of Squeeze-out as soon as practicable following completion of the Right of Squeeze-out process.

    If the Relevant Threshold is reached or exceeded at the end of the Acceptance Period, the Right to Sell-out will automatically expire upon completion of the Right of Squeeze-Out. As a result, the Offeror expects that completion of the Right to Squeeze-out process will precede the completion of the Right of Sell-out process. If completion of the Right to Sell-out process does not precede the completion of the Right of Squeeze-out out process, the Offeror intends to apply for the commencement of unconditional listing and trading on Euronext Amsterdam, Euronext Brussels, Euronext Lisbon and Euronext Paris of any Offeror Shares which may be issued as consideration pursuant to the Right to Sell-out as soon as practicable following completion of the Right to Sell-out process.

    If, following completion of the Tender Offer or after the exercise of the Right of Squeeze-out or the Right to Sell-out, as the case may be, the Offeror holds 95% of ATHEX’s share capital, the Offeror intends to request the convocation of a General Meeting of the Shareholders to resolve upon the submission of an application to the HCMC requesting the delisting of the ATHEX Shares from the Athens Stock Exchange, in accordance with article 17 paragraph 5 of Law 3371/2005, at which (General Meeting) the Offeror will exercise its voting rights in favor of such resolution.

    Plans for ATHEX and Euronext following the Tender Offer

    Embed ATHEX within a pan-European trading framework

    As part of the combined group, ATHEX will be able to join the Euronext Group’s single liquidity pool, enabled by a single order book and powered by a single technology platform, where members can access all its markets in a seamless manner, with the ambition of deepening investor interest and creating greater liquidity as well as fair and transparent markets. Today, more than €13 billion worth of equities are traded daily on the Offeror’s seven (7) European markets that are part of the single liquidity pool. Thanks to its highly flexible architecture, the Offeror expects to see reduced time to market for new products in the combined group. This integration aims to deepen investor interest, create greater liquidity, and ensure fair and transparent markets.

    Strengthen access to financing for Greek corporates

    With ATHEX joining the Euronext Group, Greece will become a key hub for listings under a harmonized framework, offering greater scale, visibility, and access to European liquidity. In addition to listing larger Greek companies, the Offeror will bolster its capabilities in financing Greek SMEs. The pan-European pre-IPO educational program “IPOready” will be deployed across Greece. This program has already enabled over 1,200 companies to understand the benefits of listing, resulting in 33 new listings (€1.6 billion raised at listing, €5.7 billion aggregate market cap at listing). The Offeror will also provide a platform for Greek companies to list debt, diversifying their financing sources.

    Following the successful completion of the Tender Offer, ATHEX will be incorporated into a trusted framework for European and international investors. The Offeror has a proven track record of delivering substantial benefits to the local ecosystems of acquired market operators.

    Reinforce the operating resiliency of the local capital markets

    The Offeror’s size and operational DNA enable it to operate within extremely high reliability standards. The Offeror is investing massively in market technology and has built the best-in-class technology operations with cyber-security excellence. The Offeror has been granted the highest security ratings in its recent annual technology audit performed by Bitsight. The Offeror is a technology business first and foremost, with more than 875 technology and operations employees (35% of total employees), mainly located in Milan, Porto and Paris. ATHEX will benefit from an immediate change in scale in terms of technology platforms and operations, notably from a fully integrated cybersecurity and operational framework operation ensuring maximum resilience of the Greek market in a world of increasingly complex technology threats.

    Create a unified post-trade infrastructure

    The Offeror relies on a single clearing house, clearing all of its European market flows across cash and derivatives products. As part of the combined group, the Offeror intends to expand Euronext Clearing, which centralizes clearing for the whole Euronext Group, and which has benefitted from significant investments over the past few years, to Greek securities. This central European clearing expansion is key to the integration of Greek markets within the Offeror’s framework.

    The Offeror relies on a converging technology framework to create the conditions of success for the custody and settlement of financial products across Europe. As part of the combined group, the CSD function of ATHEX will be part of Euronext Securities’ convergence program, aiming at delivering a unified post-trading core settlement service through a single platform for securities settlement (TARGET2-Securities or T2S) by leveraging the CSDs of the Euronext Group.

