Category: Machine Learning

  • MIL-OSI USA: SPC Tornado Watch 310

    Source: US National Oceanic and Atmospheric Administration

    Note:  The expiration time in the watch graphic is amended if the watch is replaced, cancelled or extended.Note: Click for Watch Status Reports.
    SEL0

    URGENT – IMMEDIATE BROADCAST REQUESTED
    Tornado Watch Number 310
    NWS Storm Prediction Center Norman OK
    240 PM EDT Wed May 21 2025

    The NWS Storm Prediction Center has issued a

    * Tornado Watch for portions of
    Eastern Ohio
    Western Pennsylvania
    Far Northern West Virginia

    * Effective this Wednesday afternoon and evening from 240 PM
    until 800 PM EDT.

    * Primary threats include…
    A couple tornadoes possible
    Scattered damaging wind gusts to 65 mph possible
    Isolated large hail events to 1.5 inches in diameter possible

    SUMMARY…Low-topped supercell and related hail/wind and tornado
    potential should focus in a narrow zone regionally near a warm front
    this afternoon until around sunset.

    The tornado watch area is approximately along and 50 statute miles
    east and west of a line from 35 miles north northwest of Pittsburgh
    PA to 30 miles west southwest of Morgantown WV. For a complete
    depiction of the watch see the associated watch outline update
    (WOUS64 KWNS WOU0).

    PRECAUTIONARY/PREPAREDNESS ACTIONS…

    REMEMBER…A Tornado Watch means conditions are favorable for
    tornadoes and severe thunderstorms in and close to the watch
    area. Persons in these areas should be on the lookout for
    threatening weather conditions and listen for later statements
    and possible warnings.

    &&

    AVIATION…Tornadoes and a few severe thunderstorms with hail
    surface and aloft to 1.5 inches. Extreme turbulence and surface wind
    gusts to 55 knots. A few cumulonimbi with maximum tops to 500. Mean
    storm motion vector 23025.

    …Guyer

    Note: The Aviation Watch (SAW) product is an approximation to the watch area. The actual watch is depicted by the shaded areas.
    SAW0
    WW 310 TORNADO OH PA WV 211840Z – 220000Z
    AXIS..50 STATUTE MILES EAST AND WEST OF LINE..
    35NNW PIT/PITTSBURGH PA/ – 30WSW MGW/MORGANTOWN WV/
    ..AVIATION COORDS.. 45NM E/W /15WNW EWC – 37SSE AIR/
    HAIL SURFACE AND ALOFT..1.5 INCHES. WIND GUSTS..55 KNOTS.
    MAX TOPS TO 500. MEAN STORM MOTION VECTOR 23025.

    LAT…LON 40967953 39487950 39488137 40968144

    THIS IS AN APPROXIMATION TO THE WATCH AREA. FOR A
    COMPLETE DEPICTION OF THE WATCH SEE WOUS64 KWNS
    FOR WOU0.

    Watch 310 Status Report Message has not been issued yet.

    Note:  Click for Complete Product Text.Tornadoes

    Probability of 2 or more tornadoes

    Mod (30%)

    Probability of 1 or more strong (EF2-EF5) tornadoes

    Low (10%)

    Wind

    Probability of 10 or more severe wind events

    Mod (40%)

    Probability of 1 or more wind events > 65 knots

    Low (10%)

    Hail

    Probability of 10 or more severe hail events

    Low (20%)

    Probability of 1 or more hailstones > 2 inches

    Low (

    MIL OSI USA News

  • MIL-OSI USA: Statement of Commissioner Kristin N. Johnson on Her Departure from the CFTC

    Source: US Commodity Futures Trading Commission

    It has been an honor and privilege to serve as a Commissioner at the Commodity Futures Trading Commission (CFTC). Having completed my full term, I have notified the President of my intent to step down as a CFTC Commissioner later this year. Although this is a difficult decision, I am proud of the work that I have accomplished and am deeply grateful for the chance to develop meaningful relationships with staff and current and former Commissioners during my tenure at the CFTC.
    I am exceptionally fortunate to have had the opportunity to serve our great nation and am honored that President Joseph R. Biden nominated me to serve in two critical roles as a financial market regulator. In addition to nominating me to serve a three-year term as a CFTC Commissioner in the fall of 2021, last summer, President Biden nominated me to serve as Assistant Secretary for Financial Institutions at the United States Department of the Treasury. 
    As a graduate of Georgetown University’s Walsh School of Foreign Service, the invitation to return to Washington, D.C. as a CFTC Commissioner resonated with my life-long commitment to be “in service of others.” When I accepted the nomination to serve as a CFTC Commissioner, I requested a three-year leave of absence from Emory University School of Law where I serve as Asa Griggs Candler Professor of Law. On March 28, 2022, I was unanimously confirmed by the United States Senate. On March 30, 2022, not long after teaching my last class for the semester at Emory Law School, I was sworn in to serve as a CFTC Commissioner.
    This year marks the 50th Anniversary of the CFTC, a small-but-mighty agency that works daily to advance effective supervision and oversight in derivatives markets. In 1974, Congress passed and Former President Gerald Ford[1] signed into law the Commodity Futures Trading Commission Act creating the CFTC. A few months later, on April 15, 1975, four of the first five Commissioners, including the first Chairman of the Commission, were sworn in to service.
    As the Commission celebrates this important milestone, I celebrated my third anniversary at the Commission. A few days after my third anniversary, my term expired.
    Our derivatives markets operate as a critical resource for price discovery, risk management, and hedging functions for many sectors in our economy but, most notably, the agriculture, energy, and financial services sectors. One of the greatest strengths of our federal government and, more specifically, the federal agencies that supervise many of the largest global financial market participants in the world, is the intellectual leadership of our regulators.[2] Over the last several decades significant events have tested the resilience of our markets. In each instance, the Commission and its regulations developed through robust engagement among the Commissioners—with the support of the Commission staff—have served to address liquidity and default risk management concerns and to enhance the integrity and stability of our derivatives markets.
    I have endeavored to support the Commission’s work through constructive, substantive engagement with my fellow Commissioners, Commission staff, and the diverse businesses that we supervise. I am deeply committed to encouraging the Commission to develop well-informed, research-based, data-driven regulatory solutions that are well-tailored and fit-for-purpose. Thoughtful, effective regulation ensures that our markets are resilient even during periods of significant or persistent challenges.
    It has been a privilege to serve alongside my fellow Commissioners and to have had the opportunity to work with the exceptional and indefatigable staff at the Commission. The Commission staff works tirelessly to support the Commission in tackling complex and consequential issues through careful and thoughtful deliberative processes. I am confident that the Commission will continue to do important work protecting investors and customers, combatting fraud and market manipulation, and ensuring market integrity and stability.
    A Survey of Service
    Serving in leadership at the Commission, I have enjoyed driving intellectual and policy developments on several critical issues facing our markets. I led the Commission by advancing proposed and final rules that enhance risk management for derivatives clearing organizations (DCOs), cyber-resilience, and effective recovery, resilience, and wind-down regulations.
    I have strongly advocated for careful reflection regarding the integration of artificial intelligence (AI) in financial markets and advocated for a number of policies and strategies to enhance the Commission’s ability to better understand industry integration of AI, including information gathering; the creation of an inter-agency task force encouraging domestic and international harmonization and collaboration on guidance or policies addressing the adoption of AI; the creation of a CFTC AI Fraud and Market Manipulation Task Force; and efforts to ensure sufficient human capital and financial resources to enable the Commission staff to keep pace with rapidly-evolving AI technologies.
    In the wake of a crypto-crisis in the fall of 2022, I delivered a keynote address at the inaugural Digital Assets @Duke conference, where I called for the Commission to organize roundtables and convene discussions to better understand the type of regulatory interventions that may lead to effective supervision of rapidly developing and evolving decentralized finance markets.[3] I encouraged the Commission to begin a multi-stakeholder dialogue on digital asset markets that would help to prepare the Commission staff to create regulation to carry out a Congressional mandate and, at the same time, offer educational workshops on foundational issues such as corporate governance, resolution planning, and customer protection features of CFTC regulation.[4] These regulatory pillars are hardwired in our supervision and should be part of the regulatory architecture for any novel assets or markets that come under Commission supervision. Same risks, same rules. Moreover, these governance and operational guardrails have historically served to ensure that firms are able to withstand anticipated shocks (for example, by promoting enterprise risk management) and that markets remain resilient—even in times of significant distress. 
    I am proud to have served as Sponsor of the Market Risk Advisory Committee (MRAC). I am grateful for the hard work of Alicia Crighton (Chair of the MRAC), the members of the MRAC, and the members of the MRAC Subcommittees—the Market Structure, Central Counterparty Risk & Governance, Interest Rate Benchmark Reform, Climate-Related Market Risk, and Future of Finance Subcommittees.
    As Sponsor of the MRAC, I led the Commission in taking on, in real-time, emerging cyber defense and cyber resilience concerns. In March of 2023, the MRAC hosted a first-of-its-kind hearing to examine cyber threats and potential solutions in derivatives markets. Over the last three years, the MRAC has submitted three sets of recommendations and a cutting-edge report to the Commission. The recommendations and report address system safeguards, critical third-party service providers and cyber resilience for institutions at the center of our market infrastructure; the efficacy of recovery, resilience, and wind-down policies for intermediaries in our markets; risk management related to the cash-futures basis trade; and a report on the state of the futures commission merchant market.
    The central tenants of the Commodity Exchange Act inform the CFTC’s mandate—to prevent fraud and market manipulation, protect investors and customers, and ensure the stability and integrity of our markets. In order to deter escalating or future misconduct, I have strongly supported efforts to ensure that the Commission upholds this mandate, enhances customer protection, and holds bad actors accountable.
    Artificial Intelligence in Financial Markets 
    While derivatives transactions in financial markets date back to ancient Greece, none of the Greek philosophers who lived two thousand years ago had the ability to generate a philosophical tome or literary masterpiece by simply typing a few questions into ChatGPT.[5]  Simply stated, today’s financial markets are evolving at an unprecedented and accelerated pace. I arrived at the Commission deeply committed to advancing the Commission’s understanding of AI and AI use cases relevant to our markets. During my tenure at the Commission, I partnered with leadership across the industry, government regulators, public interest advocates, academics, and Commission staff to initiate a dialogue on the increasing adoption of AI by our market participants as well as the incorporation of AI in regulatory oversight and supervision.
    Information-Gathering
    In January 2024, I rolled up my sleeves during a winter storm and worked in collaboration with talented CFTC senior staff to develop the Commission’s first request for comment on AI in CFTC-regulated markets.[6] Later in the year, I represented the Commission in the development of the U.S. Department of the Treasury’s request for information on AI.[7] I also represented the Commission by serving in an association of federal regulators across government agencies engaged in understanding the implications of integrating AI in government supervision and regulation.
    In June of 2023, I joined a group of market regulators reflecting on the integration of AI in supervisory technology (SupTech) at the International Organization of Securities Commissions’ (IOSCO) Annual Meeting in Bangkok, Thailand. Days after IOSCO’s Annual Meeting in June 2023, I launched an annual international roundtable to explore AI and other novel technologies and the impact of these technologies on market structures with the former U.S. Ambassador to Spain and Andorra, Julissa Reynoso Pantaleón.[8] I have served as a keynote speaker at dozens of industry and trade association conferences as well as academic institutions including Yale, Stanford, Duke, New York University, the University of Pennsylvania, Georgetown, the University of Chicago, and Cornell Law Schools, as well as Rice University’s Baker Institute, among other institutions where I have been fortunate to engage in thoughtful conversations with leading experts representing diverse viewpoints.
    My engagement with market participants, U.S. market and prudential regulators, and global market regulators around the world has left me with the impression that we are still in a learning phase and are continuing to develop more precise understandings of the power, potential, and limits of developed and developing applications of AI, including generative and agentic AI.    I have, however, advocated for a few accessible policy initiatives that the Commission should begin to take steps to introduce.
    An Inter-Agency Task Force – Collaboration and Coordination
    Over the last three years, I have advocated for AI policy priorities that must be at the center of the CFTC and other regulators’ policy agenda.[9] I have called for coordination among regulators to ensure that regulators are informed and have the depth of expertise to respond effectively to emerging technologies. I have asked the Commission and other financial market regulators to create an Inter-Agency AI Task Force to establish a pathway for open dialogue through deep dive, public and closed-door roundtables among the Commission, market participants, other market and prudential regulators, and public interest advocates.[10] Shortly after the announcement of my proposal, the Commission named its first Chief AI Officer.
    CFTC AI Fraud and Market Manipulation Task Force
    Our markets are faced with increasingly sophisticated forms of AI driven fraud. Evidence suggests that hackers are repurposing AI-based tools previously used in cyber defense tactics to identify weaknesses in networks and cybersecurity applications. These weaknesses open back doors for cyber-attacks. Generative AI may enable sophisticated actors to execute more convincing phishing campaigns. Deep fakes and similar campaigns may be more difficult to detect, especially for less sophisticated consumers and retail participants.
    I have encouraged the Commission to create an internal AI task force within the Division of Enforcement and introduce heightened civil monetary penalties in instances where bad actors use AI to engage in fraud or market manipulation. In conversations with regulators in jurisdictions around the world, I have advocated for regulators to better understand AI as a SupTech resource that may enhance our ability to more precisely target AI fueled cyber and fraud attacks that threaten to upend the integrity and stability of domestic and global financial markets causing severe market disruption.
    Human Capital and Financial Resources
    The CFTC continues to punch above its weight. The agency, however, must have both financial and human resources to keep pace as industry participants integrate increasingly complex iterations of AI. As our markets become more complex and reflect the incorporation of and reliance on novel technologies, the Commission must have the resources to effectively supervise more sophisticated markets. I believe that the Commission would benefit from increased resources dedicated to enabling several of the Divisions within the Commission to prepare for and meet the challenges of regulating innovative trading, clearing, and settlement technologies.[11]
    The Market Risk Advisory Committee
    In my role as Sponsor of the MRAC, I have convened stakeholders with diverse perspectives to address critical, complex issues facing our markets. Under my leadership and working in collaboration with industry executives representing exchanges, clearinghouses, futures commission merchants, as well as public interest advocates, academics, and many others, the MRAC examined many of the most pressing risks across our financial markets, including systemic issues that could threaten the stability of derivatives markets.
    During my time as Sponsor, the MRAC has focused on increasing concerns presented by cyber threats; the significance of critical third-party service providers such as cloud-based service providers; the introduction of artificial intelligence in market infrastructure and commercial and retail transactions; and novel and nascent issues that arise with the introduction of decentralized financial products such as digital assets or cryptocurrency and other emerging markets.
    In March of 2023, the MRAC hosted a first-of-its-kind post-mortem on the implications for markets following the cyberattack on back-office service provider ION. The hearing included presentations by Matthew Cronin of the White House’s Office of the National Cyber Director; Tom Sexton, President and Chief Executive Officer of the National Futures Association; Walt Lukken, President and Chief Executive Officer of the Futures Industry Association; Julie Holzrichter of CME Group; Amanda Olear, Former Director of the Market Participants Division of the CFTC; Greg Ruppert, Executive Vice President of FINRA; Ashwini Panse of Intercontinental Exchange; Suyash Paliwal, Former Director of the CFTC Office of International Affairs (OIA); and Senior Special Counsel Kirsten Robbins of the CFTC OIA, among others.[12]
    At the MRAC’s most recent meeting, the Committee voted to submit recommendations on many issues—a report and recommendation on the need to evaluate our regulations governing critical third party service providers (particularly in areas marked by concentration risks due to a limited number of competitive service providers); cyber resilience for derivatives clearing organizations; and best practices for managing market, liquidity, counterparty credit, and other risks related to the cash futures basis trade.[13] In addition to these significant contributions, the MRAC advanced important recovery and resolution proposals and published a cutting-edge report on concentration risk engendered by a decline in the market for futures commission merchant services over the last two decades.[14]
    The MRAC’s work on each of these critical questions will help the Commission to address emerging issues and enhance the Commission’s ability to promote the stability and integrity of derivatives markets.
    The Importance of Public Service
    I began my legal career as a law clerk for the Honorable Judge Joseph A. Greenaway Jr. I am thankful that the Judge was willing to take a chance on me; the Judge hired me as a second-year law student to serve as his law clerk upon my graduation from law school. Having spent the better part of his career as a federal prosecutor and later a federal judge, Judge Greenaway taught me to value public service and the importance of building relationships in the communities in which we serve. 
    I am grateful that I have had the opportunity to serve the CFTC community. Every well-developed proposed or final rule review, open or closed meeting briefing and engagement, advisory committee meeting agenda, and policy initiative advanced by my office benefited tremendously from the tireless work and commitment of my current and former staff. I would like to extend my sincere thanks to everyone who served my office in any counsel, policy advisor or law student intern role. I am also grateful to the incomparable executive assistants who supported the administrative functions of the office.
    About Commissioner Johnson
    Immediately prior to joining the Commission, Commissioner Johnson served as a tenured professor with an endowed professorship (Asa Griggs Candler Professor of Law) and Associate Dean for Faculty Research at Emory University School of Law. Commissioner Johnson also held a named professorship and served as Associate Dean for Faculty Research at Tulane University School of Law. Prior to law teaching, Commissioner Johnson served as a lawyer in private practice at Simpson Thacher & Bartlett LLC’s New York and London offices supporting the mergers and acquisitions, private credit and public and private capital markets practices. Upon leaving private practice, Commissioner Johnson joined J.P. Morgan Chase as Vice President and Assistant General Counsel in the Treasury Services Division supporting private funds. Before attending law school, Commissioner Johnson served as an analyst at Goldman Sachs in the Asset Management Division.
    Commissioner Johnson is the co-author of two forthcoming books—The Cambridge University Press Handbook on Artificial Intelligence & The Law and Artificial Intelligence & The Law: Cases and Materials.  Her recent work examines the implications of emerging innovative technologies including distributed digital ledger technologies that enable the creation of digital assets or cryptocurrency as well as networked, centralized and decentralized transaction-enabling infrastructure. Her early scholarship focuses on financial market disruptions that may create systemic risk concerns, with particular emphasis on the origination of derivatives and other complex financial products as well as secondary market trading, clearing, and settlement. She has testified before Congress on the benefits and risks of integrating emerging technologies such as blockchain or distributed digital ledger technologies and AI in financial markets.[15]

    [3] Keynote Address of Commissioner Kristin Johnson at Digital Assets @ Duke Conference, Duke’s Pratt School of Engineering and Duke Financial Economics Center, Mitigating Crypto-Crises: Applying Lessons Learned in Governance, Risk Management, and Compliance (January 26, 2023), https://www.cftc.gov/PressRoom/SpeechesTestimony/opajohnson2.

