Category: Technology

  • MIL-OSI USA: Hawley, Durbin Reintroduce Bill Combatting Online Child Sexual Abuse Material 

    US Senate News:

    Source: United States Senator Josh Hawley (R-Mo)

    Wednesday, May 21, 2025

    Today, U.S. Senators Josh Hawley (R-Mo.) and Dick Durbin (D-Ill.) reintroduced the STOP CSAM Act. The legislation will crack down on the proliferation of child sexual abuse material (CSAM) online by allowing victims to sue companies that host it. Senators Chuck Grassley (R-Iowa), Amy Klobuchar (D-Minn.), and Mark Kelly (D-Ariz.) have cosponsored the bill.
    The Senators announced the legislation’s reintroduction in February ahead of their joint hearing highlighting witnesses impacted by CSAM, including survivors, advocates, and law enforcement experts. They originally introduced the legislation last Congress and garnered the votes to unanimously advance it through the Senate Judiciary Committee. 
    “Every day that Congress fails to protect kids online is another day that online predators can victimize children and steal their innocence—and social media companies are totally complicit,” said Senator Hawley. “To stop them, Congress must give parents and victims the right to sue these companies, and my bipartisan legislation would empower them to do just that.”
    “In the real world, child safety is a top priority. But in the virtual world, criminals and bullies don’t need to pick a lock or wait outside the playground to cause harm. They can harass, intimidate, addict, or sexually exploit our kids without leaving home,” said Senator Durbin. “Big Tech has woefully failed to police itself, and the American people are demanding that Congress intervene. We made significant headway last year to address Big Tech’s failure to protect our kids online and it’s time to build on that progress. I’m glad to partner with Senator Hawley to reintroduce our bill supporting victims of child sexual exploitation and increasing accountability for tech companies.”
    Senator Hawley has been a leading proponent of holding Big Tech accountable and protecting kids online. Last year, he questioned Meta CEO Mark Zuckerberg about the rampant child exploitation on his social media platforms, prompting him to stand up and apologize to the families of victims in the room.
    Senator Hawley also introduced legislation to allow any private citizen to sue Big Tech platforms for hosting CSAM. After striking a deal with Senator Durbin to advance the CSAM legislation, the bipartisan bill was eventually blocked on the Senate floor.
    Read the full bill text here. 

    MIL OSI USA News

  • MIL-OSI USA: Padilla, Schiff Condemn Trump Administration’s Student Visa Revocations

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)
    WASHINGTON, D.C. — U.S. Senators Alex Padilla, Ranking Member of the Senate Judiciary Immigration Subcommittee, and Adam Schiff (both D-Calif.) blasted the Trump Administration’s recent harmful revocations of international student visas, including on ideological grounds, underscoring the lack of due process regarding these revocations and the chilling effect of these actions in suppressing freedom of thought and expression. In their letter to Secretary of State Marco Rubio and Department of Homeland Security (DHS) Secretary Kristi Noem, the Senators condemn the revocation of hundreds of California student visas and Immigration and Customs Enforcement’s (ICE) termination of several hundred California students’ Student and Exchange Visitor Information System (SEVIS) records.
    The Senators called on the State Department to immediately stop their “Catch and Revoke” AI-powered initiative, an effort to monitor millions of social media accounts of student visa holders and green card holders to gather evidence of alleged terrorist sympathies. The technology is reportedly being used to monitor international students’ speech through SEVIS and other publicly available resources, leading to the revocation of student visas or green cards for students exercising peaceful expression, without due process. This step to surveil international students’ activity is an unprecedented leap toward stifling students’ First Amendment rights and their freedom of speech. The Senators pushed for restoring revoked visas and full transparency.
    While the Department of Justice has reversed the termination of students’ SEVIS records, the student visa revocations under Catch and Revoke remain ongoing and are instilling fear and uncertainty among international students at colleges and universities in California and across the country.
    “These visa revocations and record terminations constitute unprecedented and unconstitutional attacks on freedom of thought and expression that impact international and U.S. citizen students alike at our nation’s colleges and universities,” wrote the Senators. “While we welcome the news that the Administration has taken steps to rectify the SEVIS record terminations, these actions taken all together still call into question our nation’s bedrock commitment to freedom of expression. We urge the State Department and DHS to suspend the ‘Catch and Revoke’ initiative, which continues to cause uncertainty, erode due process, and chill free speech and expression among students.”
    “The actions taken as part of the ‘Catch and Revoke’ initiative suggest a troubling pattern of misusing immigration enforcement to suppress dissent, intimidate politically active students, and chill Constitutionally protected expression,” continued the Senators. “Without transparency or independent oversight, the risk of abuse continues to grow. In fact, USCIS is now openly targeting speech by noncitizens with other immigration statuses, not just students.”
    The Senators detailed a series of other alarming incidents targeting international students, as ICE has detained students on university campuses, at ports of entry, and in their own homes, often without notice or time to contact an attorney. Many of these cruel arrests were based on limited information within these students’ visa applications and violate the right to due process.
    “Reports indicate that ICE has arrested students based on vague or previously disclosed information in their visa applications — such as social media posts, protest participation, or lawful political associations — as justification for their detention,” added the Senators. “If true, these practices represent not just an overreach of immigration authority but a violation of students’ First Amendment rights. These processes do not appear to be conducted with consideration for students’ due process and require immediate remediation.”
    Padilla and Schiff highlighted the immense contributions international students make to colleges and universities in California and nationwide. California’s more than 140,000 international students contribute roughly $6.4 billion to the U.S. economy and support about 55,114 jobs. These students also strengthen and help the United States secure its global leadership in science, technology, and research; protect U.S. national security interests; and promote innovation.
    The Senators emphasized the critical role California’s higher education system plays in powering the U.S. economy and warned that the attacks on the state’s international students jeopardize the country’s economic future.
    “California’s higher education system is the largest in the nation and considered one of the best in the world, driving global economic mobility—and fueling California’s growth into the fourth largest economy in the world,” wrote the Senators. “These institutions serve as beacons of opportunity and economic potential that transform the lives of hundreds of thousands of students in providing a better life for themselves, their families, and future generations. However, this Administration’s attacks on institutions of higher education and international students, who add immense value to our universities, puts our nation’s economic future at risk.”
    Last month, Senators Padilla and Schiff joined 34 Democrats in pressing the Trump Administration to reconsider recent decisions to revoke student visas. In 2021, Padilla led a group of 23 Senators in calling on the State Department to address the backlog of visas for international students. Padilla also chaired a hearing entitled “Strengthening our Workforce and Economy through Higher Education and Immigration” in 2022, highlighting the challenges undocumented students and international students face in seeking higher education and obtaining jobs in the United States.
    Full text of the letter is available here and below:
    Dear Secretary Rubio and Secretary Noem:
    We write to express our increasing concern about actions targeting international students by the State Department and by Immigration and Customs Enforcement (ICE). Starting earlier this year, the State Department began revoking hundreds of student visas including on apparent ideological grounds, revoking roughly a hundred visas in California alone. These revocations have been conducted by the State Department through its AI-enabled “Catch and Revoke” initiative, instructing affected students to leave the country voluntarily or risk facing deportation proceedings. At the same time, ICE began terminating Student and Exchange Visitor Information System (SEVIS) records for thousands of students—leaving them uncertain about their ability to continue their studies. This includes at least two hundred students in California.
    These visa revocations and record terminations constitute unprecedented and unconstitutional attacks on freedom of thought and expression that impact international and U.S. citizen students alike at our nation’s colleges and universities. While we welcome the news that the Administration has taken steps to rectify the SEVIS record terminations, these actions taken all together still call into question our nation’s bedrock commitment to freedom of expression. We urge the State Department and DHS to suspend the “Catch and Revoke” initiative, which continues to cause uncertainty, erode due process, and chill free speech and expression among students.
    Colleges and universities across the U.S. have long benefitted from the enrollment and participation of international students, who contribute immensely to academic, scientific, and cultural life at schools all around the country. This should not be a partisan issue—there are over 1.1 million international students all over the country, across many states, and the District of Columbia. California enrolls more than 140,850 international students who contribute approximately $6.4 billion to our economy, supporting around 55,114 jobs. Nationally, over 1.12 million international students contribute roughly $43.8 billion to the U.S. economy and support over 370,000 jobs. They also strengthen our national security by fostering global partnerships, cross-cultural understanding, and long-term diplomatic ties with future world leaders educated in the U.S. By attracting top talent from around the globe, we bolster our workforce, drive innovation, and better position ourselves to maintain our competitive edge in science, technology, and research.
    In addition to the State Department visa revocations, multiple alarming incidents have surfaced in recent months involving international students detained by immigration enforcement at university campuses, ports of entry, and even in their homes. In a significant departure from normal practice, these students were, in many cases, not provided prior notice and given no time to contact an attorney, leaving many with few options to defend their nonimmigrant status and their ability to continue studying in the United States. Reports indicate that ICE has arrested students based on vague or previously disclosed information in their visa applications—such as social media posts, protest participation, or lawful political associations—as justification for their detention. If true, these practices represent not just an overreach of immigration authority but a violation of students’ First Amendment rights. These processes do not appear to be conducted with consideration for students’ due process and require immediate remediation.
    The actions taken as part of the “Catch and Revoke” initiative suggest a troubling pattern of misusing immigration enforcement to suppress dissent, intimidate politically active students, and chill Constitutionally protected expression. Without transparency or independent oversight, the risk of abuse continues to grow. In fact, USCIS is now openly targeting speech by noncitizens with other immigration statuses, not just students.
    California’s higher education system is the largest in the nation and considered one of the best in the world, driving global economic mobility—and fueling California’s growth into the fourth largest economy in the world. These institutions serve as beacons of opportunity and economic potential that transform the lives of hundreds of thousands of students in providing a better life for themselves, their families, and future generations. However, this Administration’s attacks on institutions of higher education and international students, who add immense value to our universities, puts our nation’s economic future at risk.
    We urge your agencies to take immediate corrective action by suspending the Catch and Revoke initiative, restoring revoked visas, and providing full transparency to ensure that our immigration system is not misused to police speech at our colleges and universities and maintain beneficial international exchange at universities. We look forward to your prompt response.
    Sincerely,

    MIL OSI USA News

  • MIL-OSI USA: Chairman Mast Delivers Opening Remarks at Hearing on FY26 State Department Posture

    Source: US House Committee on Foreign Affairs

    Media Contact 202-321-9747

    WASHINGTON, D.C. – Today, House Foreign Affairs Committee Chairman Brian Mast delivered opening remarks at a full committee hearing titled, “FY26 State Department Posture: Protecting American Interests.”

    Watch Here

    -Remarks-

    Since day one, President Trump and yourself, you’ve taken bold action to clean house, to restore accountability, to slash waste, and to put America—and Americans—first. I would say that this was desperately needed.

    In the past two decades alone, the State Department’s budget grew from about $9.5 billion to over $55 billion. And I think we could all easily say: for what? In any way, shape, or form did our foreign policy feel like it was five times more effective under Joe Biden? I think everybody would say no.

    Instead, we had a State Department that was literally a slush fund for many far-left bureaucrats, grifting non-government organizations, and foreign adversaries like the Taliban. We had our tax dollars went to things like vouchers for migrants at our southern border, mobilizing elderly lesbians to vote in Costa Rica, as well as drag shows, LGBT comic books, musicals, plays, and operas.

    That stuff was not PEPFAR, to say the least. It didn’t make America safer. It didn’t make America stronger. It didn’t bring other countries closer to us, and it didn’t save lives.

    Now, many of my colleagues might think that canceling these programs creates an inroad for China. I would say we could only hope that China is stupid enough to spend money in that way.

    I want to thank this administration for bringing charges against those who, it appears, were stealing from the State Department and USAID—and, in turn, the American people.

    And I want to thank you, Secretary Rubio, for reorganizing the State Department into a lean and effective diplomatic operation.

    Let’s give proof of that.

    Just this past week alone, President Trump secured more than $2 trillion of investment from the Middle East. That is more than ten times what Joe Biden secured from the Middle East during his entire four years in the White House—which is not entirely surprising, considering under the Biden State Department, millions were spent on programs like trans inclusion in Tunisia. That was the focus in the Middle East.

    Now, as you know, Secretary Rubio, the job is not done. Up until now, over 80% of the State Department has been unauthorized. We have bureaus and offices that have grown from thousands of dollars to billions of dollars, and that changes in law when we pass the first comprehensive and stand-alone State Department reauthorization that has occured since 2002.

    I look forward to working with the members of this committee. I look forward to working with you, Secretary Rubio, and I look forward to working with Senator Risch, moving forward, to make sure that one thing—and one thing alone—takes place: Every single dollar and diplomat that we authorize and send into the field puts America first.

    ###

    MIL OSI USA News

  • MIL-OSI USA: The 1925 Patent of the Norwegian Ostehøvel (Cheese Slicer)

    Source: US Global Legal Monitor

    This weekend marked the national day of Norway, Syttende Mai. I have previously written about the celebrations connected to the national day, including the rules pertaining to the national (Bunad) dresses. Today, I describe the patent act that was in force when the Scandinavian Cheese Slicer (Ostehøvel) first got patented in 1925, 100 years ago this year.

    In 1925, the 1910 Patent Act (Lov om patenter (LOV-1910-07-02-4) was in force. The law can be located either in the Norsk Lovtidende Avd. 1 for the year 1910 or in the Almindelig Norsk Lovsamling. The amendments made in 1920 can be found in Norsk Lovtidende Avd. 1 1920. (Lov om midlertidig tillegg til lovene om patenter av 16. juni 1885 og 2. juli 1910 (LOV-1920-07-16-9).)

    Section 1 of the 1910 Patent Act provides that:

    A patent protects, in accordance with this law, new inventions, which can be utilized in industry.

    However, the following are excluded:

    a) Inventions, the exercise of which would be contrary to law, morality or public order;

    b) Inventions, the object of which is a nutritional, recreational or medicinal product or a chemical compound; however, a patent may be granted on the special manufacturing process.

    In order to obtain a patent for an invention, a patent claim must be submitted to the Styret for det Industrielle Retsvern [literally Board of Industrial Legal Protection] in accordance with the provisions of this Act. (Chapter 1 § 1 Lov om Patenter. Translation by author.)

    The law provided protection against the production and use of a patented product (§ 4) but also allowed for the use by the public, subject to compensation. (§ 8.) A patent holder that had not started production of a product within three years was required to allow others to produce the patented product. (§ 9.)

    The Ostehøvel

    Thor Bjørklund applied for a patent for his cheese slicer (ostehøvel) after being inspired by the plane (høvel) he used in his woodshop, as a better way to cut the cheese economically. The slicer was specialized to cut cheese thin and straight. The cheese slicer was introduced at a time in Norway when the population was poorer than today and cheese needed to last longer. A video on how to use it can be viewed here. A memorial book was published in 2000, Skjær pent av osten, (literally “carefully cut off the cheese”) inspired by a 1971 interview with Thor Bjørklund.

    The patent was published in the Norsk tidende for det industrielle retsvern (1926) in no. 48, p. 234.  The patent entered into force on February 27, 1925.

    Patent application number 43377. Screenshot of Norsk Tidende for Det Industrielle Retsvern, p. 234, made available by the National Library of Norway (Nasjonalbiblioteket) at https://www.nb.no/items/bad74105002005ed8d2f8a1e8645c01a?page=7

    The patent itself is also made available at Stiftelsen Lillehammer Museum with both the 1925 patent announcement and patent text. An additional patent for changes to the cheese slicer was awarded in 1928.

    The 1925 patent text specifically describes the invention in relation to a planer as:

    “This invention relates to a knife for cutting cheese etc. of the type that acts like a planer, where the cutting edge is formed by cutting out and bending down a platform-shaped part or is characterized mainly in that the portions of the plate-shaped part that are located at both ends are cut, are elastic and flexible so that the cheese, even if the angle of the blade in relation to the cheese surface changes during cutting.

    A characteristic feature of the invention further consists in that the thickness of the cheese slice is regulated in a manner known during cutting by bending the plate-shaped part.” (Translation by author.)

    The ostehøvel has become one of the most loved Norwegian inventions.

    Norwegian Patent Law Today

    Today, Norway regulates patent law in Lov om patenter (patentloven)(LOV-1967-12-15-9) (the Patent Act). An unofficial English translation of the Patent Act is published on the Norwegian Industrial Property Office website. Norway is a party to the Paris Convention for the Protection of Industrial Property (1885), the Patent Cooperation Treaty (PTC)(1980), and the Budapest Treaty on the International Recognition of the Deposit of Microorganisms for the Purposes of Patent Procedure (1977). Norway has ratified the European Patent Convention (EPC) and is a member of the European Patent Office (EPO).

    Today, a patent application can be made by presenting an application to the Norwegian Industrial Property Office and paying the applicable fee. Applications can be made as an EPC application or a Norwegian application. If the patent is awarded, there is an annual fee to maintain the patent.

    Examples of Law Library holdings related to Norwegian Patent Law:

    Additional Law Library of Congress Online Resources on Norwegian Law:

    Subscribe to In Custodia Legis – it’s free! – to receive interesting posts drawn from the Law Library of Congress’s vast collections and our staff’s expertise in U.S., foreign, and international law.

    MIL OSI USA News

  • MIL-OSI: iRhythm Technologies to Participate in Upcoming Investor Conferences

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, May 21, 2025 (GLOBE NEWSWIRE) — iRhythm Technologies, Inc. (NASDAQ:IRTC), a leading digital health care company focused on creating trusted solutions that detect, prevent, and predict disease, today announced that its management team is scheduled to present at the following investor conferences.

    • William Blair 45thAnnual Growth Stock Conference on Wednesday, June 4, 2025, at 2:00 p.m. Central Time (12:00 p.m. Pacific Time)
    • Goldman Sachs 46thAnnual Global Healthcare Conference on Tuesday, June 10, 2025, at 2:40 p.m. Eastern Time (11:40 a.m. Pacific Time)
    • Truist Securities MedTech Conference on Tuesday, June 17, 2025, at 1:40 p.m. Eastern Time (10:40 a.m. Pacific Time)

    Interested parties may access live and archived webcasts of the presentations on the “Events & Presentations” section of the company’s investor website at investors.irhythmtech.com.

    About iRhythm Technologies, Inc.
    iRhythm is a leading digital health care company that creates trusted solutions that detect, predict, and prevent disease. Combining wearable biosensors and cloud-based data analytics with powerful proprietary algorithms, iRhythm distills data from millions of heartbeats into clinically actionable information. Through a relentless focus on patient care, iRhythm’s vision is to deliver better data, better insights, and better health for all. For additional information about iRhythm, please visit its corporate website at irhythmtech.com.

    Investor Contact
    Stephanie Zhadkevich
    investors@irhythmtech.com

    Media Contact
    Kassandra Perry
    irhythm@highwirepr.com

    The MIL Network

  • MIL-Evening Report: Evidence shows AI systems are already too much like humans. Will that be a problem?

    Source: The Conversation (Au and NZ) – By Sandra Peter, Director of Sydney Executive Plus, University of Sydney

    Studiostoks / Shutterstock

    What if we could design a machine that could read your emotions and intentions, write thoughtful, empathetic, perfectly timed responses — and seemingly know exactly what you need to hear? A machine so seductive, you wouldn’t even realise it’s artificial. What if we already have?

    In a comprehensive meta-analysis, published in the Proceedings of the National Academy of Sciences, we show that the latest generation of large language model-powered chatbots match and exceed most humans in their ability to communicate. A growing body of research shows these systems now reliably pass the Turing test, fooling humans into thinking they are interacting with another human.

    None of us was expecting the arrival of super communicators. Science fiction taught us that artificial intelligence (AI) would be highly rational and all-knowing, but lack humanity.

    Yet here we are. Recent experiments have shown that models such as GPT-4 outperform humans in writing persuasively and also empathetically. Another study found that large language models (LLMs) excel at assessing nuanced sentiment in human-written messages.

    LLMs are also masters at roleplay, assuming a wide range of personas and mimicking nuanced linguistic character styles. This is amplified by their ability to infer human beliefs and intentions from text. Of course, LLMs do not possess true empathy or social understanding – but they are highly effective mimicking machines.

    We call these systems “anthropomorphic agents”. Traditionally, anthropomorphism refers to ascribing human traits to non-human entities. However, LLMs genuinely display highly human-like qualities, so calls to avoid anthropomorphising LLMs will fall flat.

    This is a landmark moment: when you cannot tell the difference between talking to a human or an AI chatbot online.

    On the internet, nobody knows you’re an AI

    What does this mean? On the one hand, LLMs promise to make complex information more widely accessible via chat interfaces, tailoring messages to individual comprehension levels. This has applications across many domains, such as legal services or public health. In education, the roleplay abilities can be used to create Socratic tutors that ask personalised questions and help students learn.

    At the same time, these systems are seductive. Millions of users already interact with AI companion apps daily. Much has been said about the negative effects of companion apps, but anthropomorphic seduction comes with far wider implications.

    Users are ready to trust AI chatbots so much that they disclose highly personal information. Pair this with the bots’ highly persuasive qualities, and genuine concerns emerge.

    Recent research by AI company Anthropic further shows that its Claude 3 chatbot was at its most persuasive when allowed to fabricate information and engage in deception. Given AI chatbots have no moral inhibitions, they are poised to be much better at deception than humans.

    This opens the door to manipulation at scale, to spread disinformation, or create highly effective sales tactics. What could be more effective than a trusted companion casually recommending a product in conversation? ChatGPT has already begun to provide product recommendations in response to user questions. It’s only a short step to subtly weaving product recommendations into conversations – without you ever asking.

    What can be done?

    It is easy to call for regulation, but harder to work out the details.

    The first step is to raise awareness of these abilities. Regulation should prescribe disclosure – users need to always know that they interact with an AI, like the EU AI Act mandates. But this will not be enough, given the AI systems’ seductive qualities.

    The second step must be to better understand anthropomorphic qualities. So far, LLM tests measure “intelligence” and knowledge recall, but none so far measures the degree of “human likeness”. With a test like this, AI companies could be required to disclose anthropomorphic abilities with a rating system, and legislators could determine acceptable risk levels for certain contexts and age groups.

    The cautionary tale of social media, which was largely unregulated until much harm had been done, suggests there is some urgency. If governments take a hands-off approach, AI is likely to amplify existing problems with spreading of mis- and disinformation, or the loneliness epidemic. In fact, Meta chief executive Mark Zuckerberg has already signalled that he would like to fill the void of real human contact with “AI friends”.

    Relying on AI companies to refrain from further humanising their systems seems ill-advised. All developments point in the opposite direction. OpenAI is working on making their systems more engaging and personable, with the ability to give your version of ChatGPT a specific “personality”. ChatGPT has generally become more chatty, often asking followup questions to keep the conversation going, and its voice mode adds even more seductive appeal.

    Much good can be done with anthropomorphic agents. Their persuasive abilities can be used for ill causes and for good ones, from fighting conspiracy theories to enticing users into donating and other prosocial behaviours.

    Yet we need a comprehensive agenda across the spectrum of design and development, deployment and use, and policy and regulation of conversational agents. When AI can inherently push our buttons, we shouldn’t let it change our systems.

    Jevin West receives funding from the National Science Foundation, the Knight Foundation, and others. The full list of funders and affiliated organizations can be found here: https://jevinwest.org/cv.html

    Kai Riemer and Sandra Peter do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Evidence shows AI systems are already too much like humans. Will that be a problem? – https://theconversation.com/evidence-shows-ai-systems-are-already-too-much-like-humans-will-that-be-a-problem-256980

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI: Best Same Day Payday Loans for Quick Cash in 2025: MoneyMutual Picked as the Top Pick for Guaranteed Approval

    Source: GlobeNewswire (MIL-OSI)

    Las Vegas, NV, May 21, 2025 (GLOBE NEWSWIRE) —

    In today’s unpredictable economy, financial emergencies rarely come with a warning. A sudden car repair, medical bill, or missed paycheck can send even the most prepared households into a scramble. In such moments, speed isn’t just convenient, it’s essential.

    As Americans increasingly turn to fast, flexible lending options, the demand for same-day payday loans has surged. Just as we expect rapid food delivery and real-time updates, financial solutions must also keep pace. Consumers want cash in hand, not tomorrow, but today.

    Amid a crowded field of lenders and brokers, MoneyMutual has emerged as the leading online platform connecting borrowers with trusted same-day payday loan providers. Recognized for its efficiency, wide lender network, and secure process, MoneyMutual stands out as the top choice for those seeking fast financial relief in a pinch.

    Stay with us as we take a closer look at how MoneyMutual works and why it’s become the go-to resource for same-day lending solutions in 2025.

    >> Consider MoneyMutual for Same Payday Loans >>

    Overview of the Leading Same Day Payday Loan Connection Service – MoneyMutual

    When time is of the essence and financial relief can’t wait, MoneyMutual stands at the forefront of same-day payday loan connection services. With a reputation built on speed, simplicity, and trust, the platform offers a fast and accessible route for borrowers seeking immediate financial support.

    Speed of Potential Funding: One of MoneyMutual’s standout features is its ability to facilitate rapid access to funds, often as soon as the same business day. After submitting a short application, borrowers are swiftly connected with a lender from the platform’s expansive network. If approved, funds can be deposited directly into the applicant’s bank account within hours, depending on the lender’s processing times and bank policies.
    Extensive Lender Network: MoneyMutual doesn’t issue loans directly. Instead, it acts as a trusted intermediary, linking users to an array of verified online payday lenders. This expansive network increases the chances of loan approval by matching borrower needs with the criteria of various lending partners.

    >> Visit MoneyMutual to Find Out More >>

    Key Evaluation Factors

    To determine why MoneyMutual stands out among same-day payday loan connection services, several key factors were assessed, from lender quality to user experience.

    Quality and Size of Lender Network
    MoneyMutual partners with over 60 lenders, ranging from specialized payday providers to short-term installment loan companies. These are vetted for reliability and compliance, offering borrowers a better shot at finding a match tailored to their financial situation.

    Accessibility of Loan Options
    The platform supports a broad range of loan amounts, typically between $100 and $5,000, depending on individual lender terms and borrower qualifications. This flexibility accommodates everything from small emergencies to more urgent, moderate expenses.

    Potential for Rapid Funding
    Once connected with a lender, borrowers may receive funds as quickly as within 24 hours, and in some cases, the same day. This makes MoneyMutual a highly attractive option for those facing time-sensitive financial stressors.

    Platform Usability
    The MoneyMutual website is designed for ease and efficiency, featuring mobile compatibility and streamlined navigation. Borrowers can apply, review offers, and connect with lenders all within minutes.

    Simple Application Process
    Filling out MoneyMutual’s secure online form typically takes under five minutes. Applicants provide basic information about their income, employment status, and banking details. Once submitted, the platform immediately begins matching them with potential lenders.

    Features for Borrowers
    MoneyMutual allows users to compare loan offers from multiple lenders in one place. This increases transparency and empowers users to select the option that best meets their needs.

    Transparency of Lender Terms
    While MoneyMutual itself doesn’t dictate terms, it emphasizes partnerships with lenders that clearly disclose loan amounts, repayment dates, APRs, and fees, a crucial feature in helping borrowers make informed decisions.

    Ease of Navigation
    The website features a clean, modern interface with clear calls-to-action and informative content. Even first-time users will find it intuitive to use on desktop or mobile.

    Typical Loan Parameters
    Loan amounts facilitated through MoneyMutual generally range from $100 to $5,000, with repayment periods often between 14 and 30 days, depending on the lender and state regulations. Some lenders may offer extended terms for installment loans.

    >> Consider MoneyMutual for Same Payday Loans >>

    Pros and Cons of MoneyMutual for Same Day Payday Loans

    In a financial climate where speed often matters most, MoneyMutual has emerged as a go-to marketplace for borrowers seeking same day payday loans. But how does it really stack up? We take a closer look at the platform’s key advantages and potential drawbacks as more Americans turn to short-term lending for emergency expenses.

    Pros:

    • Potential for Fast Fund Access: Many users report receiving funds as soon as the next business day, sometimes even within hours, depending on the lender.
    • Large Network of Participating Lenders: MoneyMutual connects users with a broad pool of lenders, increasing the chances of finding a match, even with less-than-perfect credit.
    • Streamlined Online Application Process: The initial form takes just minutes to complete, making it ideal for time-sensitive borrowing needs.
    • User-Friendly Online Platform: The website is simple to navigate, guiding applicants from inquiry to lender match with minimal friction.
    • Opportunity to Compare Multiple Loan Offers: Users can review different offers and select terms that best align with their needs before committing.

    Cons:

    • MoneyMutual Is Not a Direct Lender: The platform acts as a facilitator, meaning users must evaluate and finalize terms with third-party lenders independently.
    • Loan Terms and Interest Rates Vary by Lender: APRs, repayment windows, and fees differ widely, and borrowers must scrutinize each offer carefully.
    • Payday Loans Typically Involve High Interest Rates and Fees: Even when fast cash is needed, these loans can become costly, especially if rolled over or extended.