    ATHEX as the cornerstone of the Offeror in Southeast Europe

    As the largest exchange group in the highly dynamic Southeastern region of Europe, ATHEX is best placed to lead the Offeror’s expansion across the region. As part of the Euronext Group, ATHEX will be the cornerstone of the Offeror’s expansion in the region, where business opportunities are numerous.

    Greek ecosystem to be fully part of the Offeror’s governance and supervision

    After and subject to successful completion of the Tender Offer, the composition of the Offeror’s Supervisory Board and the structure of its corporate governance will be amended. Subject to the Offeror’s shareholders and regulatory approvals, an independent director representing the Greek ecosystem will join the Offeror’s Supervisory Board.

    In addition, the Chief Executive Officer of the ATHEX will join the Offeror’s Managing Board, subject to the Offeror shareholders’ and regulatory approvals.

    In terms of regulatory framework, the Offeror is supervised at group level by a College of Regulators. The College of Regulators is made up of the seven (7) national regulatory authorities supervising the respective Euronext’s national regulated markets. After and subject to Closing occurring, the Offeror will recommend inviting HCMC to join the Offeror’s College of Regulators, pari passu with the national regulatory authorities currently supervising the Offeror, with a rotating chair every semester to exercise supervision at group level of the combined group. The direct regulatory oversight of ATHEX and the Greek market will remain unchanged. This will allow HCMC to continue regulating ATHEX and the Greek market and be part of the supervision of ATHEX at group-level through the Offeror’s College of Regulators.

    Reunite complementary skills and expertise

    Should the potential combination occur, it could create opportunities for knowledge sharing, career development, and cross-functional collaboration, fostering an environment where talent thrives. Euronext would aim to cultivate an inclusive, collaborative, and entrepreneurial work environment. With a long-standing commitment to diversity and inclusion, Euronext believes that recognizing and valuing diversity benefits both employees and the business’s long-term success. Euronext would ensure that ATHEX employees have opportunities for career development, encouraging them to take on wider responsibilities and roles in the pan-European development of their activities. They would also be encouraged to explore opportunities across various locations to embrace new challenges within Euronext. The diversification of Euronext’s businesses would consistently offer opportunities for high-performing employees, not only in traditional exchange roles but also in new activities developed through the innovation program.

    Following the successful completion of the Tender Offer and upon approval of the ATHEX shareholders meeting, the Offeror intends to modify, subject to ATHEX’s shareholders approval by a simple majority, ATHEX’s trademark name. As such, it will operate under the name “Euronext Athens”, fully embedding the Greek financial infrastructure and creating a sense of togetherness.

    Tender Offer Conditions

    Completion of the Tender Offer is subject to the satisfaction of the following conditions and minimum number of shares:

    (a)   the approval of the HCMC in relation to the direct change of control of ATHEX;

    (b)   the approval of the HCMC in relation to the indirect change of control of ΑΤΗΕΧClear;

    (c)   the approval of the HCMC in relation to the indirect change of control of ATHEXCSD;

    (d)   the approval of RAEWW and the HCMC in relation to the change of control of ATHEX due to its participation in Hellenic Energy Exchange (“HenEx”) and EnEx Clearing House (“EnExClear”);

    (e)   the approval of the HCMC in relation to the acquisition by the Euronext Reference Shareholders2 of an indirect qualifying holding between 20% and 50% of ATHEX, ATHEXCSD and ATHEXClear;

    (f)   the issuance of a declaration of non-objection from the competent foreign authorities regarding the coordinated regulation and supervision of Euronext being the AMF, AFM, CBI, NFSA, FSMA, CMVM, and CONSOB (together with (a)-(f), the “Conditions”); and

    (g)   no later than the end of the Acceptance Period, at least 38,759,500 ATHEX Shares, corresponding to at least 67% of ATHEX’s total paid-up voting share capital, shall have been lawfully and validly tendered to the Offeror (the “Minimum Number of Shares”). This condition may be amended in accordance with the provisions of the Law.

    If (i) the Minimum Number of Shares is not fulfilled as at the end of the Acceptance Period and/or (ii) the Conditions are not satisfied, the Tender Offer will ipso jure lapse, with retroactive effect, and have no legal effect, and the ATHEX Shares tendered to the Offeror will be returned to their holders.

