<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>attack &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 23 Jun 2021 21:20:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Auto Show·Creation and Innovation &#124; Shanghai Auto Show: An Attack to &#8220;Embrace Change&#8221;</title>
		<link>https://en.spress.net/auto-show%c2%b7creation-and-innovation-shanghai-auto-show-an-attack-to-embrace-change/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 23 Jun 2021 21:20:08 +0000</pubDate>
				<category><![CDATA[Vehicles]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[auto]]></category>
		<category><![CDATA[Auto show]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[embrace]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[Show]]></category>
		<category><![CDATA[ShowCreation]]></category>
		<guid isPermaLink="false">https://en.spress.net/auto-show%c2%b7creation-and-innovation-shanghai-auto-show-an-attack-to-embrace-change/</guid>

					<description><![CDATA[The wind comes from the east. The 19th Shanghai Auto Show has entered a countdown. The theme of this auto show is &#8220;Embracing Change&#8221;. The subtext is obvious: A new era is coming. So, in the new era, what kind of changes will spread to the three camps of independent, joint venture and luxury? Autonomy [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The wind comes from the east. The 19th Shanghai Auto Show has entered a countdown. The theme of this auto show is &#8220;Embracing Change&#8221;. The subtext is obvious:<strong> A new era is coming.</strong> So, in the new era, what kind of changes will spread to the three camps of independent, joint venture and luxury? Autonomy of &#8220;home battles&#8221; The booming independent brands are even more &#8220;menacing&#8221; on their home courts.  <strong> &#8220;More than 150,000 SUVs grab the public, and 300,000 electric cars grab the BBA&#8221;,</strong> Geely shouted such a slogan, this time the Shanghai Auto Show not only launched a new Xingyue L, cut into the hinterland of the joint venture SUV, but also launched Ultra Krypton, disrupting high-end new energy. The price is full of confidence, and the once questioned design is now getting better and better. This time Changan UNI-T will launch a sports special edition and a new design language CS55 PLUS. In addition, GAC Trumpchi’s Shadow Leopard is also unique in design.<strong> Really worthy of appearance, become the protagonist of his own accord.</strong> However, a good-looking skin is always inseparable from &#8220;hard core&#8221; technology. With the continuous deepening of independent innovation, from Geely&#8217;s vast architecture platform, Changan&#8217;s Blue Whale power system to BYD&#8217;s blade battery, international giants are constantly seeking cooperation. This also means that<strong> The self-owned brands with &#8220;price ratio to win&#8221; have now successfully switched to &#8220;technological advancement to win&#8221;.</strong>  In addition to technological innovation, high-end efforts are also the essence of the reform of independent brands in recent years. In 2016 and 2017, the WEY brand under Great Wall and the Lynk &amp; Co brand under Geely came out one after another. Last year, Dongfeng and SAIC Roewe also released Lantu and R brands respectively, targeting the high-end new energy market.<strong> &#8220;The high-end new energy market is a strategic choice for independent brands, and it is also a good opportunity.&#8221;</strong> Nowadays, independent brands have taken a certain advantage in the field of new energy vehicles. The development of &#8220;changing lanes and overtaking&#8221; previously predicted by experts has gradually changed from a dream to a reality. &#8220;One Vision&#8221; joint venture &#8220;If you don&#8217;t succeed in China, you will lose in the world.&#8221; For joint venture car companies, how to better adapt to the Chinese market is one of the eternal problems.  And when the weather vane of the Chinese auto market changes,<strong> The joint venture appears to be &#8220;not active.&#8221;</strong> Japanese giants Toyota and Nissan have always been ambiguous about the &#8220;new four modernizations&#8221;. At the end of last year, Toyota&#8217;s head Akio Toyoda even expressed public dissatisfaction with the &#8220;electric vehicle revolution&#8221; that is currently emerging. He pointedly pointed out that the auto industry welcomes new entrants and anyone can build a car as long as they have technical capabilities. But Akio Toyoda also said that “Tesla” only sells “recipes” to consumers, and Toyota has a real kitchen and chef. Compared with the &#8220;ambiguity&#8221; of the Japanese system, the Korean system, the law system, or the powerless. In recent years, the market share of Korean and French cars has been declining. According to the latest data, the share of Korean cars has fallen from 4.9% in the past to 3.4%, and French cars have dropped from 1.4% to 0.2%. How to turn around is more urgent for the situation of constant marginalization.  