    How to Utilize MoneyMutual for Potential Same Day Payday Loans

    As financial pressures grow for millions of Americans, platforms like MoneyMutual are seeing increased usage from borrowers in need of quick cash. Here’s how consumers can navigate the service to potentially access same day payday loans.

    Step-by-Step Process:

    • Visit the Official MoneyMutual Website: Begin by going to MoneyMutual.com, where users can start the loan inquiry process directly from the homepage.
    • Complete the Secure Online Application Form: Applicants are asked to enter basic personal and financial information. The form typically takes just a few minutes and is encrypted to protect sensitive data.
    • Review Loan Offers from Lenders in the Network: Once submitted, the system distributes the application to a network of participating payday lenders. Eligible borrowers may receive multiple offers to compare.
    • Examine Terms and Conditions Carefully Before Accepting: Each lender sets its own rates, fees, and repayment requirements. Experts caution that borrowers should read all terms closely and ensure they understand the total repayment cost before agreeing to any loan.

    With no obligation to accept an offer, MoneyMutual serves as a free intermediary rather than a direct lender. However, borrowers should be aware of state-specific payday loan regulations and consider all financial alternatives before proceeding.

    Types of Short-Term Financial Assistance Facilitated by MoneyMutual

    As rising costs and inflation strain household budgets, Americans are increasingly turning to alternative lending platforms for fast, flexible cash solutions. Among them, MoneyMutual has gained traction as a major online marketplace that connects borrowers with lenders offering a variety of short-term financial products. While the platform itself isn’t a direct lender, it facilitates access to multiple loan types tailored for immediate financial relief.

    Here’s a closer look at the key types of loans available through the MoneyMutual network:

    • Payday Loans: These are brief, high-cost loans intended to cover expenses until the borrower’s next paycheck. Loan amounts are typically small, often between $100 and $1,000, but carry high interest rates and fees. While controversial due to their cost, payday loans remain a common solution for those facing sudden emergencies like utility shutoff notices or medical expenses.
    • Short-Term Loans: This broader category includes installment loans and other forms of lending with short durations, usually ranging from a few weeks to several months. These loans may offer slightly more favorable repayment terms than traditional payday loans and can be used for a variety of needs, such as auto repairs, rent payments, or temporary income disruptions.
    • Bad Credit Loans: For borrowers with low credit scores or limited credit history, MoneyMutual helps facilitate access to lenders willing to work with higher-risk applicants. These loans come with elevated interest rates but offer a vital financial lifeline to consumers often excluded from traditional banking systems.
    • Cash Advances: Cash advances are designed for rapid disbursement, sometimes within 24 hours, and are ideal for extremely time-sensitive expenses. Typically repaid from the borrower’s next paycheck, these loans are often used to bridge the gap between pay periods or when an unexpected cost arises.

    While these financial products can offer short-term relief, experts caution they should be used carefully. Borrowers are urged to read loan terms closely, understand all associated fees, and assess whether repayment timelines align with their income schedule. Platforms like MoneyMutual may provide access, but financial responsibility lies squarely with the borrower.

    Customer Support and Resources Offered by MoneyMutual

    As more consumers turn to online lending marketplaces for fast financial relief, support and transparency have become increasingly important. MoneyMutual offers a basic but functional support system designed to guide users through the lending process.

    Unlike direct lenders, MoneyMutual serves as an intermediary, connecting users with its network of more than 60 short-term lenders. Because of this, its customer support doesn’t extend to loan management or repayment issues, which must be handled directly with the individual lender. However, the platform does provide users with access to key resources that help clarify how the loan matching process works.

    The company maintains a comprehensive FAQ section on its website, offering clear answers to common questions about eligibility, the loan request process, credit requirements, and fund disbursement. The site also outlines what borrowers can expect after being matched with a lender and encourages users to review terms carefully before signing any agreement.

    The platform doesn’t offer live chat or in-depth financial education tools, it emphasizes its role as a free service to connect borrowers with loan offers, placing the responsibility of further communication and decision-making on the user.

    Potential Disbursement Methods Through MoneyMutual’s Network

    As more consumers turn to online lending platforms for fast financial relief, how those funds are delivered becomes just as critical as loan approval itself. MoneyMutual, one of the most recognized payday loan marketplaces, connects borrowers with a wide range of lenders, each offering different methods of disbursing funds.

    • Direct Deposit to Bank Account: The most widely used and efficient method among lenders in the MoneyMutual network is direct deposit. Once approved, borrowers may receive funds directly into their checking account, often within 24 hours. For many facing urgent expenses, this speed and convenience are a significant advantage.
    • Other Methods (Varies by Lender): While direct deposit remains the standard, some lenders may offer alternative electronic disbursement options, such as ACH transfers or prepaid debit card funding. However, availability can vary by lender and borrower location, and these alternatives may affect how quickly funds are accessible.

    Borrowers using MoneyMutual should confirm disbursement methods and timelines directly with their matched lender to ensure there are no delays in accessing their funds.

    Navigating Same Day Payday Loans Responsibly: Important Cautions

    Same day payday loans can serve as a financial lifeline in moments of crisis, but they must be approached with caution. The high interest rates, short repayment terms, and risk of repeat borrowing make them a risky option for most consumers. 

    By understanding the costs, reading loan terms carefully, and seeking alternative financial solutions where possible, borrowers can protect themselves from unnecessary financial hardship. Responsible borrowing begins with informed decision-making, and when in doubt, seeking professional financial guidance is always a wise move.

    Understand the High Costs
    Same day payday loans may provide fast funds, but they are among the most expensive forms of borrowing available. These loans typically carry high interest rates, with annual percentage rates (APRs) that can reach or exceed 300%. 

    In many cases, the fees and interest owed may be nearly as much as the original loan amount. For example, borrowing $300 could cause repaying $375 or more in just two weeks. Without a clear repayment strategy, the costs can escalate quickly, especially if the borrower is forced to extend or roll over the loan.

    Review Loan Terms Carefully
    Payday loans are legally required to disclose all terms and fees, but borrowers often overlook the fine print. Each lender may have different repayment policies, fees for late or missed payments, or clauses that allow for automatic withdrawal from a borrower’s checking account. 

    Carefully reviewing these terms before accepting a loan is essential. Understanding the total repayment amount, due date, and what happens if repayment is delayed can help prevent surprises and avoid spiraling fees.

    Borrow Only What You Can Repay
    It may tempt you to borrow the maximum amount offered, especially when facing financial stress. However, payday loans are due in full within a short timeframe, usually on your next payday. Borrowing more than you can reasonably afford to repay can quickly result in bounced payments, overdraft fees, or the need to take out additional loans.

    A good rule of thumb is to borrow the minimum amount needed and ensure that full repayment can be made from your next paycheck without jeopardizing other essential expenses.

    Be Aware of Short Repayment Periods
    Unlike personal loans or credit cards that allow for flexible monthly payments, payday loans are typically due in a lump sum within 14 to 30 days. This compressed repayment window can strain already tight budgets.

    Missing the repayment deadline can trigger additional fees and result in a cycle of borrowing and debt accumulation. Many borrowers find themselves having to take out new payday loans just to cover the previous ones, further increasing financial stress.

    Consider Alternatives First
    Before committing to a payday loan, it’s worth exploring other, less expensive borrowing options. Credit unions often offer Payday Alternative Loans (PALs), which feature lower interest rates and longer repayment periods. Some banks provide small-dollar personal loans with predictable terms. 

    Other alternatives include negotiating payment plans with utility companies, seeking temporary hardship assistance from local nonprofits, or utilizing buy now, pay later services for specific purchases. These alternatives may not offer instant cash, but they typically come with fewer long-term risks and better repayment flexibility.

    Recognize the Risk of Debt Traps
    One of the most concerning aspects of payday loans is the potential for borrowers to fall into a debt trap. Many payday loan users find themselves unable to repay the full balance on time and must take out another loan to cover the previous one. This cycle of borrowing and repayment often continues for months, with fees compounding at every step. 

    Over time, a small loan can grow into a major debt burden, affecting a borrower’s ability to meet other financial obligations and damaging their overall financial stability.

    Seek Financial Advice if Needed
    For those considering payday loans or currently struggling with repayment, seeking help from a financial advisor or credit counselor can be a valuable step. Nonprofit credit counseling agencies offer free or low-cost services that include budgeting support, debt management plans, and guidance on safer borrowing options. 

    Some states and local governments also provide financial education programs to help consumers better understand loan terms and credit usage. Accessing these resources can provide long-term financial strategies that reduce reliance on high-cost, short-term loans.

    Frequently Asked Questions

    If you’re considering a same-day payday loan, it’s important to understand exactly how these loans work, what they cost, and what to expect from the process. Below are answers to the most common questions borrowers ask before applying.

    What Is a Same-Day Payday Loan?
    A same-day payday loan is a short-term, high-interest loan designed to give borrowers quick access to cash, usually on the same day they apply. These loans are used to cover urgent expenses such as medical bills, car repairs, or unexpected utility payments. The loan amount is usually small (often between $100 and $1,000) and must be repaid in full on your next payday, usually within two to four weeks.

    How Quickly Can I Get the Money?
    If approved, many lenders can deposit funds into your bank account within a few hours or by the end of the business day. However, actual timing depends on when you apply, the lender’s processing speed, and your bank’s deposit policies. Some lenders offer instant funding or same-day direct deposit if applications are submitted early in the day, while others may require overnight processing.

    Do I Need Good Credit to Get a Same-Day Payday Loan?
    No, same-day payday loans are generally accessible to borrowers with poor credit or no credit history at all. Most lenders don’t perform hard credit checks and instead focus on your income, employment status, and ability to repay the loan. Proof of a steady income, a valid ID, and an active checking account are typically the main requirements for approval.

    What Are the Costs Associated With Same-Day Payday Loans?
    Same-day payday loans can be very expensive. While the fees may seem modest upfront, the annual percentage rates (APRs) can reach 300% or more. For example, a $300 loan with a $45 fee for two weeks equates to a 391% APR. Failing to repay the loan on time can lead to additional fees, interest, and in some cases, collection activity. Always review the full cost of borrowing before committing.

    Can I Extend or Roll Over My Payday Loan If I Can’t Repay It on Time?
    Some lenders may offer extensions or rollovers, which allow you to delay repayment by paying an additional fee. However, this often leads to a cycle of debt, as the interest continues to accrue. Rolling over a loan once or multiple times can double or even triple your repayment obligation. If you’re struggling to repay, it’s best to contact the lender early and explore options, or seek help from a nonprofit credit counselor to avoid escalating costs.

    Editorial Note
    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in payday loans.

    Affiliate Transparency
    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer
    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it’s meant for informational purposes only. These entities aren’t responsible for the legality, relevance, or interpretation of the material.

    Contact

    • Company: MoneyMutual
    • Address: 2510 E. Sunset Rd. Ste 6, #85 Las Vegas NV, 89120
    • Email: customerservice@moneymutual.com
    • Phone Support: 844-276-2063

    Attachment

    The MIL Network

  • MIL-OSI: Best Mobile Tracking & Monitoring App 2025: mSpy Review – Top Mobile Spy App for Hidden Phone Surveillance

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) — In the contemporary era of digitization, the ubiquity of smartphones has redefined our modes of communication and global connectivity.

    Concomitant with this technological progress, the surge of phone surveillance applications has emerged, granting a window into the undertakings and engagements transpiring on these gadgets.

    Track Instantly with the Best Mobile Tracking App – Try mSpy Before It’s Too Late!

    While phone surveillance software wields considerable potential within certain contexts, it is imperative to undertake their employment with a discerning consciousness of accountability and ethical considerations.

    Observing the current landscape, it becomes evident that social media platforms and mobile devices have assumed roles of paramount significance in the contemporary child’s life. Per findings unveiled by the Common Sense Census, a notable 84% of American adolescents within the age cohort of 13 to 18 acquired their initial smartphone during the year 2019. Subsequently, these youths dedicated an average of precisely 7 hours and 22 minutes daily, exclusively engrossed in social media applications and websites.

    Top Pick: mSpy – Best Mobile Spy & Monitoring App for Hidden Phone Surveillance this year.

    While the internet undeniably furnishes global youngsters with a commendable avenue for unfettered education and communication, it has concurrently engendered a milieu wherein they engage with individuals entirely unfamiliar to them. This virtual realm’s essence necessitates an appraisal of the electronic safety quotient. Young minds stand perpetually exposed to online perils, ranging from cyberbullying and harassment to the insidious realm of sextortion. Beyond this, extensive social media usage harbors the potential to precipitate internet dependency, potentially culminating in social interaction deficits amongst the youthful demographic.

    Don’t Settle for Less: Get the Best Mobile Spy App of 2025 – mSpy Is All You Need

    Advancements in technology are progressing rapidly, and the pervasive presence of smartphones is evident across diverse age groups. People spanning from children to adults rely on various applications and mobile services to facilitate their daily routines. The desire to ensure your children’s well-being in the digital realm, gather pertinent information from your spouse’s mobile device, or optimize workforce efficiency might lead to the inclination of discreetly and autonomously monitoring a specific individual’s Android device.

    However, not all of these options prove to be efficient and valuable. Among the array of spy applications we evaluated, mSpy emerged as our paramount selection after meticulous scrutiny. 

    Why Mobile Tracking Apps Are in High Demand in 2025
    The need for mobile tracking and monitoring apps has surged in 2025. With nearly everyone relying on smartphones for work, social interaction, and entertainment, concerns around digital safety, accountability, and privacy breaches have grown. Parents are more cautious than ever about their children’s online activity. Employers are seeking better ways to monitor company-issued devices. Even individuals in relationships are using tracking apps to rebuild trust or stay informed.
    Monitor Any Device in Stealth Mode – mSpy Is the Best Mobile Tracking App Trusted Worldwide
    Cyberbullying, online predators, screen addiction, and unauthorized data sharing are just a few reasons why mobile tracking solutions are in high demand. At the same time, the rise of remote workforces has made employee monitoring essential for business owners to prevent misuse of company time and resources.
    Apps like mSpy have emerged as tools that provide peace of mind. They offer insight into text messages, GPS locations, app usage, and more—without requiring direct access to the device in real time. These tools are becoming an integral part of modern digital life, helping people feel more secure in a hyper-connected world.
    What to Look For in a Mobile Spy App
    Not all mobile tracking apps are created equal. Some offer advanced features but lack ease of use; others are stealthy but limited in scope. If you’re looking for a phone spy app in 2025, there are several key features to prioritize.
    First, compatibility is crucial—make sure the app works on both Android and iOS devices. Look for real-time GPS tracking, call and SMS logs, social media monitoring, and browsing history access. The app should run discreetly in the background to avoid detection and provide a user-friendly dashboard for accessing tracked data.
    Security is equally important. Top-tier apps use encrypted data channels to ensure privacy, both for the person being monitored and the one viewing the information. Reliable customer support, frequent updates, and clear installation guides also add to a tool’s credibility.
    When evaluating mobile monitoring software, features like geofencing, app usage limits, and screen time analysis can add extra value—especially for parental use. A well-rounded app like mSpy offers all of these while keeping the setup process simple and discreet.
    Full Access. Zero Detection. mSpy Is the Best Mobile Spy App for Hidden Surveillance
    Is Phone Spying Safe & Ethical?
    Phone tracking, when used ethically, can serve as a protective tool. But misuse can raise serious privacy concerns. The line between security and surveillance often comes down to intent—and legality.
    In many countries, it’s legal for parents to monitor the phones of their minor children without consent. Employers may also monitor company-owned devices provided they disclose it in their policies. However, using a spy app to monitor a partner or adult without consent can cross legal and ethical boundaries.
    Apps like mSpy are designed for legitimate use cases, particularly child safety and employee productivity. The app clearly states that users must comply with local laws and have proper authorization. If used responsibly, mSpy can empower users to stay informed and make proactive decisions without violating trust.
    Understanding the ethical framework before using any mobile spy app is critical. When used as intended—for safety, protection, and responsible oversight—it becomes a digital ally rather than an invasion of privacy.

    Top-Rated mSpy Deal: The #1 Phone Monitoring App Is Just a Click Away

    What Is mSpy?

    mSpy is a mobile tracking and monitoring application designed to give users discreet access to key data from smartphones and tablets. Introduced to the market in 2010, the spy application tailored for smartphones provides the capability to clandestinely observe individuals employing the designated device. It seamlessly integrates into employee phones or the devices of your progeny, facilitating real-time oversight of their whereabouts and engagements on the device.
    Leveraging mSpy’s free version, you can meticulously monitor diverse activities, encompassing geographic movements, social media interactions, phone conversations, as well as the dispatch and receipt of messages.

    The apex attribute of this application resides in its inconspicuous functionality, evading detection by the party under scrutiny. It discreetly operates in the backdrop, diligently acquiring information without arousing their awareness.

    Over the course of time, this technology has undergone refinement, with mSpy presently standing as the preeminent application of its genre. Its ascendancy is corroborated by a substantial user base exceeding one million parents who employ it as a means to oversee their children’s pursuits. Furthermore, it proves instrumental for spouses and employers who harbor the intent to gain insights into the activities of their target individuals.

    mSpy encompasses these pivotal features for parental supervision:

    • Online and application filtering — Dictate the permissible applications for your children and the websites they are permitted to access. It’s worth noting that mSpy’s capacity for website filtering is limited to specific blacklisting, without the option to categorically filter websites.
    • Location tracing — Maintain tabs on your child’s whereabouts and their historical movements.
    • Activity summaries — Consolidates and presents insights regarding your child’s device utilization, encompassing their most frequent contacts for messaging and calling, prevalent websites visited, and more.

    In addition to the aforementioned, mSpy boasts an array of supplementary functionalities, inclusive of call and SMS tracking, surveillance of social media applications, a keylogger, and screen recording capabilities.

    Get the Best Mobile Spy App of the Year – Instant mSpy Setup. No Tech Skills Needed.

    How does mSpy work?

    As previously indicated, subsequent to a successful installation of mSpy on the designated mobile device, it will seamlessly operate in the device’s background. It diligently assembles a wide spectrum of data from the said device, encompassing call logs, text messages, instant messaging dialogues, geographic positioning, among others, subsequently transmitting this data to your designated mSpy account.

    Subsequently, accessing your account is a streamlined process. You can effortlessly log into your account utilizing any web browser accessible through diverse devices such as mobile phones, desktops, and laptops, thus facilitating a thorough perusal of the accumulated information as per your convenience.
    Simplified Monitoring in Three Effortless Phases
    To initiate monitoring, you can effortlessly adhere to the ensuing three uncomplicated stages, commencing your child’s device oversight seamlessly.

    First Step: Select a Subscription
    Embark upon your journey by selecting an appropriate subscription plan from the mSpy website, catering to your precise software attribute prerequisites. Subsequently, finalize the purchase by inputting your payment particulars. Following this, an email confirming your transaction will be dispatched to your inbox.

    Second Step: Deploy mSpy onto the Target Device
    Contained within the welcome email is an installation manual, meticulously guiding you through the process of establishing the mSpy application upon the targeted device.

    Third Step: Initiate Surveillance
    With the successful implementation of mSpy upon the designated device, you can seamlessly access your control panel on the mSpy website, thereby commencing an effortless exploration of the acquired data through an intuitively designed dashboard.

    ==> Special Discount: Order Today With Best Price And Special Offers <==

    Primary Features of mSpy

    mSpy has several unique features and we are explaining a few of them that piqued our interest.

    • Supervision and Site Limitation: Embedded within mSpy’s array of functionalities is the capacity to oversee the websites frequented by your child or designated individual, encompassing even bookmarked pages. Moreover, the application stands poised to furnish prompt notifications when particular keywords are inputted into the mobile device. This dynamic attribute can prove notably advantageous for parents, enabling them to attain heightened insights into their children’s online explorations and content consumption.
    • Moreover, an ancillary capability affords you the prerogative to restrict access to specific websites. This provision holds true on the premise that the monitored entity employs any of the prevalent web browsers such as Safari, Chrome, or a native Android browser. 
    • Procure Requisite Insights: The entirety of the data gleaned from the targeted device orchestrates its voyage to your dedicated dashboard on mSpy.com. This hub offers a comprehensive glimpse into the targeted phone’s operating system, memory utilization, as well as particulars regarding the cell provider and installed software version. The dashboard even presents real-time indications of the remaining battery charge. Furthermore, it extends visibility into the habitual usage patterns and synchronization status of the targeted phone.
    • From this vantage point, you wield the authority to either reactivate or entirely disable the software. Additional functionalities encompass log extraction, device locking, log removal, disconnection from the application, data preservation measures in the event of device loss, and the capacity to initiate a device reboot. mSpy endows you with a formidable realm of control, resting at your disposal.
    • Text Communication Surveillance: Beyond telephonic conversations, the mSpy tracking tool extends its reach to encompass transmitted, received, and erased text messages. This capacity affords the means to ascertain whether your child engages in the dissemination of unsuitable content or confidential details, or if such interactions transpire reciprocally.
    • Vigilance Over Virtual Networks: Resonating with akin surveillance solutions like WebWatcher, mSpy facilitates oversight of diverse messaging platforms and social media applications. To avail this elevated functionality, opting for the Premium or Family Kit subscription is a requisite. Additionally, there might be a need to undertake jailbreaking or rooting of the device to unlock this advanced layer of surveillance capability.
    • Contact and Schedule Examination: Employing mSpy empowers you to peruse the compilation of contact identities, email addresses, telephone digits, as well as the tangible address entries, meticulously archived within the target mobile device. Furthermore, you gain the prerogative to scrutinize the calendar itinerary featured on the target device. This extends the capability to remain attuned to scheduled engagements, calendar annotations, and any foreordained appointments.
    • App & Screen Activity: See which apps are installed and how frequently they’re used. You can also block specific apps from running if necessary.
    • Location Surveillance via GPS: Within the realm of parental surveillance, mSpy empowers you to virtually shadow your offspring. The application offers the prowess to trail your child’s spatial trajectory, revealing an encapsulated chronicle of their route history over a designated time span. This granular information encompasses specific addresses and coordinates, affording an exhaustive retrospective and contemporary snapshot of locations traversed.
    • Boundary Delimitation: An innovative facet encompassed within mSpy’s repertoire is the introduction of geofencing. This progressive attribute empowers you to demarcate regions of safety and restraint. As your child enters or departs these predefined zones, you are promptly apprised via email notifications. A supplementary benefit is the integrated mapping feature, which adeptly illustrates the historical trajectory of your child’s movements.
    • Keylogger: mSpy includes a built-in keylogger that records every keystroke made on the device. This is especially helpful for uncovering hidden logins, searches, or messages typed across apps.

    Parental Control? Employee Oversight? mSpy Is the Best Phone Monitoring App for You

    mSpy Pros and Cons

    Pros:

    • Stealth Mode: Operates invisibly in the background without user detection.
    • Multi-App Monitoring: Tracks major social media platforms.
    • Geofencing & Real-Time Alerts: Great for parents and employers.
    • User-Friendly Dashboard: Clean interface with easy navigation.
    • Cross-Platform Support: Compatible with Android and iPhone.

    Cons:

    • Some Features Require Rooting or Jailbreaking: Advanced tools need extra steps.
    • Pricing Is Subscription-Based: No one-time purchase option.
    • No Live Call Recording: Restricted due to privacy laws in many regions.

    Despite these limitations, mSpy remains one of the most balanced spy apps for those seeking depth without unnecessary complexity.

    Protect What Matters with the Best Phone Monitoring App – Start with mSpy Now
    Compatibility of mSpy application Across Mobile Devices

    mSpy extends its compatibility umbrella over an extensive array of mobile phones and tablets, encompassing the following:

    • iOS 7 through 9.1 for mSpy with jailbreak. In scenarios where the targeted iPhone remains unjailbroken, data transfer is routed through iCloud storage, facilitating mSpy functionality on any phone with iOS 7 or higher.
    • Android 4 or subsequent iterations, although certain advanced facets of the application may solely be accessible on rooted Android devices.
    • Mac OS X variants encompassing 10.9 Mavericks, 10.8 Mountain Lion, 10.7 Lion, 10.11 El Capitan, and 10.10 Yosemite.

    Costing of mSpy
    Outlined below is the cost framework for mSpy’s mobile phone monitoring services:

    mSpy Basic Plan
    1-month subscription: $39.99 3 

    mSpy Premium Plan
    1-month subscription: $59.99 3-month subscription:

    mSpy Family Kit
    Moreover, the company introduces the Family Kit, facilitating concurrent oversight of 3 devices. This package is available at the ensuing rates: 12-month subscription: $199.99

    mSpy Refund Policy: What You Need to Know

    mSpy offers a 14-day refund window for first-time subscribers, but only under specific conditions.

    Eligible for Refund:

    • You experience technical issues that mSpy’s support team cannot resolve.
    • Your refund request is submitted within 14 days of purchase.
    • The request pertains to your initial subscription (not renewals or additional purchases). 

    Not Eligible for Refund:

    • You change your mind or make an accidental purchase.
    • The target device is incompatible, lacks internet access, or has been reset.
    • You refuse to follow installation instructions or decline technical assistance.
    • You lack physical access to the target device or cannot unlock it.
    • You fail to reinstall mSpy after an OS update or factory reset.
    • You lose your private encryption key, resulting in data loss.
    • You attempt to use mSpy on unsupported operating systems (e.g., Symbian, Windows Phone, BlackBerry 10).

    How to Request a Refund:

    • Email your request to refund@mspy.com.
    • Include your order details and the reason for the refund.
    • Note: Refund requests are not accepted via live chat or phone

    The Phone Monitoring App You Can Trust – Try mSpy Risk-Free
    mSpy Installation Guide: Step-by-Step

    For Android Devices:

    1. Purchase your mSpy plan
    2. Access installation guide in your dashboard
    3. Enable app installation from unknown sources
    4. Install the app on the target device
    5. Hide the app icon (automatic)
    6. Start monitoring via your web account

    For iPhones:

    1. Buy mSpy and log in to your account
    2. Enter iCloud credentials of the target phone
    3. Enable backup sync (2FA must be off)
    4. Start tracking through your dashboard

    Total setup time: Under 10 minutes in most cases
    No ongoing access required once installed
    Secure & Track Remotely with the Best Mobile Tracking App – mSpy Limited Offer On Now!
    Exploring the mSpy Free Trial 

    Embark on a 7-day exploration of the mSpy free trial to ascertain its potential merits. Upon initiation, you will be granted unrestricted access to all functionalities, acquainting yourself with the benefits it bestows.

    This trial stint is instrumental in unveiling the capacity to invisibly and remotely oversee any mobile device. The process is straightforward: navigate to mSpy.com, select an appropriate subscription plan, and opt for the free trial alternative.

    Following a week of experiential utilization, you possess the liberty to either perpetuate the subscription or opt for its termination. Should you aspire to delve into its efficacy sans financial commitment, the avenue of this complimentary trial beckons.

    Get An Exclusive Limited Time Discount on mSpy

    Is mSpy Legal to Use?

    The legality of mobile tracking apps depends on how they’re used:

    • Legal for Parental Monitoring: Parents can track their minor children’s phones.
    • Legal on Company Devices: Employers can monitor work-issued devices with employee consent or policy documentation.
    • Illegal Without Consent: It’s unlawful in many regions to spy on a spouse, adult, or partner without permission.

    mSpy emphasizes responsible usage. Users must confirm that they own the device or have legal permission before installing the software. The platform clearly disclaims liability for misuse.
    If used within the bounds of law and intent, mSpy is a powerful and compliant solution for modern digital monitoring.
    Why Wait? The Best Phone Monitoring App (mSpy) Is Ready – Real-Time GPS, Social Media Logs & More

    mSpy vs Competitors

    mSpy vs FlexiSPY

    FlexiSPY offers live call interception and ambient recording—features mSpy avoids for legal reasons. However, mSpy wins on ease of use, stealth, and customer support.

    mSpy vs uMobix

    uMobix has strong social media tracking, but its dashboard is less intuitive. mSpy provides a better overall user experience and is more stable on iOS.

    mSpy vs Cocospy

    Cocospy is beginner-friendly but lacks depth. mSpy offers more advanced features, such as keyword alerts, geofencing, and in-depth logs.
    In side-by-side comparisons, mSpy consistently delivers the best combination of reliability, discretion, and monitoring power.

    Why mSpy Earns Its Reputation as a Premier Mobile Surveillance App

    • Budget-Friendly Vigilance: mSpy emerges as a cost-effective avenue, facilitating the scrutiny of your child’s digital interactions or mobile pursuits for a mere fraction of a dollar per day.
    • Effortless Deployment: Installation proves a straightforward endeavor, requiring less than 10 minutes for comprehensive setup completion.
    • Concealed Operation: The application seamlessly functions in a concealed background mode, rendering it entirely imperceptible to the marked user.
    • Timely Updates: The flow of updated information from the target device remains uninterrupted, with data refresh cycles occurring every 5 minutes.
    • Comprehensive Assistance: A robust network of 24/7 multilingual support ensures that you receive the requisite guidance and aid throughout your journey with mSpy.
    • Unwavering Dependability and Security: mSpy embodies an unwavering commitment to reliability and security. All procured data undergoes encryption and safeguards, rendering it a steadfast and secure mobile monitoring solution.