    The Offeror may revoke the Tender Offer if (i) a competing offer, as provided by the Law, has been submitted, or (ii) subject to the HCMC’s approval, if an unforeseen change in circumstances beyond the control of the Offeror occurs that makes the Tender Offer particularly onerous.

    The declarations of acceptance which are submitted cannot be revoked, unless a competing offer, as provided by the Law, has been submitted, in which case the accepting shareholder will be entitled to exercise a revocation right.

    Shareholders’ Statements – Undertakings

    All members of the Board of Directors of ATHEX owning ATHEX shares including CEO Ioannis Kontopoulos have provided irrevocable undertakings to tender their shares in the Tender Offer subject to the issuance of a reasoned opinion of ATHEX’s Board of Directors in favour of the Tender Offer.

    Name Number of shares held
    George Ηandjinicolaou 15,000
    Ioannis Kontopoulos 95,000

    Euronext Advisors

    Deutsche Bank AG, a credit institution incorporated under the laws of the Federal Republic of Germany with its principal office in Frankfurt am Main, registered address Taunusanlage 12, 60325 Frankfurt am Main, acts as advisor of Euronext in respect of the Tender Offer, in accordance with article 12 of the Law (the “Advisor”).

    For the purpose of the Tender Offer only, Deutsche Bank AG has certified to the HCMC that Euronext (i) has taken all appropriate measures to be able to issue and deliver the Euronext Shares to the shareholders who will accept the Tender Offer and (ii) has the necessary wherewithal to pay in full the total amount in respect of the 0.16% clearing duties, namely 0.08% payable by Euronext and 0.08% payable by each of ATHEX’s shareholders who lawfully and validly accept the Tender Offer, payable by Euronext to the Hellenic Central Securities Depository S.A., in connection with the registration of the over-the-counter transfer of all the ordinary shares of ATHEX tendered to Euronext by ATHEX’s shareholders. It is clarified that this certificate does not constitute any offer of financing or any other type of commitment and/or assumption of any obligation whatsoever, and that this certificate is not provided as nor does it constitute advice, or recommendation within the meaning of Article 729 of the Greek Civil Code. Deutsche Bank AG, by means of this certificate, does not provide any guarantee (within the meaning of Article 847 of the Greek Civil Code) or letter of guarantee, for the fulfillment of the delivery obligations, monetary or other obligations undertaken by the Offeror in the context of the Tender Offer.

    About Euronext

    Euronext is a public company with limited liability (naamloze vennootschap) incorporated under the laws of the Netherlands on 15 March 2014 and is domiciled in the Netherlands. Euronext’s statutory seat (statutaire zetel) is in Amsterdam, the Netherlands, and its registered office and principal place of business is at Beursplein 5, 1012 JW Amsterdam, the Netherlands. The Company is registered with the trade register of the Chamber of Commerce for Amsterdam, the Netherlands, under number 60234520, and the telephone number is +31 (0)20-7214444. Euronext’s LEI is 724500QJ4QSZ3H9QU415 and its corporate website is https://www.euronext.com/en.

    Under its Articles of Association, the Offeror’s authorized share capital amounts to €200,000,001.60 and is divided into 125,000,000 Ordinary Shares, each with a nominal value of €1.60 and one priority share with a nominal value of €1.60. The priority share has not been issued. All of Euronext’s shares have been or will be issued under Dutch law.

    As of December 31st, 2024, the Offeror’s issued share capital amounted to €166,776,811.20 and was divided into 104,235,507 ordinary shares, whereas the Offeror held 1,475,395 treasury shares.

    On 11 March 2025, the Offeror announced the completion of its €300 million share repurchase programme for which 2,692,979 shares, or approximately 2.58% of Euronext’s share capital, were repurchased.

    Following the repurchase programme, and as of the cancellation of the purchased shares under this programme which is expected to occur on 5 August 2025, the Offeror’s issued share capital amounts to €162,468,044.80 and divided into 101,542,528 ordinary shares.