However, there are also chasers. American brands are coming late. &#8220;Being late may not necessarily lose&#8221;, the new models built by SAIC General Motors can not be underestimated in terms of electrification and intelligent connectivity. The German public also smelled the crisis early. At the Volkswagen Group&#8217;s annual meeting two years ago, the chairman of the board of directors of the Volkswagen Group Deiss announced that by 2028, 22 million electric vehicles will be delivered globally, and more than half will come from the Chinese market. In addition to the &#8220;radical&#8221; slogan, its actions are also very rapid.<strong> Following the launch of ID.4 by North and South Volkswagen in January this year, the Shanghai Auto Show will immediately launch the exclusive ID.6 family for the Chinese market. The speed of product introduction is a bit off guard.</strong> If you change, you can lose the market. In other words, whoever can catch the hearts of Chinese consumers faster will be able to return to the market.<strong> The joint venture brand that was once so far ahead needs to hold on to its own turf.</strong> &#8220;Disrupted&#8221; luxury &#8220;Tesla&#8221; has been jealous for a long time. In the era of fuel vehicles, BBA (Mercedes-Benz, BMW, Audi) firmly grasped the right to speak and became the benchmark of luxury. In the era of electric vehicles, Tesla has become the mainstream, and its performance, evolution speed and price are all new benchmarks.<strong> Its performance is crushing BBA.</strong> As a result, a &#8220;pure electric counterattack&#8221; was officially launched.  According to information from Feilv Automobile, at the Shanghai Auto Show, Mercedes-Benz has brought three new pure electric models of &#8220;ABS&#8221; from the Mercedes EQ family; BMW brands iX and i4 will be unveiled in China, and then listed in China this year; In addition, Audi Q4 e-tron and domestic Audi e-tron will also be unveiled during the Shanghai Auto Show. It is not difficult to see that in the current increasingly fierce competition, BBA is accelerating the completion of the electrified product line map. Only through the continuous penetration of products into the market hinterland can we hope to gain a firm foothold in the future era.  <strong> The first-line main battlefield continues to expand, and the second-line camp is constantly evolving.</strong> In the century of automobile development history, luxury brands have always played the leading role, but during the transition period of old and new cars, their opponents have begun to change: the red flag, which has a dark horse, has already been sitting in the second-line sales crown. And the average price of Weilai Automobile, which just mentioned 100,000+, has exceeded 400,000 yuan. Market sales and ranking are certainly important,<strong> But on another new track, who can keep the lead is equally important.</strong> With new trends and changes, the auto market is undergoing new changes every day, and the best way to deal with changes is to &#8220;embrace changes.&#8221;</p>
<p><span id="more-27148"></span></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27148</post-id>	</item>
		<item>
		<title>The Ministry of Public Security is investigating the attack group VOV</title>
		<link>https://en.spress.net/the-ministry-of-public-security-is-investigating-the-attack-group-vov/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 17:00:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[cms]]></category>
		<category><![CDATA[Conduct investigations]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Cursing]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Google maps]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[High technology]]></category>
		<category><![CDATA[insults]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[Major]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Phuong Hang]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Vietnames Broadcast]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV TV Channel]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV1]]></category>
		<category><![CDATA[VOV2]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-ministry-of-public-security-is-investigating-the-attack-group-vov/</guid>