    [4] See Kristin N. Johnson, Commissioner, CFTC, Federal Reserve of Chicago Financial Markets Group Fall Conference, Investing in Investor Protection (Nov. 16, 2022), available on file with the Federal Reserve Bank of Chicago; see also Nahiomy Alvarez, Nomaan Chandiwalla, Alessandro Cocco, 2022 Financial Markets Group Fall Conference–Recap, https://www.chicagofed.org/publications/blogs/ chicago-fed-insights/2023/2022-fmg-fall-conference-recap (Feb. 6, 2023).

    [5] Kristin N. Johnson, Regulating Cryptocurrency Secondary Market Trading Platforms, 1/8/2020 U. Chi. L. Rev. Online 1 (2020).

    [7] See U.S. Department of the Treasury, Artificial Intelligence in Financial Services (Dec. 2024), https://home.treasury.gov/system/files/136/Artificial-Intelligence-in-Financial-Services.pdf (Treasury December Report).

    [15] In April of 2021, Commissioner Johnson testified before the United States House of Representatives Subcommittee on Consumer Protection and Financial Institutions. In July of 2019, she testified before the House Financial Services Committee Artificial Intelligence Task Force on the implications of integrating artificial intelligence in financial technology (fintech) platforms. 

    MIL OSI USA News

  • MIL-OSI USA: Peters Unveils New Investigative Report Finding Fired Inspectors General Identified More Savings than DOGE

    US Senate News:

    Source: United States Senator for Michigan Gary Peters
    WASHINGTON, D.C. —U.S. Senator Gary Peters (D-MI), Ranking Member of the Senate Homeland Security and Governmental Affairs Committee, released a report detailing the Trump Administration’s unprecedented attacks on Inspectors General – the independent watchdogs tasked with rooting out waste, fraud, and abuse in federal agencies. Peters’ report finds that the 19 Inspectors General (IGs) President Trump fired earlier this year identified billions of dollars more in potential savings to taxpayers than the Department of Government Efficiency (DOGE) created by the Trump Administration and Elon Musk with the supposed goal of identifying wasteful spending. 
    “This report underscores the value of professional, independent and nonpartisan Inspectors General and the work they do to effectively identify waste, fraud and abuse of taxpayer dollars,” said Senator Peters. “If the Trump Administration were serious about eliminating waste, it would rely on the proven track record of independent Inspectors General. Instead, President Trump’s decision to fire them will not only undermine efforts to reduce waste – it sends a message of intimidation to anyone who wants to hold this Administration accountable.”
    READ THE FULL REPORT: “Undermining the Watchdogs: The 19 Independent Inspectors General Fired by President Trump Uncovered Billions in Fraud, Waste, and Abuse”
    Inspectors General play a critical role in ensuring transparency and accountability in government operations. The report documents how, in his first week in office, President Trump fired 18 Inspectors General across major federal agencies, including the Departments of Defense, State, Commerce, and Veterans Affairs. The Administration later removed the USAID Inspector General, an act widely seen as retaliatory for conducting oversight of the Administration’s actions to shutter the agency. These terminations violated the Inspector General Act, which requires the President to provide Congress with a 30-day notice and a detailed justification before dismissing an IG.
    The report finds that the fired IGs had a collective monetary impact of over $50 billion in fiscal year 2024 alone through investigations and audits, uncovering significant fraud and abuse. To date, the Offices of Inspectors General (OIGs) have pinpointed $175 billion in potential savings that could be achieved if federal agencies implement all of their outstanding recommendations.
    These watchdogs have also conducted criminal investigations that resulted in financial recoveries, including a Department of Energy OIG probe that halted an illegal semiconductor export scheme, which led to the cancellation of $100 million in grants. Similarly, an investigation by the Department of Defense OIG uncovered fraudulent financial practices targeting Gold Star families, leading to a 12-year prison sentence and a $1.4 million penalty. 
    The impact of the Administration’s actions has been deeply felt across federal oversight agencies, as staffing cuts further compromise their ability to conduct audits, evaluations, and investigations. Interviews with affected IG offices revealed serious concerns about the erosion of independence and morale within these agencies.

    MIL OSI USA News

  • MIL-OSI: ESET takes part in global operation to disrupt Lumma Stealer, one of the most prevalent infostealers

    Source: GlobeNewswire (MIL-OSI)

    • ESET took part in a globally coordinated operation to disrupt Lumma Stealer.
    • The operation, led by Microsoft, targeted Lumma Stealer infrastructure, including all known C&C servers from the past year, making the botnet, in large part, inoperative.
    • Lumma Stealer has been one of the most prevalent infostealers over the past two years.
    • ESET provided both technical analysis and statistical information, and extracted essential data from tens of thousands of samples, as Lumma Stealer developers had been actively developing and maintaining the malware.

    PRAGUE and BRATISLAVA, Slovakia, May 21, 2025 (GLOBE NEWSWIRE) — ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a global disruption operation against Lumma Stealer, an infamous Malware-as-a-Service infostealer. The operation targeted Lumma Stealer infrastructure, specifically all known C&C servers of the past year, making the botnet, in large part, inoperative.

    “ESET automated systems processed tens of thousands of Lumma Stealer samples, dissecting them to extract key elements, such as C&C servers and affiliate identifiers. This allowed us to continuously monitor Lumma Stealer’s activity, cluster affiliates, keep track of development updates, and more,” says ESET researcher Jakub Tomanek, who monitors and investigates Lumma Stealer. “Infostealer malware families, like Lumma Stealer, are typically just a foreshadowing of future, much more devastating attacks. Harvested credentials are a valued commodity in the cybercrime underworld, sold by initial access brokers to various other cybercriminals, including ransomware affiliates,” adds Tomanek. Lumma Stealer has been one of the most prevalent infostealers over the past two years, leaving no part of the world untouched.

    Lumma Stealer developers had been actively developing and maintaining the malware. ESET has regularly spotted code updates ranging from minor bugfixes to complete replacement of string encryption and updates to the network protocol. The operators of the botnet also actively maintained the shared network infrastructure. Between 17 June 2024 and 1 May 2025, ESET observed a total of 3,353 unique C&C domains, with an approximate average of 74 new domains emerging each week, including occasional updates to Telegram-based dead drop resolvers. This ongoing evolution underscores the significant threat posed by Lumma Stealer and highlights the importance of the disruption efforts.

    Lumma Stealer adopts the concept of malware as a service, where affiliates pay a monthly fee based on their tier to receive the latest malware builds and the network infrastructure necessary for data exfiltration. The tiered subscription model features price ranges from $250 to $1000 per month, each with increasingly sophisticated features. The operators of Lumma Stealer have also created a Telegram marketplace for affiliates, with a rating system to sell stolen data without intermediaries. Common distribution methods include phishing, cracked software, and other malware downloaders. Lumma Stealer employs a few, but effective, anti-emulation techniques that make analysis as complicated as possible. These techniques are designed to evade detection and hinder the efforts of security analysts.

    Microsoft’s Digital Crimes Unit has facilitated the takedown, suspension, seizure, and blocking of the malicious domains that formed the backbone of Lumma Stealer’s infrastructure via a court order granted by the United States District Court of the Northern District of Georgia. In coordination, the U.S. Department of Justice simultaneously also seized the Lumma Stealer control panel, targeting the Lumma Stealer marketplace – and in turn the purchasers of Lumma Stealer malware. This was coordinated with Europol’s European Cybercrime Center (EC3) as well as Japan’s Cybercrime Control Center (JC3), which facilitated the suspension of locally based Lumma Stealer infrastructure.

    “This global disruption operation was made possible by our long-term tracking of Lumma Stealer. The disruption operation led by Microsoft aimed to seize all known Lumma Stealer C&C domains, making the exfiltration infrastructure of Lumma Stealer non-functional. However, ESET will continue to track other infostealers while closely monitoring for Lumma Stealer activity following this disruption operation,” concludes Tomanek.

    For an overview of the Lumma Stealer ecosystem and both a technical analysis and look at the evolution of Lumma Stealer’s key static and dynamic properties critical to the disruption effort, check out the latest ESET Research blogpost, “ESET takes part in global operation to disrupt Lumma Stealer” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), Bluesky, and Mastodon for the latest news from ESET Research.

    Lumma Stealer detection rate based on ESET telemetry (data since July 2024)

    About ESET
    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown — securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts, and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/3e248b2b-dcbf-42cb-93ac-a4b4668bbc31

    The MIL Network

  • MIL-OSI: Best Betting Apps in Texas – BetWhale Picked As the Top TX Sportsbook Mobile App

    Source: GlobeNewswire (MIL-OSI)

    New York City, May 21, 2025 (GLOBE NEWSWIRE) —

    In Texas, sports aren’t just entertainment—they’re a way of life. Texans wear their team loyalties like badges of honor, proudly supporting everything from Friday night high school football under stadium lights to major league events packed with screaming fans. 

    JOIN THE BEST BETTING APP IN TEXAS: BETWHALE

    Although Texas has historically maintained strict regulations on gambling, passionate sports fans have turned to online betting apps to add even more excitement to the games they love. Betting apps in Texas have opened a thrilling new dimension for sports enthusiasts eager to test their predictions and expertise while potentially earning some extra cash.

    What Makes BetWhale the Best Betting App in Texas

    When evaluating betting apps in Texas, BetWhale clearly stands out. Several features contribute to its unmatched popularity among Texans:

    Generous Bonuses

    BetWhale offers a highly competitive welcome bonus, rewarding new users with a 125% bonus up to $1,250 on their first deposit. Regular promotions and loyalty programs further enhance the user experience, providing consistent value to bettors.

    Comprehensive Sports Coverage

    The app provides extensive coverage of major sports such as NFL, NBA, MLB, NHL, and collegiate sports. Additionally, BetWhale includes niche markets like MMA, esports, international soccer leagues, and even entertainment and political betting, catering to a diverse betting audience.

    Seamless User Experience

    BetWhale’s intuitive platform ensures easy navigation across all devices. Quick-loading pages, clearly displayed odds, and streamlined bet placements create a hassle-free experience for both new and experienced bettors.

    Live Betting and Streaming

    One of BetWhale’s standout features is its live betting platform. Real-time odds adjustments, comprehensive live betting markets, and streaming of selected sports events significantly heighten the excitement and engagement of betting in real-time.

    Security and Reliability

    The app employs advanced encryption technology and secure payment gateways, ensuring user data and transactions are safe. Quick, reliable transactions paired with responsive customer support further solidify its appeal.

    TAKE THE 125% BONUS AT BETWHALE

    Why Texans Love to Bet on Sports

    Texans don’t just casually follow sports; they live and breathe them. Their deep cultural and community ties to teams—from high school through professional leagues—make sports betting a natural extension of their sports fandom. Betting apps in Texas capitalize on this passion by offering a wide variety of betting options tailored to local interests, ensuring Texans can engage fully with the excitement of each sporting event.

    This passion translates into significant betting engagement throughout the year, peaking around major events, championships, and rivalry games. The sheer variety of sports and teams ensures that there is always action available on Texas betting apps, providing continuous excitement and opportunities to win.

    How to Join Texas Betting Apps

    Joining betting apps in Texas, such as BetWhale, is simple and hassle-free. Here’s a step-by-step guide to ensure a smooth registration and betting process:

    1. Choose a Reputable Betting App

    Your first step should always involve selecting a secure and trusted betting app that accepts Texas residents. BetWhale is highly recommended due to its robust security, diverse betting markets, user-friendly interface, and reliable customer service.

    2. Complete the Registration Form

    Once you’ve chosen the right app, click the “Join” or “Register” button prominently featured on the homepage. A registration form will appear, requiring you to fill in essential personal details accurately. It’s essential to double-check your information for accuracy to avoid potential verification issues later.

    3. Account Verification Process

    After registering your account, betting apps like BetWhale will require verification to ensure compliance with regulatory standards and to protect your account from unauthorized access. 

    Typically, this involves providing a clear image or scan of your government-issued ID, such as a driver’s license, passport, or state ID and supplying a recent utility bill, bank statement, or official document showing your current residential address clearly and accurately.

    4. Deposit Funds into Your Betting Account

    Once your account is verified, the next step is depositing funds to place bets. Betting apps in Texas, including BetWhale, typically offer various convenient and secure payment methods such as credit/debit cards, e-wallets, and prepaid cards. 

    Select your preferred payment method, enter the amount you wish to deposit, and follow the instructions provided. Deposits are usually processed instantly, allowing you to start betting immediately.

    5. Placing Bets on Your Favorite Sports

    With funds securely in your account, you’re now ready to start placing bets. Navigate through the intuitive user interface provided by BetWhale or your chosen app to explore various sports and markets available.

    Most Popular Sports Texans Bet On

    Texans have a deeply ingrained passion for sports, and this passion translates directly into enthusiastic betting activity. Betting apps in Texas see robust action, especially around sports that resonate deeply with local pride. Here’s an expanded breakdown of the most popular sports Texans love betting on:

    Football: King of Texas Sports

    In Texas, football isn’t just a sport—it’s a cultural phenomenon. Whether it’s the thrilling atmosphere of Friday Night Lights at local high school stadiums or the grandeur of Sunday afternoons with NFL action, Texans are deeply invested in football. The betting activity surrounding football peaks dramatically during the season.

    NFL Football

    Dallas Cowboys: Known affectionately as “America’s Team,” the Cowboys boast one of the largest fanbases in the United States. Texans bet extensively on Cowboys games, especially rivalry matchups against NFC East opponents such as the Philadelphia Eagles, New York Giants, and Washington Commanders.

    Houston Texans: Despite their comparatively younger history, the Texans have quickly developed a dedicated following, with bettors consistently wagering on their games, particularly intra-division clashes in the AFC South against rivals like the Indianapolis Colts and Tennessee Titans.

    College Football

    Texas Longhorns (University of Texas at Austin): With an iconic burnt orange and white color scheme and the famous “Hook ’em Horns” chant, the Longhorns command statewide loyalty. High-profile games against rivals such as Oklahoma in the Red River Showdown or matchups against Texas Tech and Baylor see intense betting activity.

    Texas A&M Aggies: Aggie pride runs deep in College Station. Betting on Aggies games, especially against SEC powerhouses like Alabama and LSU, captures significant attention throughout the season.

    Football consistently remains the top choice among betting apps in Texas, with considerable excitement and betting volume accompanying major events such as the NFL playoffs, College Football Playoff, and bowl games.

    Basketball: Texas’ Second Love

    Basketball, both professional and collegiate, also attracts extensive betting attention across Texas. Enthusiasm peaks during playoff seasons and March Madness, drawing large numbers of sports bettors to the apps.

    NBA Basketball

    Houston Rockets: With a history of championship success in the ’90s, Rockets games remain popular betting events, especially during playoff contention years.

    Dallas Mavericks: Led historically by stars such as Dirk Nowitzki and now Luka Dončić, the Mavericks have a robust following that fuels betting activity throughout the season, spiking significantly during playoff runs.

    San Antonio Spurs: Known for their consistent excellence and championship pedigree under legendary coach Gregg Popovich, the Spurs have maintained a loyal betting fanbase that actively engages during critical playoff matchups.

    College Basketball

    Texans don’t limit their basketball enthusiasm to the professional ranks. March Madness, the NCAA basketball tournament, sees heightened interest, especially when local teams participate:

    Baylor Bears: Recent successes, including their 2021 national championship win, have elevated Baylor’s profile and significantly increased betting engagement during tournament seasons.

    Texas Tech Red Raiders: A recent powerhouse in college basketball, their strong showings in tournaments have translated directly into heightened betting interest across Texas betting apps.

    Baseball: Texas’ Summer Tradition

    Baseball remains a cherished tradition throughout Texas, particularly during the warm months, and Texans enthusiastically wager on their beloved MLB teams.

    Houston Astros: The Astros’ recent World Series victories and consistent playoff appearances have propelled them into a national spotlight. Their postseason games, especially matchups against rivals such as the New York Yankees, consistently draw high betting volumes.

    Texas Rangers: Playing out of Arlington, the Rangers maintain a passionate fan base. During strong competitive seasons or playoffs, Rangers games generate considerable betting interest statewide.

    Major League Baseball betting peaks dramatically in Texas during postseason play, as the excitement surrounding the playoffs and World Series leads to increased betting activity.

    Factors to Consider When Choosing Texas Betting Apps

    Selecting the right betting app in Texas involves more than just picking the first platform that appears attractive. It’s essential to examine specific aspects that can significantly impact your betting experience. Here’s a detailed exploration of key factors you should consider:

    Licensing and Security

    The cornerstone of a reliable betting app is its adherence to strict licensing and robust security protocols. Choosing a betting app that operates under credible licensing authorities ensures you’re dealing with a trustworthy provider that complies with international gambling standards.

    Betting Markets and Odds

    Another critical factor when choosing betting apps in Texas is the breadth and depth of available betting markets, along with the competitiveness of odds provided.

    Ideal apps provide comprehensive coverage across a wide variety of sports including major leagues (NFL, NBA, MLB), collegiate sports, international soccer, horse racing, and niche markets like esports and MMA. Extensive market coverage allows you to explore different betting opportunities and diversify your wagering.

    Betting odds directly impact your potential winnings. Choosing apps that consistently offer attractive, competitive odds can significantly increase your potential returns. It’s beneficial to compare odds across various platforms to determine which app frequently provides the best value, particularly in popular markets like football or basketball.

    User-Friendly Interface

    A well-designed, user-friendly interface can markedly improve your betting experience, making it easier and more enjoyable to engage with sports betting regularly.

    Apps that feature intuitive navigation allow users to quickly locate their favorite sports, markets, and betting options without confusion. Clear, organized menus and fast-loading pages are key aspects of superior app design.

    Payment Options

    The availability and reliability of multiple payment methods significantly influence the convenience and practicality of any betting app in Texas. A good betting app should provide a wide range of secure payment methods. 

    Commonly used options include:

    • Credit/Debit Cards: Visa, MasterCard, and American Express are standard for quick and straightforward deposits.
    • E-Wallets: Payment systems like PayPal, Skrill, Neteller, and ecoPayz offer speedy, secure, and discreet transactions.
    • Prepaid Cards: Options such as Paysafecard allow deposits without the necessity of linking directly to a personal bank account or credit card.
    • Bank Transfers: Direct bank transfers offer a secure option for larger transactions, albeit with slightly longer processing times compared to other methods.

    Customer Service

    High-quality customer support can dramatically influence your betting experience, especially when resolving technical issues or answering account-related questions promptly.

    Efficient, responsive customer service is essential for addressing queries or issues swiftly. Top-tier betting apps in Texas usually offer customer support that is quick to respond, typically within minutes via live chat and within a few hours via email.

    A reputable betting app should provide multiple customer support channels, including live chat, email, phone support, and FAQ pages.

    Place Bets at the Top Texas Betting Apps

    When choosing betting apps in Texas, considering these factors in detail ensures you select a reliable, user-friendly, and enjoyable betting platform. Evaluating licensing and security, betting markets and odds, app usability, payment methods, and customer support quality will collectively guide you toward an app that enhances your sports betting experience.

    Making the right choice not only offers security and convenience but also greatly enhances the enjoyment and potential profitability of sports betting activities in Texas.