    On 22 May 2025, the Offeror launched an offering of bonds due 2032 convertible into new shares and/or exchangeable for existing shares (“OCEANEs”) for a nominal amount of €425 million. Bondholders will be granted the right to convert or exchange the Bonds into new and/or existing Shares (the “Conversion/Exchange Right”) which they may exercise at any time from the 41st day (inclusive) following the Issue Date (30 May 2025) up to the 7th business day (inclusive) preceding the Maturity Date (30 May 2032) or, as the case may be, the relevant early redemption date. For illustrative purposes, considering a nominal amount of €425 million, a reference share price of €145 and a 32.5% conversion premium corresponding to the mid-point of the marketing range, the potential dilution would represent approximately 2.1% of the Company’s outstanding share capital, if the Conversion/Exchange Right was exercised for all the Bonds and the Company decided to deliver new Shares only upon exercise of the Conversion/Exchange Right.

    The Offeror is subject to the provisions of the Dutch Civil Code, the Dutch Financial Supervision Act and the Articles of Association with regard to the issue of shares following admission. The shares are in registered form and are only available in the form of an entry in the Offeror’s shareholders’ register and not in certificated form.

    The Euronext Group provides exchange listing, trading, post trade and related services in Europe. The Company operates Regulated Markets and Multilateral Trading Facilities (each a “MTF”) in seven European countries (Belgium, France, Ireland, Italy, the Netherlands, Norway, and Portugal). The Group operates these venues under a regulatory licence, under national legislation implementing MiFID II / MiFIR granted to the local market operator and the relevant National Competent Authority (each a “NCA”) or Ministry when appropriate. Each market operator is subject to the national laws and regulations supervised by the NCAs, central banks and finance ministries as appropriate. As part of their regular supervision, NCAs perform from time-to-time audits, inspections and on-site visits. This may lead to recommendations or other measures as appropriate. The Group also operates central securities depositories (each a “CSD”) in four European countries (Denmark, Italy, Norway and Portugal). Each of the CSDs is a limited liability company subject to national laws and regulations; however, they all operate under the brand “Euronext Securities”. VP Securities A/S (Euronext Securities Copenhagen), Monte Titoli S.p.A. (Euronext Securities Milan), Interbolsa S.A. (Euronext Securities Porto), and Verdipapirsentralen ASA (Euronext Securities Oslo) hold a licence under the CSDR, under limited national implementing provisions, granted by their NCA on 3 January 2018, 18 December 2019, 12 July 2018, and 28 January 2022 respectively.

    Euronext, through Euronext Securities Copenhagen, Euronext Securities Milan and Euronext Securities Porto, participates in the ECB’s TARGET2-Securities (T2S) platform. The CSDs migrated respectively in September 2016 (with EUR in 2016 and with Danish Kroner in 2018), August 2015 and March 2016.

    Moreover, the Group operates a Central Counterparty in Italy, Cassa di Compensazione e Garanzia S.p.A (“Euronext Clearing“). The company was incorporated on 31 March 1992, holds its registered office in Rome at Via Tomacelli 146, and is registered with the Italian Register of Companies under no. 04289511000. It is authorised by the Bank of Italy as a CCP pursuant to Article 17 of EMIR with effect from 20 May 2014.

    Important Notices

    General

    The Tender Offer described herein is addressed to holders of ATHEX Shares and only to persons to whom it may be lawfully addressed. The Tender Offer will be made in the territory of the Hellenic Republic. The making of the Tender Offer to specific persons who are residents in or nationals or citizens of jurisdictions outside the Hellenic Republic or to custodians, nominees or trustees of such persons (the “Excluded Shareholders”) may be made only in accordance with the laws of the relevant jurisdiction. It is the responsibility of the Excluded Shareholders and each person wishing to accept the Tender Offer to inform themselves of and ensure compliance with the laws of their respective jurisdictions in relation to the Tender Offer. If you have any doubts as to your status, you should consult with your professional advisor in the relevant jurisdiction.