					<description><![CDATA[The Department of Cybersecurity and High-Tech Crime Prevention and Control (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers who attacked VOV electronic newspaper. In the past few days, all social networking platforms of VOV Electronic Newspaper on Google and Facebook have been spammed, threatened, insulted, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Department of Cybersecurity and High-Tech Crime Prevention and Control (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers who attacked VOV electronic newspaper.</strong><br />
<span id="more-25580"></span> In the past few days, all social networking platforms of VOV Electronic Newspaper on Google and Facebook have been spammed, threatened, insulted, called for boycott, etc. The subjects used many different accounts to comment. malice, cursing, rating VOV 1* (1 star) on Google Map.</p>
<p> After that, other fanpages of VOV1, VOV2, VOV TV channel… also received hundreds of similar comments consecutively. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_114_39182547/2041423f4d7da423fd6c.jpg" width="625" height="351"> <em> Subjects used many different accounts to &#8220;review&#8221; on Google Maps to reduce the reputation of Radio Voice of Vietnam. Photo: VOV</em> According to VOV, the reporters who made this series of articles were also subjected to a series of strange nicks sending abusive, insulting and threatening messages. Not stopping there, the target group also searched for the phone number and social network of the VOV.VN reporter&#8217;s wife or husband to terrorize them in the form of messages. On the morning of June 13, on a fanpage called &#8220;Steel Fan Sister Hang&#8221; posted the entire so-called &#8220;how&#8221; to hack the content management software (CMS) of VOV Electronic Newspaper. “From the morning of June 13, accessing the VOV.VN address was very difficult and intermittent. At 13:00 on the same day, VOV&#8217;s electronic newspaper was hacked, making it impossible for readers to access it for many hours after that,&#8221; VOV said. VOV Electronic Newspaper has also contacted functional units of the Ministry of Public Security and the Ministry of Information and Communications to coordinate in solving and handling the violations of extremists when deliberately attacking the technical platforms of a company. national media. Previously, on June 12, 2021, VOV Electronic Newspaper published articles: &#8220;I can&#8217;t give myself the right to insult anyone online&#8221; and &#8220;Mrs Phuong Hang with deviant livestreams: It&#8217;s time to take action. strict reason&#8221; Talking to the press, the Department of Cybersecurity and High-Tech Crime Prevention (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers. VOV electronics. The Department of Cybersecurity and High-Tech Crime Prevention (A05) said that it had previously received a dispatch from VOV and understood this issue. Currently, professional units are investigating and clarifying. A05 affirmed that this is the responsibility of the unit and investigated and clarified this issue.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25580</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on Voice of Vietnam Online Newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</link>
		
		<dc:creator><![CDATA[Ninh Cơ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 12:27:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Negativity]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Voice]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV VN Electronic Newspaper]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</guid>

					<description><![CDATA[To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. . On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief Online newspaper Voice of Vietnam [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. .</strong><br />
<span id="more-25501"></span> On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief <strong> Online newspaper Voice of Vietnam</strong> (<strong> Vov</strong> .vn), said it had sent an official letter requesting the Ministry of Public Security to investigate and clarify cyber attacks against the Vov.vn website and its social networking platform.</p>