    Editorial Note

    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in any gambling activities or signing up with any online casinos mentioned. 

    Gambling Caution

    Online gambling comes with financial risks and may lead to addictive behavior or monetary loss. We urge all readers to gamble responsibly. If you or someone you know is struggling with gambling, professional help is available. The National Council on Problem Gambling (NCPG) can be contacted at 1-800-522-4700 or visited online at www.ncpgambling.org.

    21+ only. It is up to each individual to verify whether online gambling is permitted under their local, state, or federal laws. Neither the publisher, the authors, nor any syndication partners condone or support unlawful gambling. Participation in online gambling is done at the reader’s own discretion and risk.

    Affiliate Transparency

    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer

    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it is meant for informational purposes only. These entities are not responsible for the legality, accuracy, or interpretation of the material.

    BetWhale
    https://betwhale.ag
    support@betwhale.ag
    1150 Gemini St, Houston, TX 77058

    Attachment

    The MIL Network

  • MIL-OSI Banking: The autonomous enterprise: How generative AI is reshaping business applications

    Source: Microsoft

    Headline: The autonomous enterprise: How generative AI is reshaping business applications

    Today at Microsoft Build 2025, we’re excited to announce the new Model Context Protocol (MCP) servers for Microsoft Dynamics 365 ERP and CRM business applications. These MCP servers will help remove the tedious work of connecting systems together to build agents and accelerate the ability for our customers and partners to build AI-powered agents to drive business processes quicker, accelerating their journey to the Frontier Firm in the era of the autonomous enterprise.

    Build AI agents to drive business processes with Model Context Protocol servers

    To provide some context, generative AI is fundamentally reshaping the way organizations work, introducing a new way of interacting with technology—using natural language to simplify and accelerate tasks. This innovation is driving unprecedented productivity gains, streamlining complex processes that once required manual effort and specialized tools. As this technology matures, we’re entering the next phase: the autonomous enterprise, where organizations and people use technology, particularly AI and automation, to operate and adapt in an age of rapid transformation and innovation. Where there once was “an app for that,” there will now be “an agent for that”.

    This transformation isn’t just about automation—it’s about people. By putting intelligent agents in the hands of every employee, organizations are empowering individuals to focus on higher-value work, make decisions faster, and drive innovation. Sales teams can deepen customer relationships without being bogged down by administrative tasks. Finance professionals can move from manual reconciliation to strategic forecasting. Marketers can go from idea to execution, and product managers can orchestrate complex workflows with clarity and speed.

    The autonomous enterprise is the future of business. Business applications will work with agents built by Microsoft and our partners. In this new era, organizations aren’t just streamlining operations, they’re amplifying human potential and accelerating their journey to the autonomous enterprise.

    This is why we’re so excited about the Dynamics 365 ERP and CRM MCP servers. These servers help eliminate data and application silos, allowing agents to work seamlessly across processes and help enable new autonomous scenarios for improved business functionality and productivity.

    Dynamics 365: Agent-ready business applications

    Agentic AI is an AI system that can take actions generated by the system, with very limited or even no direct human intervention. Autonomous actions built into agents operating across various business processes, industries, and segments, can make businesses more efficient and responsive. Designed not just to support tasks, but to operate autonomously, AI agents can intelligently orchestrate workflows and make context-aware selections. But how do you create a context-aware agent when data, information, and processes are ever-changing?

    MCP standardizes how applications provide context to language models, helping enable seamless integration with different data sources and tools. This open standard connects AI assistants and agents to various systems where data resides, such as content repositories, business tools, and development environments. An MCP-compliant agent uses rich contextual information to act efficiently, unlike a non-MCP-compliant agent, which lacks necessary context.

    Using the MCP server, makers can easily connect agents to existing knowledge sources and APIs, helping enable them to interface directly with Dynamics 365 applications. Actions and knowledge synchronize automatically, facilitating real-time updates and the evolution of functionality. This model significantly simplifies agent development and minimizes ongoing maintenance efforts.

    Central to this innovation is Microsoft Copilot Studio, which provides a standardized protocol for agents to seamlessly interact with Dynamics 365 applications, helping to ensure consistency, reliability, and scalability. Security and governance are also prioritized from the start as Dynamics 365 MCP servers require authentication and enforce authorization. Agents that access Dynamics 365 through the MCP server must authenticate as a valid Dynamics 365 user, helping to ensure the benefits of Entra ID identity protection. This also prevents escalation of privileges, meaning the agent will only be able to perform the MCP actions that they’re authorized to do. The MCP servers are also made available to Microsoft Copilot Studio using connector infrastructure. This means they can employ enterprise security and governance controls such as data loss prevention controls and multiple authentication methods. 

    For partners and customers, MCP standardization dramatically reduces complexity, accelerates development, and increases time to value.

    MCP-compliant agentic AI

    At Microsoft, we bring a deep understanding of critical business processes for small and medium business (SMB) as well as large enterprise organizations through our market-leading Dynamics 365 ERP and CRM business solutions—combined with our industry-specific expertise delivered through our Microsoft Cloud for Industry solutions. This combination of experience and expertise uniquely positions us to deliver on the needs of customers across size, business process, industry, or region.

    Our newly introduced set of MCP servers help enable multiple scenarios across business processes. Below are a few examples of what’s possible with Dynamics 365, Microsoft Cloud for Industry, and our broad ecosystem of partners.

    Sales and service

    Custom agents and AI assistants can now be connected to Microsoft Dynamics 365 Sales, Microsoft Dynamics 365 Customer Service, and Microsoft Dynamics 365 Business Central applications through MCP servers. Agents can retrieve and update CRM data, create quotes, and complete orders. They can also get order/case summaries and email drafts. These MCP servers open endless possibilities in automating tedious jobs in sales and service functions, irrespective of company size or industry.

    For example, telesales representatives can use intelligent assistants, such as Claude, connected to Dynamics 365 MCP servers to prioritize leads, qualify them, generate quotes, and send personalized emails—without needing to switch contexts or rely on complex integrations. And when customers encounter an order issue, service representatives can resolve it quickly by using Dynamics 365 Customer Service data to retrieve/update case information and create replacement orders in real time.

    Supply chain and finance

    The AI procurement agent illustrated below efficiently validates purchase requisitions against company policies, existing inventory, and delivery records to identify a suitable supplier that meets the criteria for cost, speed, sustainability, and reliability. It further consolidates multiple items from the same supplier into one purchase order and sends it for purchase. The agent can significantly enhance efficiency in procurement processes, where timely and budget-conscious supply delivery is critical.

    Business Central

    For small and medium size businesses, for example, looking to optimize sourcing information and vendor compliance, the custom agent demonstrated here can quickly identify shipments containing materials that require compliance checks. The agent provides guidance on recycling requirements and updated sourcing standards, reads supplier contracts, and suggests next steps like confirming vendor certifications and updating shipment checklists. A solution like this could streamline the compliance process, which can help customers gain a competitive advantage.

    Partners using the Dynamics 365 MCP server

    Our partners play a crucial role in driving innovation and delivering value to customers. We’re dedicated to making Dynamics 365 MCP servers accessible, helping enable our customers and partners to develop diverse agent scenarios across industries and business processes, regardless of their business application vendor.

    With MCP server becoming the standard of the future for agents, partners can use it to more quickly and efficiently orchestrate headless business services in ERP and external systems. It turns simple intent into action, automating procurement for faster, efficient, and resilient supply chain operations. Our ecosystem of partners has started using MCP server for Dynamics 365 to create a host of industry-specific agents.

    • Avanade, an early adopter of Microsoft 365 Copilot for Sales and a leading Microsoft partner, is excited to use MCP servers for Dynamics 365 to enrich their AI-powered request for proposal (RFP) Insights agent. This agent helps sellers summarize, evaluate, and respond to RFPs using historical Dynamics 365 data, further streamlining proposal generation. While initially for internal use, Avanade is exploring deployment for clients in engineering, construction, and professional services.
    • Emission AI agent by Fellowmindwill use AI and MCP servers for Dynamics 365 to automatically classify and organize purchase transactions to prepare it for greenhouse gas (GHG) emission accounting purposes by categorizing spend-types (such as office supplies, raw materials, and travel expenses) through data extraction, classification, algorithms, taxonomy mapping, and real-time feedback and learning. The agent provides support to procurement and environmental, social, and governance (ESG) professionals, helping them streamline their processes and achieve more accurate results.
    • HSO’s PayFlow Agent improves invoice payment efficiency in accounts payable. Streamlining timely payments and reducing inquiries that require manual intervention leads to faster resolutions and enhanced supplier relationships. Using MCP server for Dynamics ERP MCP, PayFlow processes seller payment inquiries, identifies invoice statuses, matches them against buyer receipts, and retrieves tracking information to notify responsible parties to either remit payment promptly or set an expectation of when payment can be received.  
    • JourneyTeam is enriching its Strategic Account Manager agent that accesses MCP servers for Dynamics 365 to optimize lead engagement. The agent summarizes historical services and projects, compares lead summaries and interests, compiles recommendations, then, after manual reviews, will initiate next steps by utilizing MCP servers, Microsoft Azure AI Search, and Document Intelligence. 
    • MCA Connect is building a smart sourcing agent that accesses MCP servers for Dynamics 365 to automate requisition processing, supplier assignment, and workflow submission. The MCP servers give the agent access to actions like getting open requisitions, approving vendors, and assigning suppliers based on supplier performance metrics without the need to create new APIs and integrate with Dynamics 365.
    • Publicis Sapient Hummingbird is building an agent to improve lead management using MCP servers for Dynamics 365 to access data that will streamline the process of managing business-to-business leads. This agent automates lead qualification, scoring, and personalized engagement, accelerating hot leads to quotes faster and nurturing warm leads through a series of targeted emails. This innovative approach enhances efficiency, improves customer experience, and drives higher conversion rates and revenue growth.                               
    • RSM is building intelligent, secure, and context-aware agents that accelerate workflows, improve decisions, and expand capabilities by embedding them directly into real-world business processes. These agents, developed using Microsoft Copilot Studio, will access MCP servers for Dynamics 365 to support humanitarian logistics by coordinating critical supply chains, helping to ensure timely delivery of life-saving equipment, and automating procurement tasks. 
    • TTEC Digital is building a post-service upselling agent that accesses MCP servers for Dynamics 365 to prospect for warranty plans after a purchase, turning each sale into an upsell opportunity. The agent will help drive personalized sales and service conversations at scale by using the knowledge, tools, and actions from the MCP server. 

    As we look ahead, the convergence of intelligent agents, standardized platforms, and deep domain expertise will define the next frontier of business transformation. The ability to harness autonomous capabilities will define tomorrow’s market leaders. Businesses that act now will gain a decisive competitive edge and chart a course toward sustained success. The autonomous enterprise is no longer a vision of the future—it’s here, built with Microsoft and its partner ecosystem.

    Join us at Microsoft Build 2025 to explore how MCP servers are transforming Dynamics 365 and the broader Microsoft Cloud–MCP server focused sessions at Microsoft Build 2025. 

    Let’s shape what’s next, together.

    MIL OSI Global Banks

  • MIL-OSI China: Foreign, health ministers call on WHO to facilitate Taiwan’s participation

    Source: Republic of Taiwan – Ministry of Foreign Affairs

    May 16, 2025  
    No. 157  

    During a joint press conference on May 16, Minister of Foreign Affairs Lin Chia-lung and Minister of Health and Welfare Chiu Tai-yuan called on the World Health Organization (WHO) to facilitate Taiwan’s participation. They said that Taiwan would demonstrate self-confidence and work with the world while showcasing the professionalism of Taiwan’s medical diplomacy team.

     

    The 78th World Health Assembly (WHA) is set to open in Geneva on May 19. Minister Lin and Minister Chiu held a joint press conference at the Ministry of Foreign Affairs (MOFA) on the morning of May 16, at which they underscored Taiwan’s willingness to contribute to better global health. The two ministers said that the WHO should not brook political interference but rather should promptly invite Taiwan to participate as an observer in the WHA as well as WHO technical meetings and thus realize WHO’s goal of “One World for Health.” 

     

    Making a special appearance at the press conference was the Puzangalan Children’s Choir of Pingtung County, which performed “Ualjaiyui,” a traditional song of blessing of the Paiwan indigenous community. The song speaks of good fortune and of passing on traditions. Taiwan shares such sentiments for its WHA Action Team headed to Geneva as well as to the world at large. Minister Lin pointed out that the choir would also be traveling to Geneva to show that Taiwan was not just a land of technology but also home to cultural soft power. 

     

    Minister Lin shared that this year’s WHA slogan is “One World for Health” and that the government was calling on WHO to “Chip in with Taiwan” so that no nation or people would be left behind, allowing Taiwan to work with other nations toward a healthier world. Adding that health and disease knew no borders, he said that in addressing COVID-19 Taiwan showed great resilience and was able to assist other nations. Excluding Taiwan from the WHA and WHO therefore represented a loss for the international community.

     

    Minister Lin further commented that Taiwan’s national health insurance program has enrolled 99 percent of residents and that no matter where people lived, they had access to Taiwan’s quality medical services and social security net, an accomplishment praised worldwide. Acknowledging WHO’s Global Action Plan for Health of Indigenous Peoples, the minister said that Taiwan was ready to share its experience providing quality medical care to indigenous people. 

     

    In the AI era, Minister Lin stated, utilizing digital technology could improve access to medical care. Reflecting this, MOFA would for the first time hold a forum on smart medicine in Geneva, at which both Acer Medical and Quanta Computer would share their experience in order to promote a Taiwan model of smart medicine. Taiwan, he said, would continue to show how it could help and underscore its role as a global leader in semiconductors and related technology. 

     

    Minister Lin said that to realize President Lai Ching-te’s vision of a healthy Taiwan, MOFA had implemented the Diplomatic Allies Prosperity Project and eight flagship projects, which included the smart medicine and healthcare industries. He said thats MOFA had worked with the Ministry of Health and Welfare (MOHW) to establish a Taiwan medical diplomacy team as well as a medical consultation team that included professionals from medical firms and organizations. Through the “One Country, One Center” project, medical cooperation would be strengthened with New Southbound Policy partner countries. Such efforts would also bring Taiwan’s healthcare industry—comprising its biotech, pharmaceutical, and information technology sectors—to the world. 

     

    Minister Lin thanked the nation’s diplomatic allies for making proposals in favor of Taiwan’s participation, as well as like-minded countries for taking such concrete steps as sending letters and conducting joint demarches in support of Taiwan. Such actions underscored the strength of international support for Taiwan. However, China’s distortion of UN General Assembly Resolution 2758 and its pressure on the WHO Secretariat meant that Taiwan had yet to be invited to attend the WHA.

     

    Minister Lin stressed that Taiwan had established a government firmly rooted in popular support by conducting many democratic elections. As such, only the popularly elected government of Taiwan could represent the people of Taiwan at the United Nations, WHO, and other multilateral organizations. Many nations’ executive and legislative branches had publicly stated that UNGA Resolution 2758 did not preclude Taiwan’s participation in international organizations such as WHO. He then expressed hope that more nations would work together in support of Taiwan’s participation in WHO and oppose China’s international efforts at lawfare and cognitive warfare. 

     

    In addition, Minister Lin said that this year’s WHA slogan was “One World for Health” and that a Pandemic Agreement would be signed during the meeting. Taiwan had, he said, already shown the humanitarian spirit of “Taiwan can help” during COVID-19 and proved itself a valuable resource to WHO. However, Taiwan’s absence left a gap in the global public health and disease prevention network, said Minister Lin, who called on the WHO Secretariat to not brook political interference, to maintain professionalism and neutrality, and to facilitate Taiwan’s membership in the global public health and disease prevention network so as to create greater welfare for the world.

     

    In closing, Minister Lin said that Taiwan’s WHA Action Team would conduct publicity efforts in Geneva starting from May 16 and that MOFA and the MOHW would work together with self-confidence and engage the world. Moreover, the ministries would be proactive in making Taiwan’s voice heard and ensure that Taiwan responded to “One World for Health” and appealed to others to “Chip in with Taiwan” by making greater contributions to global public health. (E)

    MIL OSI China News

  • MIL-OSI United Kingdom: UK-East Africa trade forum to kickstart investment

    Source: United Kingdom – Executive Government & Departments

    World news story

    UK-East Africa trade forum to kickstart investment

    UK hosts first-ever forum dedicated to trade and investment with East Africa, including announcements on cross-border trade and electric motorbikes.

    The UK has announced two investments in East Africa to de-risk cross-border trade for buyers and sellers, as well as to provide more electric bikes and charging infrastructure in Kenya. 

    The announcements were made at the first-ever East Africa Trade and Investment Forum (EATIF). The forum has brought together businesses and governments from Kenya, Uganda and Tanzania to engage directly with British businesses, and agree future investments. The forum takes place on 21 to 22 May 2025. It has been organised by DMA Invest and the East Africa Association, in partnership with the UK Government. 

    British International Investment (BII) and Standard Chartered Bank will support trade finance in Kenya and Tanzania with a USD $100 million facility to de-risk cross-border and local trade. This will make finance more accessible for businesses as well as increase the availability of vital goods and services. Investment qualifies for the ‘2X Challenge’ which advances gender equality and women’s economic empowerment in developing countries. The facility will support female-led businesses, as well as employment and leadership opportunities for women, and is expected to finance over USD $450 million in trade volumes over its lifetime. 

    In addition, BII will make a USD $5 million investment in electric motorbike infrastructure in Kenya. The investment will support ARC Ride’s initial rollout of 5,000 electric motorbikes and upgrade battery swapping infrastructure which will increase adoption. This will directly result in over 100,000 metric tons of CO2 per year being saved as electric mobility replaces petrol motorbikes.

    Lord Collins, the UK Government’s Minister for Africa, represented the United Kingdom at the summit, which was also attended by government delegations from Kenya, Uganda and Tanzania. This included: Abubakar Hassan Abubakar, Principal Secretary State Department for Investment Promotion, Kenya, and the CEO of the Kenya Investment Authority (KenInvest), John Mwendwa; General Wamala, Minister for Works and Transport in Uganda; and Msafiri Lameck Mbibo, Deputy Permanent Secretary of the Ministry of Minerals in Tanzania. 

    Lord Collins, the UK Government’s Minister for Africa, said: 

    The UK is a long-term partner for long-term investment in East Africa. This forum will showcase the best of East African business to British business and lay a pipeline of private sector investment between them. This, combined with much-needed improvements to regulations and resilience, will lead to jobs and mutual growth in the future. We go far when we go together.

    Mwebesa Francis, Ugandan Minister for Trade, Industry and Cooperatives said: 

    We welcome the UK-East Africa Trade and Investment Forum 2025 as a platform to highlight Uganda’s vibrant trade and investment opportunities. By engaging with UK investors and partners, we aim to enhance our trade infrastructure, diversify our export markets, and drive sustainable development. We hope this forum will also explore ways to leverage trade and investment to accelerate progress towards our Ten-fold Growth Strategy, unlocking new opportunities for economic growth and development.