    The Tender Offer is not being made, directly or indirectly, by mail or by any means in or into any jurisdiction within which, under its laws, rules and regulations, the submission, the making or the presentation of the Tender Offer or the mailing or distribution of the Information Circular to be approved by the HCMC a declaration of acceptance and any other document or material relevant thereto (together, the “Relevant Documents”) is illegal or contravenes any applicable legislation, rule or regulation (together, the “Excluded Territories”). Accordingly, copies of any such Relevant Documents and materials will not be, and must not be, directly or indirectly, mailed, distributed or otherwise sent to anyone or from anyone in or into or from any Excluded Territory.

    No Offeror Shares have been offered or will be offered pursuant to the Tender Offer to the public in the United Kingdom, except that the Offeror Shares may be offered to the public in the United Kingdom at any time: (a) to any legal entity which is a qualified investor as defined under Article 2 of the UK Prospectus Regulation; (b) to fewer than 150 natural or legal persons (other than qualified investors as defined under Article 2 of the UK Prospectus Regulation); or (c) in any other circumstances falling within Section 86 of the FSMA. Provided that no such offer of the Offeror Shares shall require Euronext or the Advisor to publish a prospectus pursuant to Section 85 of the FSMA or supplement a prospectus pursuant to Article 23 of the UK Prospectus Regulation. For the purposes of this provision, the expression an “offer to the public” in relation to the Offeror Shares in the United Kingdom means the communication in any form and by any means of sufficient information on the terms of the offer and any Offeror Shares to be offered so as to enable an investor to decide to purchase or subscribe for any Offeror Shares and the expression “UK Prospectus Regulation” means Regulation (EU) 2017/1129 as it forms part of domestic law by virtue of the European Union (Withdrawal) Act 2018.

    The Consideration Shares have not been and will not be registered under the U.S. Securities Act of 1933, as amended (the “Securities Act”), or the securities laws of any state or other jurisdiction of the United States and may not be offered, sold or delivered, directly or indirectly, in or into the United States absent registration, or pursuant to an exemption from, or in a transaction not subject to, the registration requirements of the Securities Act and in compliance with any applicable state and other securities laws of the United States. This release does not constitute an offer to sell or solicitation of an offer to buy any of the Consideration Shares in the United States. Euronext has no intention to register any part of the Tender Offer in the United States or make a public offering of the Consideration Shares in the United States. Any Consideration Shares offered in the United States will be offered only to (i) holders of the Company Shares located outside of the United States and (ii) holders of Company Shares located within the United States that are “Qualified Institutional Buyers” (as defined in Rule 144A under the Securities Act). Such holders of Company Shares will be required to make such acknowledgements and representations to, and agreements with, Euronext as Euronext may require establishing that they are entitled to receive Consideration Shares pursuant to an exemption from or in a transaction not subject to the registration requirements of the Securities Act. Accordingly, any holder of Company Shares located within the United States who is not a Qualified Institutional Buyer or who does not make such acknowledgement and representation to establish their entitlement to receive the Consideration Shares is ineligible to participate in the Tender Offer, and any purported acceptance of the Tender Offer by such holder will be ineffective and disregarded.

    The Tender Offer is being made in the U.S. in reliance on the expected availability of the Tier II exemption pursuant to Rule 14d-1(d) of, and otherwise in compliance with Section 14E of, and Regulation 14E promulgated under, the U.S. Securities and Exchange Act of 1934, as amended (the “Exchange Act”), and otherwise in accordance with the requirements of Greek law. The Tender Offer is not subject to Section 14(d)(1) of, or Regulation 14D promulgated under, the Exchange Act. The Company is not currently subject to the periodic reporting requirements under the Exchange Act and is not required to, and does not, file any reports with the SEC thereunder.

    Pursuant to exemptive relief granted by the SEC from Rule 14e-5 under the Exchange Act, during the period of the Tender Offer, Euronext may purchase, or arrange to purchase, whether directly or through any of its affiliates, any broker or other financial institution acting as its agent or any affiliates of any broker or other financial institution acting as its agent, shares of the Company as permitted by applicable law. The Offeror Shares are issued to the Company’s existing shareholders in Singapore without the intention of being on-sold there, and no documents issued by or on behalf of the Company may be used in any subsequent sale by these shareholders. The Information Circular has not been and will not be lodged with or registered as a prospectus under the Securities and Futures Act 2001 of Singapore with the Monetary Authority of Singapore. Therefore, the Information Circular does not constitute an offer or invitation for the sale or purchase of the Offeror Shares in Singapore, whether directly or indirectly, and shall not form the basis of any contract for the issue or sale of the Consideration Shares in Singapore.