<p> At noon on the same day, discuss with Newspaper <em> Workers,</em> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (A05 &#8211; Ministry of Public Security) said that the unit has received an official dispatch from the Voice of Vietnam Electronic Newspaper. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_15_39179349/2c801c011343fa1da352.jpg" width="625" height="416"> <em> Website VOV Newspaper is not accessible at the time &#8211; Photo: Screenshot</em> Like Newspaper <em> Laborer </em> It was reported that from the evening of June 12, the access to Vov.vn electronic newspaper had difficulties, the transmission line was slow. By 12 o&#8217;clock on June 13, readers could not access the Vov.vn link at all. According to the technical department of the Voice of Vietnam Electronic Newspaper, this is the result of a denial of service (DDoS) attack that overflows the bandwidth, making access to the newspaper crippled. At the same time, the fanpage of this newspaper also received tens of thousands of negative and offensive comments. The agency has been in contact with Google and Facebook to handle the related issues. A representative of the Voice of Vietnam Electronic Newspaper also said that the attack on the newspaper affected the operation of the editorial office, affecting readers&#8217; access to information. The Voice of Vietnam has sent a dispatch to the relevant authorities to request a settlement, in which it is requested that the Ministry of Public Security search for the perpetrators of the online newspaper attack. Online newspaper Voice of Vietnam (Vov.vn) has had many technical solutions to fix the problem and access normally from the evening of June 13.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25501</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on VOV online newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Lam]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 03:49:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Overload]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Rescue]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[VNCERT]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</guid>

					<description><![CDATA[Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate. On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate.</strong><br />
<span id="more-25338"></span> On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry of Public Security to investigate and clarify cyber attacks targeting the VOV website and the platform. the agency&#8217;s social media platform.</p>
<p> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) also confirmed that he had received an official letter from VOV. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. In addition, the Cyber ​​Emergency Response Center (VNCERT) and network operators also participate in supporting and solving problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39178611/9961ece8e3aa0af453bb.jpg" width="625" height="416"> <em> At the time of the cyber attack, readers could not access the website of VOV newspaper. Photo: VOV.</em> Exchange with <em> Zing</em> , a representative of VOV&#8217;s technical department said that cyberattacks on the agency&#8217;s resource system began on June 12. At about 13:00 on June 13, the bandwidth system was overloaded, suspected of being attacked by a denial of service (DDoS). On the morning of June 14, the administrator continued to record a new attack that caused the bandwidth of the system and the website to be overloaded. This is the first time this newspaper has been attacked by DDoS. In addition to the above attacks, the VOV side also believes that the person behind the attacks also discredits the stars of the VOV electronic newspaper on Google or repeatedly makes offensive and threatening comments on the newspaper&#8217;s fanpage. The VOV side is reviewing and detecting malicious code in the system, and at the same time limiting the consequences of cyberattacks, calculating damage to coordinate with authorities to solve.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25338</post-id>	</item>
		<item>
		<title>Decoding France: Benzema upgrades the most aggressive attack group of Gallic roosters with a hidden danger</title>
		<link>https://en.spress.net/decoding-france-benzema-upgrades-the-most-aggressive-attack-group-of-gallic-roosters-with-a-hidden-danger/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 15:46:09 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Aggressive]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Benzema]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Decoding]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Gallic]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[hidden]]></category>
		<category><![CDATA[roosters]]></category>
		<category><![CDATA[upgrades]]></category>
		<guid isPermaLink="false">https://en.spress.net/decoding-france-benzema-upgrades-the-most-aggressive-attack-group-of-gallic-roosters-with-a-hidden-danger/</guid>

					<description><![CDATA[(Transfer from sports arena+) Sports Weekly Special Correspondent Sun Qi With the world champion halo on the head, many talented players, and the return of the former top scorer, the French team is destined to be the thorn in the eyes of the powers of this European Cup. While retaining the world championship team, Deschamps&#8217; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>(Transfer from sports arena+)<strong> Sports Weekly Special Correspondent Sun Qi</strong></p>