    Abubakar Hassan Abubakar, Principal Secretary, State Department for Investment Promotion, Kenya, said: 

    Kenya provides Africa’s leading value proposition for private capital, with a great portfolio of opportunities in key sectors. We are proud to be part of the UK EATIF and welcome the regional focus that fosters economic integration.

    Chris Chijiutomi, MD and Head of Africa at British International Investment, said:  

    BII is proud to announce these two investments today at the EATIF, demonstrating our commitment to fostering economic growth in East Africa. By making trade finance more accessible and backing innovative infrastructure projects like electric motorbikes, we are addressing critical needs in the region. We’re not only supporting businesses that are the backbone of these economies, but also driving inclusive and sustainable growth, contributing to a more resilient and prosperous East African region.

    The EATIF aims to deliver mutually beneficial growth and jobs by building partnerships between businesses and policymakers in Kenya, to create a long pipeline of investment between the UK and the region. It will aim to channel private sector funding into high-impact sectors critical for sustainable development like infrastructure, clean energy, agribusiness, healthcare, and manufacturing. 

    EATIF aims to replicate the success of the West and Central Africa Forum (WCAF), which built a pipeline of over GBP 1 billion in deals over three years. EATIF is just the beginning, with a series of follow-up engagements planned to sustain momentum and translate relationships into tangible deals. 

    These interactions, ranging from government-to-government meetings to C-suite business dialogues, will help align priorities and lay the groundwork for future partnerships. The forum will showcase the full suite of UK government support available to businesses, such as UK Export Finance (UKEF) and BII. UKEF has played a transformative role in other regions, growing its exposure in West and Central Africa from £3 million to over £1.2 billion, and similar outcomes are expected in East Africa over time. These tools can help UK and East African businesses de-risk projects and access finance more easily. 

    Further information

    The East Africa Trade and Investment Forum 

    More information can be found here.

    British International Investment announcements 

    1. Trade Finance Facility with Standard Chartered 

    • the USD $100 million Trade Finance Programme with BII and SCB is a 50:50 risk-sharing facility to increase access to trade finance for businesses in Kenya and Tanzania
    • the facility will provide much-needed trade finance support to businesses in sectors such as food, agriculture, healthcare, industrials, and infrastructure to increase access to trade financing and support growth in the region
    • the investment qualifies for the 2x Challenge as at least 30% of the facility will support businesses that provide employment and leadership opportunities for women
    • it is expected to support and facilitate over USD $450 million in trade volumes over its lifetime, creating better economic opportunities for suppliers and businesses in East Africa
    • the long-standing partnership between BII, the UK’s development finance institution and impact investor and SCB, a leading international cross-border bank, demonstrates how UK organisations are collaborating to enhance trade and economic development in the region

    2. ARC Ride 

    • BII’s investment in ARC Ride, Africa’s e-mobility battery-as-a-service (BaaS) provider, will support the company to provide affordable, reliable and clean e-mobility solutions for rapidly developing cities in Kenya
    • the financing will enable ARC Ride’s initial rollout of 5,000 electric two-wheelers (E2W) and accelerate the expansion of E2W BaaS infrastructure
    • with the goal to build Africa’s first and largest automated battery swapping network, it is also establishing the industry standard for battery swapping of E2Ws both from ARC Ride and other manufacturers, which is important for more Electric Vehicle (EV) adoption
    • it will directly result in over 100,000 metric tonnes of CO2 per year being saved as electric mobility replaces petrol motor bikes

    Media Content 

    Photos and videos from the event can be found here.

    Contact 

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI: Sift Announces ActivityIQ and Other Innovations to Strengthen Identity Trust

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, May 21, 2025 (GLOBE NEWSWIRE) — Sift, the AI-powered fraud platform securing identity trust for leading global businesses, today announced several new capabilities that provide fraud and risk teams with actionable intelligence they need to make more confident risk decisions and strengthen identity trust.

    One of the latest capabilities, ActivityIQ, leverages generative AI to better identify and surface account takeover (ATO) fraud patterns that might otherwise go undetected. Built upon Activity Analyzer, which Sift announced earlier this year, ActivityIQ saves analysts significant time reviewing high risk sessions by summarizing risk patterns across multiple accounts simultaneously. The custom-trained LLM can save hundreds of hours, in aggregate, for customers using ATO Defense to review risky sessions in the Sift Console.

    Another addition to the Sift product experience is FIBR In-Console, an innovation of Sift’s Fraud Industry Benchmarking Resource. It brings the industry’s widely recognized fraud KPI measuring tool directly into the Sift’s fraud fighting hub, allowing customers to directly compare their own key fraud metrics, including payment fraud attack, manual review, general chargeback, and fraudulent chargeback rates against their industry peers. This side-by-side comparison eliminates the need to navigate between multiple platforms to benchmark performance, enabling more efficient and confident fraud strategy decisions.

    To further allow customers to make data-driven refinements to their digital risk strategies, Sift also released automatic chargeback labeling, which creates a feedback loop for Sift’s payment fraud prevention solution by automatically updating machine learning models with chargeback outcomes. Together, these capabilities create a powerful foundation for establishing and maintaining identity trust across touchpoints in the consumer journey.

    “The fraud ‘attack surface’ demands both intelligence and efficiency from risk operations teams, all while maintaining great consumer experience,” said Raviv Levi, Chief Product and Technology Officer at Sift. “With our latest innovations, Sift customers can more easily establish and maintain identity trust by benchmarking their fraud KPIs against industry peers and with AI-generated insights to prevent ATO. Together, our latest capabilities equip risk teams to effectively combat fraud while fostering profitable growth.”

    Sift’s latest innovations also include updates to the Sift Console such as: Search Bar Autocomplete, Sift Notifications Report, and RiskWatch Percentile Scoring in Score Threshold (STR) reporting.

    To learn more about Sift’s latest capabilities, read more on the Sift blog here.

    About Sift

    Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per year, and a commitment to long-term customer success empower more than 700 customers to grow fearlessly. Brands including DoorDash, Yelp, and Poshmark rely on Sift to unlock growth and deliver seamless consumer experiences. Visit us at sift.com and follow us on LinkedIn.

    Media Contact:
    Victor White
    VP, Corporate Marketing, Sift
    press@sift.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/b1a28c5f-57e3-4015-b842-09d8f739f7fa

    The MIL Network

  • MIL-OSI: Superior Agents by KIP Reveal Surprising AI “Personalities” in Crypto Trading Experiment

    Source: GlobeNewswire (MIL-OSI)

    SINGAPORE, May 21, 2025 (GLOBE NEWSWIRE) — KIP Protocol has launched a public experiment testing autonomous, self-learning AI agents in live crypto trading environments, each powered by a different large language model (LLM). Despite identical setups, the agents exhibited dramatically different behaviors, hinting at something deeper than prompt engineering: LLMs have real, measurable behavioral divergence in autonomous economic environments.

    The agents — all live on-chain — use a Darwinian feedback loop to evolve over time. No prompts or fine-tuning post-deployment. Each decision is judged solely by results: PnL, risk, efficiency. The best strategies survive, the rest are dropped.

    Standout findings:

    • Aristid (Gemini) returned +42.5% in 36 days — a 3,536% annualized return — with just 29 trades.
    • Verity (Deepseek) delivered +32.5% over 62 days with a low-variance, high-consistency approach.
    • Lux (Qwen) traded infrequently but outperformed per trade, showing highly selective strategy logic.
    • Sefer (OpenAI) posted cautious but positive returns.
    • Romulus (Gemini) lagged, highlighting that LLM quality matters, but feedback architecture is key.

    “We didn’t tell these agents how to trade. We just defined the environment and let them learn,” said Jennifer Dodgson, co-founder of KIP Protocol. “What emerged is both technically impressive and strangely human – you start to see each model’s tendencies come through.”

    Agents cycle through decisions thousands of times: scan market conditions, select a pair, decide to act, score outcomes, and update strategy – all autonomously.

    Over time, patterns emerged:

    • Gemini agents showed volatility at both extremes.
    • Deepseek led in stable, compounding growth.
    • Qwen proved surprisingly precise with minimal trades.
    • OpenAI was slower to adapt but remained profitable.

    These findings reveal how AI models behave in self-directed, real-world environments. It’s a glimpse into the future of AI that goes beyond chatbots: agents that generate, retain, and optimize economic value on their own.

    Check us out:
    Live Leaderboard: https://superioragents.com/live-agents
    Technical Framework: https://kipprotocol.gitbook.io/superior-agents

    About KIP Protocol:

    KIP Protocol builds Web3 infrastructure for AI app developers, model makers and data owners, empowering easy deployment and monetisation of AI assets while maintaining full ownership rights. With a focus on building infrastructure that caters to every aspect of AI, from governments exploring AI sovereignty to consumer-facing applications, KIP Protocol is setting its sights on achieving over 100,000 daily active users (DAUs) and unlocking the largest total addressable market in decentralized AI. Addressing challenges of connectivity, monetization, and ownership, the platform enables creators to transform their innovations into tangible and sustainable value. At the heart of this ecosystem is the $KIP token, serving as its economic engine. The token powers transparent revenue sharing, allowing creators to retain digital property rights of their AI assets while accessing sustainable income streams. Through its ERC-3525 tokenization, KIP democratizes access to AI innovations and empowers creators to thrive in a decentralized economy.

    For media inquiries, contact press@kip.pro or presshub@kip.pro

    Disclaimer: This press release is provided by KIP Protocol. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining related opportunities involves significant risks, including the potential loss of capital. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector–including cryptocurrency, NFTs, and mining–complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    The MIL Network

  • MIL-OSI: Bitget Wallet Launches New Brand Identity and “Crypto for Everyone” Movement

    Source: GlobeNewswire (MIL-OSI)

    Backed by 300% user growth, Bitget Wallet unveils a new design and $1M campaign to bring crypto into everyday use worldwide

    SAN SALVADOR, El Salvador, May 21, 2025 (GLOBE NEWSWIRE) — Bitget Wallet, the leading non-custodial crypto wallet, has unveiled a new brand identity to reflect its evolution into a full-service crypto wallet designed for everyday use. With over 80 million users, Bitget Wallet has strategically expanded its offerings beyond trading and earning to onchain discovery and global payments. Alongside a new logo symbolizing simplicity and direction, the app has introduced a more streamlined, user-friendly interface to make crypto more intuitive for all. Bitget Wallet stands by the inclusive motto — Crypto for Everyone — now part of a broader initiative, the Crypto for Everyone Movement, aimed at onboarding the next billion users. Through this, it plans to incentivize the community with a pool of over $1 million as gratitude for support.

    “The role of wallets is evolving — it’s moving from a niche tool to one with real-world utility for everyday needs,” said Alvin Kan, COO of Bitget Wallet. “This rebrand is part of a longer-term plan to make crypto accessible for everyone. We’re building towards a future where interacting with crypto feels as easy as using Uber or Paypal,” he added. Bitget Wallet’s growth has coincided with increased demand for self-custody and alternative financial access, particularly in regions where banking infrastructure is limited. The platform saw a 300% increase in users over the past year, with the fastest growth in Africa (+959%), Europe (+367%), and the Middle East (+350%), as more individuals turn to crypto to navigate inflation, limited banking access, and economic instability, gaining greater control over their finances.

    Bitget Wallet’s rebrand focuses on making crypto easier to use and more practical for everyday needs. Built around four core features — Trade, Earn, Pay, and Discover — the wallet lets users track market trends, explore new tokens, and trade across over 130 blockchains with one click. In selected regions, a new Simple Mode will be launched to offer a streamlined experience for users who are new to crypto. To support secure usage, it includes protections like real-time risk monitoring and transaction screening, helping users navigate onchain finance more safely.

    Bitget Wallet is among the first to launch an in-app shop and remains the only major self-custodial wallet offering full payment flexibility, including crypto cards, QR code scans, and direct purchases. The shop supports over 300 brands across gaming, mobile, travel, and e-commerce, enabling crypto payments at Amazon, Google Play, Shopee, and more. Regional integrations with national QR payment systems are also underway. Building on this everyday utility, the wallet offers yield features to help users earn passive income on their crypto balances and plans to support tokenized real-world assets like stocks and gold as it expands beyond digital assets.

    Bitget Wallet stands strong with the essence of crypto extending beyond our decentralized vision, serving as a critical access layer across trading, earning, and payments for onchain assets. Users now have an even more powerful tool — simple to use, accessible, and packed with capabilities — that connects people to opportunity, wherever they are, whenever they need,” said Gracy Chen, CEO at Bitget.

    To mark the rebrand, Bitget Wallet is launching the Crypto for Everyone Movement in partnership with leading ecosystem projects, offering over $1 million in rewards and inviting users to explore the updated platform through interactive campaigns.

    More details on the brand update and product roadmap are available on the Bitget Wallet blog. Watch the brand video on YouTube.

    About Bitget Wallet
    Bitget Wallet is a non-custodial crypto wallet designed to make crypto simple and secure for everyone. With over 80 million users, it brings together a full suite of crypto services, including swaps, market insights, staking, rewards, DApp exploration, and payment solutions. Supporting 130+ blockchains and millions of tokens, Bitget Wallet enables seamless multi-chain trading across hundreds of DEXs and cross-chain bridges. Backed by a $300+ million user protection fund, it ensures the highest level of security for users’ assets.
    For more information, visit: XTelegramInstagramYouTubeLinkedInTikTokDiscordFacebook

    For media inquiries, contact media.web3@bitget.com

    Disclaimer: This is a paid post and is provided by Bitget. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.

    Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    Photos accompanying this announcement are available at:

    https://www.globenewswire.com/NewsRoom/AttachmentNg/62942f0e-9b03-4122-91be-4dd57d364f1a

    https://www.globenewswire.com/NewsRoom/AttachmentNg/e3937725-8626-4018-bbab-fc0fe485b879

    https://www.globenewswire.com/NewsRoom/AttachmentNg/235a4208-356f-44ed-8016-20c19a845169

    The MIL Network

  • MIL-OSI: Sidetrade introduces first-ever AI Cash Collection Agent, autonomous and interactive

    Source: GlobeNewswire (MIL-OSI)

    New AI-native agent shifts Order-to-Cash from smart automation to autonomous execution, live today throughout global finance teams

    Sidetrade, the global leader in AI-powered Order-to-Cash applications, has today unveiled a seismic breakthrough in enterprise finance; the world’s first-ever AI Cash Collection Agent, operating live and autonomously from a digital standpoint.

    Powered by Sidetrade’s Data Lake, the new Aimie orchestrates Order-to-Cash (O2C) processes, executing phone calls, interacting with debtor clients, escalating and flagging issues or exceptions for human follow-up actions where necessary. Announced at the Gartner CFO & Finance Executive Conference today, this launch marks a decisive leap beyond automation.

    Ushering in a new era for CFOs, Global Business Services, and Shared Services
    In the current economic climate, traditional financial systems, rule-based automation, large teams handling low-value calls, and follow-up email campaigns have all revealed their limitations. The race for competitiveness is not just won with automation. It is also won with speed, precision, and the ability to make sense of vast and fragmented data. Chief Financial Officers (CFOs), Global Business Services, and Shared Services leaders must accelerate cash flow generation, reduce operational overheads, and scale faster.

    Aimie is now agentic. Designed as an enterprise teammate, her first capability is being an autonomous Cash Collection Agent, trained on $7.2 trillion in payment experiences and insights from 40 million buyers worldwide. “Simply put, Aimie does not wait for instructions,” said Rob Harvey, Chief Product Officer at Sidetrade. “Aimie does much more than merely follow a script; she makes decisions. That’s the real breakthrough. Agentic AI propels Order-to-Cash processes beyond automation into autonomous decision-making, unlocking new levers for sustainable financial performance. By combining human oversight with self-directed agents, we are creating an opening for more adaptive, scalable finance operations, where manual processes do not hold back growth.”

    Aimie’s Cash Collection Agent is ready for deployment across Europe and North America:

    • Autonomous outbound calling (first contact calls, follow-up calls, voicemail messages) with personalized dialogues suited to every situation;
    • Outcome qualification with automatic case updates;
    • Escalation when a material risk is detected.

    Unlike static bots, Aimie continuously learns from live outcomes, adjusts outreach strategies, and refines prioritization using predictive signals from Sidetrade’s Data Lake.

    Championing consistency to elevate performance
    Early adopters are already experiencing real-world impact. “What I love most about Aimie isn’t the cost savings; it’s her consistency,” said Stephen Dyer, VP Credit & Collections at OpenText. “I manage 100+ collectors globally, and inconsistency is inevitable. Aimie guaranteed precise, repeatable execution which is a game-changer! She also helps to reshape the modern customer 360, enabling us to move past traditional customer experiences toward a data-driven, personalized relationship that can be replicated at scale.”

    Aimie empowers Sidetrade customers with distinctive capabilities:

    • Rapidly learning a company’s culture, products, and terminology, adapting communication in a way that feels native to their brand.
    • Engaging in interactive, qualified conversations with thousands of buyers at scale, acting as a fully-fledged game-changer for managing massive SMB account portfolios, at low cost.
    • Speaking up to 29 languages: allowing for seamless cash collection in local languages and contexts.
    • Making 1,000 outbound calls daily, operating 24/5.
    • Accelerating cash flow by scaling the most effective channel in collections: outbound calling.

    Aimie takes on the high-volume, low-value tasks that drain finance teams, automating repetitive work with consistency, wherever the geography. The results? Reduced administrative burden on accounts receivable, so talent can refocus on strategic impact. Speaking with early adopters, Harvey commented: “They are not worried about a robot taking their job… because most of them already feel like they are doing the robot’s job. Moreover, they are aware that if we fail to design an AI co-worker, tomorrow’s finance will feel less human as they will be stuck talking to accounts payable robots instead of solving real strategic problems.”

    Building on CFOs economic environment
    Aimie’s unique advantage is Sidetrade’s Data Lake, which manages 10 payment events per second across one billion transactions, making it the largest real-time O2C behavioral database in the market. “Aimie’s intelligence comes from context-rich data, not just clever LLM’s,” said Mark Sheldon, Sidetrade’s Chief Technology Officer. “Generic AI systems lack the contextual data needed to operate as domain experts. But Aimie does. With $7.2 trillion in behavioral payment signals, Aimie adapts with pinpoint precision, and she keeps learning. Finance departments gain access to a new resource: tireless and infinitely scalable.”

    Sidetrade has been training finance-specific models since 2015, with generative capabilities added in 2024. The AI Cash Collection Agent is part of a broader rollout of Sidetrade’s new agentic AI, which includes purpose-built agentic functionalities for email auto-response, portal data extraction, and cash application exception handling. As an AI orchestrator, Aimie coordinates a team of domain-specific agents to run the O2C cycle autonomously. “AI goes agentic,” stated Harvey. “Each agent operates independently to process thousands of customer emails and payments per day. Together, they represent a step-change in how finance teams execute their O2C processes.”