    Track Smarter in 2025 – mSpy Is the Best Mobile Tracking App for Safe, Legal Use

    FAQs About mSpy Apps

    Q1: Is mSpy visible on the phone?
    No, once installed, mSpy runs in stealth mode and is not visible to the device user.
    Q2: Does mSpy work with the latest iOS and Android versions?
    Yes. mSpy supports Android 13/14 and iOS 17, with ongoing updates to maintain compatibility.
    Q3: What happens if the phone restarts or updates?
    The app auto-restarts in most cases and continues tracking unless uninstalled.
    Q4: Can I install mSpy without touching the phone?
    Only on iPhones with iCloud backup enabled and no 2FA. Android phones require brief physical access.
    Q5: What are people saying on Reddit or forums?
    Reddit users generally report that mSpy is dependable, especially for parental control. Some voice privacy concerns, but these are tied to misuse rather than flaws in the app.

    Click Here to Get mSpy From Its Official website

    mSpy Real User Reviews

    Jenna T. – Dallas, TX (Parent)

    “I needed a way to monitor my teenage son’s online behavior after some late-night messages raised concerns. mSpy helped me keep track of his activity without making him feel violated. It’s been a life-saver.”
    Raj M. – San Jose, CA (Employer)
    “We issued company phones last year and suspected misuse. mSpy provided the visibility we needed without disrupting work. The dashboard is intuitive, and the alerts help us spot problems early.”
    Carla R. – Atlanta, GA (Concerned Spouse)
    “mSpy gave me the peace of mind I was looking for. I had suspicions, and while it wasn’t easy, the clarity helped us have an honest conversation. It’s discreet and effective.”
    Peter N. – Chicago, IL (Tech Blogger)
    “As someone who tests monitoring tools, mSpy stands out for its reliability and feature richness. It’s not the cheapest, but it delivers value, especially for less tech-savvy users.”
    See Their Calls, Chats & GPS – All From Your Dashboard with the Best Mobile Tracking App

    How mSpy Helps Prevent Digital Dangers

    The digital world is filled with unseen threats, especially for children and vulnerable users. mSpy plays a preventive role by giving parents and guardians real-time insights into mobile behavior—often before something harmful occurs.
    For example, cyberbullying often starts subtly, through text messages or social media. With mSpy’s keyword alert system and message monitoring, red flags can be detected early. Parents can intervene before emotional damage is done.
    Online predators are another concern. They typically engage victims through apps like Snapchat, Instagram, and WhatsApp. mSpy allows guardians to review conversations across these platforms, revealing inappropriate behavior or grooming tactics.
    Screen addiction is also on the rise. With app usage tracking, parents can understand where time is being spent and set digital boundaries. For employers, mSpy prevents productivity loss by identifying inappropriate device use during work hours.
    By offering visibility and early intervention tools, mSpy becomes more than just a spy app—it becomes a layer of digital protection.

    Can You Trust Spy Apps? Reputation Check & Scam Warning Signs

    The spy app industry is filled with copycats, scams, and malware-laced programs. Knowing who to trust is essential—and mSpy stands out for good reason.
    What Makes a Spy App Trustworthy?

    • Official website distribution only
    • Transparent pricing and feature lists
    • Clear legal use policy
    • Regular updates and live customer support

    mSpy checks every box. It’s not found on suspicious third-party app stores or fake marketplaces. The company has been in operation for over 10 years, with a verifiable user base and global presence.
    Red Flags to Avoid

    • Apps offering “undetectable call recording” without any legal disclaimer
    • Download links through sketchy APK sites
    • No refund policy or support contact

    Before installing any tracking tool, check reviews, legal policies, and trust ratings. If it looks too good to be true, it probably is.

    Best Mobile Spy App for Parents, Employers & Partners – Get mSpy Now
    Troubleshooting Guide: What to Do If mSpy Stops Working
    Even reliable apps can run into issues—especially after OS updates or permission resets. If mSpy stops syncing or collecting data, here’s what to do:
    Step 1: Check Internet Connection
    The app needs internet access to sync data. Ensure the target phone is connected to Wi-Fi or mobile data.
    Step 2: Revisit Permissions
    Go to the phone’s settings and ensure permissions like GPS, contacts, and storage are still enabled for mSpy.
    Step 3: Confirm App Visibility
    Make sure the app hasn’t been removed or flagged by antivirus software. If necessary, reinstall following the original setup guide.
    Step 4: Contact Support
    mSpy has 24/7 live chat support. Log in to your dashboard and connect with their team for personalized assistance.
    With the right response, most issues can be resolved within minutes—and your monitoring resumes without disruption.
    Best Mobile Spy App for Android & iPhone – Track Without Being Detected with mSpy
    The Final Conclusion

    After conducting a comprehensive exploration, juxtaposing the positives and negatives, we have arrived at a definitive conclusion. The pivotal question emerges: Does mSpy stand as a prudent investment, or is it best to avert its usage?

    Our exhaustive analysis of mSpy customer feedback resoundingly echoes the sentiment of admiration. This accord resonates with our own assessment, solidifying the stance that mSpy represents a high-value proposition, replete with an array of commendable attributes and exceptional customer assistance. It is our conviction that mSpy reigns as the preeminent tracking application, proficiently catering to the needs of those seeking to discreetly oversee the actions of their employees, children, or other individuals. It stands as a potent conduit to discreetly peruse incoming calls and dispatched messages, all while evading the awareness of the subject under observation.

    The stalwart customer support infrastructure, coupled with the seamless integration of routine updates to ensure a user-friendly experience, fuels our belief that mSpy’s enduring value will persist in the foreseeable future. Notably, mSpy extends a suite of preeminent monitoring features, further enhancing its allure.

    The Phone Monitoring App You Can Trust – Try mSpy Risk-Free

    Project name: mSpy
    Londynska 730/59,
    Vinohrady,
    120 00 Praha,
    Czech Republic
    Media Contact:
    Company website: https://www.mspy.com/
    email: support@mspy.com
    USA (toll-free): +1 855 896 00 41

    Disclosure: The claim “#1 Choice in the United States” reflects our personal opinion and is not supported by independent market research.
    mSpy is intended strictly for legal use only. Installing monitoring software on a device you do not own, or without proper consent, may violate local laws. In most jurisdictions, you are required to notify the device owner before installation.
    Unauthorized use could lead to civil or criminal penalties. You are fully responsible for ensuring lawful use of the software.
    We strongly recommend consulting a licensed legal advisor before installing or using mSpy on any device.
    All trademarks, logos, and brand names mentioned are the property of their respective owners. References to third-party products or services are for identification purposes only and do not constitute endorsements.
    Always refer to the official website of the loan provider for the most accurate and up-to-date product terms, pricing, and eligibility requirements.

    Content Accuracy Disclaimer

    Every effort has been made to ensure the accuracy of the information presented in this article. However, due to the dynamic nature of product formulations, promotions, and availability, details may change without notice. The publisher makes no warranties or representations as to the current completeness or accuracy of any content, including product claims, pricing, or ingredient lists.
    It is the responsibility of the reader to verify product information directly through the official website or manufacturer prior to making a purchasing decision. Any reliance placed on the information in this article is done strictly at your own risk.

    Affiliate Disclosure
    This article may contain affiliate links. If you purchase a product or service through these links, the publisher may earn a commission at no additional cost to you. These commissions help support the creation of in-depth reviews and educational wellness content.
    The publisher only promotes products that have been independently evaluated and deemed potentially beneficial to readers. However, this compensation may influence the content, topics, or products discussed in this article. The views and opinions expressed are those of the author and do not necessarily reflect the official policy or position of any affiliate partner or product provider.

    Attachment

    The MIL Network

  • MIL-OSI USA: Training on Camp Guernsey will close Emigrant Hill Road temporarily for training

    Source: US State of Wyoming

    CAMP GUERNSEY JOINT TRAINING CENTER, Wyo. – Training at Camp Guernsey Joint Training Center’s North Training Area will cause traffic delays on Emigrant Hill Road and significant noise hazards for the surrounding community June 4 to 11, 2025, Guernsey, Wyoming, due to indirect artillery firing over the road.

    The Wyoming National Guard thanks the community for their continued support.
    For more information, please call Lt. Col. LaQuendin Counts at 307-836-7638 or Wyoming National Guard at 307-772-5309 or look for updates on the Camp Guernsey Joint Training Center Facebook page, found here: https://www.facebook.com/CampGuernseyJTC/ .

    MIL OSI USA News

  • MIL-OSI USA: Senators Coons, Barrasso introduce bipartisan bill to expand access to mental health services for seniors

    US Senate News:

    Source: United States Senator for Delaware Christopher Coons
    WASHINGTON – U.S. Senators Chris Coons (D-Del.) and John Barrasso (R-Wyo.) introduced the Expanding Seniors Access to Mental Health Services Act. The bill would improve Medicare beneficiaries’ access to licensed clinical social workers. By providing these mental health professionals with the opportunity to participate in the Medicare program when delivering services in skilled nursing facilities, this bill expands the number of mental health providers available to Delaware’s seniors.  
    “Increasing access to clinical social workers improves seniors’ mental health and gives them hope no matter where they live,” said Senator Coons. “Unfortunately, outdated Medicare rules prevent too many older Americans from receiving support from social workers in skilled nursing facilities. The bipartisan Expanding Seniors Access to Mental Health Services Act fixes these rules and expands Medicare coverage to allow social workers to provide the best care to seniors when they need it most.”
    “As a doctor, I know how vital it is for seniors to have access to mental health services,” said Senator Barrasso. “In particular, for those living in rural communities, finding a mental health provider is challenging. This is why I am proud to support bipartisan solutions that help more patients get the care they need.”
    “On behalf of the National Association of Social Workers?–?Delaware Chapter, we thank Senator?Chris?Coons for championing the bipartisan Expanding Seniors Access to Mental Health Services Act,” said Molly?J.?Arbogast, Executive Director of NASW Delaware. “Delaware’s social workers are eager to meet our neighbors where they are, whether that is in a skilled-nursing facility, a community clinic, or their own living rooms, but outdated Medicare rules keep too many people waiting. This bill cuts red tape, recognizes the full value of clinical social work, and gives older adults and people with disabilities quicker access to the evidence-based care they deserve.”
    “We strongly support the Expanding Seniors Access to Mental Health Services Act and applaud Senators Coons and Barrasso for prioritizing nursing home residents’ mental health through expanded Medicare coverage of these essential services in long term and post-acute care settings. This bill also helps short-term patients at skilled nursing facilities maintain trusted relationships with their preferred clinical social workers—promoting continuity of care as well as safer, more successful transitions back to the community. Enabling seniors to access these services is a vital step in addressing the growing mental and behavioral health needs of older adults,” said Cheryl Heiks, Executive Director of Delaware Health Care Facilities Association.
    “On behalf of the National Association of Social Workers—Wyoming Chapter, we extend our heartfelt thanks to Senator John Barrasso for his leadership on the bipartisan Expanding Seniors Access to Mental Health Services Act,” said Nathan Stahley, Executive Director of NASW Wyoming. “Modernizing outdated Medicare regulations is essential to expanding access to mental health services for individuals in Wyoming and across the country. This vital legislation cuts through unnecessary red tape, elevates the role of clinical social workers, and ensures that older adults and people with disabilities can receive the timely, evidence-based care they need and deserve.”
    “The National Association of Social Workers (NASW) applauds Senators John Barrasso and Chris Coons for introducing the bipartisan Expanding Seniors Access to Mental Health Services Act. Passage of this legislation is critical to the health and well-being of Medicare beneficiaries, for our nation and the social work profession,” said NASW CEO Anthony Estreet, PhD, MBA, LCSW-C. “It will help Medicare beneficiaries access desperately needed, high-quality mental health services clinical social workers are authorized to perform under state law, and it will remove a significant barrier to mental health care provided by independent clinical social workers to older adults and people with disabilities in skilled nursing facilities.”
    The Expanding Seniors Access to Mental Health Services Act ensures clinical social workers can provide psychosocial services to patients in nursing homes, and the full range of Health and Behavior Assessment and Intervention (HBAI) services within their scope of practice.
    The text of the bill is available here.

    MIL OSI USA News

  • MIL-OSI USA: Senators Coons, Cornyn welcome new members to the bipartisan Law Enforcement Caucus

    US Senate News:

    Source: United States Senator for Delaware Christopher Coons
    WASHINGTON – U.S. Senators Chris Coons (D-Del.) and John Cornyn (R-Texas), co-chairs of the bipartisan Senate Law Enforcement Caucus, celebrated the caucus’ new members for the 119th Congress during National Police Week, which started on May 11 and ended May 17.
    Senator Coons and Cornyn welcome U.S. Senators Ruben Gallego (D-Ariz.), Jim Justice (R-W.Va.), and Dave McCormick (R-Pa.).
    Senator Coons launched the Senate Law Enforcement Caucus over a decade ago with former Senator Roy Blunt (R-Mo.). Since then, the caucus has held briefings on policing issues like recruitment and retention, emerging threats such as generative AI’s impact on children, and best practices shared by law enforcement officials working on the ground.
    The caucus is more committed than ever to supporting law enforcement, protecting families, and strengthening communities across the country.
    A full member list can be found on the Senate Law Enforcement website and below:
    U.S. Senators Chris Coons (D-Del.), John Cornyn (R-Texas), Richard Blumenthal (D-Conn.), John Boozman (R-Ark.), Ted Budd (R-N.C.), Catherine Cortez Masto (D-Nev.), Dick Durbin (D-Ill.), Ruben Gallego (D-Ariz.), Lindsey Graham (R-S.C.), Mazie Hirono (D-Hawaii), John Hoeven (R-N.D.), Cindy Hyde-Smith (R-Miss.), Jim Justice (R-W.Va.), Amy Klobuchar (D-Minn.), Roger Marshall (R-Kan.), Dave McCormick (R-Pa.), Jeff Merkley (D-Ore.), Jerry Moran (R-Kan.), Lisa Murkowski (R-Alaska), Chris Murphy (D-Conn.), Gary Peters (D-Mich.), Mike Rounds (R-S.D.), Chuck Schumer (D-N.Y.), and Thom Tillis (R-N.C.).

    MIL OSI USA News

  • MIL-OSI: Micron Technology to Report Fiscal Third Quarter Results on June 25, 2025

    Source: GlobeNewswire (MIL-OSI)

    BOISE, Idaho, May 21, 2025 (GLOBE NEWSWIRE) — Micron Technology, Inc. (Nasdaq: MU) announced today that it will hold its fiscal third quarter earnings conference call on Wednesday, June 25, 2025, at 2:30 p.m. Mountain time.

    The call will be webcast live at http://investors.micron.com/. Webcast replays of presentations can be accessed from Micron’s Investor Relations website for approximately one year after the call.

    About Micron Technology, Inc.
    We are an industry leader in innovative memory and storage solutions transforming how the world uses information to enrich life for all. With a relentless focus on our customers, technology leadership, and manufacturing and operational excellence, Micron delivers a rich portfolio of high-performance DRAM, NAND and NOR memory and storage products through our Micron® and Crucial® brands. Every day, the innovations that our people create fuel the data economy, enabling advances in artificial intelligence (AI) and compute-intensive applications that unleash opportunities — from the data center to the intelligent edge and across the client and mobile user experience. To learn more about Micron Technology, Inc. (Nasdaq: MU), visit micron.com.

    © 2025 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. Micron, the Micron logo, and all other Micron trademarks are the property of Micron Technology, Inc. All other trademarks are the property of their respective owners.

    Micron Media Relations Contact
    Mark Plungy
    Micron Technology, Inc.
    +1 (408) 203-2910
    corpcomms@micron.com

    Micron Investor Relations Contact
    Satya Kumar
    Micron Technology, Inc.
    +1 (408) 450-6199
    satyakumar@micron.com

    The MIL Network

  • MIL-OSI USA: NASA-French Satellite Spots Large-Scale River Waves for First Time

    Source: NASA

    In a first, researchers from NASA and Virginia Tech used satellite data to measure the height and speed of potentially hazardous flood waves traveling down U.S. rivers. The three waves they tracked were likely caused by extreme rainfall and by a loosened ice jam. While there is currently no database that compiles satellite data on river flood waves, the new study highlights the potential of space-based observations to aid hydrologists and engineers, especially those working in communities along river networks with limited flood control structures such as levees and flood gates.
    Unlike ocean waves, which are ordinarily driven by wind and tides, and roll to shore at a steady clip, river waves (also called flood or flow waves) are temporary surges stretching tens to hundreds of miles. Typically caused by rainfall or seasonal snowmelt, they are essential to shuttling nutrients and organisms down a river. But they can also pose hazards: Extreme river waves triggered by a prolonged downpour or dam break can produce floods.
    “Ocean waves are well known from surfing and sailing, but rivers are the arteries of the planet. We want to understand their dynamics,” said Cedric David, a hydrologist at NASA’s Jet Propulsion Laboratory in Southern California and a coauthor of a new study published May 14 in Geophysical Research Letters.

    Measuring Speed and Size
    To search for river waves for her doctoral research, lead author Hana Thurman of Virginia Tech turned to a spacecraft launched in 2022. The SWOT (Surface Water and Ocean Topography) satellite is a collaboration between NASA and the French space agency CNES (Centre National d’Études Spatiales). It is surveying the height of nearly all of Earth’s surface waters, both fresh and salty, using its sensitive Ka-band Radar Interferometer (KaRIn). The instrument maps the elevation and width of water bodies by bouncing microwaves off the surface and timing how long the signal takes to return.
    “In addition to monitoring total storage of waters in lakes and rivers, we zoom in on dynamics and impacts of water movement and change,” said Nadya Vinogradova Shiffer, SWOT program scientist at NASA Headquarters in Washington.
    Thurman knew that SWOT has helped scientists track rising sea levels near the coast, spot tsunami slosh, and map the seafloor, but could she identify river height anomalies in the data indicating a wave on the move?
    She found that the mission had caught three clear examples of river waves, including one that arose abruptly on the Yellowstone River in Montana in April 2023. As the satellite passed overhead, it observed a 9.1-foot-tall (2.8-meter-tall) crest flowing toward the Missouri River in North Dakota. It was divided into a dramatic 6.8-mile-long (11-kilometer-long) peak followed by a more drawn‐out tail. These details are exciting to see from orbit and illustrate the KaRIn instrument’s uniquely high spatial resolution, Thurman said.
    Sleuthing through optical Sentinel-2 imagery of the area, she determined that the wave likely resulted from an ice jam breaking apart upstream and releasing pent-up water.
    The other two river waves that Thurman and the team found were triggered by rainfall runoff. One, spotted by SWOT starting on Jan. 25, 2024, on the Colorado River south of Austin, Texas, was associated with the largest flood of the year on that section of river. Measuring over 30 feet (9 meters) tall and 166 miles (267 kilometers) long, it traveled around 3.5 feet (1.07 meters) per second for over 250 miles (400 kilometers) before discharging into Matagorda Bay.
    The other wave originated on the Ocmulgee River near Macon, Georgia, in March 2024. Measuring over 20 feet (6 meters) tall and extending more than 100 miles (165 kilometers), it traveled about a foot (0.33 meters) per second for more than 124 miles (200 kilometers).
    “We’re learning more about the shape and speed of flow waves, and how they change along long stretches of river,” Thurman said. “That could help us answer questions like, how fast could a flood get here and is infrastructure at risk?”
    Complementary Observations
    Engineers and water managers measuring river waves have long relied on stream gauges, which record water height and estimate discharge at fixed points along a river. In the United States, stream gauge networks are maintained by agencies including the U.S. Geological Survey. They are sparser in other parts of the world.
    “Satellite data is complementary because it can help fill in the gaps,” said study supervisor George Allen, a hydrologist and remote sensing expert at Virginia Tech.
    If stream gauges are like toll booths clocking cars as they pass, SWOT is like a traffic helicopter taking snapshots of the highway.
    The wave speeds that SWOT helped determine were similar to those calculated using gauge data alone, Allen said, showing how the satellite could help monitor waves in river basins without gauges. Knowing where and why river waves develop can help scientists tracking changing flood patterns around the world.
    Orbiting Earth multiple times each day, SWOT is expected to observe some 55% of large-scale floods at some stage in their life cycle. “If we see something in the data, we can say something,” David said of SWOT’s potential to flag dangerous floods in the making. “For a long time, we’ve stood on the banks of our rivers, but we’ve never seen them like we are now.”
    More About SWOT
    The SWOT satellite was jointly developed by NASA and CNES, with contributions from the Canadian Space Agency (CSA) and the UK Space Agency. NASA’s Jet Propulsion Laboratory, managed for the agency by Caltech in Pasadena, California, leads the U.S. component of the project. For the flight system payload, NASA provided the Ka-band radar interferometer (KaRIn) instrument, a GPS science receiver, a laser retroreflector, a two-beam microwave radiometer, and NASA instrument operations. The Doppler Orbitography and Radioposition Integrated by Satellite system, the dual frequency Poseidon altimeter (developed by Thales Alenia Space), the KaRIn radio-frequency subsystem (together with Thales Alenia Space and with support from the UK Space Agency), the satellite platform, and ground operations were provided by CNES. The KaRIn high-power transmitter assembly was provided by CSA.
    News Media Contacts
    Jane J. Lee / Andrew WangJet Propulsion Laboratory, Pasadena, Calif.818-354-0307 / 626-379-6874Written by Sally Younger2025-074

    MIL OSI USA News

  • MIL-OSI USA: Russian GRU Targeting Western Logistics Entities and Technology Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL OSI USA News -

  • MIL-OSI USA: Russian GRU Cyber Actors Targeting Western Logistics Entities and Tech Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Today, CISA, the National Security Agency, the Federal Bureau of Investigation, and other U.S. and international partners released a joint Cybersecurity Advisory, Russian GRU Targeting Western Logistics Entities and Technology Companies.  

    This advisory details a Russian state-sponsored cyber espionage-oriented campaign targeting technology companies and logistics entities, including those involved in the coordination, transport, and delivery of foreign assistance to Ukraine.

    Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, military unit 26165 cyber actors are using a mix of previously disclosed tactics, techniques, and procedures (TTPs) and are likely connected to these actors’ widescale targeting of IP cameras in Ukraine and bordering NATO nations.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of until 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise, and posture network defenses with a presumption of targeting. For more information on Russian state-sponsored threat actor activity, see CISA’s Russia Cyber Threat Overview and Advisories page. 

    MIL OSI USA News

  • MIL-OSI USA: Lt. Gov. Luke – VNR – Hawaiʻi Schools Win ‘Super Sleuth’ Award in Internet Speeds Mapping Effort

    Source: US State of Hawaii

    Lt. Gov. Luke – VNR – Hawaiʻi Schools Win ‘Super Sleuth’ Award in Internet Speeds Mapping Effort

    Posted on May 20, 2025 in Latest Department News, Newsroom

    STATE OF HAWAIʻI
    KA MOKU ʻĀINA O HAWAIʻI

     

    SYLVIA LUKE
    LIEUTENANT GOVERNOR
    KE KEʻENA O KA HOPE KIAʻĀINA

    FOR IMMEDIATE RELEASE

    May 20, 2025

    Hawaiʻi Schools Win ‘Super Sleuth’ Award in Internet Speeds Mapping Effort

    Connect Kākou’s Digital Detectives Initiative included 6,000 participants statewide

    Lt. Gov. Luke with Robert Louis Stevenson Middle School (left) and Kona Pacific Charter School (right).

     

    (Videos/Photos Courtesy: Connect Kākou)

    HONOLULU – Lieutenant Governor Sylvia Luke announced today that more than 6,000 Hawaiʻi residents, many of them students, participated in the Digital Detectives campaign to map internet speeds across the state. Part of the Connect Kākou initiative, Digital Detectives aimed to close the digital divide by identifying areas in need of urgent broadband infrastructure improvements.

    By taking a simple 30-second internet speed test last October, residents provided valuable data to help ensure federal funding is directed where it is most needed. Classes from Robert Louis Stevenson Middle School and Kona Pacific Charter School received the top Digital Detectives Super Sleuth Awards for student participation and classroom reporting. The classes received a visit from Lieutenant Governor Luke and a gift card for classroom supplies.

    “Thanks to the thousands of students and their teachers who participated in Digital Detectives, we now have a clearer picture of Hawaiʻi’s internet speeds and where improvements are most needed,” said Lieutenant Governor Luke. “Reliable internet is crucial for education, future careers, and so much more. We were thrilled to see so many students taking part in shaping a more connected future for our state.

    “Digital Detectives encouraged our students to become active participants in expanding internet access for their communities,” said Ken Hiraki, executive director of the Public Schools Foundation. “By turning a simple classroom activity into meaningful data for our state, students had a front row seat to civic engagement and real-world impact.”

    Results from the internet speed tests have been aggregated to provide a more comprehensive view of connectivity across the state. Construction of fiber-optic internet lines in underserved areas is expected to begin as early as this year.

    Connect Kākou is a State of Hawai‘i initiative led by Lieutenant Governor Luke, in collaboration with the Hawai‘i Broadband and Digital Equity Office (HBDEO), the University of Hawai‘i, the Department of Hawaiian Home Lands (DHHL), and multiple state and county agencies. Connect Kākou is working to ensure people from all walks of life have reliable access to high-speed internet and the tools and knowledge to safely and confidently use the internet. Visit www.connectkakou.org to learn more.

    # # #

    Media Contact:

    Shari Nishijima

    Communications Director

    Office of the Lieutenant Governor

    Cell: (808) 978-0867

    Jordan Ozaki

    iQ 360 Inc.

    Cell: (808) 294-7712

    MIL OSI USA News

  • MIL-OSI USA: DBEDT NEWS RELEASE: HAWAI‘I APRIL UNEMPLOYMENT RATE REMAINS AT 2.9 PERCENT

    Source: US State of Hawaii

    DBEDT NEWS RELEASE: HAWAI‘I APRIL UNEMPLOYMENT RATE REMAINS AT 2.9 PERCENT

    Posted on May 20, 2025 in Latest Department News, Newsroom

     

     

    STATE OF HAWAIʻI

    KA MOKU ʻĀINA O HAWAIʻI

    JOSH GREEN, M.D.
    GOVERNOR

    KE KIAʻĀINA

    DEPARTMENT OF BUSINESS, ECONOMIC DEVELOPMENT AND TOURISM

    KA ʻOIHANA HOʻOMOHALA PĀʻOIHANA, ʻIMI WAIWAI A HOʻOMĀKAʻIKAʻI

     

    RESEARCH AND ECONOMIC ANALYSIS DIVISION

     

    JAMES KUNANE TOKIOKA

    DIRECTOR

    KA LUNA HOʻOKELE

     

    1. EUGENE TIAN

    CHIEF STATE ECONOMIST

    HAWAI‘I APRIL UNEMPLOYMENT RATE REMAINS AT 2.9 PERCENT 

    Jobs Increased by 17,000 Year-Over-Year

    FOR IMMEDIATE RELEASE

    May 20, 2025

    HONOLULU — The Hawai‘i State Department of Business, Economic Development and Tourism (DBEDT) today announced that the seasonally adjusted unemployment rate for April was 2.9 percent, the same as in March. In April, 668,650 persons were employed and 19,650 were unemployed, for a total seasonally adjusted labor force of 688,300 statewide. Nationally, the seasonally adjusted unemployment rate was 4.2 percent in April, the same as in March.

    The unemployment rate figures for the state of Hawai‘i and the U.S. in this release are seasonally adjusted in accordance with U.S. Bureau of Labor Statistics (BLS) methodology. The not-seasonally adjusted rate for the state was 2.5 percent in April, compared to 2.4 percent in March.

    Industry Payroll Employment (Establishment Survey)

    In a separate measure of employment, total nonagricultural jobs increased by 1,500 month-over-month, from March 2025 to April 2025. Job gains were experienced in Leisure & Hospitality (+1,900); Private Education & Health Services (+1,100); Trade, Transportation & Utilities (+500); Professional & Business Services (+400); Construction (+300); and Information (+100). Within Leisure & Hospitality, the rise in employment primarily occurred in Food Services & Drinking Places. Within Private Education & Health Services, the bulk of job gains were spread out over the subsectors of Health Care & Social Assistance. Employment in Manufacturing remained unchanged. Job losses occurred in Financial Activities (-200); and Other Services (-200). Government employment went down by 2,400 jobs, primarily due to below average over-the-month change in staffing at both the Department of Education and the University of Hawai‘i system. Year-over-year, nonfarm jobs have gone up by 17,000, or 2.7 percent.