<p>With the world champion halo on the head, many talented players, and the return of the former top scorer, the French team is destined to be the thorn in the eyes of the powers of this European Cup. While retaining the world championship team, Deschamps&#8217; team has supplemented both veterans and newcomers, and will work hard to replicate the feat of Lian Zhuang at the turn of the century.</p>
<p>In the European Cup squad, the main force who won the Hercules Cup 3 years ago is still the backbone. Nine members of the world champions were not selected for this list, and the French team&#8217;s sufficient talent pool in the third line guarantees a wealth of choices for each position. With the return of Benzema, Deschamps needed to balance efficiency and splendor in tactical design.</p>
<p><img fifu-featured="1" decoding="async" src="https://p8.itc.cn/images01/20210615/7169e42b23f94251a618e53af8c65ca5.jpeg" max-width="600"></p>
<p>Deschamps holds many good cards, and the center seems to be one of the few shortcomings. Benzema brings strong reinforcement to this position. He will lock the starting position and enrich the French team&#8217;s tactical system. His attack group with Mbappe and Griezmann can be regarded as one of the most luxurious combinations in team history. . Deschamps needs to ensure that Benzema, who has returned to the team for the first time in five and a half years, has a good chemical reaction with the two geniuses.</p>
<p>After the World Cup was crowned, in addition to some innovations in the friendly matches and the European League, the Blue Army system was still based on the asymmetric 442 (similar to 4231). If Deschamps continues to use the asymmetric 442, Benzema, who likes to pull side support, will create space for Mbappe’s unilateral blasting with Griezmann; the player’s multi-functional attributes provide the traditional 4231 or 433 and even the three-back formation. may. The diamond 442, which has been tested in actual combat, may allow the attacking trio to appear in their most comfortable position.</p>
<p>The main lineup of the French team has basically surfaced, and it is not small for Kim Pombe to be on the top. Rabiot and Coment will compete for another starting spot. This tournament allows 5 players to be replaced in regular time, which is a big plus for the strong Gauls on the bench.</p>
<p>Under the 24-in-16 format, the French team should be able to advance to the knockout rounds without any problems, but it will not be a smooth journey. In the dead group where the two host hosts are seated, the challenge to Germany in Munich in the first match is a great test. After that, they will fly to Budapest to face Hungary and Portugal in the last final.</p>
<p>This year&#8217;s European Cup matches are all over Europe, and flying distance has also become a potential factor affecting the overall prospects. During the group stage, the French team will not be troubled, but they will experience different lengths of flight if they qualify in different places. Get the first place in the group, the French team will go to Bucharest to play against a group third, and go directly to the first quarter of the knockout round. Once promoted, they will have the follow-up physical advantage; if they get second in the group, they will go to London to play against England where D The first place in the group, promotion will usher in a round-trip flight from London-Rome-London; the third in the group will face B1 or C1, even if it enters the semifinals, it will face the long consumption of Baku flying to London.</p>
<p>The championship is definitely the goal of the French team, and the semi-finals are the passing line. The strength of the cards is certainly an advantage, but countless precedents have proved that the World Series is not the winner, but the winner. As a target of public criticism, the Gaul must strive for a balance: while the team of death that kicked off at the latest finishes with a relatively ideal ranking, the physical fitness is allocated to deal with the knockout game with extremely low fault tolerance and many uncertainties.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25095</post-id>	</item>
		<item>
		<title>The national football team will start or return to the 433 formation, Wu Lei leads three strikers to attack Syria</title>
		<link>https://en.spress.net/the-national-football-team-will-start-or-return-to-the-433-formation-wu-lei-leads-three-strikers-to-attack-syria/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 14:55:10 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[football]]></category>
		<category><![CDATA[Football team]]></category>