    Sheldon concluded: “Short-term, what companies need to define is the level of autonomy they are willing to delegate to agents, the role human oversight should play, and how best to optimize their resources in this new paradigm. Rather than giving in to fears around agentic AI or human replaceability, I encourage business leaders to rethink the role of people within organizations that fully harness this technological shift. The most forward-thinking leaders already augment operational efficiency while repositioning their teams toward higher-value, strategic work.”

    Aimie, Sidetrade’s AI Cash Collection Agent, is now available for early adopters. Meet Aimie, here.

    Media relations @Sidetrade
    Christelle Dhrif                +33 6 10 46 72 00          cdhrif@sidetrade.com
    About Sidetrade (www.sidetrade.com)
    Sidetrade (Euronext Growth: ALBFR.PA) provides a SaaS platform designed to revolutionize how cash flow is secured and accelerated. Leveraging its new-generation agentic AI, nicknamed Aimie, Sidetrade analyzes $7.2 trillion worth of B2B payment transactions daily in its Cloud, thereby anticipating customer payment behavior and the attrition risk of 40 million buyers worldwide. Sidetrade has a global reach, with 400+ talented employees based in Europe, the United States, and Canada, serving global businesses in more than 85 countries. Among them: AGFA, BMW Financial Services, Bunzl, DXC, Engie, Inmarsat, KPMG, Lafarge, Manpower, Morningstar, Page, Randstad, Safran, Saint-Gobain, Securitas, Siemens, UGI, Veolia.
    For further information, visit us at www.sidetrade.com and follow @Sidetrade on LinkedIn.
    In the event of any discrepancy between the French and English versions of this press release, only the English version is to be taken into account.

    Attachment

    The MIL Network

  • MIL-OSI: XRP News: 7 Days Left, Buy $XDX Before XenDex Presale Closes and Exchange Listings Begin

    Source: GlobeNewswire (MIL-OSI)

    SYDNEY, May 21, 2025 (GLOBE NEWSWIRE) — With just 7 days remaining, the clock is ticking for investors to secure their allocation of $XDX tokens before the XenDex presale officially ends. Having already filled its soft cap and with the hard cap nearly reached, XenDex is entering its final presale phase and early momentum is turning into full-blown market attention.

    XenDex is emerging as the most anticipated DeFi launch on the XRP Ledger, offering real utility, speed, and accessibility at a time when XRP is experiencing a powerful market resurgence.

    Buy XDX

    Riding on the recent news of the possibility of XRP price hitting all time high, XenDex is building the DeFi infrastructure XRP has long needed. Its all-in-one decentralized exchange (DEX) is in active development, and the Version 1 of the DEX will be unveiled soon, showcasing every feature in action.

    A First-of-Its-Kind Platform on XRPL

    XenDex combines the best of DeFi in a beginner-friendly, powerful interface, including:

    • AI-Powered Copy Trading – Mirror successful trades and reduce risk in real-time
    • Non-Custodial Lending & Borrowing – Earn rewards by lending or using assets as collateral
    • Cross-Chain Trading – Seamlessly swap XRP tokens across networks like Solana, Ethereum, and BNB
    • Staking & Yield Farming – Earn passive income by supplying liquidity to XenDex pools
    • DAO Governance – Let the community steer the direction of the platform via $XDX voting rights

    Join XenDex Presale

    The upcoming mockup will give the community a first look at how these features will function and only presale buyers will get early access to the live platform once it launches.

    Presale Details (Final Phase)

    • Soft Cap: Filled
    • Hard Cap: Almost Filled
    • Price: 1.25 XRP = 10 XDX
    • Minimum Buy: 150 XRP

    Buy Now Before the Presale Ends: https://xendex.net/presale

    Confirmed Listings on Major Exchanges

    Once the presale closes, $XDX will be listed on:

    • Binance
    • Gate.io
    • MEXC
    • BitMart
    • FirstLedger
    • MagneticX

    Buy $XDX Now Before Listing On Binance

    Thousands have already joined the XenDex community across Telegram and X (Twitter), locking in their $XDX tokens before exchange listings go live. With the soft cap filled, token supply shrinking, and momentum building by the hour, this is your last best opportunity to buy before price pressure explodes.

    With XRP’s momentum stronger than ever and XenDex close to launching, this is your last chance to buy before price surges post-listing.

    Join the XenDex Community

    Website: https://xendex.net
    Presale: https://xendex.net/presale
    Telegram: https://t.me/xendexcommunity
    Twitter/X: https://x.com/xendex_xrp
    Docs: https://xdxdocs.gitbook.io

    Contact:
    Frank Richards
    Frank@xendex.net

    Disclaimer: This is a paid post provided by XenDex. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.

    Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/8182d808-49c5-41f6-a354-e7cca62a378a

    The MIL Network

  • MIL-OSI: Credit Agricole Sa: The Crelan Group and Crédit Agricole announce the signing of an agreement for a long-term partnership

    Source: GlobeNewswire (MIL-OSI)

    Press release

    Brussels, Montrouge, 21 May 2025

    The Crelan Group and Crédit Agricole
    announce the signing of an agreement
    for a long-term partnership

    • The Crelan Group and the Crédit Agricole Group have announced a new strategic partnership that will enable Crelan’s customers to benefit from a wider range of banking products and services.
    • This agreement will allow Crelan to ramp up its commercial development and organic growth, and Crédit Agricole to ensure the development of its business lines in Belgium.

    What does the agreement entail?

    The partnership, which entails the Crédit Agricole Group obtaining a minority stake of 9.9% in Crelan, includes commercial collaborations in the areas of asset management (with Amundi), private banking and wealth management (with Indosuez Wealth Management/Bank Degroof Petercam) and leasing (with CA Leasing & Factoring).

    Crelan and the Crédit Agricole Group also intend to establish other joint commercial initiatives in the near future.

    “Crelan and Crédit Agricole share the same vision and approach to cooperative banking. By sharing our expertise, we will become stronger and offer a wider range of high-quality banking services. Our shared cooperative DNA will be what cements our partnership, for the benefit of our customers, our cooperators and society as a whole.” Philippe Voisin, CEO of Crelan.

    We are thrilled to be supporting Crelan – a major Belgian cooperative bank – in its development objectives, through the recognised expertise of our asset management, wealth management and leasing businesses.” Olivier Gavalda, Chief Executive Officer of Crédit Agricole S.A.

    “Through this partnership with Crédit Agricole, we will be able to broaden our range of services for our individual customers. But it will also allow us to renew our long-term commitment to self-employed individuals and SMEs with tailored financing solutions.Joris Cnockaert, CCO of Crelan.

    What will change for Crelan?

    Crelan is a cooperative bank firmly established in Belgium. The entirety of the deposits will remain invested in Belgium. The network of independent agents will continue to ensure proximity to customers. In addition, by joining forces with Crédit Agricole, Crelan will fully preserve its cooperative model and its founding values, thereby guaranteeing its commitment to its cooperative shareholders.

    What are the financial implications?

    The conclusion of commercial agreements will have a positive impact on the revenues of both groups.
    This minority stake will have a positive financial impact of around 2% on Crelan’s consolidated 2025 transitional CET1 capital ratio and a non-material impact on the Crédit Agricole Group’s CET1 ratio.

    The Crelan Group and Crédit Agricole plan to finalise the partnership agreement in the coming months, subject to final negotiations.

    About the Crelan Group
    The financial group ranks fifth among Belgian retail banks in terms of total assets. The Crelan group is represented by two bank brands: Crelan and Europabank. At 31 December 2024, the Crelan group had: 4327 employees (including staff members, independent bank agents, and their employees), 727 branches, 296,751 cooperative shareholders, nearly 1.7 million customers, and €55.8 billion in total assets. In addition, the banking group manages €44.3 billion in customer deposits, €16.5 billion in off-balance sheet investments, and supports Belgian households and businesses with €49.5 billion in loans.

    About Crédit Agricole
    The Crédit Agricole Group is the leading financial provider of the French economy and one of the leading banking players in Europe. As European leader in retail banking, the Group is also the leading asset manager, bankinsurer and third-largest project financing institution.
    With its strong cooperative and mutualist foundations, 157,000 employees and 27,423 local and regional bank directors, the Crédit Agricole Group is a responsible and useful bank serving 54 million customers and 12.1 million members.
    Thanks to its universal customer-focused banking model – based on the close cooperation between its retail banks and their related businesses – the Crédit Agricole Group supports its customers in their projects in France and throughout the world: day-to-day banking, real estate and consumer loans, savings, insurance, asset management, real estate, leasing, factoring, and corporate and investment banking.
    Serving the economy, Crédit Agricole also stands out for its dynamic and innovative corporate social responsibility policy. It is based on a pragmatic approach that informs the entire Group and empowers every employee to take action.

      
    Crelan press contact

    Caroline Beauvois, Press & Corporate Communication Expert
    Tel: + 32 (0) 475 82 09 34
    Mail: press@crelan.be

    Crédit Agricole press contacts

    Olivier Tassain: olivier.tassain@credit-agricole-sa.fr – +33 6 75 90 26 66
    Alexandre Barat: alexandre.barat@credit-agricole-sa.fr – +33 6 19 73 60 28
    Bénédicte Gouvert: benedicte.gouvert@ca-fnca.fr – +33 1 49 53 43 64

    All our press releases can be found at: https://www.credit-agricole.com/en

    Attachment

    The MIL Network

  • MIL-OSI: LambdaTest Enhances Mobile App Testing with Camera Image Injection on Virtual Mobile Devices

    Source: GlobeNewswire (MIL-OSI)

    San Francisco, CA, May 21, 2025 (GLOBE NEWSWIRE) — LambdaTest, a unified agentic AI and cloud engineering platform, has announced a major enhancement to its real-time manual testing suite: Camera Image Injection. This tool empowers developers and quality assurance teams to test image capture, QR code scanning, and barcode scanning functionalities across a wide range of real mobile devices.

    The Camera Image Injection tool is compatible with over 3,000 real devices, supporting image-based functionalities and in-app image upload workflows. By enabling this feature, teams can ensure their applications perform seamlessly across diverse device ecosystems, enhancing user experience and application reliability.

    This capability removes the reliance on physical devices and enables seamless image injection via Application Programming Interfaces (APIs), saving time, costs, and effort. Teams building applications for FinTech, logistics, retail, and AR platforms can now validate complex visual workflows quickly and efficiently by injecting test images like QR codes or ID cards directly into the virtual camera input.

    “Ensuring that mobile applications function flawlessly across various devices is crucial in today’s diverse mobile landscape,” said Mayank Bhola, Co-Founder and Head of Product at LambdaTest. “With the Camera Image Injection feature, we are providing developers with the tools to test and validate image-related functionalities in real-world scenarios, leading to more robust and user-friendly applications.”

    The Camera Image Injection rollouts demonstrate LambdaTest’s continued commitment to providing innovative, reliable, and accessible tools for modern QA workflows. Whether you’re building secure banking platforms, immersive AR experiences, or education-focused web apps, LambdaTest is equipping teams with the tools they need to deliver quality faster and smarter.

    About LambdaTest

    LambdaTest is an AI-native, omnichannel software quality platform that empowers businesses to accelerate time to market through intelligent, cloud-based test authoring, orchestration, and execution. With over 15,000 customers and 2.3 million+ users across 130+ countries, LambdaTest is the trusted choice for modern software testing.

    • Browser & App Testing Cloud: Enables manual and automated testing of web and mobile apps across 10,000+ browsers, real devices, and OS environments, ensuring cross-platform consistency.
    • HyperExecute: An AI-native test execution and orchestration cloud that runs tests up to 70% faster than traditional grids, offering smart test distribution, automatic retries, real-time logs, and seamless CI/CD integration.
    • KaneAI: The world’s first GenAI-native testing agent, leveraging LLMs for effortless test creation, intelligent automation, and self-evolving test execution. It integrates directly with Jira, Slack, GitHub, and other DevOps tools.

    For more information, please visit, https://lambdatest.com

    The MIL Network

  • MIL-OSI Asia-Pac: Foreign, health ministers call on WHO to facilitate Taiwan’s participation

    Source: Republic of China Taiwan

    May 16, 2025  No. 157  

    During a joint press conference on May 16, Minister of Foreign Affairs Lin Chia-lung and Minister of Health and Welfare Chiu Tai-yuan called on the World Health Organization (WHO) to facilitate Taiwan’s participation. They said that Taiwan would demonstrate self-confidence and work with the world while showcasing the professionalism of Taiwan’s medical diplomacy team.
     
    The 78th World Health Assembly (WHA) is set to open in Geneva on May 19. Minister Lin and Minister Chiu held a joint press conference at the Ministry of Foreign Affairs (MOFA) on the morning of May 16, at which they underscored Taiwan’s willingness to contribute to better global health. The two ministers said that the WHO should not brook political interference but rather should promptly invite Taiwan to participate as an observer in the WHA as well as WHO technical meetings and thus realize WHO’s goal of “One World for Health.” 
     
    Making a special appearance at the press conference was the Puzangalan Children’s Choir of Pingtung County, which performed “Ualjaiyui,” a traditional song of blessing of the Paiwan indigenous community. The song speaks of good fortune and of passing on traditions. Taiwan shares such sentiments for its WHA Action Team headed to Geneva as well as to the world at large. Minister Lin pointed out that the choir would also be traveling to Geneva to show that Taiwan was not just a land of technology but also home to cultural soft power. 
     
    Minister Lin shared that this year’s WHA slogan is “One World for Health” and that the government was calling on WHO to “Chip in with Taiwan” so that no nation or people would be left behind, allowing Taiwan to work with other nations toward a healthier world. Adding that health and disease knew no borders, he said that in addressing COVID-19 Taiwan showed great resilience and was able to assist other nations. Excluding Taiwan from the WHA and WHO therefore represented a loss for the international community.
     
    Minister Lin further commented that Taiwan’s national health insurance program has enrolled 99 percent of residents and that no matter where people lived, they had access to Taiwan’s quality medical services and social security net, an accomplishment praised worldwide. Acknowledging WHO’s Global Action Plan for Health of Indigenous Peoples, the minister said that Taiwan was ready to share its experience providing quality medical care to indigenous people. 
     
    In the AI era, Minister Lin stated, utilizing digital technology could improve access to medical care. Reflecting this, MOFA would for the first time hold a forum on smart medicine in Geneva, at which both Acer Medical and Quanta Computer would share their experience in order to promote a Taiwan model of smart medicine. Taiwan, he said, would continue to show how it could help and underscore its role as a global leader in semiconductors and related technology. 
     
    Minister Lin said that to realize President Lai Ching-te’s vision of a healthy Taiwan, MOFA had implemented the Diplomatic Allies Prosperity Project and eight flagship projects, which included the smart medicine and healthcare industries. He said thats MOFA had worked with the Ministry of Health and Welfare (MOHW) to establish a Taiwan medical diplomacy team as well as a medical consultation team that included professionals from medical firms and organizations. Through the “One Country, One Center” project, medical cooperation would be strengthened with New Southbound Policy partner countries. Such efforts would also bring Taiwan’s healthcare industry—comprising its biotech, pharmaceutical, and information technology sectors—to the world. 
     
    Minister Lin thanked the nation’s diplomatic allies for making proposals in favor of Taiwan’s participation, as well as like-minded countries for taking such concrete steps as sending letters and conducting joint demarches in support of Taiwan. Such actions underscored the strength of international support for Taiwan. However, China’s distortion of UN General Assembly Resolution 2758 and its pressure on the WHO Secretariat meant that Taiwan had yet to be invited to attend the WHA.
     
    Minister Lin stressed that Taiwan had established a government firmly rooted in popular support by conducting many democratic elections. As such, only the popularly elected government of Taiwan could represent the people of Taiwan at the United Nations, WHO, and other multilateral organizations. Many nations’ executive and legislative branches had publicly stated that UNGA Resolution 2758 did not preclude Taiwan’s participation in international organizations such as WHO. He then expressed hope that more nations would work together in support of Taiwan’s participation in WHO and oppose China’s international efforts at lawfare and cognitive warfare. 
     
    In addition, Minister Lin said that this year’s WHA slogan was “One World for Health” and that a Pandemic Agreement would be signed during the meeting. Taiwan had, he said, already shown the humanitarian spirit of “Taiwan can help” during COVID-19 and proved itself a valuable resource to WHO. However, Taiwan’s absence left a gap in the global public health and disease prevention network, said Minister Lin, who called on the WHO Secretariat to not brook political interference, to maintain professionalism and neutrality, and to facilitate Taiwan’s membership in the global public health and disease prevention network so as to create greater welfare for the world.
     
    In closing, Minister Lin said that Taiwan’s WHA Action Team would conduct publicity efforts in Geneva starting from May 16 and that MOFA and the MOHW would work together with self-confidence and engage the world. Moreover, the ministries would be proactive in making Taiwan’s voice heard and ensure that Taiwan responded to “One World for Health” and appealed to others to “Chip in with Taiwan” by making greater contributions to global public health. (E)

    MIL OSI Asia Pacific News

  • MIL-OSI USA: Scientists design gene delivery systems for cells in the brain and spinal cord

    Source: US Department of Health and Human Services – 2

    News Release
    Wednesday, May 21, 2025

    NIH-funded breakthrough could enable targeted therapies for many neurological disorders.

    Research teams funded by the National Institutes of Health (NIH) have created a versatile set of gene delivery systems that can reach different neural cell types in the human brain and spinal cord with exceptional accuracy. These delivery systems are a significant step toward future precise gene therapy to the brain that could safely control errant brain activity with high precision. In contrast, current therapies for brain disorders mostly treat only symptoms.
    The new delivery systems carry genetic material into the brain and spinal cord for targeted use by specific cell types. This platform has the potential to transform how scientists can study neural circuits. It provides researchers with gene delivery systems for various species used in research, without the need for genetically modified, or transgenic, animals. Examples include illuminating fine structures of brain cells with fluorescent proteins and activating or silencing circuits that control behavior and cognition.
    “Imagine this new platform as a delivery truck dropping off specialized genetic packages in specific cell neighborhoods in the brain and spinal cord,” said John Ngai, Director of the NIH’s Brain Research Through Advancing Innovative Neurotechnologies® Initiative, or The BRAIN Initiative®. “With these delivery systems, we can now access and manipulate specific cells in the brain and spinal cord – access that was not possible before at this scale.”
    The new delivery tools, which use a small, stripped-down adeno-associated virus (AAV) to deliver DNA to target cells, can be broadly applied across many species and experimental systems, including small tissue samples removed during human brain surgeries. The delivery systems have been tested, or validated, in intact living systems, which is an important step for introducing new tools for widespread use. The newly published toolkit includes:

    Dozens of delivery systems that selectively target key brain cell types, including excitatory neurons, inhibitory interneurons, striatal and cortical subtypes, brain blood vessel cells, and hard-to-reach neurons in the spinal cord that control body movement and are damaged in several neurological diseases, such as amyotrophic lateral sclerosis (ALS) and spinal muscular atrophy
    Computer programs powered by artificial intelligence (AI) that can identify genetic “light switches,” known as enhancers, that turn genes on in specific brain cell types, using data from many different species – cutting considerable time and effort for scientists looking for these genetic switches.