     

    Technical Notes:

    Labor Force Components

    The concepts and definitions used by the Local Area Unemployment Statistics (LAUS) program are the same as those used in the Current Population Survey for the national labor force data:

    • Civilian labor force. Included are all persons in the civilian noninstitutional population ages 16 and older classified as either employed or unemployed. (See the definitions below.)
    • Employed persons. These are all persons who, during the reference week (the week including the twelfth day of the month), (a) did any work as paid employees, worked in their own business or profession or on their own farm, or worked 15 hours or more as unpaid workers in an enterprise operated by a member of their family, or (b) were not working but who had jobs from which they were temporarily absent because of vacation, illness, bad weather, childcare problems, maternity or paternity leave, labor-management dispute, job training, or other family or personal reasons, whether or not they were paid for the time off or were seeking other jobs. Each employed person is counted only once, even if he or she holds more than one job.
    • Unemployed persons. Included are all persons who had no employment during the reference week, were available for work, except for temporary illness and had made specific efforts to find employment sometime during the four-week period ending with the reference week. Persons who were waiting to be recalled to a job from which they had been laid off need not have been looking for work to be classified as unemployed.
    • Unemployment rate. The unemployed percent of the civilian labor force [i.e., 100 times (unemployed/civilian labor force)].

    Seasonal Adjustment

    The seasonal fluctuations in the number of employed and unemployed persons reflect hiring and layoff patterns that accompany regular events such as the winter holiday season and the summer vacation season. These variations make it difficult to tell whether month-to-month changes in employment and unemployment are due to normal seasonal patterns or to changing economic conditions. Therefore, the BLS uses a statistical technique called seasonal adjustment to address these issues. This technique uses the history of the labor force data and the job count data to identify the seasonal movements and to calculate the size and direction of these movements. A seasonal adjustment factor is then developed and applied to the estimates to eliminate the effects of regular seasonal fluctuations on the data. Seasonally adjusted statistical series enable more meaningful data comparisons between months or with an annual average.

    Current Population (Household) Survey (CPS)

    A survey conducted for employment status in the week that includes the twelfth day of each month generates the unemployment rate statistics, which is a separate survey from the Establishment Survey that yields the industry job counts. The CPS survey contacts approximately 1,000 households in Hawai‘i to determine an individual’s current employment status. Employed persons consist of 1) all persons who did any work for pay or profit during the survey reference week, 2) all persons who did at least 15 hours of unpaid work in a family owned enterprise operated by someone in their household and 3) all persons who were temporarily absent from their regular jobs, whether they were paid or not. Persons considered unemployed are those that do not have a job, have actively looked for work in the prior four weeks and are available for work. Temporarily laid-off workers are counted as unemployed, whether or not they have engaged in a specific job-seeking activity. Persons not in the labor force are those who are not classified as employed or unemployed during the survey reference week.

    Benchmark Changes to Local Area Unemployment Statistics Data

    Statewide and sub-state data for 2019 to 2024 have revised inputs and data for 1990 to 2024 have been re-estimated to reflect revised population controls and model re-estimation.

    Change to Monthly Employment Estimates

    This release incorporates revised job count figures for the seasonally adjusted series. The revised data reflects historical corrections applied to unadjusted super sector or sector-level series dating back from 2018 through 2024. For years, analysts with the state of Hawai‘i Department of Labor and Industrial Relations Research and Statistics Office have developed monthly employment estimates for Hawai‘i and its metropolitan areas. These estimates were based on a monthly survey of Hawai‘i businesses and analysts’ knowledge about our local economies. Beginning with the production of preliminary estimates for March 2011, responsibility for the production of state and metropolitan area (MSA) estimates were transitioned from individual state agencies to the U.S. Bureau of Labor Statistics (BLS).

    For Hawai‘i, this means the transition of statewide, Honolulu and Kahului-Wailuku MSA estimates for both the seasonally adjusted and not-seasonally adjusted areas are produced by BLS. State agencies will continue to provide the BLS with information on local events that may affect the estimates, such as strikes or large layoffs/hiring at businesses not covered by the survey and to disseminate and analyze the Current Employment Statistics (CES) estimates for local data users. BLS feels this change is designed to improve the cost efficiency of the CES program and to reduce the potential bias in state and area estimates. A portion of the cost savings generated by this change is slated to be directed toward raising survey response rates in future years, which will decrease the level of statistical error in the CES estimates. Until then, state analysts feel this change could result in increased month-to-month variability for the industry employment numbers, particularly for Hawai‘i’s counties and islands. BLS can be reached at 202-691-6555 for any questions about these estimates.

    The not-seasonally adjusted job estimates for Hawai‘i County, Kaua‘i County, Maui, Moloka‘i and Lāna‘i are produced by the state of Hawai‘i Department of Business, Economic Development and Tourism.

    Labor Force Estimates for Small Areas

    Labor Force estimates for the islands within Maui County (Maui, Moloka‘i and Lānai) are produced by the state of Hawai‘i Department of Business, Economic Development and Tourism.

    Seasonally Adjusted Labor Force and Unemployment Estimates for Honolulu and Maui County

    BLS publishes smoothed seasonally adjusted civilian labor force and unemployment estimates for all metropolitan areas, which includes the City and County of Honolulu and Maui County.

    BLS releases this data each month in the Metropolitan Area Employment and Unemployment news release. The schedule is available at http://www.bls.gov/news.release/metro.toc.htm.

    Alternative Measures of Labor Underutilization

     

    Alternative Measures of Labor Underutilization for States, Second Quarter of 2024 through First Quarter of 2025 Averages  
    Area Measure  
    U-1 U-2 U-3 U-4 U-5 U-6
                 
    United States 1.5 2.0 4.1 4.3 5.0 7.7
                 
    Hawai‘i 0.7 1.2 3.0 3.1 3.9 6.2

     

    The six alternative labor underutilization state measures based on the Current Population Survey (CPS) and compiled on a four-quarter moving-average basis defined as:

    U-1, persons unemployed 15 weeks or longer, as a percent of the civilian labor force;

    U-2, job losers and persons who completed temporary jobs, as a percent of the civilian labor force;

    U-3, total unemployed, as a percent of the civilian labor force (this is the definition used for the official unemployment rate);

    U-4, total unemployed plus discouraged workers, as a percent of the civilian labor force plus discouraged workers;

    U-5, total unemployed, plus discouraged workers, plus all other marginally attached workers*, as a percent of the civilian labor force plus all marginally attached workers; and

    U-6, total unemployed, plus all marginally attached workers, plus total employed part-time for economic reasons, as a percent of the civilian labor force plus all marginally attached workers.

    *Individuals who want and are available for work, and who have looked for a job sometime in the prior 12 months (or since the end of their last job if they had one within the past 12 months) but were not counted as unemployed because they had not searched for work in the four weeks preceding the survey, for such reasons as childcare or transportation problems, for example. Discouraged workers are a subset of the marginally attached.

    Please note that the state unemployment rates (U-3) that are shown are derived directly from the CPS. As a result, these U-3 measures may differ from the official state unemployment rates for the latest four-quarter period. The latter are estimates developed from statistical models that incorporate CPS estimates, as well as input data from other sources, such as state unemployment claims data.

    # # #

    Media contacts:

     

    Dr. Eugene Tian

    Chief State Economist

    Research and Economic Analysis Division

    Department of Business, Economic Development and Tourism, State of Hawai‘i

    Phone: 808-586-2470

    Email: [email protected]

    Laci Goshi

    Communications Officer

    Department of Business, Economic Development and Tourism, State of Hawai‘i

    Cell: 808-518-5480

    Email: [email protected]

    MIL OSI USA News

  • MIL-OSI USA: DLNR News Release – ADDITIONAL TEMPORARY CLOSURES AT DIAMOND HEAD STATE MONUMENT IN JUNE, May 20, 2025

    Source: US State of Hawaii

    DLNR News Release – ADDITIONAL TEMPORARY CLOSURES AT DIAMOND HEAD STATE MONUMENT IN JUNE, May 20, 2025

    Posted on May 20, 2025 in Latest Department News, Newsroom

    STATE OF HAWAIʻI

    KA MOKU ʻĀINA O HAWAIʻI

    JOSH GREEN, M.D.

    GOVERNOR

    KE KIAʻĀINA

    DEPARTMENT OF LAND AND NATURAL RESOURCES

    KA ‘OIHANA KUMUWAIWAI ‘ĀINA

     

    DAWN N.S. CHANG

    CHAIRPERSON

    KA LUNA HOʻOKELE

     

     

    ADDITIONAL TEMPORARY CLOSURES AT DIAMOND HEAD STATE MONUMENT IN JUNE

     

     

    FOR IMMEDIATE RELEASE

    May 20, 2025

     

    HONOLULU – More full-day closures are forthcoming to Diamond Head State Monument (DHSM) next month. The DLNR Division of State Parks (DSP) announces park closures for ongoing rockfall mitigation work from June 17-20 and 24-27 at the popular Oahu landmark.

    During these full closures, access to the park will be restricted and no visitors will be allowed entry. Employees will access the crater via the Kapahulu Tunnel between 6 a.m. and 6 p.m. A guard will be stationed at the entry gate leading to the tunnel for the duration of the closures.

    On Monday June 16 and 23, the park will maintain its current partial closure hours from 6 a.m. – 2 p.m. All other days in June will continue with the current schedule: weekdays with closure at 2 p.m. and weekends with closure at 6 p.m.

    DSP appreciates the patience of residents and visitors through this process to create a safer, more enjoyable experience at Diamond Head. The estimated project completion date is July 25, 2025.

     

    # # # 

     

    RESOURCES 

    (All images/video courtesy: DLNR) 

    HD Video – Diamond Head rockfall mitigation project (February 7, 2025):

    https://www.dropbox.com/scl/fi/gc90ta4n6a6lj5eic0o3j/Diamond-Head-Rockfall-Mitigation-Project-Feb-07-2025.mov?rlkey=u73490f2pgfgvdpb0xt7wg0mu&st=x0gbw8zh&dl=0

     

    Photographs – Diamond Head rockfall mitigation project (February 7, 2025): https://www.dropbox.com/scl/fo/6pdh73bw7fyp6q3q1w33i/ADD0r_r-DVm8ckwfu8y3epY?rlkey=wo20wtocef5w6cr05ozxrv1nz&st=tthorl4v&dl=0

     

    Diamond Head State Monument construction operating hours (full schedule):

    Diamond Head State Monument

     

     

    Media contact:

    Ryan Aguilar

    Communications Specialist

    Department of Land and Natural Resources, State of Hawai‘i

    Phone: 808-587-0396

    Email: [email protected]

    MIL OSI USA News

  • MIL-OSI Europe: Answer to a written question – Restoring European AI-driven innovation, competitiveness and investment in the EU by addressing challenges in the GPAI Code of Practice and the implementation of the GDPR – E-000760/2025(ASW)

    Source: European Parliament

    The Code of Practice on general-purpose artificial intelligence (AI) models will set out commitments to which providers of such models may voluntarily adhere to demonstrate compliance with the relevant provisions under the AI Act[1].

    The AI Office has facilitated the drawing-up of the Code, with working groups chaired by independent experts involving nearly 1 000 stakeholders, Member States representatives, and observers. As the main addressees of the Code, general-purpose AI model providers are invited to dedicated workshops with the chairs and vice-chairs.

    The European AI Office is supporting the appointed chairs and vice-chairs drafting a simple but effective Code at the current state of the art. An adequate Code, to be assessed by the AI Office and the AI Board, would cover the relevant obligations in the AI Act, without going beyond it. Signatories to the Code can benefit from reduced administrative burden and increased trust by the AI Office.

    Moreover, the AI Act as a product safety legislation is designed to complement and facilitate[2] the EU data protection law, while avoiding overlaps. When both apply[3], market surveillance authorities should cooperate with authorities supervising fundamental rights legislation[4]. The Commission will issue guidelines on the interplay with other EU laws to ensure effective and consistent implementation across the EU[5].

    The Commission aims to cooperate with the European Data Protection Board (EDPB) to help AI providers and deployers understand and comply with their obligations under both acts. The EDPB has adopted an opinion under the General Data Protection Regulation’s (GDPR) consistency mechanism, addressed to the data protection authorities, on the application of the GDPR to AI models[6], thereby seeking EU-wide harmonised application. The Commission has also proposed GDPR procedural rules regulation[7], which harmonises procedural rules in cross-border cases.

    • [1] Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU) 2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (AI Act), OJ L, 2024/1689.
    • [2] Recitals (2), (10), 67 AI Act.
    • [3] This is the case when personal data processing is involved in the development and use of AI systems subject to requirements under the AI Act. See Article 2(7) and Recital (10) AI Act.
    • [4] See authorities designated under Article 77 AI Act that includes data protection authorities.
    • [5] See Article 96(1)e) AI Act.
    • [6] EDPB Opinion 28/2024, available at: https://www.edpb.europa.eu/our-work-tools/our-documents/opinion-board-art-64/opinion-282024-certain-data-protection-aspects_en.
    • [7] Proposal for a regulation of the European Parliament and of the Council laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679, COM/2023/348 final. Currently under negotiation.
    Last updated: 21 May 2025

    MIL OSI Europe News

  • MIL-OSI Europe: Written question – The wreck of the ‘Sea Diamond’ on the seabed of Santorini for 18 years as toxic waste – E-001879/2025

    Source: European Parliament

    Question for written answer  E-001879/2025
    to the Commission
    Rule 144
    Maria Zacharia (NI)

    The recent seismic sequence in Santorini coincides with the sad 18-year anniversary of inactivity on the wreck of the ‘Sea Diamond’, which is hanging on a steep slope of the seabed at a depth of 120 metres and at risk of sliding and reaching a depth of 280 metres, with dramatic consequences for the island’s exceptionally beautiful natural environment.

    The Commission has been aware of the situation since 2007(!) with colleagues’ oral and written questions nos E-2185/07,[1] E-2274/07,[2] H-0509/07,[3] E-5789/07,[4] E-1944/08,[5] H-0748/08,[6] E-5439/08,[7] E-6685/08,[8] E-4818/09,[9] H-0037/10,[10] E-002071/2011,[11] E-005420/2011,[12] E-003198/2012[13] and E-003650/2012.[14] It is also aware of the case law of the Court of Justice, according to which fuel on board a tanker becomes waste from the moment it leaks into the sea and, therefore, there is a breach of Directive 2006/12/EC on waste and in particular of Article 4 of the Directive, according to which Member States must take the necessary measures to prohibit the abandonment, dumping and uncontrolled disposal of waste.

    The Commission, however, disputes the spillage of oil or other toxic waste into the sea, ignoring a study by the Department of Environmental Engineering of the Technical University of Crete from 2011, which has been communicated to it, as have the judicial expert opinions from 2019 and 2020.

    Could the Commission justify its services’ decision not to take current scientific data into account?

    Submitted: 12.5.2025

    • [1] https://www.europarl.europa.eu/doceo/document/E-6-2007-2185_EN.html
    • [2] https://www.europarl.europa.eu/doceo/document/E-6-2007-2274_EN.html
    • [3] https://www.europarl.europa.eu/doceo/document/H-6-2007-0509_EN.html
    • [4] https://www.europarl.europa.eu/doceo/document/E-6-2007-5789_EN.html
    • [5] https://www.europarl.europa.eu/doceo/document/E-6-2008-1944_EN.html
    • [6] https://www.europarl.europa.eu/doceo/document/H-6-2008-0748_EN.html
    • [7] https://www.europarl.europa.eu/doceo/document/E-6-2008-5439_EN.html
    • [8] https://www.europarl.europa.eu/doceo/document/E-6-2008-6685_EN.html
    • [9] https://www.europarl.europa.eu/doceo/document/E-7-2009-4818_EN.html
    • [10] https://www.europarl.europa.eu/doceo/document/H-7-2010-0037_EN.html
    • [11] https://www.europarl.europa.eu/doceo/document/E-7-2011-002071_EN.html
    • [12] https://www.europarl.europa.eu/doceo/document/E-7-2011-005420_EN.html
    • [13] https://www.europarl.europa.eu/doceo/document/E-7-2012-003198_EN.html
    • [14] https://www.europarl.europa.eu/doceo/document/E-7-2012-003650_EN.html

    MIL OSI Europe News

  • MIL-OSI: Raj Judge Joins Zscaler’s Board of Directors and as EVP of Corporate Strategy & Ventures

    Source: GlobeNewswire (MIL-OSI)

    SAN JOSE, Calif., May 21, 2025 (GLOBE NEWSWIRE) — Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, is pleased to announce that Raj Judge has been appointed to the company’s Board of Directors and joined as Executive Vice President of Corporate Strategy and Ventures. In this role, Judge will lead the company’s growth strategy, business development, and venture investment initiatives to drive Zscaler to $5 billion in ARR and beyond.

    Judge brings over 25 years of experience in the tech legal and venture capital space, having previously served at Wilson Sonsini as Senior Partner and Co-Chair of the firm’s core practice, Emerging Companies and Venture Capital. Throughout his career, he has been instrumental in driving strategic growth, identifying emerging market opportunities, and creating solutions that have led to significant business growth for his clients.

    “Raj’s deep expertise in corporate strategy and investment, combined with his track record of success, makes him the ideal leader to drive Zscaler’s growth and innovation agenda,” said Jay Chaudhry, Chairman and CEO of Zscaler. “We are excited to welcome Raj to our leadership team and we look forward to the impact he will have on shaping the future of our company.”

    Judge will be responsible for key growth and investment opportunities as well as forging strategic initiatives. He will work closely with internal and external stakeholders to accelerate innovation and substantially broaden the company’s platform for Zscaler’s customers. The appointment of Judge to the Board further demonstrates the company’s dedication to advancing its corporate strategy and long-term vision.

    “I am excited to join Zscaler at such a pivotal time in its growth journey,” said Raj. “I look forward to bringing my experience and strategic skills to drive new initiatives and investments that will accelerate its continued success.”

    Forward-Looking Statements
    This press release contains forward-looking statements that are based on our management’s beliefs and assumptions and on information currently available to our management. These forward-looking statements include the potential impact of the executive appointment to Zscaler’s future strategic investments and our ability to grow and scale. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC’s website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.

    About Zscaler
    Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform.

    Zscaler™, Zscaler Zero Trust Exchange™, Zscaler Internet Access™, and Zscaler Private Access™, ZIA™, and ZPA™ and Zscaler B2B™ are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners.

    Media Contact
    Pavel Radda
    press@zscaler.com

    Investor Relations Contact
    Ashwin Kesireddy
    ir@zscaler.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/96cf5114-9019-4fa0-abd7-c9d7346123a6

    The MIL Network

  • MIL-OSI: Raj Judge Joins Zscaler’s Board of Directors and as EVP of Corporate Strategy & Ventures

    Source: GlobeNewswire (MIL-OSI)

    SAN JOSE, Calif., May 21, 2025 (GLOBE NEWSWIRE) — Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, is pleased to announce that Raj Judge has been appointed to the company’s Board of Directors and joined as Executive Vice President of Corporate Strategy and Ventures. In this role, Judge will lead the company’s growth strategy, business development, and venture investment initiatives to drive Zscaler to $5 billion in ARR and beyond.

    Judge brings over 25 years of experience in the tech legal and venture capital space, having previously served at Wilson Sonsini as Senior Partner and Co-Chair of the firm’s core practice, Emerging Companies and Venture Capital. Throughout his career, he has been instrumental in driving strategic growth, identifying emerging market opportunities, and creating solutions that have led to significant business growth for his clients.

    “Raj’s deep expertise in corporate strategy and investment, combined with his track record of success, makes him the ideal leader to drive Zscaler’s growth and innovation agenda,” said Jay Chaudhry, Chairman and CEO of Zscaler. “We are excited to welcome Raj to our leadership team and we look forward to the impact he will have on shaping the future of our company.”

    Judge will be responsible for key growth and investment opportunities as well as forging strategic initiatives. He will work closely with internal and external stakeholders to accelerate innovation and substantially broaden the company’s platform for Zscaler’s customers. The appointment of Judge to the Board further demonstrates the company’s dedication to advancing its corporate strategy and long-term vision.

    “I am excited to join Zscaler at such a pivotal time in its growth journey,” said Raj. “I look forward to bringing my experience and strategic skills to drive new initiatives and investments that will accelerate its continued success.”

    Forward-Looking Statements
    This press release contains forward-looking statements that are based on our management’s beliefs and assumptions and on information currently available to our management. These forward-looking statements include the potential impact of the executive appointment to Zscaler’s future strategic investments and our ability to grow and scale. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC’s website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.

    About Zscaler
    Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform.

    Zscaler™, Zscaler Zero Trust Exchange™, Zscaler Internet Access™, and Zscaler Private Access™, ZIA™, and ZPA™ and Zscaler B2B™ are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners.

    Media Contact
    Pavel Radda
    press@zscaler.com

    Investor Relations Contact
    Ashwin Kesireddy
    ir@zscaler.com

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/96cf5114-9019-4fa0-abd7-c9d7346123a6

    The MIL Network

  • MIL-OSI: LiveRamp Announces Fourth Quarter and Fiscal Year 2025 Results

    Source: GlobeNewswire (MIL-OSI)

    Q4 Revenue up 10% year-over-year

    FY25 Operating Cash Flow increases 46% year-over-year

    FY25 Share Repurchases totaled $101 million

    SAN FRANCISCO, May 21, 2025 (GLOBE NEWSWIRE) — LiveRamp® (NYSE: RAMP), a leading data collaboration platform, today announced its financial results for the quarter and fiscal year ended March 31, 2025.

    Q4 Financial Highlights1

    • Total revenue was $189 million, up 10%.
    • Subscription revenue was $145 million, up 9%.
    • Marketplace & Other revenue was $44 million, up 14%.
    • GAAP gross profit was $131 million, up 5%. GAAP gross margin of 69% compressed by 3 percentage points. Non-GAAP gross profit was $136 million, up 5%. Non-GAAP gross margin of 72% compressed by 3 percentage points.
    • GAAP operating loss was $12 million compared to $14 million. GAAP operating margin of negative 6% expanded by 2 percentage points. Non-GAAP operating income was $23 million compared to $16 million. Non-GAAP operating margin of 12% expanded by 3 percentage points.
    • GAAP diluted loss per share was $0.10 and non-GAAP diluted earnings per share was $0.30.
    • Net cash provided by operating activities was $63 million compared to $28 million.
    • Share repurchases in the fourth quarter totaled approximately 950 thousand shares for $25 million.

    Fiscal Year Financial Highlights1

    • Total revenue was $746 million, up 13%.
    • Subscription revenue was $569 million, up 11%, and represented 76% of total revenue.
    • Marketplace & Other revenue was $177 million, up 21%.
    • GAAP gross profit was $530 million, up 10%, and GAAP gross margin of 71% compressed by 2 percentage points. Non-GAAP gross profit was $550 million, up 12%, and non-GAAP gross margin of 74% compressed by 1 percentage point.
    • GAAP operating income was $5 million compared to $11 million. GAAP operating margin of 1% compressed by 1 percentage point. Non-GAAP operating income was $136 million compared to $105 million. Non-GAAP operating margin of 18% expanded by 2 percentage points.
    • GAAP diluted loss per share was $0.01, and non-GAAP diluted EPS was $1.70.
    • Net cash provided by operating activities was $154 million compared to $106 million.
    • Share repurchases in fiscal 2025 totaled approximately 3.8 million shares for $101 million. As of March 31, 2025, there was $256 million in remaining capacity under the share repurchase authorization that expires on December 31, 2026.

    A reconciliation between GAAP and non-GAAP results is provided in the schedules to this press release.

    Commenting on the results, CEO Scott Howe said: “We had a strong finish to fiscal 2025, with fourth quarter revenue and operating income exceeding our expectations, revenue growing at a double-digit rate and operating cash flow reaching a record high. As we enter fiscal 2026, more so than ever, we are focused on controlling what we can control: Making our platform faster and easier to use; rolling out new functionality, such as our new Cross Media Intelligence measurement solution; helping customers optimize ad spend by harnessing the power of our Data Collaboration Network; and, finally, prudently managing our own costs and growth investments. The near-term macro environment may be uncertain, but we remain confident that in the long-run we can drive sustained growth and shareholder value creation.”

    GAAP and Non-GAAP Results
    The following table summarizes the Company’s financial results for the fiscal 2025 fourth quarter and full year ended March 31, 2025 ($ in millions, except per share amounts):

           
      GAAP   Non-GAAP
      Q4 FY25 FY25   Q4 FY25 FY25
    Subscription revenue $145 $569  
    YoY change 9% 11%  
    Marketplace & Other revenue $44 $177  
    YoY change 14% 21%  
    Total revenue $189 $746  
    YoY change 10% 13%  
               
    Gross profit $131 $530   $136 $550
    % Gross margin 69% 71%   72% 74%
    YoY change (3 pts) (2 pts)   (3 pts) (1 pt)
               
    Operating income (loss) ($12) $5   $23 $136
    % Operating margin (6%) 1%   12% 18%
    YoY change 2 pts (1 pt)   3 pts 2 pts
               
    Net earnings (loss) ($6) ($1)   $20 $115
    Diluted earnings (loss) per share ($0.10) ($0.01)   $0.30 $1.70
               
    Shares to calculate diluted EPS 66.0 66.1   67.5 67.5
    YoY change (1%) (3%)   (1%) (1%)
               
    Net operating cash flow $63 $154  
    Free cash flow   $62 $153
               
    Totals may not sum due to rounding.
     
     

    A detailed discussion of our non-GAAP financial measures and a reconciliation between GAAP and non-GAAP results is provided in the schedules attached to this press release.

    Additional Business Highlights & Metrics

    • On February 25 we hosted an investor day presentation in San Francisco. The video replay, slide presentation and transcript are available on our investor relations website. Additionally, please see our investor day recap that highlights 10 interesting slides from the presentation, available here.
    • On February 25-27 we hosted our annual customer and partner conference, RampUp, in San Francisco, bringing together more than 2,500 leaders at the intersection of marketing, technology and data science. The event featured product demonstrations and 40+ panels and presentations featuring 110 leaders from some of the largest brands in the world, including Disney, Home Depot, P&G and Uber – to name a few. Video replays of these sessions are available here and an event recap for investors is available here.
    • On February 25 we announced Cross-Media Intelligence, a new capability that enables marketers to better measure and optimize campaigns anywhere their customers are. LiveRamp’s Cross-Media Intelligence is a premier solution for next-generation cross-media measurement, unifying insights across partners and datasets, and delivering actionable, repeatable insights with unmatched speed and precision. With Cross-Media Intelligence, marketers for the first time can access unified, deduplicated reporting across screens and platforms (additional information).
    • On April 22 Google announced that it will no longer roll out a new standalone prompt for consumers to opt-in to third-party cookie tracking on Chrome. LiveRamp’s mission remains the same: Enable best-in-class addressable reach and connectivity across every consumer experience by continuing to develop the largest and most useful data collaboration network. We will use cookies to extend reach on Chrome, while continuing to invest and expand our authenticated ecosystem across cookieless browsers (Safari, Firefox, and Edge), direct publisher integrations, CTV, mobile/gaming, and new AI integrations. Please see our blog post for additional information.
    • On March 6 we announced a workforce restructuring involving approximately 5% of our full-time employees. The restructuring is part of a broader strategic reprioritization to build a stronger, more profitable company by tightening our focus and simplifying and driving efficiency into our business processes. In the fourth quarter we incurred $7.2 million of restructuring and related charges primarily related to employee severance and benefits.
    • LiveRamp ended the year with 128 customers whose annualized subscription revenue exceeds $1 million, compared to 115 in the prior year.
    • LiveRamp ended the year with 840 direct subscription customers, compared to 900 in the prior year.
    • Fourth quarter subscription net retention was 104% and platform net retention was 106%.
    • Fourth quarter annualized recurring revenue (ARR), which is the last month of the quarter fixed subscription revenue annualized, was $504 million, up 8% compared to the prior year period.
    • Current remaining performance obligations (CRPO), which is contracted and committed revenue expected to be recognized over the next 12 months, was $471 million, up 14% compared to the prior year period.

    Financial Outlook

    LiveRamp’s non-GAAP operating income guidance excludes the impact of non-cash stock compensation, purchased intangible asset amortization, and restructuring and related charges.

    For the first quarter of fiscal 2026, LiveRamp expects to report:

    • Revenue of $191 million, an increase of 9%
    • GAAP operating loss of $33 million
    • Non-GAAP operating income of $6 million

    For fiscal 2026, LiveRamp expects to report:

    • Revenue of between $787 million and $817 million, an increase of between 6% and 10%
    • GAAP operating loss of between $178 million and $182 million
    • Non-GAAP operating income of between $85 million and $89 million

    Conference Call

    LiveRamp will hold a conference call today at 1:30 p.m. PT (4:30 p.m. ET) to further discuss this information. Interested parties are invited to listen to a webcast of the conference, which can be accessed on LiveRamp’s investor site. A slide presentation will be referenced during the call and is available here.

    About LiveRamp

    LiveRamp is a leading data collaboration technology company, empowering marketers and media owners to deliver and measure marketing performance everywhere it matters. LiveRamp’s data collaboration network seamlessly unites data across advertisers, platforms, publishers, data providers, and commerce media networks—unlocking deep insights, delivering transformational consumer experiences, and driving measurable growth.