    This announcement is only made available to a limited number of “Professional Investors” within the meaning of the SCA’s Board of Directors Decision No. 13 of 2021 Concerning the Financial Activities Rule Book, as amended. By receiving this announcement, the entity to whom it has been issued understands, acknowledges and agrees that it has not been approved by or filed with the UAE Central Bank, the UAE Securities and Commodities Authority, the Dubai Financial Services Authority (“DFSA“), the Financial Services Regulatory Authority of Abu Dhabi (“FSRA“) or any other relevant regulatory or licensing authorities in the UAE, nor has the originator, or any other related party received authorization or licensing from the UAE Central Bank, the UAE Securities and Commodities Authority, the DFSA, the FSRA, or any other authorities in the UAE. This announcement does not constitute a public offer of Offeror Shares in the UAE in accordance with the UAE SCA Chairman of the Board Resolution No. (11/R.M) of 2016 On the Regulations for Issuing and Offering Shares of Public Joint Stock Companies, Federal Decree-No. 32 of 2021 on Commercial Companies, or otherwise.

    The Offeror Shares may not be publicly offered, directly or indirectly, in Switzerland within the meaning of the Swiss Financial Services Act (“FinSA“) and no application has or will be made to admit the Offeror Shares to trading on any trading venue (exchange or multilateral trading facility) in Switzerland. The Information Circular and any related offering or marketing materials regarding the Offeror Shares do not constitute a prospectus under the FinSA and must not be publicly distributed or made available in Switzerland.

    The Offeror Shares have not been licensed for offering in Kuwait by the Kuwait Capital Markets Authority or any other relevant Kuwaiti government agency. The offering of the Offeror Shares in Kuwait on the basis a private placement or public offering is, therefore, restricted in accordance with Law No. 7 of 2010 and the bylaws thereto (as amended). No private or public offering of the Offeror Shares is being made in Kuwait, and no agreement relating to the sale of the Ordinary Shares will be concluded in Kuwait. No marketing or solicitation or inducement activities are being used to offer or market the Offeror Shares in Kuwait.

    The Offeror Shares may be sold only to purchasers purchasing, or deemed to be purchasing, as principal that are accredited investors, as defined in National Instrument 45-106 Prospectus Exemptions or subsection 73.3(1) of the Securities Act (Ontario), and are permitted clients, as defined in National Instrument 31-103 Registration Requirements, Exemptions and Ongoing Registrant Obligations. Any resale of the Offeror Shares must be made in accordance with an exemption from, or in a transaction not subject to, the prospectus requirements of applicable securities laws.

    The Offeror Shares have not been and will not be registered in Japan pursuant to Article 4, Paragraph 1 of the Financial Instruments and Exchange Act of Japan (Act No. 25 of 1948, as amended, the “FIEA“) in reliance upon the exemption from the registration requirements since the offering constitutes the private placement to qualified institutional investors only as provided for in “i” of Article 2, Paragraph 3, Item 2 of the FIEA. A transferor of the Offeror Shares shall not transfer or resell them except where a transferee is a qualified institutional investor under Article 10 of the Cabinet Office Ordinance concerning Definitions provided in Article 2 of the Financial Instruments and Exchange Act of Japan (the Ministry of Finance Ordinance No. 14 of 1993, as amended).

    This announcement does not constitute an invitation to the public in the Cayman Islands. Any invitation to participate in the Tender Offer is not being conducted in or from with the Cayman Islands or a place of business in the Cayman Islands.

    No person receiving a copy of this announcement or of any Relevant Document in any jurisdiction outside the Hellenic Republic may treat any such document as if it constituted a solicitation or offer to such person and under no circumstances may such person use any Relevant Document if, in the relevant jurisdiction, such solicitation or offer may not be lawfully made to such person or if such Relevant Document may not be lawfully used without breaching any legal requirements. In those instances, any such Relevant Document is sent for information purposes only.