    Overall, this collection of research tools will significantly accelerate understanding of the human brain. Importantly, the toolkit enables access to specific brain cell types in the prefrontal cortex, an area that’s critical for decision-making and uniquely human traits. With other tools in the collection, scientists can better study individual cells and communication pathways known to be affected in several neurological diseases. These include seizure disorders, ALS, Parkinson’s disease, Alzheimer’s disease, and Huntington’s disease – as well as various neuropsychiatric conditions.
    AAV-based treatments are already approved for some conditions, such as spinal muscular atrophy for which a 2016 approval of a gene therapy known as Zolgensma transformed the lives of infants and young children who once faced severe disability or early death. The new collection of gene delivery resources lays the groundwork for more precise treatments that target only affected cells in the brain, spinal cord, or brain blood vessels.
    The toolkit is available at distribution centers including Addgene, a global supplier of genetic research tools. This collection of publications offers researchers standard operating procedures and user guides for these tools.
    The work is supported by the NIH’s Brain Research Through Advancing Innovative Neurotechnologies® Initiative, or The BRAIN Initiative®. Funding issued less than four years ago launched a large-scale, team-run project to design new molecular tools that can be useful to many research laboratories. The Armamentarium for Precision Brain Cell Access aims to develop precise and reproducible access to cells and circuits in experimental research models of the brain and spinal cord. The large-scale project brings together experts in the field of molecular biology, neuroscience, and artificial intelligence (AI). The eight papers appear in the May 21 issue of the journals Neuron, Cell, Cell Reports, Cell Genomics, and Cell Reports Methods.
    Grants: UF1MH130701, UH3MH120096, U24MH133236, UF1MH128339, UM1MH130981, R01MH123620, U19MH114830, P510D010425, U420D011123, S10MH126994, UH3MH120094, UF1MH130881, F30DA053020, R01FD007478, U01AG076791, R35GM127102, RF1MH114126, UH3MH120095, RF1MH121274, R01MH113005, UH3MH120095
    The Brain Research Through Advancing Innovative Neurotechnologies® Initiative and The BRAIN Initiative® are registered trademarks of the U.S. Department of Health and Human Services.
    The NIH BRAIN Initiative, a multidisciplinary collaboration across 10 NIH Institutes and Centers, is uniquely positioned for cross-cutting discoveries in neuroscience to revolutionize our understanding of the human brain. By accelerating the development and application of innovative neurotechnologies, The BRAIN Initiative® is enabling researchers to understand the brain at unprecedented levels of detail in both health and disease, improving how we treat, prevent, and cure brain disorders. The BRAIN Initiative involves a multidisciplinary network of federal and non-federal partners whose missions and current research portfolios complement the goals of The BRAIN Initiative. 
    About the National Institutes of Health (NIH): NIH, the nation’s medical research agency, includes 27 Institutes and Centers and is a component of the U.S. Department of Health and Human Services. NIH is the primary federal agency conducting and supporting basic, clinical, and translational medical research, and is investigating the causes, treatments, and cures for both common and rare diseases. For more information about NIH and its programs, visit www.nih.gov.
    NIH…Turning Discovery Into Health®

    ###

    MIL OSI USA News

  • MIL-OSI: Insurtech Insights USA 2025 Returns with the Industry’s Most Influential Gathering of Innovators and Executives

    Source: GlobeNewswire (MIL-OSI)

    NEW YORK, May 21, 2025 (GLOBE NEWSWIRE) — Insurtech Insights USA 2025, the largest and most influential gathering of insurance decision-makers in North America, returns to the Javits Center in New York City on June 4–5, 2025. This year’s edition will host more than 6,000 attendees and 400+ speakers over two days of high-impact programming, strategic networking, and transformative industry dialogue.

    A powerful roster of global insurance and insurtech leaders is confirmed to attend, including senior executives from Munich Re, AXA, Sun Life, MetLife, Solera, Owl.co, Federato, Clearspeed, LexisNexis Risk Solutions, Majesco, AgentSync, and many more. This world-class conference will serve as a launchpad for bold ideas, cross-sector collaboration, and the technological reinvention of the insurance industry.

    At Insurtech Insights, we believe in building bridges between tradition and transformation,” said Kristoffer Lundberg, CEO of Insurtech Insights. “In 2025, we’re proud to host the world’s most forward-thinking insurers and innovators as they tackle the industry’s most urgent challenges. From leveraging GenAI and automation, to reimagining underwriting, claims, and customer engagement. This is more than a conference, it’s the heartbeat of the insurance revolution.”

    Insurtech Insights USA 2025 will feature curated keynote presentations, interactive panels, fireside chats, and startup showcases, exploring the innovations shaping the insurance industry’s future. Topics will include:

    • Generative AI in operations and claims
    • Climate risk modeling and sustainability
    • Embedded insurance and customer experience
    • Data ethics and regulatory evolution
    • Technology-driven strategies for growth and efficiency etc

    With more than 97% of past attendees recommending the event, Insurtech Insights has become a trusted space for industry professionals looking to challenge conventional thinking, identify emerging opportunities, and build the next generation of insurance solutions. Attendees leave equipped with both strategic vision and tactical insights, making it a must-attend for innovation leaders across all insurance lines—life, health, property & casualty, commercial, and specialty.

    This year’s event also places a spotlight on global collaboration and inclusivity, bringing together voices from across the Americas, Europe, and Asia to address shared challenges such as digital transformation, talent acquisition, climate adaptation, and regulatory modernization. As the industry faces unprecedented disruption, Insurtech Insights USA 2025 is the definitive platform to navigate what’s next.

    For more information and to secure your pass, visit the website here.

    About Insurtech Insights USA

    Insurtech Insights USA is the leading global conference for the insurtech industry, bringing together experts, innovators, and thought leaders to discuss the latest trends, challenges, and opportunities shaping the future of insurance. With a focus on innovation, collaboration, and disruption, Insurtech Insights USA provides a platform for networking, learning, and driving meaningful change in the insurance sector.

    For media queries and other information, please contact:

    Girish Jaggi
    Senior Account Manager
    The MicDrop Agency
    girish@themicdropagency.com
    +1 (289) 623 3627

    The MIL Network

  • MIL-OSI: Lakeside Software Names Mike Stankowitsch as VP of Global Channels

    Source: GlobeNewswire (MIL-OSI)

    BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — Lakeside Software, the first AI-driven digital employee experience company, today announced the appointment of Mike Stankowitsch as the company’s Vice President of Global Channels.

    The appointment supports Lakeside’s growing emphasis on strategic partnerships, expanded customer relationships, and innovation in the digital employee experience space.

    Stankowitsch brings deep experience in channel leadership, strategic partnership building, and business development for high-growth technology companies. He joins Lakeside from Traliant, a leader in compliance training solutions, where he led efforts to expand the partner ecosystem and drive revenue growth.  He previously held channel leadership roles at Axonify and OpenText.

    “Mike’s expertise in building alliances and scaling revenue will be instrumental as we continue to grow our global channel presence,” said Todd Elliott, Chief Revenue Officer of Lakeside Software. “Our Partner Program is foundational to Lakeside’s strategy of helping organizations with large, complex IT environments gain complete visibility into their digital estates. Mike’s leadership and extensive experience will strengthen our partner ecosystem and ensure our channel strategy remains aligned with Lakeside’s broader growth goals.”

    In this role, Stankowitsch will focus on expanding Lakeside’s global partner network and scaling revenue opportunities through strategic alliances. With global partners including HCLTech, Infosys, Dell, Lenovo, Capgemini, Kyndryl and dozens more, Lakeside’s Partner Program is a critical growth engine, enabling IT services, consulting, and technology providers to deliver greater innovation, customer impact, and operational excellence.

    Powered by AI, Lakeside’s SysTrack platform continuously monitors and optimizes complex digital environments, helping partners drive business outcomes through deeper visibility, faster issue resolution, and improved employee experience.

    “With Lakeside’s commitment to transforming digital employee experiences through AI-driven intelligence, there’s a tremendous opportunity to build a high-performing channel ecosystem,” said Stankowitsch. “I’m excited to collaborate with our expansive network of partners to deliver greater value and outcomes for customers worldwide.”

    Lakeside continues to shape the future of IT through thought leadership and strategic partnerships, including participation in Dell Technology World from May 19-22, 2025, showcasing Dell’s ProSupport Suite with Lakeside in booth #153.

    About Lakeside Software
    Lakeside Software is ushering in a new era of proactive IT with SysTrack, the industry’s most powerful AI-driven Digital Employee Experience (DEX) platform. Trusted by Fortune 500 companies worldwide, Lakeside SysTrack dramatically reduces IT costs, prevents system failures before they occur, and drives strategic decision-making through unparalleled visibility. Learn how you can save 20% on annual IT costs per employee at lakesidesoftware.com.

    Media Contact
    Bridget Bell
    bridget.bell@lakesidesoftware.com

    The MIL Network

  • MIL-OSI Africa: Afreximbank reports strong performance for Q1 2025 in line with expectations

    Source: Africa Press Organisation – English (2) – Report:

    Afreximbank reports strong performance for Q1 2025 in line with expectations The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period CAIRO, Egypt, May 21, 2025/APO Group/ — African Export-Import Bank (“Afreximbank” or the “Group”) (www.Afreximbank.com) has released the consolidated financial statements of the Bank and its subsidiaries for the three months ended 31 March 2025. Financial Highlights Afreximbank Group delivered satisfactory financial performance for the first quarter of 2025, meeting expectations with solid profitability, strengthened liquidity and a resilient capital base. This performance provides a springboard for the Bank to continue playing its pivotal role of advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development in the months and years ahead. Net interest income grew by 4.53% to US$411.2 million compared to prior year, driven by growth in interest earning assets, complemented by effective management of borrowing costs, helping the Bank to cushion the marginal decline in total interest income due to softening benchmark rates. Fee income from Guarantees and Letters of Credit saw robust growth of 47% and 36% respectively, partially offsetting lower advisory fees to contribute to total unfunded income of US$26.9 million for Q1-2025. While this represented a 7.41% decrease from US$29.0 million in Q1 2024, the strong performance in Off-balance sheet assets is in line with the Bank’s strategy to grow unfunded business. The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period. The Group’s total assets and contingent liabilities increased by 6.4%, reaching US$42.7 billion as of 31 March 2025, up from US$40.1 billion at FY’2024. On-balance sheet assets grew by 4.85% to US$37.0 billion, driven primarily by a 58% surge in cash balances to US$7.4 billion, while Off-balance sheet assets i.e. letters of credit and guarantee volumes increased by a 19% to reach US$5.7 billion at the end of Q1-2025. Net loans and advances closed Q1-2025 at US$27.8 billion, down from the FY2024 closing position reflecting early repayments from certain customers on account of improved foreign currency balances position of some sovereign borrowers. Importantly, the Loan Asset Quality remained strong, with the Non-Performing Loans (NPL) ratio at 2.44%, a modest increase from 2.33% at FY’2024 – well below the Bank’s strategic NPL ceiling of 4%. Driven by inflationary pressures and growing personnel costs, operating expenses rose by 23% to reach US$75.4 million by 31 March 2025. Despite this, Afreximbank Group maintained a healthy Cost-to-Income Ratio of 16%, below its strategic range of 17-30%. Afreximbank’s liquidity profile strengthened considerably, with liquid assets now comprising 20% of total assets, up from 13% at the close of FY’2024. This higher liquidity position was as a result of successful fund-raising, coupled with loan repayments received during the quarter. Shareholders’ funds increased by 3.4%, reaching US$7.5 billion, driven by strong internally generated capital of US$215.4 million in addition to new equity investments under the second General Capital Increase (GCI II) programme. Operating Highlights In line with the Afreximbank strategic objective of driving Industrialisation and export development, the Bank and the Government of Kenya ratified a number of initiatives designed to support the development Industrial Parks (IPs) and Special Economic Zones (SEZs) in Kenya under the US$3 billion Kenya country programme. These projects which include Dongo Kundu Industrial Park in Mombasa and Naivasha SEZ II in Mai Mahiu, are key components of Kenya’s Vision 2030 plan to boost export manufacturing and industrialisation. Afreximbank’s support for these initiatives will specifically enhance infrastructure development, attract investment, and strategically position Kenya as a key hub for African and global commerce. The rollout of the Pan-African Payments and Settlement System (PAPSS) continues to gain momentum with KCB Group in Kenya and Bank of Kigali in Rwanda launching the platform, becoming the first banks in their respective countries to offer seamless, instant, and affordable cross-border payments in local currencies across Africa. Aligned with its mandate to promote Global Africa following the recognition of the African Diaspora as the 6th region of Africa, the Bank further cemented its expansion and presence in the Caribbean with the historic groundbreaking ceremony to kick off the construction of the first ever Afreximbank African Trade Centre (AATC) outside of Africa in Bridgetown, Barbados. AATC Barbados will also host its regional office. The Barbados AATC is an authentic icon of trade embodying the ambition, resilience, and influence of leading commercial cities in Africa and the Caribbean that serve as dynamic focal points for commerce, fostering regional and global trade connections, and is expected to enhance intra-and extra-African trade, with a focus on countries of the Global South. Mr. Denys Denya, Afreximbank’s Senior Executive Vice President, commented: “Our QI 2025 results, which were in line with expectations, reflected a strong and resilient financial performance, notwithstanding continued macroeconomic challenges. With solid profitability growth, a strengthened liquidity position, and a well-capitalised balance sheet, the Group is firmly positioned to continue playing a pivotal role in advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development.” Highlights of the results for the Group are shown below:

    Income statement Financial Metrics

    Q1-2025

    Q1-2024

    Gross Income (US$ million)

    784.9

    753.8

    Operating Income (US$ million)

    474.2

    423.5

    Net Income (US$ million)

    215.4

    178.7

    Return on average assets (ROAA)

                2.38%

    2.19%

    Return on average equity (ROAE)

    12%

    12%

    Cost-to-income ratio

    16%

    15%

    Balance sheet financial metrics

    Q1-2025

    FY-2024

    Total Assets (US$ billion)

    37.0

    35.3

    Total Liabilities (US$ billion)

    29.5

    28.1

    Shareholders’ Funds (US$ billion)

    7.5

    7.2

    Net asset value per share (US$)

    71,671

    69,695

    Non-performing loans ratio (NPL)

    2.44%

    2.33%

    Cash/Total assets

    20%

    13%

    Capital Adequacy ratio (Basel II)

    26%

    24%

    Distributed by APO Group on behalf of Afreximbank. Media Contact: Vincent Musumba Communications and Events Manager (Media Relations) Email: press@afreximbank.com Follow us on: X: https://apo-opa.co/43pfUK5  Facebook: https://apo-opa.co/43uKQbW  LinkedIn: https://apo-opa.co/4jhrbSL  Instagram: https://apo-opa.co/43DKyk2 About Afreximbank: African Export-Import Bank (Afreximbank) is a Pan-African multilateral financial institution mandated to finance and promote intra- and extra-African trade. For over 30 years, the Bank has been deploying innovative structures to deliver financing solutions that support the transformation of the structure of Africa’s trade, accelerating industrialisation and intra-regional trade, thereby boosting economic expansion in Africa. A stalwart supporter of the African Continental Free Trade Agreement (AfCFTA), Afreximbank has launched a Pan-African Payment and Settlement System (PAPSS) that was adopted by the African Union (AU) as the payment and settlement platform to underpin the implementation of the AfCFTA. Working with the AfCFTA Secretariat and the AU, the Bank has set up a US$10 billion Adjustment Fund to support countries effectively participating in the AfCFTA. At the end of December 2024, Afreximbank’s total assets and contingencies stood at over US$40.1 billion, and its shareholder funds amounted to US$7.2 billion. Afreximbank has investment grade ratings assigned by GCR (international scale) (A), Moody’s (Baa1), China Chengxin International Credit Rating Co., Ltd (CCXI) (AAA), Japan Credit Rating Agency (JCR) (A-) and Fitch (BBB). Afreximbank has evolved into a group entity comprising the Bank, its equity impact fund subsidiary called the Fund for Export Development Africa (FEDA), and its insurance management subsidiary, AfrexInsure (together, “the Group”). The Bank is headquartered in Cairo, Egypt. For more information, visit: www.Afreximbank.com Forward-Looking Statements: The Bank makes written and/or oral forward-looking statements, as shown in this presentation and in other communications, from time to time. Likewise, officers of the Bank may make forward-looking statements either in writing or during verbal conversations with investors, analysts, the media, and other key members of the investment community. Statements regarding the Bank’s strategies, objectives, priorities, and anticipated financial performance for the year, constitute forward-looking statements. They are often described with words like “should”, “would”, “may”, “could”, “expect”, “anticipate”, “estimate”, “project”, “intend”, and “believe”. By their very nature, these statements require the Bank to make assumptions that are subject to risks and uncertainties, especially uncertainties related to the financial, economic, regulatory, and social environment within which the Bank operates. Some of these risks are beyond the control of the Bank and may make actual results that are obtained to vary materially from the expectations inferred from the forward-looking statements. Risk factors that could cause such differences include regulatory pronouncements, credit, market (including equity, commodity, foreign exchange, and interest rate), liquidity, operational, reputational, insurance, strategic, legal, environmental, and other known and unknown risks. As a result, when making decisions with respect to the Bank, we recommend that readers apply further assessment and should not unduly rely on the Bank’s forward-looking statements. Any forward-looking statement contained in this presentation represents the views of management only as of the date hereof and they are presented for the purpose of assisting the Bank’s investors and analysts to understand the Bank’s financial position, strategies, objectives, priorities, anticipated financial performance in relation to the current period, and, as such, may not be appropriate for other purposes. The Bank does not undertake to update any forward-looking statement, whether written or verbal, that may be made from time to time, by it or on its behalf, except as required under applicable relevant regulatory provisions or requirements.

    Text copied to clipboard.

    MIL OSI Africa

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: Rhizome Secures $6.5M in Seed Funding to Meet Surging Demand for Resilience Planning

    Source: GlobeNewswire (MIL-OSI)

    WASHINGTON, May 21, 2025 (GLOBE NEWSWIRE) — Rhizome, the leading climate resilience planning platform for the power grid, today announced the close of a $6.5 million oversubscribed Seed funding round led by Base10 Partners. The company will use the funding to scale their AI platform and team as they continue to help utilities protect their grid and customers from the impacts of extreme weather events. Rhizome will focus on building out its existing platform, new product research and development, and expanding its geographic footprint domestically and internationally.

    Rhizome, launched in 2023, supports utilities by helping them model the impacts of increasingly severe extreme weather events against their systems. By leveraging AI against climate risk data and digital representations of the physical grid, Rhizome’s platform identifies vulnerabilities and prioritizes resilience investments and upgrades. This fundraise will further fuel Rhizome’s mission to integrate climate intelligence into utility planning workflows at a time when grid resilience has never been more crucial.