    Built on a foundation of strict neutrality, interoperability, and global scale, LiveRamp enables organizations to maximize the value of their data while accelerating innovation. Trusted by many of the world’s leading brands, retailers, financial services providers, and healthcare innovators, LiveRamp is helping shape the future of responsible data collaboration in an AI-driven, outcomes-focused world where advertisers reach intended audiences and consumers receive more relevant advertising messages.

    LiveRamp is headquartered in San Francisco, California, with offices worldwide. Learn more at LiveRamp.com.

    Forward-Looking Statements

    This press release contains “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995, as amended (the “PSLRA”). Forward-looking statements are often identified by words or phrases such as “anticipate,” “estimate,” “plan,” “expect,” “believe,” “intend,” “foresee,” or the negative of these terms or other similar variations thereof, but the absence of these words does not mean that a statement is not forward-looking. These statements, which are not statements of historical fact, include, but are not limited to, the Company’s guidance regarding revenue, GAAP operating loss and Non-GAAP operating income for the first quarter and full year of fiscal 2026 and other similar estimates, assumptions, forecasts, projections and expectations regarding market position, product development, growth opportunities, economic conditions and other future events and trends.

    These forward-looking statements are not guarantees of future performance and are subject to a number of factors and uncertainties that could cause the Company’s actual results and experiences to differ materially from the anticipated results and expectations expressed in the forward-looking statements.

    Among the factors that may cause actual results and expectations to differ from anticipated results and expectations expressed in forward-looking statements are economic uncertainties that could impact us or our suppliers, customers and partners, including, geo-political circumstances, including risk related to tariffs and other trade restrictions, the possibility of a recession, general inflationary pressure and high interest rates; the ability and willingness of our customers to renew their agreements with us upon their expiration; our ability to add new customers and upsell within our subscription business; our reliance upon partners, including data suppliers, who may withdraw or withhold data from us; increased competition and rapidly changing technology that could impact our products and services; the risk that we fail to realize the potential benefits of or have difficulty integrating acquired businesses; and our inability to attract, motivate and retain talent. Additional risks include maintaining our culture and our ability to innovate and evolve while operating in a hybrid work environment, with some employees working remotely at least some of the time within a rapidly changing industry, while also avoiding disruption from reductions in our current workforce as well as disruptions resulting from acquisition, divestiture and other activities affecting our workforce. Our global workforce strategy could possibly encounter difficulty and not be as beneficial as planned. Our international operations are also subject to risks, including the performance of third parties as well as impacts from war and civil unrest, that may harm the Company’s business. The risk of a significant breach of the confidentiality of the information or the security of our or our customers’, suppliers’, or other partners’ data and/or computer systems, or the risk that our current insurance coverage may not be adequate for such a breach, that an insurer might deny coverage for a claim or that such insurance will continue to be available to us on commercially reasonable terms, or at all, could be detrimental to our business, reputation and results of operations. Other business risks include unfavorable publicity and negative public perception about our industry; interruptions or delays in service from data center or cloud hosting vendors we rely upon; and our dependence on the continued availability of third-party data hosting and transmission services. Our clients’ ability to use data on our platform could be restricted if the industry’s use of third-party cookies and tracking technology declines due to technology platform changes, regulation or increased user controls. Continued changes in the judicial, legislative, regulatory, accounting, cultural and consumer environments affecting our business, including but not limited to litigation, investigations, legislation, regulations and customs at the state, federal and international levels relating to information collection and use represents a risk, as well as changes in tax laws and regulations that are applied to our customers which could cause enterprise software budget tightening. In addition, third parties may claim that we are infringing their intellectual property or may infringe our intellectual property which could result in competitive injury and / or the incurrence of significant costs and draining of our resources.

    For a discussion of these and other risks and uncertainties that could affect LiveRamp’s business, reputation, results of operation, financial condition and stock price, please refer to LiveRamp’s filings with the U.S. Securities and Exchange Commission, including in the “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations” sections of LiveRamp’s most recently filed Annual Report on Form 10-K, Quarterly Reports on Form 10-Q and subsequent filings.

    The financial information set forth in this press release reflects estimates based on information available at this time.

    LiveRamp assumes no obligation and does not currently intend to update these forward-looking statements.

    To automatically receive LiveRamp financial news by email, please visit www.LiveRamp.com and subscribe to email alerts.

    For more information, contact:

    LiveRamp Investor Relations
    Investor.Relations@LiveRamp.com

    LiveRamp® and RampID™ and all other LiveRamp marks contained herein are trademarks or service marks of LiveRamp, Inc. All other marks are the property of their respective owners.

    ________________________
    1 Unless otherwise indicated, all comparisons are to the prior year period.

                 
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED STATEMENTS OF OPERATIONS
    (Unaudited)
    (Dollars in thousands, except per share amounts)
                 
      For the three months ended March 31,
              $ %
      2025     2024     Variance Variance
                 
    Revenues 188,724     171,852     16,872   9.8 %
    Cost of revenue 57,929     47,722     10,207   21.4 %
    Gross profit 130,795     124,130     6,665   5.4 %
    % Gross margin 69.3 %   72.2 %      
                 
    Operating expenses            
    Research and development 45,926     45,161     765   1.7 %
    Sales and marketing 56,961     60,476     (3,515 ) (5.8 )%
    General and administrative 32,175     30,252     1,923   6.4 %
    Gains, losses and other items, net 7,241     2,516     4,725   187.8 %
    Total operating expenses 142,303     138,405     3,898   2.8 %
                 
    Loss from operations (11,508 )   (14,275 )   2,767   19.4 %
    % Margin (6.1 )%   (8.3 )%      
                 
    Total other income, net 4,762     5,070     (308 ) (6.1 )%
    Loss from continuing operations before income taxes (6,746 )   (9,205 )   2,459   26.7 %
    Income tax benefit (479 )   (3,027 )   2,548   84.2 %
    Net earnings from continuing operations (6,267 )   (6,178 )   (89 ) (1.4 )%
                 
    Earnings from discontinued operations, net of tax     805     (805 ) (100.0 )%
                 
    Net loss (6,267 )   (5,373 )   (894 ) (16.6 )%
                 
    Basic loss per share:            
    Continuing operations (0.10 )   (0.09 )   (0.00 ) (2.0 )%
    Discontinued operations 0.00     0.01     (0.01 ) (100.0 )%
    Basic loss per share (0.10 )   (0.08 )   (0.01 ) (17.3 )%
                 
    Diluted loss per share:            
    Continuing operations (0.10 )   (0.09 )   (0.00 ) (2.0 )%
    Discontinued operations 0.00     0.01     (0.01 ) (100.0 )%
    Diluted loss per share (0.10 )   (0.08 )   (0.01 ) (17.3 )%
                 
    Basic weighted average shares 65,957     66,323        
    Diluted weighted average shares 65,957     66,323        
                 
    Some totals may not sum due to rounding.            
                 
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED STATEMENTS OF OPERATIONS
    (Unaudited)
    (Dollars in thousands, except per share amounts)
                 
      For the twelve months ended March 31,
              $ %
      2025     2024     Variance Variance
                 
    Revenues 745,580     659,661     85,919   13.0 %
    Cost of revenue 215,910     179,489     36,421   20.3 %
    Gross profit 529,670     480,172     49,498   10.3 %
    % Gross margin 71.0 %   72.8 %      
                 
    Operating expenses            
    Research and development 176,668     151,201     25,467   16.8 %
    Sales and marketing 213,106     195,693     17,413   8.9 %
    General and administrative 126,499     110,166     16,333   14.8 %
    Gains, losses and other items, net 7,993     11,708     (3,715 ) (31.7 )%
    Total operating expenses 524,266     468,768     55,498   11.8 %
                 
    Income from operations 5,404     11,404     (6,000 ) (52.6 )%
    % Margin 0.7 %   1.7 %      
                 
    Total other income, net 17,436     22,957     (5,521 ) (24.0 )%
    Income from continuing operations before income taxes 22,840     34,361     (11,521 ) (33.5 )%
    Income tax expense 25,342     24,270     1,072   4.4 %
    Net earnings (loss) from continuing operations (2,502 )   10,091     (12,593 ) (124.8 )%
                 
    Earnings from discontinued operations, net of tax 1,688     1,790     (102 ) (5.7 )%
                 
    Net earnings (loss) (814 )   11,881     (12,695 ) (106.9 )%
                 
    Basic earnings (loss) per share:            
    Continuing operations (0.04 )   0.15     (0.19 ) (124.8 )%
    Discontinued operations 0.03     0.03     (0.00 ) (5.5 )%
    Basic earnings (loss) per share (0.01 )   0.18     (0.19 ) (106.9 )%
                 
    Diluted earnings (loss) per share:            
    Continuing operations (0.04 )   0.15     (0.19 ) (125.5 )%
    Discontinued operations 0.03     0.03     (0.00 ) (3.1 )%
    Diluted earnings (loss) per share (0.01 )   0.17     (0.19 ) (107.0 )%
                 
    Basic weighted average shares 66,126     66,266        
    Diluted weighted average shares 66,126     67,918        
                 
    Some totals may not sum due to rounding.            
                 
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF GAAP TO NON-GAAP EPS (1)
    (Unaudited)
    (Dollars in thousands, except per share amounts)
                   
      For the three months
    ended March 31,
      For the twelve months
    ended March 31,
      2025     2024     2025     2024
                   
    Income (loss) from continuing operations before income taxes (6,746 )   (9,205 )   22,840     34,361
    Income tax expense (benefit) (479 )   (3,027 )   25,342     24,270
    Net earnings from continuing operations (6,267 )   (6,178 )   (2,502 )   10,091
    Earnings from discontinued operations, net of tax     805     1,688     1,790
    Net earnings (loss) (6,267 )   (5,373 )   (814 )   11,881
                   
    Basic earnings (loss) per share (0.10 )   (0.08 )   (0.01 )   0.18
    Diluted earnings (loss) per share (0.10 )   (0.08 )   (0.01 )   0.17
                   
    Excluded items:              
    Purchased intangible asset amortization (cost of revenue) 3,135     3,097     14,415     8,785
    Non-cash stock compensation (cost of revenue and operating expenses) 24,166     24,780     107,979     71,304
    Restructuring and merger charges (gains, losses, and other) 7,241     2,516     7,993     11,708
    Transformation costs (general and administrative)             1,875
    Total excluded items from continuing operations 34,542     30,393     130,387     93,672
                   
    Income from continuing operations before income taxes and excluding items 27,796     21,188     153,227     128,033
    Income tax expense (2) 7,759     3,947     38,296     29,882
    Non-GAAP net earnings (loss) from continuing operations 20,037     17,241     114,931     98,151
                   
    Non-GAAP earnings per share from continuing operations              
    Basic 0.30     0.26     1.74     1.48
    Diluted 0.30     0.25     1.70     1.45
                   
    Basic weighted average shares 65,957     66,323     66,126     66,266
    Diluted weighted average shares 67,479     68,471     67,499     67,918
                   
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures and the material limitations on the usefulness of these measures, please see Appendix A.
                   
    (2) Non-GAAP income taxes were calculated by applying the estimated annual effective tax rate to year-to-date pretax income or loss and adjusting for discrete tax items in the period. The differences between our GAAP and non-GAAP effective tax rates were primarily due to the net tax effects of the excluded items, coupled with the valuation allowance and smaller pre-tax income for GAAP purposes.
                   
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF GAAP TO NON-GAAP INCOME FROM OPERATIONS (1)
    (Unaudited)
    (Dollars in thousands)
                   
      For the three months
    ended March 31,
      For the twelve months
    ended March 31,
      2025     2024     2025     2024  
                   
    Income (loss) from operations (11,508 )   (14,275 )   5,404     11,404  
    Operating income (loss) margin (6.1 )%   (8.3 )%   0.7 %   1.7 %
                   
    Excluded items:              
    Purchased intangible asset amortization (cost of revenue) 3,135     3,097     14,415     8,785  
    Non-cash stock compensation (cost of revenue and operating expenses) 24,166     24,780     107,979     71,304  
    Restructuring and merger charges (gains, losses, and other) 7,241     2,516     7,993     11,708  
    Transformation costs (general and administrative)             1,875  
    Total excluded items 34,542     30,393     130,387     93,672  
                   
    Income from operations before excluded items 23,034     16,118     135,791     105,076  
    Non-GAAP operating income margin 12.2 %   9.4 %   18.2 %   15.9 %
                   
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures and the material limitations on the usefulness of these measures, please see Appendix A.
                   
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF ADJUSTED EBITDA (1)
    (Unaudited)
    (Dollars in thousands)
                   
      For the three months
    ended March 31,
      For the twelve months
    ended March 31,
      2024     2023     2024     2023  
                   
    Net earnings (loss) from continuing operations (6,267 )   (6,178 )   (2,502 )   10,091  
    Income tax expense (benefit) (479 )   (3,027 )   25,342     24,270  
    Total other expense, net (4,762 )   (5,070 )   (17,436 )   (22,957 )
                   
    Income (loss) from operations (11,508 )   (14,275 )   5,404     11,404  
    Depreciation and amortization 3,803     3,823     17,207     11,508  
                   
    EBITDA (7,705 )   (10,452 )   22,611     22,912  
                   
    Other adjustments:              
    Non-cash stock compensation (cost of revenue and operating expenses) 24,166     24,780     107,979     71,304  
    Restructuring and merger charges (gains, losses, and other) 7,241     2,516     7,993     11,708  
    Transformation costs (general and administrative)             1,875  
                   
    Other adjustments 31,407     27,296     115,972     84,887  
                   
    Adjusted EBITDA 23,702     16,844     138,583     107,799  
                   
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures, the usefulness of these measures and the material limitations on the usefulness of these measures, please see Appendix A.
                   
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED BALANCE SHEETS
    (Dollars in thousands)
                 
      March 31   March 31   $ %
      2025     2024     Variance Variance
    Assets            
    Current assets:            
    Cash and cash equivalents 413,331     336,867     76,464   22.7 %
    Restricted cash 595     2,604     (2,009 ) (77.2 )%
    Short-term investments 7,500     32,045     (24,545 ) (76.6 )%
    Trade accounts receivable, net 186,169     190,313     (4,144 ) (2.2 )%
    Refundable income taxes, net 9,708     8,521     1,187   13.9 %
    Other current assets 38,886     31,682     7,204   22.7 %
    Total current assets 656,189     602,032     54,157   9.0 %
                 
    Property and equipment 23,813     25,394     (1,581 ) (6.2 )%
    Less – accumulated depreciation and amortization 17,629     17,213     416   2.4 %
    Property and equipment, net 6,184     8,181     (1,997 ) (24.4 )%
                 
    Intangible assets, net 20,167     34,583     (14,416 ) (41.7 )%
    Goodwill 501,756     501,756       %
    Deferred commissions, net 44,452     48,143     (3,691 ) (7.7 )%
    Other assets, net 30,623     36,748     (6,125 ) (16.7 )%
      1,259,371     1,231,443     27,928   2.3 %
                 
    Liabilities and Stockholders’ Equity            
    Current liabilities:            
    Trade accounts payable 112,271     81,202     31,069   38.3 %
    Accrued payroll and related expenses 50,776     61,575     (10,799 ) (17.5 )%
    Other accrued expenses 38,586     42,857     (4,271 ) (10.0 )%
    Deferred revenue 45,885     30,942     14,943   48.3 %
    Total current liabilities 247,518     216,576     30,942   14.3 %
                 
    Other liabilities 62,994     65,732     (2,738 ) (4.2 )%
                 
    Stockholders’ equity:            
    Preferred stock           n/a
    Common stock 15,918     15,594     324   2.1 %
    Additional paid-in capital 2,045,316     1,933,776     111,540   5.8 %
    Retained earnings 1,313,358     1,314,172     (814 ) (0.1 )%
    Accumulated other comprehensive income 4,295     3,964     331   8.4 %
    Treasury stock, at cost (2,430,028 )   (2,318,371 )   (111,657 ) 4.8 %
    Total stockholders’ equity 948,859     949,135     (276 ) (0.0 )%
      1,259,371     1,231,443     27,928   2.3 %
                 
           
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED STATEMENTS OF CASH FLOWS
    (Unaudited)
    (Dollars in thousands)
      For the three months
    ended March 31,
      2025     2024  
    Cash flows from operating activities:      
    Net loss (6,267 )   (5,373 )
    Earnings from discontinued operations, net of tax     (805 )
    Non-cash operating activities:      
    Depreciation and amortization 3,803     3,823  
    Loss on disposal or impairment of assets 44     6  
    Lease-related impairment and restructuring charges (28 )   (546 )
    Gain on sale of strategic investments (515 )    
    Loss on marketable equity securities 206      
    Provision for doubtful accounts (453 )   1,947  
    Deferred income taxes (496 )   (498 )
    Non-cash stock compensation expense 24,166     24,780  
    Changes in operating assets and liabilities:      
    Accounts receivable, net 25,187     8,700  
    Deferred commissions 46     (3,971 )
    Other assets 4,703     8,514  
    Accounts payable and other liabilities 11,738     (246 )
    Income taxes (523 )   (7,285 )
    Deferred revenue 969     (1,403 )
    Net cash provided by operating activities 62,580     27,643  
    Cash flows from investing activities:      
    Capital expenditures (293 )   (1,791 )
    Cash paid in acquisitions, net of cash received     (170,281 )
    Purchases of investments     (24,509 )
    Proceeds from sales of investments     25,000  
    Proceeds from sale of strategic investment 763      
    Net cash provided by (used in) investing activities 470     (171,581 )
    Cash flows from financing activities:      
    Proceeds related to the issuance of common stock under stock and employee benefit plans 202     1  
    Shares repurchased for tax withholdings upon vesting of stock-based awards (1,026 )   (719 )
    Acquisition of treasury stock (25,447 )   (15,177 )
    Net cash used in financing activities (26,271 )   (15,895 )
    Net cash provided by (used in) continuing operations 36,779     (159,833 )
    Cash flows from discontinued operations:      
    From operating activities (798 )   805  
    Net cash provided by (used in) discontinued operations (798 )   805  
    Net cash provided by (used in) continuing and discontinued operations 35,981     (159,028 )
    Effect of exchange rate changes on cash 580     (447 )
           
    Net change in cash, cash equivalents and restricted cash 36,561     (159,475 )
    Cash, cash equivalents and restricted cash at beginning of period 377,365     498,946  
    Cash, cash equivalents and restricted cash at end of period 413,926     339,471  
           
    Supplemental cash flow information:      
    Cash paid for income taxes, net from continuing operations 558     4,905  
    Cash received for income taxes, net from discontinued operations     (1,258 )
    Cash paid for operating lease liabilities 2,426     2,594  
           
           
    Operating lease assets obtained in exchange for operating lease liabilities     148  
    Operating lease assets, and related lease liabilities, relinquished in lease terminations (40 )    
    Purchases of property, plant and equipment remaining unpaid at period end 20     104  
    Marketable equity securities obtained in disposition of strategic investment 652      
    Excise tax payable on net stock repurchases 64      
           
           
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED STATEMENTS OF CASH FLOWS
    (Unaudited)
    (Dollars in thousands)
      For the twelve months
    ended March 31,
      2025     2024  
    Cash flows from operating activities:      
    Net earnings (loss) (814 )   11,881  
    Earnings from discontinued operations, net of tax (1,688 )   (1,790 )
    Non-cash operating activities:      
    Depreciation and amortization 17,207     11,508  
    Loss on disposal or impairment of assets 85     1,219  
    Lease-related impairment and restructuring charges 14     1,769  
    Gain on sale of strategic investments (515 )    
    Loss on marketable equity securities 206      
    Provision for doubtful accounts 695     2,254  
    Impairment of goodwill     2,875  
    Deferred income taxes (447 )   (458 )
    Non-cash stock compensation expense 107,979     71,304  
    Changes in operating assets and liabilities:      
    Accounts receivable, net 3,547     (32,336 )
    Deferred commissions 3,691     (11,113 )
    Other assets 2,105     9,426  
    Accounts payable and other liabilities 3,573     8,508  
    Income taxes 3,430     22,275  
    Deferred revenue 14,897     8,334  
    Net cash provided by operating activities 153,965     105,656  
    Cash flows from investing activities:      
    Capital expenditures (1,042 )   (4,255 )
    Cash paid in acquisitions, net of cash received (1,951 )   (170,281 )
    Purchases of investments (1,967 )   (48,894 )
    Proceeds from sales of investments 26,989     50,750  
    Proceeds from sale of strategic investment 763      
    Purchases of strategic investments (1,400 )   (1,000 )
    Net cash provided by (used in) investing activities 21,392     (173,680 )
    Cash flows from financing activities:      
    Proceeds related to the issuance of common stock under stock and employee benefit plans 8,833     7,222  
    Shares repurchased for tax withholdings upon vesting of stock-based awards (10,331 )   (5,835 )
    Acquisition of treasury stock (101,198 )   (60,502 )
    Net cash used in financing activities (102,696 )   (59,115 )
    Net cash provided by (used in) continuing operations 72,661     (127,139 )
    Cash flows from discontinued operations:      
    From operating activities 1,688     1,790  
    Net cash provided by discontinued operations 1,688     1,790  
    Net cash provided by (used in) continuing and discontinued operations 74,349     (125,349 )
    Effect of exchange rate changes on cash 106     372  
           
    Net change in cash, cash equivalents and restricted cash 74,455     (124,977 )
    Cash, cash equivalents and restricted cash at beginning of period 339,471     464,448  
    Cash, cash equivalents and restricted cash at end of period 413,926     339,471  
           
    Supplemental cash flow information:      
    Cash paid for income taxes, net from continuing operations 22,548     2,465  
    Cash received for income taxes, net from discontinued operations (2,486 )   (2,765 )
    Cash received for tenant improvement allowances (2,628 )    
    Cash paid for operating lease liabilities 9,798     10,293  
           
           
    Operating lease assets obtained in exchange for operating lease liabilities 2,327     11,825  
    Operating lease assets, and related lease liabilities, relinquished in lease terminations (595 )   (4,486 )
    Purchases of property, plant and equipment remaining unpaid at period end 20     104  
    Marketable equity securities obtained in disposition of strategic investment 652      
    Excise tax payable on net stock repurchases 128      
           
    LIVERAMP HOLDINGS, INC AND SUBSIDIARIES
    CALCULATION OF FREE CASH FLOW (1)
    (Unaudited)
    (Dollars in thousands)
                           
      6/30/2023 9/30/2023 12/31/2023 3/31/2024 FY2024   6/30/2024 9/30/2024 12/31/2024 3/31/2025 FY2025
                           
    Net cash provided by (used in) operating activities $ 25,693   $ 35,764   $ 16,556   $ 27,643   $ 105,656     $ (9,328 ) $ 55,596   $ 45,117   $ 62,580   $ 153,965  
                           
    Less:                      
    Capital expenditures   (53 )   (200 )   (2,211 )   (1,791 )   (4,255 )     (226 )   (241 )   (282 )   (293 )   (1,042 )
                           
    Free Cash Flow $ 25,640   $ 35,564   $ 14,345   $ 25,852   $ 101,401     $ (9,554 ) $ 55,355   $ 44,835   $ 62,287   $ 152,923  
                           
                           
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures and the material limitations on the usefulness of these measures, please see Appendix A.
     
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    CONSOLIDATED STATEMENTS OF OPERATIONS
    (Unaudited)
    (Dollars in thousands, except per share amounts)
                              Yr-to-Yr
      FY2024   FY2025   FY2025 to FY2024
      6/30/2023 9/30/2023 12/31/2023 3/31/2024 FY2024   6/30/2024 9/30/2024 12/31/2024 3/31/2025 FY2025   % $
                                 
    Revenues   154,069     159,871     173,869     171,852     659,661       175,961     185,483     195,412     188,724     745,580     13.0 % 85,919  
    Cost of revenue   45,621     41,212     44,934     47,722     179,489       51,749     51,234     54,998     57,929     215,910     20.3 % 36,421  
    Gross profit   108,448     118,659     128,935     124,130     480,172       124,212     134,249     140,414     130,795     529,670     10.3 % 49,498  
    % Gross margin   70.4 %   74.2 %   74.2 %   72.2 %   72.8 %     70.6 %   72.4 %   71.9 %   69.3 %   71.0 %      
                                 
    Operating expenses                            
    Research and development   34,519     33,733     37,788     45,161     151,201       44,118     43,889     42,735     45,926     176,668     16.8 % 25,467  
    Sales and marketing   44,879     44,135     46,203     60,476     195,693       54,175     51,107     50,863     56,961     213,106     8.9 % 17,413  
    General and administrative   26,664     26,009     27,241     30,252     110,166       30,961     31,369     31,994     32,175     126,499     14.8 % 16,333  
    Gains, losses and other items, net   116     6,574     2,502     2,516     11,708       206     397     149     7,241     7,993     (31.7 )% (3,715 )
    Total operating expenses   106,178     110,451     113,734     138,405     468,768       129,460     126,762     125,741     142,303     524,266     11.8 % 55,498  
                                 
    Income (loss) from operations   2,270     8,208     15,201     (14,275 )   11,404       (5,248 )   7,487     14,673     (11,508 )   5,404     (52.6 )% (6,000 )
    % Margin   5.0 %   24.3 %   40.2 %   (31.6 )%   1.7 %     (3.0 )%   4.0 %   7.5 %   (6.1 )%   0.7 %      
                                 
    Total other income, net   4,849     6,431     6,607     5,070     22,957       4,444     4,197     4,033     4,762     17,436     (24.0 )% (5,521 )
                                 
    Income (loss) from continuing operations before income taxes   7,119     14,639     21,808     (9,205 )   34,361       (804 )   11,684     18,706     (6,746 )   22,840     (33.5 )% (11,521 )
    Income tax expense (benefit)   8,705     10,163     8,429     (3,027 )   24,270       6,685     9,952     9,184     (479 )   25,342     4.4 % 1,072  
    Net earnings (loss) from continuing operations   (1,586 )   4,476     13,379     (6,178 )   10,091       (7,489 )   1,732     9,522     (6,267 )   (2,502 )   (124.8 )% (12,593 )
                                 
    Earnings from discontinued operations, net of tax       387     598     805     1,790               1,688         1,688     (5.7 )% (102 )
                                 
    Net earnings (loss) $ (1,586 ) $ 4,863   $ 13,977   $ (5,373 ) $ 11,881     $ (7,489 ) $ 1,732   $ 11,210   $ (6,267 ) $ (814 )   (106.9 )% (12,695 )
                                 
    Basic earnings (loss) per share:                            
    Continuing Operations   (0.02 )   0.07     0.20     (0.09 )   0.15       (0.11 )   0.03     0.15     (0.10 )   (0.04 )   (124.8 )% (0.19 )
    Discontinued Operations   0.00     0.01     0.01     0.01     0.03       0.00     0.00     0.03     0.00     0.03     (5.5 )% (0.00 )
    Basic earnings (loss) per share   (0.02 )   0.07     0.21     (0.08 )   0.18       (0.11 )   0.03     0.17     (0.10 )   (0.01 )   (106.9 )% (0.19 )
                                 
    Diluted earnings (loss) per share:                            
    Continuing Operations   (0.02 )   0.07     0.20     (0.09 )   0.15       (0.11 )   0.03     0.14     (0.10 )   (0.04 )   (125.5 )% (0.19 )
    Discontinued Operations   0.00     0.01     0.01     0.01     0.03       0.00     0.00     0.03     0.00     0.03     (3.1 )% (0.00 )
    Diluted earnings (loss) per share   (0.02 )   0.07     0.21     (0.08 )   0.17       (0.11 )   0.03     0.17     (0.10 )   (0.01 )   (107.0 )% (0.19 )
                                 
                                 
    Basic weighted average shares   66,497     66,284     65,961     66,323     66,266       66,621     66,294     65,631     65,957     66,126        
    Diluted weighted average shares   66,497     67,868     67,943     66,323     67,918       66,621     67,309     66,743     65,957     66,126        
                                 
    Some earnings (loss) per share amounts may not add due to rounding.         
                                 
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF GAAP TO NON-GAAP EXPENSES (1)
    (Unaudited)
    (Dollars in thousands)
      FY2024   FY2025
      6/30/2023 9/30/2023 12/31/2023 3/31/2024 FY2024   6/30/2024 9/30/2024 12/31/2024 3/31/2025 FY2025
    Expenses:                      
    Cost of revenue 45,621   41,212   44,934   47,722   179,489     51,749   51,234   54,998   57,929   215,910  
    Research and development 34,519   33,733   37,788   45,161   151,201     44,118   43,889   42,735   45,926   176,668  
    Sales and marketing 44,879   44,135   46,203   60,476   195,693     54,175   51,107   50,863   56,961   213,106  
    General and administrative 26,664   26,009   27,241   30,252   110,166     30,961   31,369   31,994   32,175   126,499  
    Gains, losses and other items, net 116   6,574   2,502   2,516   11,708     206   397   149   7,241   7,993  
                           
    Gross profit, continuing operations: 108,448   118,659   128,935   124,130   480,172     124,212   134,249   140,414   130,795   529,670  
    % Gross margin 70.4 % 74.2 % 74.2 % 72.2 % 72.8 %   70.6 % 72.4 % 71.9 % 69.3 % 71.0 %
                           
    Excluded items:                      
    Purchased intangible asset amortization (cost of revenue) 3,290   1,217   1,181   3,097   8,785     3,846   3,748   3,686   3,135   14,415  
    Non-cash stock compensation (cost of revenue) 629   629   817   1,478   3,553     1,596   1,499   1,455   1,615   6,165  
    Non-cash stock compensation (research and development) 5,077   5,293   6,960   9,859   27,189     10,205   10,920   10,085   10,494   41,704  
    Non-cash stock compensation (sales and marketing) 3,736   4,786   4,089   6,337   18,948     7,093   7,383   7,278   5,716   27,470  
    Non-cash stock compensation (general and administrative) 3,850   5,027   5,631   7,106   21,614     9,091   9,266   7,942   6,341   32,640  
    Restructuring charges (gains, losses, and other) 116   6,574   2,502   2,516   11,708     206   397   149   7,241   7,993  
    Transformation costs (general and administrative) 1,875         1,875              
    Total excluded items 18,573   23,526   21,180   30,393   93,672     32,037   33,213   30,595   34,542   130,387  
                           
    Expenses, excluding items:                      
    Cost of revenue 41,702   39,366   42,936   43,147   167,151     46,307   45,987   49,857   53,179   195,330  
    Research and development 29,442   28,440   30,828   35,302   124,012     33,913   32,969   32,650   35,432   134,964  
    Sales and marketing 41,143   39,349   42,114   54,139   176,745     47,082   43,724   43,585   51,245   185,636  
    General and administrative 20,939   20,982   21,610   23,146   86,677     21,870   22,103   24,052   25,834   93,859  
                           
    Gross profit, excluding items: 112,367   120,505   130,933   128,705   492,510     129,654   139,496   145,555   135,545   550,250  
    % Gross margin 72.9 % 75.4 % 75.3 % 74.9 % 74.7 %   73.7 % 75.2 % 74.5 % 71.8 % 73.8 %
                           
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures, the usefulness of these measures and the material limitations on the usefulness of these measures, please see Appendix A.
     