		<category><![CDATA[Formation]]></category>
		<category><![CDATA[leads]]></category>
		<category><![CDATA[Lei]]></category>
		<category><![CDATA[National]]></category>
		<category><![CDATA[Return]]></category>
		<category><![CDATA[start]]></category>
		<category><![CDATA[strikers]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Team]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-national-football-team-will-start-or-return-to-the-433-formation-wu-lei-leads-three-strikers-to-attack-syria/</guid>

					<description><![CDATA[At two o&#8217;clock in the morning Beijing time on the 16th, the Chinese team will usher in the Syrian team, the last opponent of the World Preliminary Group Stage at the Sharjah Stadium in the UAE. The Syrian team has already qualified ahead of schedule, and the Chinese team will also be locked in the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img fifu-featured="1" decoding="async" src="https://p2.itc.cn/q_70/images01/20210615/ffc5f877b3d54739a5127955e994eebc.jpeg" max-width="600"></p>
<p>At two o&#8217;clock in the morning Beijing time on the 16th, the Chinese team will usher in the Syrian team, the last opponent of the World Preliminary Group Stage at the Sharjah Stadium in the UAE. The Syrian team has already qualified ahead of schedule, and the Chinese team will also be locked in the group as long as they get one more point. Qualifying places. However, the Chinese team has unified their minds and will not adopt conservative tactics in the last game. They will definitely go all out to win the opponent.</p>
<p>Due to the large-scale rotation of the national football team against the Maldives, it is not difficult to guess the starting lineup of the national football team in this game against the Syrian team. Yan Junling and Wu Lei are definitely the main players in the iron fight and will not be rotated. On the defensive line, Wang Shenchao, Jiang Guangtai and Zhang Linpeng, who were rotated in the last rotation, will start the field. At the right back position, due to tomorrow&#8217;s serious injury, Tang Miao will start the field and Ji Xiang will be the alternate.</p>
<p>If there are no accidents in the midfield, Wu Xi and Zhang Xizhe will continue to start, assisted by Wu Xinghan and Jin Jingdao. However, in the game against the Philippines, such a midfielder did not achieve the expected results. In the second half, Li Tie also decisively adjusted the lineup before winning the opponent. In this game against Syria, Li Tie is likely to continue to use the 433 formation to attack opponents. In this case, midfielder Wu Xi will partner with Jin Jingdao as a double defensive midfielder. Wu Xi is responsible for control and Jin Jingdao is responsible for sweeping and intercepting. Zhang Xizhe advanced to the front midfielder and was responsible for organizing the offense.</p>
<p>If you change to 433, then Wu Xinghan and Wu Lei will continue to serve on the left and right wing sides and serve as wingers. Exxon was alone in the middle, serving as a center. For Wu Lei&#8217;s performance as a winger, the head coach seems very satisfied. In the match against the Maldives, he still insisted on arranging Wu Lei&#8217;s starting field and playing the right winger in the whole team rotation. It seems that he also intends to find another feeling for playing Syria. Wu Lei really lived up to expectations, only playing 45 minutes to complete a goal and an assist. (Sohu Sports Pei Li)</p>
<p>Predicted starting: 433</p>
<p>Goalkeeper: Yan Junling</p>
<p>Defensive line: Wang Shenchao, Zhang Linpeng, Jiang Guangtai, Tang Miao</p>
<p>Midfielder: Jin Jingdao, Wu Xi, Zhang Xizhe</p>
<p>Strikes: Wu Xinghan, Exon, Wu Lei</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25078</post-id>	</item>
		<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Meat producer JBS pays ransom after hacker attack The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States.</title>
		<link>https://en.spress.net/meat-producer-jbs-pays-ransom-after-hacker-attack-the-worlds-largest-meat-company-jbs-has-apparently-paid-a-ransom-of-11-million-after-a-cyber-attack-by-hackers-it-was-another-incident-in-a-serie/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 22:06:06 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Apparently]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cases]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[meat]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[pays]]></category>
		<category><![CDATA[Producer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Series]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[worlds]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24057</guid>