    Extreme weather events are rapidly increasing in frequency, intensity, and cost. In 2024 alone, the U.S. faced 27 billion-dollar climate and weather disasters, totaling over $182 billion in damages. For electric utilities, the stakes are particularly high. A McKinsey analysis found that major storms have cost individual utilities an average of $1.4 billion over a 20-year period, underscoring the urgent need for smarter, more resilient infrastructure planning in the face of growing climate volatility.

    At the same time, electric utility capital expenditures hit a record $179 billion, with projections rising to $194 billion in 2025. In an environment where every dollar counts, utilities need advanced planning tools that can simulate a range of climate scenarios — removing the guesswork from resilience planning and helping every dollar go further.

    “We set out to partner with investors who deeply understand the power sector and share our commitment to solving pressing climate resilience challenges,” said Mishal Thadani, Co-founder and CEO of Rhizome. “This funding allows us to scale our work and continue refining a suite of products that help utilities prepare the grid for an increasingly uncertain future.”

    Base10 is joined in the Seed round by first-time Rhizome investors in MCJ and CLAI. They join Convective Capital, El Cap, Streetlife Ventures, Stepchange, and Everywhere in closing out the oversubscribed round, all of whom also participated in prior Rhizome fundraises.

    “Resilience is unquestionably one of the most important factors in ensuring a safe, reliable power grid,” said Rexhi Dollaku, General Partner at Base10 Partners. “Mish, Rahul, and the team bring the right mix of vision, urgency, and technical depth to solve this challenge, and we’re proud to support them.”

    In just under two years, Rhizome has developed and commercialized a suite of mission-specific products used by electric utilities in diverse geographical regions. Its flagship product, gridADAPT, supports long-term infrastructure planning by helping utilities prioritize investments that improve reliability and resilience. This was followed by the launch of gridFIRM, a first-of-its-kind platform for wildfire risk mitigation, and most recently, gridCAVA –– an affordable climate vulnerability assessment tool designed specifically for municipal and cooperative utilities. Built on Rhizome’s scalable, cloud-based Aspen platform, these tools round out a powerful portfolio of climate resilience planning tools designed to model current and future climate risk against utility infrastructure, available to utilities across Rhizome’s expanding geographical footprint.

    Rhizome is actively engaged in utility partnerships across the U.S. and Canada, supporting organizations facing a range of region-specific climate risks. Current customers include AvangridSeattle City LightVermont Electric Power Company (VELCO), Vermont Electric Cooperative (VEC). Rhizome also has a range of strategic collaborations that include EPRI’s Climate READi, KPMG, Black and Veatch, and the University of Connecticut.

    Rhizome is expanding its platform, growing its team, and partnering with more utilities to strengthen resilience in the face of climate-driven threats. Contact Rhizome or visit here to learn more about the company’s expanding portfolio of climate risk solutions.

    About Rhizome
    Rhizome is an AI-powered software platform that helps utilities identify vulnerabilities from climate threats, quantify risk at high resolutions, and measure the economic and social benefits of grid-enhancing investments. Rhizome provides the highest standard of equitable climate risk mitigation to ensure that communities and businesses are protected against intensifying extreme weather events.

    About Base10 Partners
    Founded by Adeyemi Ajao and TJ Nahigian, Base10 is a San Francisco-based venture capital fund investing in founders who believe purpose is key to profits and companies that are automating sectors of the Real Economy, including transportation, retail, logistics, and construction. Through its program, The Advancement Initiative, Base10 aims to donate 50% of profits to underfunded colleges and universities to support financial aid and other key initiatives. Portfolio companies include Notion, Figma, Nubank, Stripe, Motive, Chili Piper, and Popmenu. Connect via base10.vc.

    Media Contact
    FischTank PR
    rhizome@fischtankpr.com

    Additional Inquiries ** or ** Business Development Inquiries
    Dea Pratt, Head of Marketing
    dea@rhizomedata.com

    The MIL Network

  • MIL-OSI Economics: Basel Committee continues to prioritise Basel III implementation, progresses work to strengthen supervisory effectiveness and discusses finalisation of principles on third-party risks

    Source: Bank for International Settlements

    • The Basel Committee continues to prioritise the full and consistent implementation of Basel III.
    • Progresses work to strengthen supervisory effectiveness based on the lessons learned from the 2023 banking turmoil.
    • Aims to finalise principles for the sound management of third-party risk in the banking sector by the end of 2025.

    The Basel Committee on Banking Supervision met in Stockholm on 20 and 21 May 2025 to discuss a range of initiatives.

    Financial stability outlook

    Committee members exchanged views on recent market developments and the financial stability outlook for the global banking system. A heightened level of uncertainty and increased market volatility requires ongoing vigilance by banks and supervisors to ensure that the global banking system continues to maintain its resilience.

    2023 banking turmoil

    The Committee took stock of its work to develop a suite of practical tools to support supervisors in their day-to-day work as part of its efforts to strengthen supervisory effectiveness in the light of the lessons learned from the 2023 banking turmoil. The initial work covered the supervision of liquidity risk and interest rate risk in the banking book, the assessment of the sustainability of banks’ business models and the importance of effective supervisory judgment. The tools do not change or replace existing standards or guidelines and were designed to strengthen supervisory practices and effectiveness worldwide. The Committee will publish an update on the outcome of this work by the end of the year.

    Following the meeting of the Group of Central Bank Governors and Heads of Supervision (GHOS) earlier this month, the Committee continues to prioritise the implementation of Basel III framework in full, consistently and as soon as possible. The Committee also discussed its analytical work to assess whether specific features of the Basel Framework performed as intended during the 2023 banking turmoil, such as liquidity risk and interest rate risk in the banking book.

    Digitalisation of finance

    The Committee reviewed the comments received on its consultation on supervisory principles for the sound management of third-party risk in the banking sector. It also discussed an analysis on the risks and benefits from banks’ reliance on third-party service providers.

    Building on the comments received and its own analysis, the Committee will publish a final version of the principles by the end of the year.

    Members also exchanged views on recent developments related to artificial intelligence and digital fraud. The Committee will continue to monitor developments in these areas.

    The Committee also discussed how best to use technological innovation for its Pillar 3 disclosure framework. The disclosure framework enables market participants to access key information about a bank’s risk profile. Making these data more easily accessible by publishing them in a machine-readable format would provide an important public good. The Committee will consult on such a proposal by the end of the year.

    Financial risks of extreme weather events

    At the GHOS meeting earlier this month, the Committee was tasked with prioritising its work to analyse the impact of extreme weather events on financial risks. The Committee will continue to work on operationalising this work over the coming months. The GHOS also tasked the Committee with publishing a voluntary disclosure framework for climate-related financial risks for jurisdictions to consider; the framework will be published in June.


    Note to editors: 

    The Basel Committee is the primary global standard setter for the prudential regulation of banks and provides a forum for cooperation on banking supervisory matters. Its mandate is to strengthen the regulation, supervision and practices of banks worldwide with the purpose of enhancing financial stability. The Committee reports to the Group of Central Bank Governors and Heads of Supervision and seeks its endorsement for major decisions. The Committee has no formal supranational authority, and its decisions have no legal force. Rather, the Committee relies on its members’ commitments to achieve its mandate. The Group of Central Bank Governors and Heads of Supervision is chaired by Tiff Macklem, Governor of the Bank of Canada. The Basel Committee is chaired by Erik Thedéen, Governor of Sveriges Riksbank. 

    More information about the Basel Committee is available here.

    MIL OSI Economics

  • MIL-OSI Economics: South Korea spent $222 billion on defense from 2021 to 2025, reveals GlobalData

    Source: GlobalData

    The rising tensions with North Korea, coupled with China’s increasing assertiveness, have necessitated South Korea to bolster its military capabilities and readiness. These strategic enhancements include investments in advanced weapons systems, military preparedness, and fortification of cybersecurity infrastructure. In light of these developments, the country has allocated $222 billion for the period from 2021 to 2025, according to GlobalData, a leading data and analytics company.

    GlobalData’s latest report, “South Korea Defense Market Size and Trends, Budget Allocation, Regulations, Key Acquisitions, Competitive Landscape and Forecast, 2025–30,” reveals that as part of its modernization drive, the country has undertaken significant acquisitions, including the KF-21 Boramae Multirole Aircraft, the K239 Chunmoo Multiple Rocket Launch System, and the K9 Self-Propelled Artillery Systems. Notably, all these military platforms are indigenously manufactured.

    Akash Pratim Debbarma, Aerospace & Defense Analyst at GlobalData, comments: “Over the years, South Korea has successfully diminished its reliance on imports and enhanced the capabilities of its armed forces through the indigenous development of several advanced military systems. The country’s allocation of funds toward acquisition and research, development, testing, and evaluation (RDT&E) underscores its commitment to addressing the evolving security challenges within the region.”

    The successful flight of the KF-21 prototype by Korea Aerospace Industries (KAI) in 2022 marks a significant stride toward self-reliance in combat aircraft production. While the induction of the KF-21 is slated for 2028, it is expected to considerably enhance South Korea’s aerial combat capabilities with advanced onboard avionics and near-stealth performance.

    Debbarma concludes: “As North Korea continues its nuclear-capable missile tests, South Korea remains steadfast in enhancing its deterrence strategies, bolstering its air, naval, and missile defense capabilities. However, South Korea is still mainly dependent on the 28,500 US troops to maintain a credible deterrence against potential hostilities from North Korea.

    “With looming uncertainties about the continuance of its reliance on US support following Trump’s return to office, South Korea will likely redirect most of its defense budgets into indigenization efforts. While supporting its armed forces, South Korea will also try to achieve economy of scale to keep the cost down for its domestic defense systems by exporting them to its allies worldwide.

    MIL OSI Economics

  • MIL-OSI Economics: MPTS 2025 celebrates largest edition ever with record visitor numbers, reveals MBI, a GlobalData company

    Source: GlobalData

    The UK’s most powerful hub for the creative industries united for two days of engaged networking, passionate debate and exceptional insights into AI, the creator economy, production craft and more – helping attendees stay ahead-of-the-curve for the year ahead.

    London, United Kingdom, 21 May 2025 – After two exceptional days of conversation, collaboration and community, the biggest and buzziest MPTS yet welcomed a record 13,000 attendees from 50 countries, uniting the UK’s media and entertainment industry together in the heart of London, like never before. The exhibition is organized by Media Business Insight (MBI) Ltd, a GlobalData company.

    Hosted at London’s Olympia on 14-15 May, the red-hot editorially driven program delivered 100+ free-to-attend sessions across eight theatres, showcasing the insight and passion of more than 350 expert speakers and guest keynotes. The bustling show floor was packed with more than 300 exhibitors and sponsors, showcasing imagination, determination and standout talent of the UK’s creative and technical communities – at a time of both global challenge and immense opportunity.

    Setting the agenda for MPTS, a State of the Nation Production keynote outlined a media and entertainment landscape in which storytellers had to embrace screens, formats and creators of all kinds.

    Kate Beal, CEO, Woodcut Media, asserted: “TV doesn’t exist anymore in the way we knew it.”

    Derren Lawford, CEO, Dare Pictures, said: “We are in the middle of a decade of profound transition, and we are past the tipping point. TV is part of a wider, connected series of industries around the creation and distribution and funding of content.”

    Headliners at MPTS include:

    • Producer and presenter Ross Kemp, who took us on an exhilarating tour of investigative documentaries on the front lines of conflict, drug cartels and organised crime gangs. “They will know in a second if you are not telling the truth,” he said. “I specialize in telling the truth, it is as simple as that.”
    • Georgie Holt, whose company Flight Story produces the world’s second biggest podcast ‘Diary of a CEO’, declared: “We are in the era of the Founder Creator — creators who are now in charge of media content and able to monetise spectacularly outside of traditional gatekeepers.”
    • NFL professional turned American Football broadcaster Jason Bell explained how sports coverage was evolving into the F1 Drive To Survive model, in which athlete personalities and back stories were the keys to growing audiences.
    • Blockbuster editor Eddie Hamilton gave a masterclass about the precision involved in making Top Gun: Maverick and five Mission: Impossible movies with Tom Cruise. He said: “Every nuance is refined hundreds of times. Sometimes we watch a 10-minute scene 40 times in a day, checking to see where your eye is moving in the frame.”

    Diverse representation is a vital sign of the industry’s health and MPTS is proud to set the benchmark to secure equal representation and attendance from the next generation, not only across the program, but also something clearly witnessed across the show floor amongst exhibitors and attendees.

    MPTS also prioritizes the crucial importance of sustainability and, in continuing association with BAFTA albert brought this conversation to the fore with experts including Peter Okell, Sky Studios Elstree; Luke Seraphin, Sky Studios and Claire O’Neill, A Greener Future speaking in the Sustainability Series.

    Sam Street, Marketing Officer, BAFTA Albert commented: “MPTS is a really key moment in our calendar. It is always so great to connect with suppliers, companies, studios and creatives who share our common passion for sustainability within screen industries. It has also been really valuable to curate our sustainability series of panels across this year’s show, we’ve had some really insightful discussions and emphasised the importance of environmental focus throughout the screen industries.”

    We did not need a machine to predict the high demand for news and information about AI. The brand-new ticketed AI Training program and the expanded AI Media Zone drew exceptional attendance, with exhibitors such as Dot Group, Moments Lab and Software. Conversations in these packed-out sessions revolved around the impact of AI from ideation to VFX, featuring real-world insights and discussions on bridging the gap between theory and practice from speakers including Pete Archer, BBC; Jon Roberts, ITN and Damien Viel, Banijay Entertainment.

    With a record number of exhibitors already rebooking for 2026, MPTS continues to prove its value as the UK’s number one event for media and production professionals, where brands, creatives and decision-makers come together to connect, collaborate and grow.

    Jane Shepard, Senior Channel Marketing Manager, Sandisk, said: “MPTS 2025 was a spectacular showcase of innovation, bringing together the brightest minds and cutting-edge technology in the industry. An unforgettable experience for all attendees.”

    Tom Rundle, Application Engineer, Yamaha Music, said: “It has been very busy for us. We have seen a huge mix of customers from the broadcast sector here, but also customers from the other industries which we serve, whether that’s live or theatre who have deliberately come to the show to seek us out to speak to us. Will we be back next year? Yes, absolutely, this is the first year for us, so it was always a bit of a toe in the water, but it’s been vastly more successful than we thought it was going to be.”

    Peter Alderson, Business Manager, Nikon, said: “This is our second year at MPTS, we’ve gone a little bit bigger on our stands, almost doubling it, and I think it’s definitely been worthwhile doing. We’ve partnered with RED, who we recently purchased, and MRMC so it’s making a lovely statement about where we are in the market, and I think we’re in the right place to make that statement here at MPTS.”

    Jennifer Hudson, Marketing Executive, Videndum, said: “This show is really important in our calendar – we attend nearly every year and find so much value in it. We get to meet with so many different professionals within the industry, and this year has been really, really positive for us. We’ve walked away with quite a few leads and made new relationships. It’s a fantastic show, and we would thoroughly recommend anyone thinking about coming and having a stand here to definitely do it – you won’t regret it.”

    Will Pitt, Head of Sales Solutions, Techex, said: “My impression of the show is that it’s been incredibly busy and very positive. Techex particularly specialise in solving some of the headaches that a lot of the broadcast industry is grappling with at the moment, namely, how they transition into an IP-led architecture from a legacy architecture and what that journey looks like. As such, our standards have been packed pretty much throughout the show to come and look at products, but also to come and talk about ideas and lean into what that journey looks like specifically for them. So not a generic journey, but specific to their drivers and their wants and needs in the short and medium term. We particularly like MPTS because it’s London based and many of the engineers that we speak to and collaborate with are based here and therefore it’s an easy journey for them to take half a day, a day out to come and investigate what we have to offer, but also to have those conversations. And so for organisations like WBD or Sky, the BBC, ITV, etc. They can come here quite easily and engage with us, spend some time talking in real life and not over teams or Zoom.”

    Charlotte Wheeler, Event Director, MPTS said: “Without doubt, 2025 was the most stimulating, ahead-of-the-curve MPTS yet. At a time when we are seeing the industry under real pressure from budget cuts to talent shortages and perpetual change, the conversations and connections on the show floor were positive and demonstrated infectious community spirit. The level of attendance and the quality of attendees from across all sectors of the industry was incredible – not just stakeholders in technology but representatives from production and commissioning, the creator economy, those new to the industry and freelancers were all brought together by MPTS under one roof.

    “A huge amount of work goes into making sure that there is equal representation across our extensive conference programme. I am proud that MPTS is one of – if not the – most diverse shows both in terms of attendees and panellists.

    “Thank you to everyone for exhibiting, sponsoring, speaking, attending and engaging with the show to make MPTS such a thrilling success. We are already planning for 2026, which marks MPTS’ 10th edition, so look forward to a landmark celebration!”

    Save the date for MPTS 2026 when we return to Olympia Grand Hall, London on 13 – 14 May 2026.

    The conversation does not stop when the doors close. MPTS is more than just two days a year – it is a connected, year-round community for the broadcast and media industry. From on-demand content to exclusive events, there’s still so much to explore. Stay connected with us: https://www.mediaproductionshow.com/register-interest

    To enquire about exhibiting at our landmark 10th edition, please go to: https://www.mediaproductionshow.com/stand-enquiry

    MBI is the publisher of market-leading titles including Broadcast, Broadcast Sport, Broadcast Tech, KFTV, The Knowledge and Screen International.

     

    MIL OSI Economics

  • MIL-OSI Economics: US VC funding more than doubles to $89 billion YoY during January-April 2025, finds GlobalData

    Source: GlobalData

    US VC funding more than doubles to $89 billion YoY during January-April 2025, finds GlobalData

    Posted in Business Fundamentals

    The venture capital (VC) landscape in the US has demonstrated remarkable resilience and growth in funding value in early 2025, despite a slight decline in deal volume. Between January and April 2025, the US recorded a modest decrease of around 4% in VC deal volume compared to the same period in 2024. Despite the fall in volume, the total funding value of these deals more than doubled to reach $89 billion during January-April 2025, according to GlobalData, a leading data and analytics company.

    An analysis of GlobalData’s Deals Database revealed that the total VC funding value in the US was up by a massive year-on-year (YoY) growth of 151% during January-April 2025.

    Aurojyoti Bose, Lead Analyst at GlobalData, comments: “Despite the dip in deal volume, the surge in deal value indicates a strong appetite for larger investments in the US market. And this trend is likely to continue as investors seek to capitalize on high-potential startups.”

    The US continues to account for a significant share of global VC funding, maintaining its position as the top market in terms of both deal volume and value. However, the dominance in terms of value has now become even more pronounced with the massive surge in funding value.

    The US accounted for around 30% of the total number of VC deals announced globally during January-April 2025, while its share of the corresponding value stood much higher at around 70% compared to around 45% during January-April 2024.