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF GAAP TO NON-GAAP EPS (1)
    (Unaudited)
    (Dollars in thousands, except per share amounts)
      FY2024   FY2025
      6/30/2023 9/30/2023 12/31/2023 3/31/2024 FY2024   6/30/2024 9/30/2024 12/31/2024 3/31/2025 FY2025
                           
    Income (loss) from continuing operations before income taxes 7,119   14,639 21,808 (9,205 ) 34,361   (804 ) 11,684 18,706 (6,746 ) 22,840  
    Income tax expense (benefit) 8,705   10,163 8,429 (3,027 ) 24,270   6,685   9,952 9,184 (479 ) 25,342  
    Net earnings (loss) from continuing operations (1,586 ) 4,476 13,379 (6,178 ) 10,091   (7,489 ) 1,732 9,522 (6,267 ) (2,502 )
                           
    Earnings from discontinued operations, net of tax   387 598 805   1,790     1,688   1,688  
                           
    Net earnings (loss) (1,586 ) 4,863 13,977 (5,373 ) 11,881   (7,489 ) 1,732 11,210 (6,267 ) (814 )
                           
    Earnings (loss) per share:                      
    Basic (0.02 ) 0.07 0.21 (0.08 ) 0.18   (0.11 ) 0.03 0.17 (0.10 ) (0.01 )
    Diluted (0.02 ) 0.07 0.21 (0.08 ) 0.17   (0.11 ) 0.03 0.17 (0.10 ) (0.01 )
                           
    Excluded items:                      
    Purchased intangible asset amortization (cost of revenue) 3,290   1,217 1,181 3,097   8,785   3,846   3,748 3,686 3,135   14,415  
    Non-cash stock compensation (cost of revenue and operating expenses) 13,292   15,735 17,497 24,780   71,304   27,985   29,068 26,760 24,166   107,979  
    Restructuring and merger charges (gains, losses, and other) 116   6,574 2,502 2,516   11,708   206   397 149 7,241   7,993  
    Transformation costs (general and administrative) 1,875     1,875        
    Total excluded items from continuing operations 18,573   23,526 21,180 30,393   93,672   32,037   33,213 30,595 34,542   130,387  
                           
    Income from continuing operations before income taxes and excluding items 25,692   38,165 42,988 21,188   128,033   31,233   44,897 49,301 27,796   153,227  
    Income tax expense (2) 6,167   9,036 10,732 3,947   29,882   7,371   10,745 12,421 7,759   38,296  
    Non-GAAP net earnings from continuing operations 19,525   29,129 32,256 17,241   98,151   23,862   34,152 36,880 20,037   114,931  
                           
    Non-GAAP earnings per share from continuing operations                      
    Basic 0.29   0.44 0.49 0.26   1.48   0.36   0.52 0.56 0.30   1.74  
    Diluted 0.29   0.43 0.47 0.25   1.45   0.35   0.51 0.55 0.30   1.70  
                           
    Basic weighted average shares 66,497   66,284 65,961 66,323   66,266   66,621   66,294 65,631 65,957   66,126  
    Diluted weighted average shares 67,388   67,868 67,943 68,471   67,918   68,463   67,309 66,743 67,479   67,499  
                           
    Some totals may not add due to rounding           
                           
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures and the material limitations on the usefulness of these measures, please see Appendix A.
     
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    RECONCILIATION OF GAAP TO NON-GAAP OPERATING INCOME GUIDANCE (1)
    (Unaudited)
    (Dollars in thousands)
      For the   For the
      quarter ending   year ending
      June 30,
    2025
      March 31,
    2026
               
          Low   High
               
    GAAP income from operations $ 6,000   $ 85,000   $ 89,000
               
    Excluded items:          
    Purchased intangible asset amortization   3,000     11,000     11,000
    Non-cash stock compensation   24,000     82,000     82,000
    Total excluded items   27,000     93,000     93,000
               
    Non-GAAP income from operations $ 33,000   $ 178,000   $ 182,000
               
               
    (1) This presentation includes non-GAAP measures. Our non-GAAP measures are not meant to be considered in isolation or as a substitute for comparable GAAP measures, and should be read only in conjunction with our condensed consolidated financial statements prepared in accordance with GAAP. For a detailed explanation of the adjustments made to comparable GAAP measures, the reasons why management uses these measures, the usefulness of these measures and the material limitations on the usefulness of these measures, please see Appendix A.
               
    APPENDIX A
    LIVERAMP HOLDINGS, INC. AND SUBSIDIARIES
    Q4 FISCAL 2025 FINANCIAL RESULTS
    EXPLANATION OF NON-GAAP MEASURES AND OTHER KEY METRICS
     
    To supplement our financial results, we use non-GAAP measures which exclude certain acquisition related expenses, non-cash stock compensation and restructuring charges. We believe these measures are helpful in understanding our past performance and our future results. Our non-GAAP financial measures and schedules are not meant to be considered in isolation or as a substitute for comparable GAAP measures and should be read only in conjunction with our consolidated GAAP financial statements. Our management regularly uses these non-GAAP financial measures internally to understand, manage and evaluate our business and to make operating decisions. These measures are among the primary factors management uses in planning for and forecasting future periods. Compensation of our executives is also based in part on the performance of our business based on these non-GAAP measures.
     
    Our non-GAAP financial measures, including non-GAAP earnings (loss) per share, non-GAAP income (loss) from operations, non-GAAP operating income (loss) margin, non-GAAP expenses and adjusted EBITDA reflect adjustments based on the following items, as well as the related income tax effects when applicable:
     
    Purchased intangible asset amortization: We incur amortization of purchased intangibles in connection with our acquisitions. Purchased intangibles include (i) developed technology, (ii) customer and publisher relationships, and (iii) trade names. We expect to amortize for accounting purposes the fair value of the purchased intangibles based on the pattern in which the economic benefits of the intangible assets will be consumed as revenue is generated. Although the intangible assets generate revenue for us, we exclude this item because this expense is non-cash in nature and because we believe the non-GAAP financial measures excluding this item provide meaningful supplemental information regarding our operational performance.
     
    Non-cash stock compensation: Non-cash stock compensation consists of charges for employee restricted stock units, performance shares and stock options in accordance with current GAAP related to stock-based compensation including expense associated with stock-based compensation related to unvested options assumed in connection with our acquisitions. As we apply stock-based compensation standards, we believe that it is useful to investors to understand the impact of the application of these standards to our operational performance. Although stock-based compensation expense is calculated in accordance with current GAAP and constitutes an ongoing and recurring expense, such expense is excluded from non-GAAP results because it is not an expense that typically requires or will require cash settlement by us and because such expense is not used by us to assess the core profitability of our business operations.
     
    Restructuring charges: During the past several years, we have initiated certain restructuring activities in order to align our costs in connection with both our operating plans and our business strategies based on then-current economic conditions. As a result, we recognized costs related to termination benefits for employees whose positions were eliminated, lease and other contract termination charges, and asset impairments. These items, as well as third party expenses associated with business acquisitions in the prior years, reported as gains, losses, and other items, net, are excluded from non-GAAP results because such amounts are not used by us to assess the core profitability of our business operations.
     
    Transformation costs: In previous years, we incurred significant expenses to separate the financial statements of our operating segments, with particular focus on segment-level balance sheets, and to evaluate portfolio priorities. Our criteria for excluding transformation expenses from our non-GAAP measures is as follows: 1) projects are discrete in nature; 2) excluded expenses consist only of third-party consulting fees that we would not incur otherwise; and 3) we do not exclude employee related expenses or other costs associated with the ongoing operations of our business. We substantially completed those projects during the third quarter of fiscal year 2018. Beginning in the fourth quarter of fiscal 2018, and through most of fiscal 2019, we incurred transaction support expenses and system separation costs related to the Company’s announced evaluation of strategic options for its Marketing Solutions (AMS) business. In the first and second quarters of fiscal 2021 in response to the potential COVID-19 pandemic impact on our business and again during fiscal 2023 in response to macroeconomic conditions, we incurred significant costs associated with the assessment of strategic and operating plans, including our long-term location strategy, and assistance in implementing the restructuring activities as a result of this assessment.  Our criteria for excluding these costs are the same. We believe excluding these items from our non-GAAP financial measures is useful for investors and provides meaningful supplemental information.
     
    Our non-GAAP financial schedules are:
     
    Non-GAAP EPS, Non-GAAP Income from Operations, and Non-GAAP expenses: Our Non-GAAP earnings per share, Non-GAAP income from operations, Non-GAAP operating income margin, and Non-GAAP expenses reflect adjustments as described above, as well as the related tax effects where applicable.
     
    Adjusted EBITDA: Adjusted EBITDA is defined as net income from continuing operations before income taxes, other income and expenses, depreciation and amortization, and including adjustments as described above. We use Adjusted EBITDA to measure our performance from period to period both at the consolidated level as well as within our operating segments and to compare our results to those of our competitors. We believe that the inclusion of Adjusted EBITDA provides useful supplementary information to and facilitates analysis by investors in evaluating the Company’s performance and trends. The presentation of Adjusted EBITDA is not meant to be considered in isolation or as an alternative to net earnings as an indicator of our performance.
     
    Free Cash Flow: To supplement our statement of cash flows, we use a non-GAAP measure of cash flow to analyze cash flows generated from operations. Free cash flow is defined as operating cash flow less capital expenditures. Management believes that this measure of cash flow is meaningful since it represents the amount of money available from continuing operations for the Company’s discretionary spending. The presentation of non-GAAP free cash flow is not meant to be considered in isolation or as an alternative to cash flows from operating activities as a measure of liquidity.
     

    PDF available: http://ml.globenewswire.com/Resource/Download/f10eae40-8315-4829-8708-f54db5dee34b

    The MIL Network

  • MIL-OSI: Synaptics Names Rahul Patel as President and Chief Executive Officer

    Source: GlobeNewswire (MIL-OSI)

    SAN JOSE, Calif., May 21, 2025 (GLOBE NEWSWIRE) — Synaptics® Incorporated (Nasdaq: SYNA) announced today that Rahul Patel has been appointed President and Chief Executive Officer, and a Director of the company. Patel succeeds Synaptics CFO Ken Rizvi, who has served as the company’s Interim CEO since February 2025. Rizvi will continue to serve as the company’s CFO.

    With more than 30 years of leadership experience in the semiconductor industry, Patel has a proven track record of driving growth and product innovation, particularly in the areas of high-performance Edge-AI wireless connectivity solutions for handsets, tablets, PCs, wearables such as smartwatches and earbuds, IoT applications, and networking and broadband solutions for enterprises and home markets.

    Prior to joining Synaptics, he spent a decade at Qualcomm, including most recently as SVP and Group General Manager of the Connectivity, Broadband, & Networking Group, where he was responsible for overseeing a multi-billion-dollar portfolio of wireless networking and connectivity business.

    Prior to Qualcomm, Patel spent 13 years in various senior leadership roles at Broadcom, including serving as Senior Vice President and General Manager, Wireless Connectivity Group, where he played a pivotal role in expanding Broadcom’s Wi-Fi®, Bluetooth®, and GPS leadership across all market segments.

    “On behalf of the Board of Directors, we are delighted to welcome Rahul as Synaptics’ next CEO. Rahul’s extensive semiconductor expertise and strong vision uniquely position him to accelerate our growth and innovation, steering us into our next chapter as we broaden our market reach,” said Nelson Chan, Chairman of Synaptics’ Board of Directors. “Rahul’s deep expertise with wireless connectivity, coupled with his proven track record of launching successful product lines and developing high-performing global teams, will be instrumental in advancing our technology roadmap and driving long-term growth. I’d like to sincerely thank Ken for his exceptional leadership as Interim CEO and for ensuring the seamless execution of our strategic initiatives during this transition period.”

    “I am truly honored and excited to join Synaptics, a leader in high-performance Processing, Connectivity, and Sensing solutions,” said Rahul Patel. “Synaptics’ culture of innovation, exceptional engineering talent, and diversified portfolio of solutions uniquely position the company to excel. I look forward to working with the talented team at Synaptics to execute on our growth roadmap and deliver next-generation technology that brings unparalleled value to our customers, partners, and investors.”

    About Synaptics Incorporated
    Synaptics (Nasdaq: SYNA) is driving innovation in AI at the Edge, bringing AI closer to end users and transforming how we engage with intelligent connected devices, whether at home, at work, or on the move. As a go-to partner for forward-thinking product innovators, Synaptics powers the future with its cutting-edge Synaptics Astra™ AI-Native embedded compute, Veros™ wireless connectivity, and multimodal sensing solutions. We’re making the digital experience smarter, faster, more intuitive, secure, and seamless. From touch, display, and biometrics to AI-driven wireless connectivity, video, vision, audio, speech, and security processing, Synaptics is the force behind the next generation of technology enhancing how we live, work, and play. Follow Synaptics on LinkedIn, X, and Facebook, or visit www.synaptics.com

    Synaptics and the Synaptics logo are trademarks of Synaptics in the United States and/or other countries. All other marks are the property of their respective owners.

    For further information, please contact:

    Investor Relations
    Munjal Shah  
    Synaptics  
    +1-408-518-7639
    munjal.shah@synaptics.com

    Media Contact  
    Neeta Shenoy 
    Synaptics 
    +1-408-425-2654
    neeta.shenoy@synaptics.com

    The MIL Network

  • MIL-OSI: NextNRG Reports Q1 2025 Revenues up 147% Year-over-Year

    Source: GlobeNewswire (MIL-OSI)

    Triple-Digit Growth Highlights Execution of Integrated Energy Infrastructure Strategy

    Q1 2025 Conference Call Scheduled for May 22, 2025 at 9:15 AM ET

    MIAMI, May 21, 2025 (GLOBE NEWSWIRE) — NextNRG, Inc. (Nasdaq: NXXT), a pioneer in AI-driven energy innovation—transforming how energy is produced, managed and delivered through its advanced Utility Operating System, smart microgrid technology, wireless EV charging and on-demand mobile fuel delivery solutions— today announced financial results for the first quarter ended March 31, 2025, and provided a strategic update on its technology roadmap and growth trajectory.

    The Company will host a conference call to discuss these results on May 22, 2025 at 9:15 AM ET. Dial-in details are as follows:

    Selected Financial & Operational Highlights

    Metric Q1 2025 (unaudited) Q1 2024 (unaudited)
    Revenue $16.3M $6.6M
    Gross Profit $518K $462K
         

    “We entered 2025 with tremendous momentum and a clear roadmap to scale, and Q1 results are a reflection of that execution,” said Michael D. Farkas, CEO of NextNRG. “With triple-digit revenue growth, record-setting fuel volumes, and expanding margins, our core operations continue to exceed expectations. At the same time, we are advancing the next phase of our integrated energy strategy, with smart microgrid deployments and wireless EV charging programs progressing toward commercial launch.

    We believe our hybrid platform—combining traditional fueling, electrification, and AI-driven grid intelligence—represents the future of distributed energy,” Farkas added. “As we continue executing on this vision, we are building an ecosystem capable of delivering reliable, intelligent, and sustainable infrastructure at national scale laying the foundation for enormous long-term SaaS-based recurring revenue streams.”

    Recent Accomplishments

    • Strong April Momentum Across Key Metrics: Preliminary April 2025 revenue reached $5.82 million, up 154% year-over-year. Volume increased 207%, underscoring sustained demand across multiple regions.
    • Commercial Enterprise Expansion: Extended key existing relationships into Texas using a dedicated fleet portal for operational oversight, increasing engagement from enterprise clients seeking scalable site-level energy solutions.
    • Oklahoma Market Entry: Expanded footprint into a seventh operational state under a long-term agreement with one of the country’s largest in-house fleet operators.
    • Network Reach Strengthened: Grew national deployment capacity to 144 active vehicles servicing major logistics corridors across metro regions including California, Michigan, Tennessee, and the Southeastern U.S.

    Q1 2025 Strategic and Operational Highlights

    • Corporate Rebrand and Capital Formation: Completed $15 million public offering and corporate rebrand to NextNRG.
    • Utility OS Rollout Underway: Initiated deployment of NextNRG’s AI-powered Utility Operating System to optimize microgrid efficiency, automate fleet energy delivery, and enable real-time energy management across new infrastructure projects.
    • Smart Microgrids: On track to begin utility-scale microgrid deployment in Northern Florida in Q2 2025.
    • EV Innovation: Planning launch of the largest bidirectional wireless EV charging pilot in Southern Florida later this year.
    • Infrastructure Expansion with Strategic Acquisitions: Completed the Shell Oil mobile fleet acquisition and integration of Yoshi Mobility assets, boosting logistics capacity and infrastructure access.
    • Geographic Growth in Four New Markets: Entered Phoenix, Austin, San Antonio, and Houston, furthering national service availability and support for new utility and municipal customers.
    • Commercial Channel Maturation: Executed logistics support agreements with major national brands, reinforcing recurring delivery demand and infrastructure reliability.
    • Fleet Partnerships: Initiated deliveries to the world’s largest e-commerce company under a multi-year agreement, significantly expanding the Company’s B2B revenue base.

    First Quarter 2025 Performance

    • Revenue reached $16.3 million, a 147% increase from $6.6 million in Q1 2024.
    • Gallons delivered totaled 4.7 million, up 183% from 1.7 million in the prior-year quarter.
    • Average fuel margin per gallon expanded to $0.71, compared to $0.65 in Q1 2024.
    • Gross profit rose to $518,000, a 12% increase from $462,000 in the same period last year.
    • Ended the quarter with $2.1 million in cash, a 31% year-over-year increase.

    Looking Ahead: Scaling the Energy Intelligence Grid

    NextNRG is focused on expanding its integrated platform across three infrastructure-aligned revenue streams:

    1. Utility Operating System and Smart Microgrids: Deploying AI-driven grid management software and battery/solar microgrid systems through SaaS and power purchase agreements.
    2. Wireless EV Charging: Advancing from R&D to commercial pilots with property owners, CPOs, and municipalities.
    3. Mobile Energy Logistics: Scaling across sectors with centralized scheduling and recurring site-level optimization.

    About NextNRG, Inc.
    NextNRG, Inc. (NextNRG) is Powering What’s Next by implementing artificial intelligence (AI) and machine learning (ML) into renewable energy, next-generation energy infrastructure, battery storage, wireless electric vehicle (EV) charging and on-demand mobile fuel delivery to create an integrated ecosystem.

    At the core of NextNRG’s strategy is its Utility Operating System, which leverages AI and ML to help make existing utilities’ energy management as efficient as possible, and the deployment of NextNRG smart microgrids, which utilize AI-driven energy management alongside solar power and battery storage to enhance energy efficiency, reduce costs and improve grid resiliency. These microgrids are designed to serve commercial properties, schools, hospitals, nursing homes, parking garages, rural and tribal lands, recreational facilities and government properties, expanding energy accessibility while supporting decarbonization initiatives.

    NextNRG continues to expand its growing fleet of fuel delivery trucks and national footprint, including the acquisition of Yoshi Mobility’s fuel division and Shell Oil’s trucks, further solidifying its position as a leader in the on-demand fueling industry. NextNRG is also integrating sustainable energy solutions into its mobile fueling operations. The company hopes to be an integral part of assisting its fleet customers in their transition to EV, supporting more efficient fuel delivery while advancing clean energy adoption. The transition process is expected to include the deployment of NextNRG’s innovative wireless EV charging solutions.

    To find out more visit: www.nextnrg.com

    Forward-Looking Statements
    This press release includes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statement describing NextNRG’s goals, expectations, financial or other projections, intentions, or beliefs is a forward-looking statement and should be considered an at-risk statement. Words such as “expect,” “intends,” “will,” and similar expressions are intended to identify forward-looking statements. Such statements are subject to certain risks and uncertainties, including, but not limited to, those related to NextNRG’s business and macroeconomic and geopolitical events. These and other risks are described in NextNRG’s filings with the Securities and Exchange Commission from time to time. NextNRG’s forward-looking statements involve assumptions that, if they never materialize or prove correct, could cause its results to differ materially from those expressed or implied by such forward-looking statements. Although NextNRG’s forward-looking statements reflect the good faith judgment of its management, these statements are based only on facts and factors currently known by NextNRG. Except as required by law, NextNRG undertakes no obligation to update any forward-looking statements for any reason. As a result, you are cautioned not to rely on these forward-looking statements.

    Investor Relations Contact
    NextNRG, Inc.
    Sharon Cohen
    SCohen@nextnrg.com

    The MIL Network

  • MIL-OSI: Zoom Communications Reports Financial Results for the First Quarter of Fiscal Year 2026

    Source: GlobeNewswire (MIL-OSI)

    • First quarter total revenue of $1,174.7 million, up 2.9% year over year as reported and 3.4% in constant currency
    • First quarter Enterprise revenue of $704.7 million, up 5.9% year over year
    • First quarter GAAP operating margin of 20.6% and non-GAAP operating margin of 39.8%
    • First quarter GAAP EPS of $0.81, up 18.7% year over year, and non-GAAP EPS of $1.43, up 6.0% year over year
    • Number of customers contributing more than $100,000 in trailing 12 months revenue up 8.0% year over year
    • Repurchased approximately 5.6 million shares of common stock in Q1, up from 4.3 million shares in Q4

    SAN JOSE, Calif., May 21, 2025 (GLOBE NEWSWIRE) — Zoom Communications, Inc. (NASDAQ: ZM), today announced financial results for the first fiscal quarter ended April 30, 2025.

    “We delivered another solid quarter, exceeding guidance in both revenue and profitability — a testament to the strength of our platform and AI-first innovation,” said Eric S. Yuan, Zoom’s founder and CEO. “In an uncertain macro-economic environment, customers are turning to Zoom to drive efficiency, improve customer and employee experiences, and future-proof their businesses. We saw continued momentum in Zoom Customer Experience, Zoom Revenue Accelerator, and Workvivo as customers look to elevate CX, reinvigorate sales, and strengthen culture. In Q1, we launched multiple new products, maintained strong operational discipline, and accelerated our share repurchase activity, reinforcing our commitment to shareholder value.”

    First Quarter Fiscal Year 2026 Financial Highlights:

    • Revenue: Total revenue for the first quarter was $1,174.7 million, up 2.9% year over year. Adjusting for foreign currency impact, revenue in constant currency was $1,179.5 million, up 3.4% year over year. Enterprise revenue was $704.7 million, up 5.9% year over year, and Online revenue was $470.0 million, down 1.2% year over year.
    • Income from Operations and Operating Margin: GAAP income from operations for the first quarter was $241.6 million, compared to GAAP income from operations of $203.0 million in the first quarter of fiscal year 2025. Non-GAAP income from operations, which adjusts for stock-based compensation expense and related payroll taxes, and acquisition-related expenses, was $467.3 million for the first quarter, compared to non-GAAP income from operations of $456.6 million in the first quarter of fiscal year 2025. For the first quarter, GAAP operating margin was 20.6% and non-GAAP operating margin was 39.8%.
    • Net Income and Diluted Net Income Per Share: GAAP net income for the first quarter was $254.6 million, or $0.81 per share, compared to GAAP net income of $216.3 million, or $0.69 per share, in the first quarter of fiscal year 2025. Non-GAAP net income for the first quarter, which adjusts for stock-based compensation expense and related payroll taxes, gains/losses on strategic investments, net, acquisition-related expenses, and the tax effects on non-GAAP adjustments, was $448.3 million, or $1.43 per share. In the first quarter of fiscal year 2025, non-GAAP net income was $426.3 million, or $1.35 per share.
    • Cash and Marketable Securities: Total cash, cash equivalents, and marketable securities, excluding restricted cash, as of April 30, 2025 was $7.8 billion.
    • Cash Flow: Net cash provided by operating activities was $489.3 million for the first quarter, compared to $588.2 million in the first quarter of fiscal year 2025. Free cash flow, which is net cash provided by operating activities less purchases of property and equipment, was $463.4 million, compared to $569.7 million in the first quarter of fiscal year 2025.

    Customer Metrics: Drivers of total revenue included acquiring new customers. At the end of the first quarter of fiscal year 2026, Zoom had:

    • 4,192 customers contributing more than $100,000 in trailing 12 months revenue, up 8.0% from the same quarter last fiscal year.
    • A trailing 12-month net dollar expansion rate for Enterprise customers of 98%.
    • Online average monthly churn of 2.8% for the first quarter, down 40 bps from the same quarter last fiscal year.
    • The percentage of total Online MRR from Online customers with a continual term of service of at least 16 months was 74.2%, up 40 bps year over year.

    Financial Outlook: Zoom is providing the following guidance for its second quarter of fiscal year 2026 and its full fiscal year 2026.

    • Second Quarter Fiscal Year 2026: Total revenue is expected to be between $1.195 billion and $1.200 billion and revenue in constant currency is expected to be between $1.196 billion and $1.201 billion. Non-GAAP income from operations is expected to be between $460.0 million and $465.0 million. Non-GAAP diluted EPS is expected to be between $1.36 and $1.37 with approximately 310 million weighted average shares outstanding.
    • Full Fiscal Year 2026: Total revenue is expected to be between $4.800 billion and $4.810 billion and revenue in constant currency is expected to be between $4.808 billion and $4.818 billion. Full fiscal year non-GAAP income from operations is expected to be between $1.865 billion and $1.875 billion. Full fiscal year non-GAAP diluted EPS is expected to be between $5.56 and $5.59 with approximately 312 million weighted average shares outstanding. Full fiscal year free cash flow is expected to be between $1.680 billion and $1.720 billion.

    The EPS and share count figures do not include any impact from $1.2 billion of authorized share repurchase remaining as of April 30, 2025.

    Additional information on Zoom’s reported results, including a reconciliation of the non-GAAP results to their most comparable GAAP measures, is included in the financial tables below. A reconciliation of non-GAAP guidance measures to corresponding GAAP measures is not available on a forward-looking basis without unreasonable effort due to the uncertainty of expenses that may be incurred in the future, although it is important to note that these factors could be material to Zoom’s results computed in accordance with GAAP.

    A supplemental financial presentation and other information can be accessed through Zoom’s investor relations website at investors.zoom.us.