    This regulatory announcement does not contain, constitute or form part of any offer or invitation to sell or subscribe or any solicitation of any offer to purchase or subscribe for any securities in any jurisdiction, and neither this regulatory announcement (nor any part of it) nor the fact of its distribution form the basis of, or may be relied upon in connection with, or act as any inducement to enter into, any contract or commitment whatsoever.

    Cautionary Statement Regarding Forward-Looking Statements

    The information contained in this announcement does not purport to be full or complete. The exact dates of the Tender Offer may change.

    This announcement contains forward-looking statements which are subject to numerous assumptions, risks and uncertainties which change over time and relate to, amongst others, the business activities and certain plans and objectives that Euronext has in respect of the ATHEX Group and the Euronext Group. In some cases, the forward-looking statements may be identified by words such as “may”, “hope”, “might”, “can”, “could”, “will”, “should”, “expect”, “plan”, “anticipate”, “believe”, “estimate”, “predict”, “potential” or “continue” and the negative of these terms accordingly. There are many factors (for instance, without limitation, commercial, operational, economic, political and financial), as a consequence of which the actual results and the actual developments may potentially substantially differ from the plans and the objectives of Euronext and the ATHEX Group set out in this announcement. As such, Euronext and the ATHEX Group evolve in a highly competitive landscape and rapidly changing environment, where new risks and uncertainties not specifically described herein this announcement may emerge from time to time and it is not possible to predict all risks and uncertainties.

    Although Euronext believes that, as of the date of this announcement, the expectations reflected in the forward-looking statements are reasonable, Euronext cannot assure you that future events will meet these expectations. Moreover, neither Euronext nor any other person assumes responsibility for the accuracy and completeness of the forward-looking statements. After the date of this announcement, unless Euronext is required by applicable law to update these forward-looking statements, Euronext will not necessarily update any of these forward-looking statements to conform them either to actual results or to changes in expectations.


    1 Based on a total number of shares as at 30 June 2025 of 57,850,000, which exclude the number of treasury shares of 2,498,000
    2 These are the Reference Shareholders:

    Attachment

    The MIL Network

  • MIL-OSI Security: Former Guam Corrections Officer Sentenced to 120 Months in Federal Prison for Attempted Enticement of a Minor

    Source: Office of United States Attorneys

    Hagåtña – SHAWN N. ANDERSON, United States Attorney for the Districts of Guam and the Northern Mariana Islands, announces that, Raymond T. Tammed, age 30, from Piti, Guam, was sentenced to 120 months imprisonment in the U.S. District Court of Guam for Attempted Enticement of a Minor, in violation of 18 U.S.C. § 2422(b).  The Court also ordered five years of supervised release and a $100 mandatory assessment fee.  Under the Sex Offender Registration and Notification Act, Tammed must register in every jurisdiction he resides, works, and goes to school.

    In May of 2024, federal investigators conducted an internet-based operation to identify and arrest individuals seeking to engage in sexual activity with minors on Guam. During that operation, Tammed contacted an undercover agent posing as a 13-year-old girl. Despite believing that he was conversing with an underage girl, Tammed sent sexually explicit messages, sought to arrange a sexual encounter, and sent the undercover agent a selfie and a picture of his genitals. Tammed later arranged to meet the undercover agent at the Andersen Air Force Base Visitors Center, where Tammed was arrested upon arrival.

    “This case demonstrates the dangers faced by our children during online activity,” stated United States Attorney Anderson. “We will continue these undercover operations to protect our communities from sexual predators.  I applaud the efforts of law enforcement in bringing Tammed to justice.”

    ​​“Keeping our children safe from ​exploitation and ​​abuse is the highest priority.  By taking predators like ​Tammed off the street, we are ensuring the safety of the most vulnerable members of our community,” said Homeland Security Investigations Special Agent in Charge Lucy Cabral-DeArmas.  “HSI will continue to seek justice to keep our children safe with zero tolerance for this heinous crime.”

    Investigation was conducted by Homeland Security Investigations and Air Force Office of Special Investigations Service, Detachment 602.

    This case was prosecuted by Benjamin K. Petersburg, Assistant United States Attorney in the District of Guam.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.

    MIL Security OSI