    In contrast, other major markets such as China and the UK experienced double-digit declines in deal volume. Moreover, China saw its VC funding value also register a staggering drop of around 50% YoY during January-April 2025. This trend highlights the US’ unique position as a resilient market, attracting big investments even as some other key markets face challenges.

    The US continues to attract big-ticket investments, particularly in the technology sector. Start-ups focusing on technology-driven solutions, particularly in areas such as artificial intelligence (AI), are gaining significant investor traction.

    Some of the notable VC funding deals announced in the US during the first four months of 2025 include $40 billion secured by OpenAI, $3.5 billion raised by Anthropic, and $3 billion raised by Infinite Reality, among others.

    Note: Historic data may change in case some deals get added to previous months because of a delay in disclosure of information in the public domain

    MIL OSI Economics

  • MIL-OSI Global: Rethinking engineering education: Why focusing on learning preferences matters for diversity

    Source: The Conversation – USA – By Sharon Tettegah, Professor of Creative Studies, University of California, Santa Barbara

    Retention and recruitment efforts designed to boost diversity in engineering programs often fall short of their goals. gorodenkoff/Getty Images

    For decades, colleges, government agencies and foundations have experimented with recruitment and retention efforts designed to increase diversity in engineering programs.

    However, the efforts have not significantly boosted the number of women, students of color, individuals with disabilities and other underrepresented groups studying and earning degrees in STEM and engineering fields.

    Latino, Black, Native American and Alaska Native students are underrepresented among science and engineering degree recipients at the bachelor’s degree level and above. The groups are also underrepresented among STEM workers with at least a bachelor’s degree.

    Women are also underrepresented in the STEM workforce and among degree recipients in engineering and computer and information sciences.

    I study equity and social justice in STEM learning. In my recent study, I found that more students from diverse backgrounds could excel in engineering programs if course content were tailored to a wider variety of learning preferences.

    Why it matters

    Focusing on learning preferences could boost diversity in engineering courses and careers.
    Morsa Images/Getty Images

    During my time as a program officer at the National Science Foundation, an independent federal agency that supports science and engineering, I reviewed plenty of research focused on broadening participation and diversifying student enrollment in STEM fields.

    Progress can stall on efforts to boost diversity because college instructors do not consider the synergistic relationship between the content and the learner.

    Teachers are the mediators, and it is students’ experiences with the curriculum that matter.

    It was long a common belief that students have different learning styles. These included kinesthetic, learning through hands-on experiences and physical activity; auditory, learning by listening to information; and visual, learning by seeing information.

    More recent research does not support the idea that teaching students according to their learning style leads to improved learning.

    That’s why I prefer the term “learning preferences” rather than learning styles. We all have preferences – whether for ice cream flavors, home decor or how we receive information, including how we learn.

    Learning preferences are broader and more flexible, allowing multiple ways of engaging with content.

    For example, let’s say a teacher always presented equations in a classroom and the student just could not get it. However, it was the only way the information was presented. To the individual learner, they have failed. Some people would say, “These kids can’t learn,” and subsequently counsel the student out of the class.

    Then, years are spent repeating the same cycle.

    Students should have opportunities to connect with engineering content in multiple ways.
    10’000 hours/Getty Images

    However, educators can broaden their viewpoints if they look at the students as customers. If a customer is shopping for a shirt, they look for one that catches their eye. Ultimately, they find one they like.

    Instructors need to take the same approach when trying to help students understand what is happening in class. For instance, if I have trouble with equations, I should be provided with options to engage with the lesson in ways that align with my learning preferences.

    What’s next?

    Learning styles have been heavily researched. However, content preferences have not been well explored.

    In a truly democratic education system, curriculum design should reflect the voices of all stakeholders and not just those in positions of power, namely instructors.

    Using data mining and artificial intelligence, educators have a variety of options for creating content for the various preferences a learner may want or need. For example, if a student prefers other representational content, such as word problems, graphics or simulations, AI can create diverse representations so that the learner is exposed to a variety of representations.

    I argue that future studies need to consider the use of technologies such as adaptive learning applications to understand students’ learning preferences.

    Prioritizing diverse learning perspectives in STEM could help create a more inclusive and responsive learning environment.

    The Research Brief is a short take on interesting academic work.

    Sharon Tettegah received funding from the National Science Foundation for this work. Award Abstract # 1826632
    Coordinating Curricula and User Preferences to Increase the Participation of Women and Students of Color in Engineering

    ref. Rethinking engineering education: Why focusing on learning preferences matters for diversity – https://theconversation.com/rethinking-engineering-education-why-focusing-on-learning-preferences-matters-for-diversity-251095

    MIL OSI – Global Reports

  • MIL-OSI United Kingdom: Flies, crossbows and comics: novel counter terrorism innovation

    Source: United Kingdom – Executive Government & Departments

    Case study

    Flies, crossbows and comics: novel counter terrorism innovation

    Nine projects, ranging from whether flies can detect explosives to how comics can reduce radicalism and how much of a risk crossbows are, were showcased.

    More than 100 people attended the third University Innovation Concept event exploring ways in which cutting-edge research, often in unexpected areas, can help fight terrorism. 

    Nine fascinating and thought-provoking projects, ranging from whether flies can detect explosives (yes!) to how comics can reduce radicalism, and how much of a terrorism risk crossbows are, were on display at a showcase at the Open University in Milton Keynes, in which the Accelerated Capability Environment (ACE) was a proud partner. 

    Researchers and delegates were welcomed by Inspector Liam Cahill, Innovation Domain Lead at the Counter Terrorism Research Lab (CTRL), and Open University professors Arosha K Bandara and Eleanor Crabb. Annette Southgate, Head of ACE, then took to the stage to stress the importance of work and innovative collaboration such as this to “getting ahead of some of the people that are trying to cause us harm”. 

    Iain Harrison, Director of Digital, Data, Analysis & Technology at Counter Terrorism Policing, explained the rigorous process, supported by ACE, that began with 62 proposals from 28 different universities, which were then reviewed and whittled down to the nine stimulating ideas on display at the showcase event. 

    Bringing academia and Counter Terrorism Policing together 

    The projects that had been explored over 12 weeks of intensive research were showcased across three themes: 

    THEME ONE: Radicalisation and Interventions 

    First to present were a team from Anglia Ruskin University, on the topic of Exploring the Impact of Critical World Events on Extremist Misinformation Network (2020-24). This involved analysing 240 posts from four major platforms to understand how extremist groups exploit global crises on popular social media platforms, using hashtags and multiple forms of misinformation to amplify uncertainty and try and recruit new audiences. It also looked to pinpoint potential novel ways to intervene in this process. 

    Next up were a team from Cranfield University, analysing how social media content algorithms respond to user interactions within specific topics, to answer the question of Can Social Media Algorithms Radicalise? This pilot was designed to quantify if user behaviours such as watching or liking videos influenced a popular platform’s algorithm, and to what extent. The conclusion was that the algorithm could be influenced to provide more content around a particular theme, but it is not yet clear how long this influence lasts. 

    The final presentation in this first session was from the University of Liverpool, exploring the topic of Graphic Novels to Enable Discussion and Promote Critical Thinking. This project involved creating a 46-page book containing four graphic novels on the topic of radicalisation, supported by front-line intervention practitioners, for use in educational strategies to encourage critical thinking. Comics were chosen because they are already popular worldwide, accessible and engaging as a format, and cheap to produce. 

    THEME TWO: Current Threats, Biosensors and Human Networks 

    After a break, another team from Cranfield University, that had been drawing big crowds in the breakout sessions for the four crossbows on display at their stand, spoke on their research into Crossbows: A Real and Current Threat. Against a background of increasing use of crossbows, which can legally be bought by anyone over the age of 18, in targeted incidents, this set out to examine the hit probability and wounding potential of four different systems, their reload times, and how these compared to current policing response times. The conclusions, from a variety of tests including depth of penetration and discharge rate, concluded that crossbows need to be considered a real and present threat for a marauding terrorist attack, because all of those tested have potential to cause significant injury, especially to unprotected organs. 

    Next up was another project that had the audience buzzing – research from a team at The Open University on Fruit Fly Biosensors: Leveraging Olfactory Responses for Detection of Explosives and Toxic Chemicals. This explored if fruit flies, which have exceptional sensitivity, could be used as biosensors to detect toxins, drug precursors and explosives. The answer was potentially yes – experiments with TNT found that exposure to the explosive led to a gradual but clear increase in fly attraction, indicating that fruit flies can detect it. Preliminary lab data also suggests starving the flies may enhance TNT detection speed. 

    The final project in this session was an explanation of a Dynamic Target Indicator Tool (D-TinT) developed by a team at the University of Exeter. This uses techniques from movement pattern analytics and social network analysis to identify the best indicators of links between nodes in a human network based on movement patterns over time. This enables a statistical and spatial mathematical model to be developed. The Tool also identifies what might be flagged as a vulnerable target – either person or place – which could allow counter terrorism stakeholders to test the impact of possible risk-reduction procedures. 

    THEME THREE: Emerging Technologies 

    The final session of a highly enjoyable day started with a team from Robert Gordon University in Aberdeen talking the audience through their research on Leveraging Artificial Intelligence (AI) to Identify and Prevent Terrorism in Prisons: Legislative Gaps and Technological Solutions. This analysed AI’s role in situational awareness and radicalisation prevention, explored how it could support existing counterterrorism efforts, evaluated legal and ethical readiness for AI to be deployed in this way, and proposed technical and legal reforms to enable the responsible use of AI technologies in prison settings. The conclusion of the research was that AI offers significant potential to enhance security and counter-radicalisation efforts in UK prisons. 

    Next, a scoping study of Augmented Reality and Terrorism was presented by Dr Richard Jones of Edinburgh Law School, part of the University of Edinburgh. Billing augmented reality as a “technology in search of a purpose”, his research explored both potential law enforcement applications, such as head-up real-time navigation and facial recognition of persons of interest, as well as how terrorists could use the same technology, for example to create video footage for propaganda purposes. It also looked at how this technology could evolve in the public domain. The research concluded that feasibility factors include device cost and availability as well as the level of required technological expertise, which is likely to fall, in addition to utility and whether it solves a problem. 

    The final presentation of the day was by a team from the University of Southampton on Exploiting Vulnerabilities in Autonomous Vehicle Systems for Terrorist Activity – Threats to UK Critical National Infrastructure. This focused on identifying vulnerabilities in autonomous vehicle systems amid increasing reliance on connected and automated vehicles, analysing how terrorists could exploit these to disrupt or control them. This could include by hijacking the vehicle controls or causing collisions via manipulating road signs. The conclusion was that proactive risk mitigation is paramount. 

    Following the event, Inspector Cahill said: “The University Innovation Concept (UIC) was conceived with the intention of bringing Counter Terrorism Policing and academia closer together to ensure operational decisions made by experienced and knowledgeable personnel are backed by science and academic rigour. 

    “The one-day showcase was also a fantastic opportunity for attendees to network, learn about ongoing research and potentially take learning back to their operational roles, and feedback has been extremely positive.”  

    Reflecting on the event, Professor Southgate said: “ACE is proud to support policing colleagues find new and creative ways of solving frontline mission problems through partnership with researchers from across a diversity of backgrounds and institutions.

    “Accessing diversity of thought, approach and experience helps us step back and consider more impactful and enduring ways of tackling existing and sometimes long-standing problems. 

    “We are keen to help identify and shine a light on brilliant academic work that can already help solve today’s mission problems; highlighting the difference this makes, help build relationships and continue encouraging our talented academic community to support frontline policing work.”

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI: Ataccama strengthens data trust with automated lineage and cloud-native processing

    Source: GlobeNewswire (MIL-OSI)

    BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — Ataccama, the data trust company, today announced the release of Ataccama ONE data trust platform v16.1. This new version introduces powerful data lineage and connectivity capabilities, including enhanced diagram export for audit and compliance use cases and improved lineage visualization tools. It also expands pushdown processing for cloud platforms, such as Azure Synapse and Google BigQuery. With these updates, Ataccama helps organizations more easily operationalize automated lineage, govern data across complex environments, and deliver trusted insights at scale.

    As more organizations shift to hybrid and multi-cloud setups, their data becomes spread across multiple systems, teams, and tools. The result is a growing lack of visibility into the origin of data, how it changes, and its utilization. Without that visibility, building trust, ensuring compliance, and keeping costs down become harder.

    According to Gartner, only 48% of digital initiatives achieve their business outcome targets, often because organizations struggle to find, understand, and trust their data in complex environments. Traditional approaches to data lineage focus too narrowly on technical users, leaving business teams without the context they need to make timely, informed decisions. When teams cannot see where data comes from or how it changes across systems, tracing issues, confirming accuracy, and meeting compliance expectations becomes increasingly difficult.

    The Ataccama ONE data trust platform closes the data trust gap by giving organizations a comprehensive and portable view of how data moves, transforms, and impacts downstream systems. New capabilities make it easier to manage lineage across environments, including exporting diagrams for audits, preserving historical lineage states, and migrating metadata to support governance workflows and system changes. Teams can go beyond static data views to track sensitive information, audit its handling, and build confidence with point-in-time documentation. Expanded pushdown processing allows organizations to analyze data directly within cloud platforms like Azure Synapse and BigQuery, reducing movement, improving performance, and maintaining governance at scale. These updates enable teams to act faster, meet regulatory requirements, and confidently deliver trusted insights.

    “This release makes our lineage capabilities more actionable and enterprise-ready,” said Jessica Smith, VP of Data Quality at Ataccama. “Visualizing lineage in highly regulated and complex sectors like financial services, insurance, or manufacturing is not enough. Organizations need capabilities that support audit readiness, migrations, and change control. These updates allow teams to export diagrams for compliance reporting and manage metadata to promote environments and enforce governance policies. These enhancements help teams meet regulatory demands while staying agile across their data landscape.”

    New capabilities in v16.1:

    • Automated lineage and audit snapshots: Organizations can track lineage automatically across systems and export diagrams as point-in-time snapshots for compliance reporting. Additional features allow teams to preserve historical lineage states and migrate metadata between environments to support governance and system changes.
    • Enhanced visibility and collaboration: Users can customize and export lineage diagrams, drill down into detailed monitoring dashboards, and leverage improved search ranking to pinpoint issues quickly, accelerate troubleshooting, and present compliance metrics with greater precision.
    • Cloud-native data processing: Expanded pushdown processing allows organizations to analyze large datasets directly within cloud platforms like Azure Synapse and BigQuery, reducing data movement, accelerating performance, and significantly lowering cloud processing costs.
    • Support for big data workloads: Enterprises can now catalog, profile, and process Avro files stored on cloud storage systems, streamlining the integration and analysis of large and complex datasets.
    • Enhanced connectivity and flexibility: Updates, including custom schema management for Snowflake pushdown and JWT authentication with HashiCorp Vault, further enable secure, flexible, and scalable enterprise data operations.

    Ataccama ONE data trust platform v16.1 is available immediately. Organizations can learn more and request a demo at: https://www.ataccama.com/platform/data-lineage.

    About Ataccama

    Ataccama is the data trust company. Organizations worldwide rely on Ataccama ONE, the unified data trust platform, to ensure data is accurate, accessible, and actionable. By integrating data quality, lineage, observability, governance, and master data management into a single solution, Ataccama enables businesses to unlock value from their data for AI, analytics, and operations. Trusted by global enterprises, Ataccama helps organizations drive innovation, reduce costs, and mitigate risk. Recognized as a Leader in the 2025 Gartner Magic Quadrant for Augmented Data Quality and the 2025 Magic Quadrant for Data and Analytics Governance, Ataccama continues to set the standard for trusted data at scale. Learn more at www.ataccama.com.

    The MIL Network

  • MIL-OSI: Cangrade Launches Newly Patented Resume Ranker, Enabling Recruiters to Uncover High-Fit Candidates Quickly and Accurately

    Source: GlobeNewswire (MIL-OSI)

    WATERTOWN, Mass., May 21, 2025 (GLOBE NEWSWIRE) — Cangrade today announced the launch of its newly patented Resume Ranker (U.S. Patent No. 12,287,833), an AI feature that enables recruiters to quickly and effectively narrow down high-fit candidates from just a job description. With the ability to assess hundreds of resumes in minutes, Resume Ranker significantly expedites the process of finding top candidates and screening out those who may not meet the specific job requirements for a given role.

    Born out of customer need, Resume Ranker goes a step beyond resume scanning tools and parsers, applying generative AI-powered technology to uncover the most relevant job requisites and subsequently screen for them. Using existing or new job descriptions, the AI then compares them to current candidate pools to uncover the highest fits for a role, based on rankings for both required and desired skills for the job.

    With the ability to identify and edit required skills, users can create and adjust the parameters to find the best candidates. For example, a person applying for a data analyst role without SQL experience would be eliminated. More mundane skills like “record keeping” or “basic computer skills” can be removed or deprioritized. This ensures anyone in the hiring process is aligned based on the scope of the actual job.

    Benefits of Resume Ranker Include:

    • Time Savings: Quickly sort through a large volume of resumes, enabling users to focus on uniquely human parts of the recruiting process, such as interviewing and building rapport with candidates.
    • Ease of Use: Simply access existing job descriptions or copy/paste new ones, with the ability to identify and edit required and desired skills tailored to the role.
    • Improved Accuracy and Insights: View resume rankings in an intuitive dashboard, and based on the results, narrow down candidates or fine-tune job descriptions to uncover the most pertinent skills, and thus candidates, for the role.

    “With the uncertain state of the economy and job market, it’s likely that we’ll see a shift to an employers’ market this year, with more professionals competing for fewer jobs,” said Gershon Goren, founder and CEO, Cangrade. “With less internal resources and a higher number of applicants, recruiters need processes that empower them to make quick and accurate hiring decisions to stay competitive. Resume Ranker is an effective, intuitive tool giving recruiters a leg up.”

    All Cangrade solutions are created through the lens of responsible AI. As such, Resume Ranker doesn’t include any demographic information, like names, in the resume screening process—the biggest driver of bias when using large language models (LLMs). Recruiters select only job-relevant skills and experiences, so the results are solely based on candidates’ competency and ability to perform the skills most important for the job.

    Resume Ranker is now available to subscribers of Cangrade’s AI Copilot, Jules. For more information about Cangrade’s AI-powered, bias-free hiring and talent management solutions, visit www.cangrade.com.

    About Cangrade
    For HR leaders, Cangrade is the bias-free, AI-powered talent intelligence platform. By integrating data into talent acquisition and management processes, Cangrade enables businesses to make strategic and efficient decisions from initial screening through the entire employee lifecycle. Delivering 10x more accurate predictions of talent success and retention than traditional methods, the company’s Pre-Hire Assessment has helped organizations like Wayfair, FDNY, Lamar Advertising, and Applied Industrial Technologies make the right hiring decisions for over 10 million candidates and counting. For more information, visit www.cangrade.com.

    Media Contact:
    Gina Devine
    Public Relations
    press@cangrade.com

    The MIL Network