					<description><![CDATA[After a hacker attack Meat producer JBS pays ransom Status: 10.06.2021 7:13 a.m. The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. The US subsidiary of the Brazilian [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/usa-jbs-fleischproduzent-101https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP" title="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP"></p>
<h1> After a hacker attack Meat producer JBS pays ransom </h1>
<p>Status: 10.06.2021 7:13 a.m. </p>
<p> <strong> The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. </strong> The US subsidiary of the Brazilian meat processor JBS paid the equivalent of eleven million dollars in ransom after a hacker attack. The payment was made to prevent further disruption by the hackers and to restore the smooth operation of the affected locations, said the Dallas-based company. According to the US media, the payment was made in Bitcoin. According to the US government, the company had received a ransom note from a criminal organization likely based in Russia. The attack paralyzed JBS production in Australia and affected Canada and the United States.</p>
<h2> &#8220;A difficult decision&#8221;</h2>
<p>&#8220;This was a very difficult decision for our company and for me personally,&#8221; explained Managing Director Andre Nogueira. &#8220;However, we felt that this decision had to be made in order to avoid any potential risk to our customers.&#8221; The investigations are still ongoing, but preliminary results have suggested &#8220;that no company, customer or employee data has been compromised.&#8221;</p>
<h2> US investigators suspect Russia is behind it</h2>
<p>US President Joe Biden said last week that investigators had linked Russia to the JBS case. &#8220;JBS USA was in constant contact with government officials throughout the incident,&#8221; the company said. In the USA, the state and business are currently fighting a series of attacks with blackmail software known as &#8220;ransomware&#8221;. The data of the attacked systems are encrypted. The hackers demand cash payments in cryptocurrency so that they can unlock access again and not publish the data.</p>
<h2> Ransom payment in Bitcoin</h2>
<p>The US utility company was also last month <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIOw7DIAwA0LuwOzRrzsJiEfNRjUHGiKHq3duM733ccpcrZmNewQe_9z4MM80ZC67jpn9VtUfJgl9ipEKlkQQfO3epyDDqIK5CwJ0mZeIbCsY3KaBkrSmBoszeNirB-TqPYo3d9wc5S6jTfAAAAA.." class="textlink" title="Link zu: Colonial Pipeline räumt Lösegeld-Zahlung an Hacker ein" target="_blank" rel="nofollow noopener"> Colonial pipeline</a> The victim of a hacker attack with a blackmail Trojan that temporarily shut down the entire pipeline network. The US Federal Police FBI blames a hacker group called &#8220;Darkside&#8221; for the attack and later tracked down the ransom of 75 Bitcoin that Colonial had paid &#8211; at the time it was worth $ 4.4 million.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24057</post-id>	</item>
		<item>
		<title>Martial arts star Donnie Yen reveals Mike Tyson&#8217;s attack speed</title>
		<link>https://en.spress.net/martial-arts-star-donnie-yen-reveals-mike-tysons-attack-speed/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 12:10:09 +0000</pubDate>
				<category><![CDATA[Cinema & TV]]></category>
		<category><![CDATA[arts]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Boxing]]></category>
		<category><![CDATA[Donnie]]></category>
		<category><![CDATA[Donnie Yen]]></category>
		<category><![CDATA[Dying]]></category>
		<category><![CDATA[escape]]></category>
		<category><![CDATA[Gang boss]]></category>
		<category><![CDATA[Hong Hy Quan]]></category>
		<category><![CDATA[Ip Man]]></category>
		<category><![CDATA[Ip Man 3]]></category>
		<category><![CDATA[Khau Cuong Ngon]]></category>
		<category><![CDATA[Life and death]]></category>
		<category><![CDATA[martial]]></category>
		<category><![CDATA[Martial arts]]></category>
		<category><![CDATA[MIKE]]></category>
		<category><![CDATA[Mike Tyson]]></category>
		<category><![CDATA[narrowly]]></category>
		<category><![CDATA[reveals]]></category>
		<category><![CDATA[SCMP]]></category>
		<category><![CDATA[Speed]]></category>
		<category><![CDATA[Star]]></category>
		<category><![CDATA[Strike]]></category>
		<category><![CDATA[To punch]]></category>
		<category><![CDATA[Tran Moc Thang]]></category>
		<category><![CDATA[Truong Sung Bang]]></category>
		<category><![CDATA[Tse Dinh Phong]]></category>
		<category><![CDATA[Tysons]]></category>
		<category><![CDATA[Yen]]></category>
		<guid isPermaLink="false">https://en.spress.net/martial-arts-star-donnie-yen-reveals-mike-tysons-attack-speed/</guid>