    Zoom Video Earnings Call

    Zoom will host a Zoom Video Webinar for investors on May 21, 2025 at 2:00 p.m. Pacific Time / 5:00 p.m. Eastern Time to discuss the company’s financial results, business highlights and financial outlook. Investors are invited to join the Zoom Video Webinar by visiting: https://investors.zoom.com/

    About Zoom

    Zoom’s mission is to provide the AI-first work platform for human connection. Zoom Workplace — the company’s AI-powered, open collaboration platform built for modern work — will streamline communications, increase employee engagement, optimize in-person time, improve productivity, and offer customer choice with third-party apps and integrations. Zoom Workplace, powered by Zoom AI Companion, will include collaboration solutions like meetings, team chat, phone, scheduler, whiteboard, spaces, Workvivo, and more. Together with Zoom Workplace, Zoom’s Business Services for sales, marketing, and customer care teams, including Zoom Contact Center, strengthen customer relationships throughout the customer lifecycle. Founded in 2011, Zoom is publicly traded (NASDAQ:ZM) and headquartered in San Jose, California. Get more information at zoom.com

    Forward-Looking Statements

    This press release contains express and implied “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995, including statements regarding Zoom’s financial outlook for the second quarter of fiscal year 2026 and full fiscal year 2026, Zoom’s market position, opportunities, and growth strategy, product initiatives, including future product and feature releases and the potential of agentic AI, and go-to-market motions and the expected benefits resulting from the same, market trends, and Zoom’s stock repurchase program. In some cases, you can identify forward-looking statements by terms such as “anticipate,” “believe,” “estimate,” “expect,” “intend,” “may,” “might,” “plan,” “project,” “will,” “would,” “should,” “could,” “can,” “predict,” “potential,” “target,” “explore,” “continue,” or the negative of these terms, and similar expressions intended to identify forward-looking statements. By their nature, these statements are subject to numerous uncertainties and risks, including factors beyond our control, that could cause actual results, performance or achievement to differ materially and adversely from those anticipated or implied in the statements, including: declines in new customers, renewals or upgrades, or decline in demand for our platform, difficulties in evaluating our prospects and future results of operations given our limited operating history, competition from other providers of communications platforms, the effect of macroeconomic conditions on our business, including geopolitical tensions, tariffs and escalating trade tensions, interest rate fluctuations, inflationary pressures and market and foreign currency exchange rate volatility, lengthened sales cycles with large organizations, delays or outages in services from our co-located data centers, failures in internet infrastructure or interference with broadband access, compromised security measures, including ours and those of the third parties upon which we rely, and global security concerns and their potential impact on regional and global economies and supply chains. Additional risks and uncertainties that could cause actual outcomes and results to differ materially from those contemplated by the forward-looking statements are included under the caption “Risk Factors” and elsewhere in our most recent filings with the Securities and Exchange Commission (the “SEC”), including our annual report on Form 10-K for the fiscal year ended January 31, 2025. Forward-looking statements speak only as of the date the statements are made and are based on information available to Zoom at the time those statements are made and/or management’s good faith belief as of that time with respect to future events. Zoom assumes no obligation to update forward-looking statements to reflect events or circumstances after the date they were made, except as required by law.

    Non-GAAP Financial Measures

    Zoom has provided in this press release financial information that has not been prepared in accordance with generally accepted accounting principles in the United States (“GAAP”). Zoom uses these non-GAAP financial measures internally in analyzing its financial results and believes that use of these non-GAAP financial measures is useful to investors as an additional tool to evaluate ongoing operating results and trends and in comparing Zoom’s financial results with other companies in its industry, many of which present similar non-GAAP financial measures.

    Non-GAAP financial measures are not meant to be considered in isolation or as a substitute for comparable GAAP financial measures and should be read only in conjunction with Zoom’s condensed consolidated financial statements prepared in accordance with GAAP. A reconciliation of Zoom’s historical non-GAAP financial measures to the most directly comparable GAAP measures has been provided in the financial statement tables included in this press release, and investors are encouraged to review the reconciliation.

    Non-GAAP Income from Operations and Non-GAAP Operating Margin. Zoom defines non-GAAP income from operations as income from operations excluding stock-based compensation expense and related payroll taxes, and acquisition-related expenses. Zoom excludes stock-based compensation expense because it is non-cash in nature and excluding this expense provides meaningful supplemental information regarding Zoom’s operational performance and allows investors the ability to make more meaningful comparisons between Zoom’s operating results and those of other companies. Zoom excludes the amount of employer payroll taxes related to employee stock plans, which is a cash expense, in order for investors to see the full effect that excluding stock-based compensation expense had on Zoom’s operating results. In particular, this expense is dependent on the price of our common stock and other factors that are beyond our control and do not correlate to the operation of the business. Zoom views acquisition-related expenses when applicable, such as amortization of acquired intangible assets, transaction costs, and acquisition-related retention payments that are directly related to business combinations as events that are not necessarily reflective of operational performance during a period. In fact, Zoom believes the consideration of measures that exclude such expenses can assist in the comparison of operational performance in different periods that may or may not include such expenses and assist in the comparison with the results of other companies in the industry. Zoom defines non-GAAP operating margin as non-GAAP income from operations divided by GAAP revenue.

    Non-GAAP Net Income and Non-GAAP Net Income Per Share, Basic and Diluted. Zoom defines non-GAAP net income as GAAP net income adjusted to exclude stock-based compensation expense and related payroll taxes, acquisition-related expenses, gains/losses on strategic investments, net, and the tax effects of all non-GAAP adjustments. Zoom excludes these items because they are considered by management to be outside of Zoom’s core operating results. These adjustments are intended to provide investors and management with greater visibility to the underlying performance of Zoom’s business operations, facilitate comparison of its results with other periods, and may also facilitate comparison with the results of other companies in the industry. Zoom defines non-GAAP net income per share, basic and diluted, as non-GAAP net income divided by the number of shares outstanding, basic and diluted, calculated in accordance with GAAP.

    Free Cash Flow and Free Cash Flow Margin. Zoom defines free cash flow as GAAP net cash provided by operating activities less purchases of property and equipment. Zoom considers free cash flow to be a liquidity measure that provides useful information to management and investors regarding net cash provided by operating activities and cash used for investments in property and equipment required to maintain and grow the business. Zoom defines free cash flow margin as free cash flow divided by GAAP revenue.

    Revenue in Constant Currency. Zoom defines revenue in constant currency as GAAP revenue adjusted for revenue reported in currencies other than United States dollars as if they were converted into United States dollars using the average exchange rates from the comparative period rather than the actual exchange rates in effect during the respective periods. Zoom provides revenue in constant currency information as a framework for assessing how Zoom’s underlying businesses performed period to period, excluding the effects of foreign currency fluctuations.

    Customer Metrics

    Zoom defines a customer as a separate and distinct buying entity, which can be a single paid user or an organization of any size (including a distinct unit of an organization) that has multiple users. Zoom defines Enterprise customers as distinct business units that have been engaged by either our direct sales team, resellers, or strategic partners. All other customers that subscribe to our services directly through our website are referred to as Online customers.

    Zoom calculates net dollar expansion rate as of a period end by starting with the annual recurring revenue (“ARR”) from Enterprise customers as of 12 months prior (“Prior Period ARR”). Zoom defines ARR as the annualized revenue run rate of subscription agreements from all customers at a point in time. Zoom calculates ARR by taking the monthly recurring revenue (“MRR”) and multiplying it by 12. MRR is defined as the recurring revenue run-rate of subscription agreements from all Enterprise customers for the last month of the period, including revenue from monthly subscribers who have not provided any indication that they intend to cancel their subscriptions. Zoom then calculates the ARR from these Enterprise customers as of the current period end (“Current Period ARR”), which includes any upsells, contraction, and attrition. Zoom divides the Current Period ARR by the Prior Period ARR to arrive at the net dollar expansion rate. For the trailing 12 months calculation, Zoom takes an average of the net dollar expansion rate over the trailing 12 months.

    Zoom calculates online average monthly churn by starting with the Online customer MRR as of the beginning of the applicable quarter (“Entry MRR”). Zoom defines Entry MRR as the recurring revenue run-rate of subscription agreements from all Online customers except for subscriptions that Zoom recorded as churn in a previous quarter based on the customers’ earlier indication to us of their intention to cancel that subscription. Zoom then determines the MRR related to customers who canceled or downgraded their subscription or notified us of that intention during the applicable quarter (“Applicable Quarter MRR Churn”) and divides the Applicable Quarter MRR Churn by the applicable quarter Entry MRR to arrive at the MRR churn rate for Online Customers for the applicable quarter. Zoom then divides that amount by three to calculate the online average monthly churn.

    Public Relations

    Colleen Rodriguez
    Head of Global Public Relations
    press@zoom.us

    Investor Relations

    Charles Eveslage
    Head of Investor Relations
    investors@zoom.us

    Zoom Communications, Inc.
    Condensed Consolidated Balance Sheets
    (In thousands)
     
        As of
        April 30,
    2025
      January 31,
    2025
    Assets   (unaudited)    
    Current assets:        
    Cash and cash equivalents   $ 1,228,847   $ 1,349,380  
    Marketable securities     6,563,976     6,442,329  
    Accounts receivable, net     477,242     495,228  
    Deferred contract acquisition costs, current     175,900     188,358  
    Prepaid expenses and other current assets     220,812     200,679  
    Total current assets     8,666,777     8,675,974  
    Deferred contract acquisition costs, noncurrent     114,513     123,464  
    Property and equipment, net     312,211     330,475  
    Operating lease right-of-use assets     53,217     55,900  
    Strategic investments     576,139     591,481  
    Goodwill     307,295     307,295  
    Deferred tax assets     769,189     749,759  
    Other assets, noncurrent     152,555     154,073  
    Total assets   $ 10,951,896   $ 10,988,421  
    Liabilities and stockholders’ equity        
    Current liabilities:        
    Accounts payable   $ 14,205   $ 8,345  
    Accrued expenses and other current liabilities     473,951     558,562  
    Deferred revenue, current     1,409,217     1,336,387  
    Total current liabilities     1,897,373     1,903,294  
    Deferred revenue, noncurrent     16,185     17,274  
    Operating lease liabilities, noncurrent     35,894     37,406  
    Other liabilities, noncurrent     100,076     95,363  
    Total liabilities     2,049,528     2,053,337  
             
    Stockholders’ equity:        
    Common stock     302     305  
    Additional paid-in capital     4,832,800     5,130,271  
    Accumulated other comprehensive (loss) income     15,145     4,990  
    Retained earnings     4,054,121     3,799,518  
    Total stockholders’ equity     8,902,368     8,935,084  
    Total liabilities and stockholders’ equity   $ 10,951,896   $ 10,988,421  
     
    Note: The amount of unbilled accounts receivable included within accounts receivable, net on the condensed consolidated balance sheets was $108.1 million and $118.5 million as of April 30, 2025 and January 31, 2025, respectively.
     
    Zoom Communications, Inc.
    Condensed Consolidated Statements of Operations
    (Unaudited, in thousands, except share and per share amounts)
     
        Three Months Ended April 30,
          2025       2024  
    Revenue   $ 1,174,715     $ 1,141,234  
    Cost of revenue     278,402       273,302  
    Gross profit     896,313       867,932  
    Operating expenses:        
    Research and development     205,416       205,558  
    Sales and marketing     346,970       348,008  
    General and administrative     102,335       111,344  
    Total operating expenses     654,721       664,910  
    Income from operations     241,592       203,022  
    (Losses) gains on strategic investments, net     (13,619 )     17,354  
    Other income, net     87,792       71,588  
    Income before provision for income taxes     315,765       291,964  
    Provision for income taxes     61,162       75,656  
    Net income     254,603       216,308  
             
    Net income per share:        
    Basic   $ 0.84     $ 0.70  
    Diluted   $ 0.81     $ 0.69  
    Weighted-average shares used in computing net income per share:        
    Basic     304,908,652       308,700,582  
    Diluted     312,783,861       315,360,678  
     
    Zoom Communications, Inc.
    Condensed Consolidated Statements of Cash Flows
    (Unaudited, in thousands)
     
        Three Months Ended April 30,
          2025       2024  
    Cash flows from operating activities:        
    Net income   $ 254,603     $ 216,308  
    Adjustments to reconcile net income to net cash provided by operating activities:        
    Stock-based compensation expense     201,569       229,425  
    Amortization of deferred contract acquisition costs     69,557       68,125  
    Depreciation and amortization     35,316       26,667  
    Deferred income taxes     (24,690 )     (7,952 )
    Losses (gains) on strategic investments, net     13,619       (17,354 )
    Provision for accounts receivable allowances     5,855       6,782  
    Unrealized foreign exchange (gains) losses     (7,626 )     7,237  
    Non-cash operating lease cost     6,108       5,368  
    Amortization of discount/premium on marketable securities     (12,845 )     (17,668 )
    Other     4,142       98  
    Changes in operating assets and liabilities:        
    Accounts receivable     12,485       12,260  
    Prepaid expenses and other assets     (12,293 )     35,839  
    Deferred contract acquisition costs     (48,148 )     (40,128 )
    Accounts payable     7,252       7,276  
    Accrued expenses and other liabilities     (80,383 )     (14,942 )
    Deferred revenue     72,141       77,964  
    Operating lease liabilities, net     (7,401 )     (7,114 )
    Net cash provided by operating activities     489,261       588,191  
    Cash flows from investing activities:        
    Purchases of marketable securities     (1,135,024 )     (867,911 )
    Maturities of marketable securities     1,033,279       776,941  
    Sales of marketable securities     2,525        
    Purchases of property and equipment     (25,910 )     (18,508 )
    Purchases of strategic investments           (3,000 )
    Proceeds from strategic investments           4,654  
    Net cash used in investing activities     (125,130 )     (107,824 )
    Cash flows from financing activities:        
    Proceeds from exercise of stock options     954       1,016  
    Proceeds from employee equity transactions to be remitted to employees and tax authorities, net     8,690       6,581  
    Cash paid for repurchases of common stock     (418,021 )     (150,048 )
    Taxes paid related to net share settlement of equity awards     (82,153 )      
    Net cash used in financing activities     (490,530 )     (142,451 )
    Effect of exchange rate changes on cash, cash equivalents, and restricted cash     11,854       (6,852 )
    Net (decrease) increase in cash, cash equivalents, and restricted cash     (114,545 )     331,064  
    Cash, cash equivalents, and restricted cash – beginning of period     1,361,417       1,565,380  
    Cash, cash equivalents, and restricted cash – end of period   $ 1,246,872     $ 1,896,444  
     
    Zoom Communications, Inc.
    Reconciliation of GAAP to Non-GAAP Measures
    (Unaudited, in thousands, except share and per share amounts)
     
        Three Months Ended April 30,
          2025       2024  
    GAAP income from operations   $ 241,592     $ 203,022  
    Add:        
    Stock-based compensation expense and related payroll taxes     216,730       242,874  
    Acquisition-related expenses     9,004       10,701  
    Non-GAAP income from operations   $ 467,326     $ 456,597  
    GAAP operating margin     20.6 %     17.8 %
    Non-GAAP operating margin     39.8 %     40.0 %
             
    GAAP net income   $ 254,603     $ 216,308  
    Add:        
    Stock-based compensation expense and related payroll taxes     216,730       242,874  
    Losses (gains) on strategic investments, net     13,619       (17,354 )
    Acquisition-related expenses     9,004       10,701  
    Tax effects on non-GAAP adjustments     (45,663 )     (26,211 )
    Non-GAAP net income   $ 448,293     $ 426,318  
             
    Net income per share – basic and diluted:        
    GAAP net income per share – basic   $ 0.84     $ 0.70  
    Non-GAAP net income per share – basic   $ 1.47     $ 1.38  
    GAAP net income per share – diluted   $ 0.81     $ 0.69  
    Non-GAAP net income per share – diluted   $ 1.43     $ 1.35  
             
    GAAP and non-GAAP weighted-average shares used to compute net income per share – basic     304,908,652       308,700,582  
    GAAP and non-GAAP weighted-average shares used to compute net income per share – diluted     312,783,861       315,360,678  
             
    Net cash provided by operating activities   $ 489,261     $ 588,191  
    Less: Purchases of property and equipment     (25,910 )     (18,508 )
    Free cash flow (non-GAAP)   $ 463,351     $ 569,683  
    Net cash used in investing activities   $ (125,130 )   $ (107,824 )
    Net cash (used in) provided by financing activities   $ (490,530 )   $ (142,451 )
    Operating cash flow margin (GAAP)     41.6 %     51.5 %
    Free cash flow margin (non-GAAP)     39.4 %     49.9 %
             
        Three Months Ended April 30,
          2025  
        Revenue   YoY Revenue
    Growth (%)
    GAAP revenue   $ 1,174,715       2.9 %
    Add: Constant currency impact     4,762       0.5 %
    Revenue in constant currency (non-GAAP)     1,179,477       3.4 %
     

    The MIL Network

  • MIL-OSI Economics: Tawazun Council and Thales Sign Agreement to Establish Ground Master Air Surveillance Radar Production Facility in UAE

    Source: Thales Group

    Headline: Tawazun Council and Thales Sign Agreement to Establish Ground Master Air Surveillance Radar Production Facility in UAE

    • As part of the Tawazun Economic Program, Thales Emarat Technologies announces its investment in a state-of-the-art factory to produce Ground Master series air surveillance radars.
    • The facility is expected to be fully operational by 2027, enhancing the UAE’s sovereign and manufacturing capabilities.
    • This strategic cooperation agreement signed between Tawazun Council and Thales aims to strengthen partnership and support local production.

    Abu Dhabi, 20 May 2025 – Tawazun Council and Thales, have signed a cooperation agreement to produce locally advanced Ground Master series air surveillance radars. This agreement supports the UAE’s vision to boost local manufacturing and develop national defence capabilities.

    The signing took place during the fourth edition of “Make it in the Emirates 2025,” with Matar Ali Al Romaithi, Sector Chief of Defence and Security Industry Affairs at Tawazun Council, and Abdelhafid Mordi, CEO of Thales in the UAE, alongside representatives from both sides.

    This reflects Thales’ commitment to supporting the UAE’s vision of advancing manufacturing capabilities through innovation and industrial excellence.

    The Ground Master radars are internationally recognized for their reliability, superior performance, mobility, and adaptability to diverse missions, positioning them amongst the world’s leading air surveillance and defence systems. The facility is scheduled to be fully operational by 2027, where it will assemble, test, and qualify advanced air surveillance radars to meet both domestic and export markets needs.

    This factory will serve as a strategic asset, bolstering the UAE’s defence manufacturing capabilities, enhancing self-sufficiency in critical technologies, and providing flexibility to address varying operational requirements.

    A core pillar of Thales Radar Centre of Excellence’s expansion is the development of Emirati talents. Thales places localization at the heart of its growth strategy through advanced training programs and sustainable professional career development, building specialized local expertise in advanced radar technologies in support of the UAE’s National Defence Strategy and its vision of a highly capable, future-ready national workforce. As the project is not only focused on building the radar system, but also on qualifying domestic suppliers, it further contributes to strengthening the national industrial base and promoting long-term self-reliance.

    Commenting on the agreement, Matar Ali Al Romaithi, Sector Chief of Defence and Security Industry Affairs at Tawazun Council, said: “The expansion of Thales’ Radar Centre of Excellence reflects the strength of the UAE’s defence industrial strategy and its regional leadership in advanced technologies. This initiative enhances national capabilities in air surveillance radar systems while creating significant opportunities for local companies to grow, innovate, and compete globally.”

    Abdelhafid Mordi, CEO of Thales in the UAE said: “Thales is proud to contribute to the growth of the UAE’s industrial defence ecosystem by advancing local capabilities, in-line with the national vision. The expansion of our Radar Centre of Excellence, through the establishment of a new production facility, marks a major milestone – from integration, testing, manufacturing to lifecycle support. This investment reinforces the UAE’s sovereignty in critical defence technologies, strengthens the national supply chain, embarks UAE talents and deepens local expertise in advanced radar systems.”

    About Thales

    Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

    The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies.

    Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

    About Thales in the UAE

    Thales has been present in the UAE for 50 years, providing customers with technologically advanced solutions in Defence and Security, Digital Identity and Security, Aerospace, and Space industries.

    Part of the Tawazun Economic Program, Thales Emarat Technologies (TET) is a fully-owned Thales Group entity that was established in 2019 to boost localization and the development of Emirati talent. It houses centres of excellence for critical systems and a variety of defence and digital aerospace technologies. Since its establishment in 2019, Tawazun Economic Council and TET have launched the Radar Centre of Excellence, the Defence Services Center and Digital Center of Excellence. 

    MIL OSI Economics

  • MIL-OSI United Nations: Experts of the Committee on the Rights of the Child Commend Romania on Deinstitutionalisation Process, Raise Questions on Corporal Punishment and Segregation in Education

    Source: United Nations – Geneva

    The Committee on the Rights of the Child today concluded its review of the combined sixth and seventh periodic reports of Romania, with Committee Experts commending the State on the deinstitutionalisation process of alternative care centres, while raising questions on the prevalence of corporal punishment and measures taken to combat segregation in education. 

    A Committee Expert said she was happy to hear about the programme for the deinstitutionalisation of alternative care centres; this was something Romania should be proud of, as well as all the foster arrangements being made, especially for children with disabilities. 

    Juliana Scerri Ferrante, Committee Expert and Country Taskforce Member, said there seemed to be a lack of parental education programmes around corporal punishment. How could the views of the child be respected if violence was accepted as a disciplinary measure?  Could the Romanian Government take clear steps to train staff and promote child education?  Philip Jaffe, Committee Vice-Chair and Country Taskforce Member, also noted that corporal punishment appeared to remain quite widespread despite being banned in 2004.  What efforts were being made to lower the prevalence and change attitudes among parents and adults? 

    Mr. Jaffe asked what was being done to combat school segregation based on disability, special education needs, and family economic status?  What improvements were being made to increase the improvement of vocational training for older children who may be leaving the school system?  Were there any programmes which specifically targeted economically disadvantaged children?

    The delegation said Romanian legislation completely prohibited violence against children, regardless of the environment.  However, despite the legislation, which was fully aligned with United Nations Conventions, the State needed to fight against mentalities and traditions and to practically change the minds of parents and caregivers, who believed corporal punishment would discipline children better.  Awareness-raising campaigns were being conducted for parents, and mechanisms including hotlines had been developed to support children, including the helpline 119.  Authorities were obligated to launch investigations immediately concerning any allegations of violence against children. 

    The delegation said the Ministry of Education had taken steps to assist children with special educational needs, with the creation of frameworks offering them different kinds of support, based on the type of disability.  Adaptive measures had been taken for Roma children, including stimulating their participation in early education and in summer kindergartens, supporting education in their current language, and translating schoolbooks in their mother tongue, among others.  An increasing number of contracts between schools and the business sector had been recorded, including around 6,000 contracts in the school year 2023/2024. 

    Introducing the report, Helena Omna-Raicu, President of the National Authority for the Protection of Child Rights and Adoption of Romania and head of the delegation, said Romania’s path in recent years had been shaped by profound changes and emerging pressures, including the war in Ukraine and the arrival of thousands of children and families fleeing conflict.  As a neighbouring country, Romania had mobilised rapidly to provide emergency care, protection, psychosocial support, and schooling to children regardless of their nationality. 

    Ms. Omna-Raicu said Romania had made significant progress in certain areas, including in the deinstitutionalisation process.  Of the 167 residential placement centres operating in 2017, 149 had already been closed by the end of March 2025 and over 6,000 children were now benefiting from family-type alternative care.  The remaining 18 placement centres would be closed soon. 

    In closing remarks, Rinchen Chophel, Committee Expert and Country Taskforce Coordinator, reiterated the Committee’s appreciation for the Government of Romania’s support to Ukrainian refugees, particularly children.  Significant progress had been made from the last reporting period to the current one, with many looking forward beyond the dialogue. 

    In her closing remarks, Ms. Omna-Raicu, expressed deep gratitude for the dialogue.  The Committee’s concerns regarding urban disparities were noted.  Romania would treat the Committee’s recommendations as an opportunity for deeper transformation. 

     

    The delegation of Romania was comprised of representatives from the National Authority for the Protection of Child Rights and Adoption; the Ministry of Education and Research; the Ministry of Justice; the Ministry of Health; the Ministry of Labour, Family, Youth and Social Security; the Ministry of Foreign Affairs; the General Inspectorate of the Romanian Police; the General Inspectorate for Immigration; the National Administration of Penitentiaries; the Prosecutor’s Office; the National Health Insurance Authority; and the Permanent Mission of Romania to the United Nations Office at Geneva. 

    Summaries of the public meetings of the Committee can be found here, while webcasts of the public meetings can be found here. The programme of work of the Committee’s ninety-ninth session and other documents related to the session can be found here.

    The Committee will next meet in public at 3 p.m. on Wednesday, 21 May to begin its consideration of the combined fifth and sixth periodic reports of Qatar (CRC/C/QAT/5-6).

    Report

    The Committee has before it the combined sixth and seventh periodic reports of Romania (CRC/C/ROU/6-7).

    Presentation of Report

    HELENA OMNA-RAICU, President of the National Authority for the Protection of Child Rights and Adoption of Romania and head of the delegation, said Romania’s path in recent years had been shaped by profound changes and emerging pressures, including the war in Ukraine and the arrival of thousands of children and families fleeing conflict.  As a neighbouring country, Romania had mobilised rapidly to provide emergency care, protection, psychosocial support, and schooling to children regardless of their nationality.  The State was proud to have established the first Blue Dot in the region at the border crossing with Ukraine and launched the use of the Child Protection Information Management System Primero in only a couple of months after the onset of the refugee crisis, ensuring registration and case management for almost 40,000 refugee children.

    Several new national strategies had been developed for 2021-2027 which aimed to address child poverty and wellbeing, including the national strategy for the protection and promotion of children’s rights “protected children, safe Romania” 2023-2027, and the national strategy on social inclusion and poverty reduction 2022-2027, among others.   Romania had also adopted and begun the implementation of the child guarantee national action plan 2023-2030, which aimed to reduce the number of children at risk of poverty or social exclusion by at least 500,000 by 2030. Romania had seen a measurable decline in the proportion of children at risk of poverty and social exclusion from 41.5 per cent in 2022 to 33.8 per cent in 2024. 

    In April 2024, law 100/2024 was approved which included specific amendments to several laws relevant for social assistance.  The new emergency ordinance no. 96/2024, approved in June 2024 regarding the provision of humanitarian support and assistance by the Romanian State to foreign citizens or stateless persons in special situations coming from the area of the armed conflict in Ukraine, established the legal framework providing refugees with access to a wide range of key national statutory services. Another significant legislative change was enacted by amending law 272/2004 in December 2024, which now mandated the participation of children in public decision-making processes. 

    There had also been several significant programmes launched, including modernising the unique national number 119 for reporting cases of abuse, neglect, exploitation and any other form of violence against children; the development of community services for children and families to prevent separation and support the family reintegration of children from the special protection system; and the development of 200 integrated community centres and 150 daycare centres for children, among others.  Despite these advances, challenges remained, including disparities between rural and urban areas. 

    However, Romania had made significant progress in certain areas, including in the deinstitutionalisation process.  Of the 167 residential placement centres operating in 2017, 149 had already been closed by the end of March 2025 and over 6,000 children were now benefiting from family-type alternative care.  The remaining 18 placement centres would be closed soon.  The use of European Union structural funds had also supported the training of over 11,000 foster carers.  A new programme had also been introduced, aimed to scale-up integrated community-services in 2,000 marginalised rural communities, combining social assistance, health, education, and other types of social support.  Over 800 million euros of European Social Funds were planned for enhancing access to social services for the most vulnerable, including children and their families.

    The State had also expanded support for children at risk of early school leaving by using the early warning mechanism in education, of which around 50,000 participants from 6,950 institutions had completed the training programme.  Targeted policies had been developed that supported the reintegration of children who dropped out during the pandemic, and more resources were reaching schools in deprived communities.  In health, the role of community nurses and Roma health mediators had grown, and work continued to improve access to services for vulnerable groups. 

    Pilot projects on mental health for children had laid the groundwork for more systemic change, with mental health services for children and adolescents being expanded. However, challenges remained in ensuring equitable access to quality services in rural and marginalised areas, addressing shortages of specialised personnel, and improving early identification and intervention for children with developmental delays or disabilities.

    Romania was committed to reducing the number of children affected by poverty and social exclusion by at least 500,000.  The State would also pursue the complete closure of old-type residential centres, with every child in alternative care placed in family-based or community settings. Romania was committed to translating the pledges made during the first-ever global ministerial conference on ending violence against children held at the end of 2024 in Bogota, Columbia, into realities for children. 

    In education, the State aimed to increase the early childhood education enrolment rate by at least 22 per cent for children aged zero to three and at least 95 per cent for children aged four to six.  There would be a focus on improving mental health services for children and linking schools, families, and health providers more effectively, aiming to reduce preventable mortality by 20 per cent compared to 2021 levels for children of all ages.   Finally, Romania would ensure that children had a role in shaping systems through participatory budgeting, monitoring, and children and youth-led policy platforms. Romania remained committed to fully implementing the Convention and to contributing to the global effort to advance child rights everywhere.

    Questions by Committee Experts

    RINCHEN CHOPHEL, Committee Expert and Country Taskforce Coordinator, said Romania had achieved a lot since the last report, which the Committee was happy about. Romania’s assistance to the Ukrainian refugees and children should be noted.  There had been significant legislative achievements, particularly the amendments to law 272.  What measures were in place to ensure effective implementation of the law?  The national strategy on social inclusion and poverty reduction 2022-2027, and the child guarantee national action plan 2023-2030 were very welcome developments.  How had these impacted on measures to promote and protect children? Had an assessment been undertaken to evaluate the impact of the national strategy. 

    While welcoming increased allocations to certain sectors, the Coordinator asked what measures were in place to develop a child-friendly budgeting process?  What was the current status of the complaints mechanism in the country for reporting all forms of abuse and violence for children? What had been done to inform children of their right to file a complaint?  Had professionals working with children been trained on receiving complaints concerning children and the Convention? 

    The establishment of the child Ombudsman in 2018 was a crucial step in the right direction, and the Government should be congratulated for that.  What was the current status of the institution?  How did it connect with children?  The Committee noted the State party’s awareness raising activities on the Convention with appreciation, including the translation of the Committee’s general comments into Romanian.  How did these efforts extend to rural children? 

    JULIANA SCERRI FERRANTE, Committee Expert and Country Taskforce Member, asked if the national strategy for school de-segregation been adopted?  If not, then when would this occur?  What measures had been taken to address hate speech? Did the permanent committee set up in every education unit offer a complaints mechanism to children?  If not, how could children complain in schools? 

    What had been done to decrease discrimination against the Roma population?  What efforts had been made to promote the inclusion of Roma in mainstream schooling?  How was discrimination against children with disabilities tackled in education?  There was concern that Romanian law did not define valid reasons on which minor marriages could be authorised and this was left to the discretion of the authorities.  What training was provided to apply the best interests of the child? What approaches had been taken to reduce the preventable mortality of children under five years old?  What was the position of the Romanian Government on the proposed amendment to law 272 regarding lesbian, gay, bisexual, transgender and intersex children?

    There seemed to be a lack of parental education programmes around corporal punishment. How could the views of the child be respected if violence was accepted as a disciplinary measure?  Could the Romanian Government take clear steps to train staff and promote child education?  How were child labour laws enforced?  How would the Romanian Government establish a child participation mechanism?  Were refugee and asylum-seeking children involved in decisions which affected them? Were children provided information on their rights? 

    What measures were being taken to strengthen the capacity of the social welfare services? How were children with disabilities prioritised in reform measures?  What was being done to combat the illicit transfer of children abroad?  Had bilateral agreements been conducted in this regard?  Was the Romanian Government carrying out measures to understand the impact of prison on children?  How were they supported when their parents were incarcerated?  What support was available for young people leaving institutional care? 

    SOPHIE KILADZE, Committee Chair and Country Taskforce Member, said the adoption of law 105/22 providing for automatic birth registration should be considered as positive.  Could more information be provided about how the law worked in practice?  Were there any plans to introduce a statelessness determination procedure?  Was data on statelessness which concerned children disaggregated?  What measures were in place to protect children from excessive screen use?  How did Romania deal with artificial intelligence as a European Union member? Romania had one of the lowest levels of digital skills in the European Union; what measures were being undertaken to promote digital literacy among children, as well as parents? 

    PHILIP JAFFE, Committee Vice-Chair and Country Taskforce Member, said it was wonderful that strong pledges had been made at the global ministerial conference on ending violence against children in Bogota.  How was Romania implementing its mission as a pathfinding global alliance country?  It seemed Romanian children were in need of protection against high levels of physical and sexual violence.  One of the pledges made in Bogota was to conduct a prevalence study on sexual abuse; had the State moved forward with this study?  Were there dedicated teams drawing up the comprehensive framework and strategy which had been promised?  One pledge had been to enhance children’s participation regarding issues of violence.  What efforts had the Government made to ensure that there was a clear public understanding that all forms of violence against children needed to be reported? 

    Corporal punishment appeared to remain quite widespread despite being banned in 2004. What efforts were made to lower the prevalence and change attitudes among parents and adults?  It was encouraging that Romania had been one of 40 countries to recently join a statement of the Human Rights Council, expressing children’s right to protection from corporal punishment.  How was bullying and cyber bullying being addressed at all levels of legislative policy?  Could more information about the child helplines be provided? 

    Was it true that around seven to eight per cent of girls in Romania were married before the age of 18, with that percentage rising to around 20 per cent in the Roma community? What was being done in response to this? Was it true that charges had been dropped against a 17-year-old boy who entered into a non-formal marriage with an 11-year-old girl?  What policy was in practice in the health sector regarding surgical interventions and intersex children?  What were the guidelines to protect their bodily integrity until these children were capable of providing consent? 

    Responses by the Delegation

    The delegation said the law on child protection now included clear provisions which made it compulsory for public administrative bodies to involve children in consultations regarding issues which concerned them.  The national strategy on children’s rights was recently adopted and another national action plan was elaborated; these plans were complimentary. This was a comprehensive package which would help the Government to better implement all necessary measures. An assessment of the national strategy had been undertaken.  The State was now piloting a system which would indicate how to establish a model of financing where children would be considered as a different group that would benefit from a different budget. 

    The national programme for schooling in Romania ensured children received food support at schools to increase the enrolment rate and participation.  School supplies were also provided for all school grades. Two hundred euros were provided for the purchase of technology, and remedial lessons were provided to students coming from disadvantaged communities.  Recently, the scholarship system had been extended to encompass more disadvantaged groups. 

    Funds allocated to primary medical care had registered a continuous annual increase.  Just last year, the fund allocated to primary care increased by 24 per cent.  The national observatory was a big achievement for Romania and aimed to identify the children most at risk of being separated from their families, based on indicators.  Training was being conducted on the use of the observatory to ensure the data provided was reliable.   

    The hearing of minors in justice proceedings took place in special rooms, and a psychologist was always required to be present.  The new national strategy for the development of the judicial system provided for another 10 hearing rooms across the country.  There were specially designated prosecutors to handle cases involving minors.  The child Ombudsman was fully operational and cooperated with all institutions.  It had a functioning complaints mechanism.  If an incident was notified to the Ombudsman, an investigation started, which concluded with a set of recommendations sent to the institution responsible to correct the situation.  

    Civil society representatives were part of the consultative groups established at the national level.  A methodology had been issued and piloted regarding identifying and banning segregation within the educational sector.  The measures focused on ensuring an inclusive education.  Any kind of discrimination on criteria such as ethnicity, religion or sex was completely forbidden within the educational system.  Specific places in high schools were allocated for Roma students and students with disabilities.  To ensure access to high quality education, educational services had been developed starting from early education to prevent early dropout and absenteeism.     

    A set of programmes had been introduced, including a monthly allowance for children up to the age of 18, as well as parental leave.  There was also a minimum income support which supported families with children. Emergency ordinance no.96 was developed specifically for children from Ukraine and their families. 

    There was a dedicated intergovernmental group which addressed the subject of forced marriage, with the aim of drafting legislative projects in this regard.  Concerning infant mortality and the number of deaths under one year of age, a regionalised system of care had been introduced to ensure each neonate was born in a medical unit which could provide the services necessary for their care, thereby reducing infant mortality.  An important national programme was in place which contained around 15 interventions, established in partnership with the United Nations Children’s Fund.  Another programme provided 900 neonatal incubators around the country. 

    A significant number of services had been established to help families in vulnerable situations. A special programme was launched last year on the minimum inclusion income, which focused on how to assist parents within the labour market.  The State was aware of a lack of social assistance in rural areas, which was where the most vulnerable communities lived.  Interventions were directed, including food packages, and local administrative capacities would be developed. 

    A programme had been developed which aimed to establish hearing rooms for children in courts, and 29 hearing rooms were completed in April 2024.  The rooms were used by the Prosecutors and police officers when they had victims who were minors.  The rooms were child-friendly and specially designed with toys.  The child did not see the other people participating in the hearing.  A new strategy adopted in 2025 provided for the need for an additional 10 hearing rooms in the near future. 

    All social services were functioning based on a set of minimum quality standards, which were verified by the national agency for social inspection.   With the United Nations Children’s Fund, Romania was piloting a project which would identify and train foster families to care specifically for children with disabilities.  A child entering the special protection system was prioritised to be reintegrated in a family environment.  Adoption was considered the best solution in this regard, and this could only be decided by a court.  Priority was offered to domestic adoption, but international adoption could be considered after one year. 

    Amendments had been made to allow special spaces for visits in prison with children.  Such spaces were now available in all prison facilities within the Romanian penitentiary system.  There were cooperation protocols in place with the United Nations Children’s Fund and Save the Children which supported parents to develop their parental skills and improve their relationship with their children. The State was aware of the need to develop programmes which addressed the needs of children and adults and improved the relationship within the family.

    The Ministry of Education aimed to develop digital competencies among students and parents. During the pandemic, all students were provided with laptops and digital devices to keep up with the educational process.  In a new initiative launched in partnership with Microsoft, the Ministry of Education had announced the development of a project concerning artificial intelligence for increasing the school performance of students.  A project was also being implemented aimed at improving the digital skills of civil servants. 

    Romania had a dedicated national child help line.  It was toll-free and operational 24/7.  Those operating the calls were specialised counsellors who could refer the cases to the relevant authorities.  Another helpline just referred cases to social services.  The 119 helpline was a recent development, operational from any place in Romania and accessible to children and adults.  After the first year, it had been well received and was being regularly used to inform on any situation concerning a child. 

    Rape of a minor and sexual assault against a minor had been introduced as acts within the Criminal Code.  Rape committed by an adult against a minor under the age of 18 was punished by a prison sentence of between seven to 12 years.

    Questions by Committee Experts

    PHILIP JAFFE, Committee Vice-Chair and Country Taskforce Member, said one in 20 people in Romania held a disability certificate, with around 80,000 being children. What were the difficulties faced by certain groups of children to receive this certificate, including rural children?  Were there any awareness-raising campaigns for rural minorities and poor families regarding their entitlement to services?  Could more information be provided about Romania’s strategy for persons with disabilities?  How were the number and expertise of professionals being scaled up?  To what degree had the State embraced a human-rights approach to disability, as opposed to a medical model of disability?  How many children were still left in institutions? When would such institutions all be closed? 

    There were two recent laws on pre-university education and higher education; could more information be provided about the implementation of these laws?  What was the level of gross domestic product dedicated to education in Romania?  Was there a direct pipeline to hear about the concerns of children within the education system and were these concerns taken seriously?  What was being done to combat school segregation based on disability, special education needs, and family economic status?  Figures suggested that 40 per cent of children with disabilities had limited access to education.  What steps were being made to improve education for children under the age of three? What improvements were being made to increase the improvement of vocational training for older children who may be leaving the school system?  Were there any programmes which specifically targeted economically disadvantaged children?  What was the mission of the Ministry of Youth? 

    SOPHIE KILADZE, Committee Chair and Country Taskforce Member, asked if sufficient resources were dedicated to the capacity building of medical personnel? Did all children have access to health care, including health insurance?  How were vaccinations promoted in the country?  How was breast feeding promoted?  Child obesity was an issue of concern; how was this combatted? Was there a hot meals programme? 

    Mental health was a very important issue.  Was data on mental health being disaggregated, including on suicide?  Was there a comprehensive strategy and action plan regarding the issue of mental health?  Were quality mental health services available in rural and remote areas? According to alarming information, the country had the highest number of adolescent mothers across the European Union. What steps would the State undertake to prevent adolescent pregnancies and subsequent abortions?  Would Romania make reproductive education part of the curriculum? 

    What measures were in place to address drugs or substance abuse?  Were there treatments available for children?  Romania had made substantial efforts for Ukrainian children and other groups of refugees.  How would the State integrate these children long-term?  Were there delays in the enrolment of refugee children and their families into the social services system?  Would amendments be considered in the asylum law to end the detention of families at the legislative level?  Did unaccompanied migrant children have access to services, including psychosocial support and disability services?  Were there any barriers which could hinder access to education? 

    What measures were being undertaken to end child labour, including begging?  What was being done to assist children in street situations?  How were perpetrators investigated and brought to justice?  Were there quality services for child victims of trafficking in place? Was the system of child justice established across the country?  Were adequate financial resources allocated to it?  Was free legal aid available to children in conflict with the law?  Was the detention of children used only as a last resort?  If yes, did it comply with international standards? 

    RINCHEN CHOPHEL, Committee Expert and Country Taskforce Coordinator, said one in five children were affected by severe material and social deprivation, which was concerning.  What was the reality on the ground?  The minimum social assistance package had been introduced; could more information be provided on it?  Romania was increasingly vulnerable to droughts, heatwaves, floods and landslides, and it was also grappling with water pollution.  How had the national strategies pertaining to climate change helped to address the challenges of the environment and climate change in the country? What measures were being adopted to take into account children’s needs and views in the development of specific policies, including disaster-preparedness plans?  Were child rights impact assessments carried out when dealing with the business sector? 

    A Committee Expert asked what the national coverage of vaccinations was in the country?  Romania had an epidemic of measles; how did the population react to vaccinations?  How was confidence being built in vaccines?  Were people familiar with the law on rape?  What happened once the 30-day limit for registering births had elapsed? 

    Responses by the Delegation

    Romanian legislation completely prohibited violence against children, regardless of the environment.  However, despite the legislation, which was fully aligned with United Nations Conventions, the State needed to fight against mentalities and traditions and to practically change the minds of parents and caregivers, who believed corporal punishment would discipline children better.  Awareness-raising campaigns were being conducted for parents, and mechanisms including hotlines had been developed to support children, including the helpline 119. 

    Authorities were obligated to launch investigations immediately concerning any allegations of violence against children.  Romania was committed to continuing these efforts and to changing social norms and mentalities.  The numbers of cases of violence against children was increasing, which meant people were becoming more aware of the issue and reporting it. 

    Since 2016, the methodology applied in Romania clearly distinguished between the concept of disability and special education needs.  In Romania, the deinstitutionalisation process was one of the most important commitments of the Government, and the process was now concluding. Currently, out of the 167 residential centres operating in 2017, 149 had already been closed, and more than 6,000 children were benefiting from alternative care.  The legal framework stated that no placement centre could operate without the approved closure plan.  The deinstitutionalisation process also involved finding better alternative and family-based care for children.   Only 18 placement centres remained in the process of being closed, and by 2026 no such centre would be operating in Romania.  The State was still aiming to find family-style solutions for children with disabilities, and a project was being developed with the United Nations Children’s Fund to this end.

    If a birth was declared after the 30-day deadline but less than one year after the birth, the birth certificate could be issued based on approval from the mayor.  If the birth declaration was made more than one year after the birth, the certificate needed to be approved by the mayor and other administrative bodies. 

    More than 2.8 million students were enrolled in the 2023/2024 school year in Romania.  For high school, there had been a significant decrease in dropouts from 2.5 per cent in 2017 to 0.8 per cent in 2024. Around 4.5 per cent of the budget was allocated to education.  The Ministry of Education had taken steps to assist children with special educational needs, with the creation of frameworks offering them different kinds of support, based on the type of disability.  For students with temporary special needs, the law of education presented special measures, including the implementation of schooling hospitals, or schooling at home for those who were required to be in hospital or at home for medical reasons. 

    Adaptive measures had been taken for Roma children, including stimulating their participation in early education and in summer kindergartens, supporting education in their current language, and translating schoolbooks in their mother tongue, among others.  More than 66,000 teachers had been trained in digital and multimedia use.  An increasing number of contracts between schools and the business sector had been recorded, around 6,000 contracts in the school year 2023/2024.  Most teachers had been trained to create open educational resources.  Significant funds had been allocated to modernising rest room facilities in schools. 

    Any student could submit complaints of discrimination via an established framework.  Students benefitted from representation in the school system through several platforms.  The national strategy for sustainable development issued the methodology of the “green week programme”, which contributed to preschoolers and students’ competence in understanding basic concepts of climate change, to initiate individual and protective action to protect the environment.  Teachers were obliged to obtain 90 transferrable professional credits every five years, through attending courses offered by Romanian training houses.

    In recent years, infant mortality had remained relatively stable in Romania.  From 2023 to 2024, the number of doctors treating children increased by five per cent.  Regarding children’s access to medical services, all children were insured in Romania and benefitted from basic medical services across all sectors of health care.  The national health insurance fund also reimbursed certain services.  The Ministry of Health had launched a vaccination campaign in partnership with the Red Cross, to raise awareness of parents; this had been accompanied by a “catch-up” vaccination schedule, resulting in 1,500 children being vaccinated.  A protocol had been signed with the Orthodox Church to establish an active partnership to create a framework for anyone facing a possible cancer diagnosis, offering support.   

    World Breastfeeding Week was celebrated in August each year, as breastfeeding remained one of the most effective ways to provide children with the best start in life. Breast feeding recommendations had been developed with partners, including the World Health Organization, and were relayed to medical practitioners at the local level.  Around 200 integrated community centres would be restructured, elevated and equipped.  A television broadcast had been created to promote the importance of breastfeeding in the first six months of a child’s life.   

    Information and education campaigns had been carried out for children, parents and teachers about the benefits of a healthy diet and the consequences of unhealthy eating. Around 1,000 people had benefited from the campaign.  Substance abuse could be detected by family doctors and psychological services could be recommended.  The national health insurance house implemented the national mental health programme, providing treatment for persons with substance abuses, and ensuring specific treatment for patients with depressive disorders. 

    Questions by Committee Experts 

    RINCHEN CHOPHEL, Committee Expert and Country Taskforce Coordinator, said the Government had approved a social assistance programme in 2011 which targeted all communes, but was underfinanced; could more information be provided?  The Environment Week presented was an excellent initiative; how was it being utilised? 

    JULIANA SCERRI FERRANTE, Committee Expert and Country Taskforce Member, asked if there were any supervision orders, where children remained with their family but were supervised?  Were there age assessment procedures during the asylum procedure?  What rights did children applying for asylum have?  Could they appeal any decisions? 

    PHILIP JAFFE, Committee Vice-Chair and Country Taskforce Member, said according to research by the United Nations Children’s Fund, Romanian girls felt much lonelier than Romanian boys.  Was there a reason for this gap? 

    SOPHIE KILADZE, Committee Chair and Country Taskforce Member, asked for clarification on case management coordination? 

    A Committee Expert noted the prevalence of women among the large delegation and asked if women generally had an important and high-profile position in Romania, or if this only occurred when discussing children?  Had there been any programmes to prevent violence?  Had the concept of gender been fully institutionalised? Were teachers trained in detecting signs of violence?  What was the prevalence of child marriage in the country?  What about figures for marriages which were not officially recorded? Had there been any programmes to prevent the phenomenon or sanctions? 

    Was there any mapping of the at-risk populations in the country of female genital mutilation? Was female genital mutilation prohibited in law?  What was the most updated action on sexual exploitation?  Was there any cross-border cooperation between Romania and neighbouring countries?  Did Ukrainian children born in Romania have access to Romanian citizenship?  Did rape victims have access to emergency contraception?

    Another Expert asked about vaccinations from children aged zero to 12; was there distrust in the population when it came to vaccines?  It seemed that tuberculosis was a public health issue.  What was being done in the field of treatment? Were there children whose births had not been declared, particularly among refugees, Roma and migrants?

    A Committee Expert asked about the new concept introduced by the Parliament on parental alienation.  How had this concept been consulted on, particularly with children?  How would the best interests of the child be ensured? What specific measures were being taken to reduce school dropout and improve access to quality education for Roma children?  What mechanisms were in place to monitor and support Roma children who were at risk of dropping out? 

    Another Committee Expert said she was happy to hear about the programme for the deinstitutionalisation of alternative care centres; this was something Romania should be proud of, as well as all the foster arrangements being made, especially for children with disabilities.  What was the State doing to support the families of children with disabilities, particularly those with severe disabilities? 

    Responses by the Delegation 

    The delegation said emergency contraception was available to those who had experienced sexual assault and could be obtained without a prescription.  Adolescent pregnancies were a major concern for the Romanian public health system.  Contraceptives and medical devices were provided free of charge through family centres and through gynaecological departments, where abortions were performed upon request.  Romania was one of the first European countries to offer non-discriminatory HIV/AIDS treatment. 

    Refugees were granted a monthly allowance, one-month’s accommodation, and access to education for minors.  Legislation in the field of asylum provided for beneficiaries to apply for family reunification when family members were not in Romania.  Identity documents needed to be provided to prove family links. Family reunification of unaccompanied minors was carried out with the best interest of the child in mind. Minors from immigrant backgrounds benefitted from the same rights as minors who were Romanian citizens. Romanian language courses provided teaching support, textbooks and workbooks developed on linguistic levels according to the European Union framework.  Priority for asylum applications was given to unaccompanied minors. 

    Medical forensic expertise was used when an asylum applicant could not prove their age and there were serious doubts about their ethnicity.  The declared age of the asylum applicant was accepted if their refusal to undergo the medical expertise was based on compelling reasons.  The assessment was performed with full respect for the minor’s dignity and in as least invasive way as possible. 

    Investigations in child and human trafficking were undertaken by specialists with supervision from specialised prosecutors.  Through law 229/2024, the Romanian Parliament aimed to discourage sex tourism and the pimping of minors.  More than 1,200 criminal cases had been identified regarding child trafficking. The General Inspectorate of Romanian Police organised regular sessions for border police and 

    non-governmental organizations, with the purpose of identifying victims.  More than 125 trainings had been carried out to over 4,000 workers who may encounter trafficking victims through their work. The National Agency against Trafficking in Persons and the Directorate for Investigating Organised Crime had implemented a national action plan in the fight against human trafficking to improve the awareness of at-risk groups. 

    In 2024, prosecutors from the Directorate for Investigating Organised Crime took part in 35 seminars regarding identifying child victims, compensation for victims, international cooperation, and online sexual exploitation of children, among other topics.  A public awareness campaign had been launched relating to sexual acts between adults and minors.  The message stated that a sexual act committed against a minor of 16 years or under constituted rape, if the age gap was more than five years, and punishments applied. 

    According to Romanian legislation, minors benefited from free legal aid, whether they committed a crime, or if they were victims of a crime.  The Romanian penal system limited sanctions in regard to minors, and measures for deprivation of liberty were only given as a last resort and could only be ordered by a court. 

    The integrated social services project aimed to develop the academic knowledge of professionals working in the social assistance field, and to develop concrete measures for vulnerable groups of people. 

    During “green week”, schools organised activities around several topics relating to the environment.  These were uploaded on a specialised platform dedicated to education on climate change and varied from one educational cycle to another.  The Ministry of Education had developed a programme, the mechanism of early-living alert, which focused on early education for Roma children. 

    In Romania, social services were obligated to identify children in a risk situation.  Children could remain within families and be monitored by social services until the risks were removed.  The parental alienation provision was introduced in all cases relating to violence and neglect.  It was recommended that this provision be removed, as these measures should only be applied by the courts.  There were many trainings offered to judges on methods relating to children’s rights.  Social workers were also trained to provide necessary assistance to visiting parents. Social services could only assist; they could not intervene and solve disputes between parents. 

    Closing Remarks

    RINCHEN CHOPHEL, Committee Expert and Country Taskforce Coordinator, reiterated the Committee’s appreciation for the Government of Romania’s support to Ukrainian refugees, particularly children.  The State was encouraged to continue to undertake these activities which were important for solidarity for children.  Significant progress had been made from the last reporting period to the current one, with many looking forward beyond the dialogue.  This was an indication of the Government’s commitment towards children.  As the country moved forward, it was important to put emphasis on implementation and ensure vulnerable children did not miss out. 

    HELENA OMNA-RAICU, President of the National Authority for the Protection of Child Rights and Adoption of Romania and head of the delegation, expressed deep gratitude for the dialogue.  The delegation welcomed the Committee’s emphasis on equality, accountability and sustainability, and would underpin the next stage of the State’s deinstitutionalisation journey.  The Committee’s concerns regarding urban disparities were noted.  It was recognised that rights delayed were rights denied, and the State was committed to accelerating affirmative action. Romania would treat the Committee’s recommendations as an opportunity for deeper transformation. 

    SOPHIE KILADZE, Committee Chair, thanked the delegation for the fruitful dialogue and commended its members for their clear and comprehensive answers.  Ms. Kiladze extended her best regards to the children of Romania. 

    ___________

    Produced by the United Nations Information Service in Geneva for use of the media; 
    not an official record. English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

     

     

    CRC25.013E

    MIL OSI United Nations News

  • MIL-OSI: Paperclip Adds Renowned CISO and Cybersecurity Expert to Advisory Committee for SAFE® Encryption Technology

    Source: GlobeNewswire (MIL-OSI)

    HACKENSACK, N.J., May 21, 2025 (GLOBE NEWSWIRE) — Heather Lowrie, a highly-experienced CISO, keynote speaker, and cybersecurity advocate, joins Paperclip as an advisor for its SAFE encryption solution. Lowrie will help guide Paperclip SAFE into the international cybersecurity market and bring data-centric security and encryption to the forefront of enterprise security.

    With more than 25 years’ experience across cybersecurity, technology, risk, and resilience, Lowrie has led major digital and security transformations for high-impact public and private sector organizations. She is known for delivering business-aligned security that drives growth, builds trust, and creates societal value—underpinned by deep, hands-on experience in managing major cyber incidents.

    “We’re thrilled to have Heather join us in an advisory capacity and to benefit from her deep expertise as we continue to advance Paperclip SAFE®,” said Chad Walter, CRO at Paperclip. “We’re excited to collaborate on cybersecurity thought leadership, participate in key industry events, and refine our go-to-market strategy to elevate encryption-in-use and the SAFE technology across the data security landscape.”

    Lowrie was recognized by her peers as CISO of the Year at the 2024 SC Awards Europe and is a Fellow of the Chartered Institute of Information Security. She is an accomplished strategist with extensive experience leading through crises—including major cyber incidents—and driving strategic change across digital transformation, data and AI, cybersecurity, and organizational culture initiatives. 

    Lowrie is also the Co-Founder of Resilionix, a deep-tech startup dedicated to helping organizations build resilience in an increasingly complex and uncertain world.

    “I’m delighted to join Paperclip in an advisory capacity and help bring data-centric security and encryption to the forefront of enterprise security,” Lowrie said. “I look forward to working with the excellent team at Paperclip to advance the adoption of encryption-in-use and to support organizations in building resilience”.

    Lowrie is a graduate of the University of Edinburgh, where she earned a Master of Science by Research in Science, Technology and Innovation Studies with distinction. She also holds a postgraduate diploma in Information Technology, awarded with distinction, from the University of the West of Scotland, alongside other academic qualifications. Lowrie holds numerous cybersecurity certifications from both U.S. and European organizations, including CISSP, CCSP, CISM, CDPSE, CIPP/E, and more. 

    About Paperclip, Inc.

    Paperclip is a proven technology partner that continues to revolutionize data security, content and document management for Fortune 1,000 companies worldwide. Every second of every day, our innovative solutions are securely processing, transcribing, storing, and communicating highly sensitive content across the internet. Maximizing efficiency to save millions annually, while maintaining absolute security and compliance. For more information, visit paperclip.com.

    About SAFE

    Paperclip SAFE builds on the foundation of trust and collaboration that Paperclip has established with its security and content management solutions over three decades. Paperclip SAFE utilizes in-depth knowledge of the database and data pipeline to secure all points within the data lifecycle. Nine of the 10 top life insurance carriers in the U.S. are currently protected by Paperclip SAFE. With Paperclip SAFE, outpace threats with data that is always encrypted and always ahead of evolving risk. For more information, visit paperclip.com/safe.

    MEDIA CONTACT:
    Megan Brandow
    Paperclip, Inc.
    MBrandow@paperclip.com
    585.727.0983

    The MIL Network

  • MIL-OSI Europe: Answer to a written question – Review of the EU Cybersecurity Act – timeline and strategic priorities – E-001364/2025(ASW)

    Source: European Parliament

    The Commission is in the process of reviewing the Cybersecurity Act ( Regulation (EU) 2019/881[1]). To support this review and gather views of interested stakeholders, on 11 April 2025, the Commission opened a call for evidence and a public consultation, available on the Have Your Say portal[2],, both open until 20 June 2025. The Commission aims to publish an evaluation of the Cybersecurity Act, as well as an impact assessment and a proposal for a revised Cybersecurity Act, in 2025, as announced in the ProtectEU Strategy[3].

    In the review process, the Commission is taking into account the current cybersecurity threats landscape. The Commission is assessing the need to amend the mandate of the European Union Agency for Cybersecurity (ENISA) and its role in the cybersecurity ecosystem, to ensure it is fit for purpose. The Commission is also assessing the European cybersecurity certification framework (ECCF) and considering the options that would contribute to a better integration of the EU cybersecurity market and improve efficiency of the ECCF, including addressing information and communications technology (ICT) supply chain security challenges . The Commission is also looking at simplification possibilities, in particular as regards reporting obligations.

    Setting out and implementing a robust cybersecurity framework is imperative to ensure economic stability, cyber resilience and security of critical infrastructures. The Commission refers the Honourable Member to the 2024 State of the Digital Decade package[4] and the Seventh Progress Report on the implementation of the EU Security Union Strategy[5], which outline the progress in implementing cybersecurity policies in the internal market.

    • [1] https://eur-lex.europa.eu/eli/reg/2019/881/oj/eng .
    • [2] https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14578-The-EU-Cybersecurity-Act_en .
    • [3] COM(2025)0148.
    • [4] 2024 State of the Digital Decade package https://digital-strategy.ec.europa.eu/en/policies/2024-state-digital-decade-package .
    • [5] COM(2024)0198.
    Last updated: 21 May 2025

    MIL OSI Europe News