					<description><![CDATA[Donnie Yen shared: &#8220;Mike Tyson&#8217;s attack speed is very fast, I also dodge quickly but still feel like I just escaped narrowly.&#8221; Chinese media reported that Donnie Yen is now preparing to return with Raging Fire &#8211; the last film of the late director Tran Moc Thang. In fire fury, Donnie Yen plays with Nicholas [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Donnie Yen shared: &#8220;Mike Tyson&#8217;s attack speed is very fast, I also dodge quickly but still feel like I just escaped narrowly.&#8221;</strong><br />
<span id="more-23760"></span> Chinese media reported that Donnie Yen is now preparing to return with <em> Raging Fire</em> &#8211; the last film of the late director Tran Moc Thang. In <em> fire fury,</em> Donnie Yen plays with Nicholas Tse. The film premiered at the film festival <em> Shanghai International. </em> This is the third work Donnie Yen collaborated with director Tran Moc Thang. Before that, he acted in two movies <em> Hong Hy Quan</em> (1994) and <em> Martial art </em> (1995).</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_296_39196537/0a30bd95b5d75c8905c6.jpg" width="625" height="411"> <em> Donnie Yen (right) and Nicholas Tse in the movie Fury.</em> Movie content <em> Wrath of Fire</em> revolves around the tense confrontation between crime boss Khau Cuong Ngao (played by Ta Dinh Phong) and the leader of the crime team Truong Sung Bang (played by Donnie Yen). Initially, the character Khau Cuong Ao was a good friend of Inspector Truong Chong Bang. But for personal gain, Khau Cuong Ngao colluded with criminals and became a murderer. Recently, when the film was about to be released, the Hong Kong martial arts star (China) recalled the films that made a name, including <em> Ip Man</em> . The actor remembers Mike Tyson&#8217;s heavy punch when filming <em> Ip Man 3</em> (2015). Recalling the scene above, Donnie Yen said he thought he would have died if he hadn&#8217;t dodged the blow in time. &#8220;Just a little carelessness, punches can be fatal,&#8221; Donnie Yen told SCMP. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_296_39196537/95393c9c34dedd8084cf.jpg" width="625" height="351"> <em> Donnie Yen and Mike Tyson.</em> “When I first met Mike Tyson, I was very emotional. I don&#8217;t think I&#8217;ll be acting with an idol. I was really worried at first. I&#8217;m afraid he can&#8217;t control the force of the punches because Mike is actually not a professional actor. I was very cautious,” said Donnie Yen. When filming <em> Ip Man 3</em> , Donnie Yen always considers this a life-and-death boxing match. He recalled his fight with Mike Tyson in the action movie. For a moment, Mike&#8217;s punch grazed Donnie Yen&#8217;s head, even coming close to touching the Hong Kong actor&#8217;s hair, before the punch hit the sandbag behind. “I had to immediately lower my head to avoid an accident. He used a lot of force, even all of his energy, to throw the punch. As Mike approached, I felt like a big truck was coming towards me. Eight years later, I still remember that dangerous moment vividly,&#8221; film star Ip Man told SCMP. In the movie <em> Ip Man 3</em> , Donnie Yen as Master Ip Man, this time used his martial arts skills to protect good against evil. That&#8217;s why Ip Man became an enemy of Frank &#8211; a gang boss specializing in looting and oppressing civilians in 1950s Hong Kong played by Mike Tyson. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_296_39196537/817d2bd8239acac4938b.jpg" width="625" height="416"> <em> The fight scene between Donnie Yen and Mike Tyson in the movie Ip Man 3.</em> The scene of Ip Man vs Frank impressed the audience and was considered the most &#8220;expensive&#8221; scene in Ip Man 3 when the audience had the opportunity to admire the high-low competition between modern boxing and traditional Wing Chun martial arts. system of China. Talking about Mike Tyson, Donnie Yen shared: &#8220;He is too famous in the world boxing world. People may not know who Donnie Yen is, but everyone knows Mike Tyson. That&#8217;s why I always stay focused when duel with him. Just a little loophole, I will pay the price. Mike Tyson&#8217;s attack speed is very fast, I also dodge quickly but still feel like I have just narrowly escaped.&#8221; Meanwhile, Mike Tyson also used many words of praise for his colleague. “This is my first time acting in a martial arts movie. On the set, I completely followed Donnie Yen&#8217;s guidance,&#8221; Mike said. After an encounter with &#8220;the scariest man on the planet&#8221;, Donnie Yen said that <em> Wrath of Fire </em> is the action film that makes him most satisfied in his decades of filming. <strong> Quoc Tiep</strong> <em> (th)</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23760</post-id>	</item>
		<item>
		<title>Israel deploys Iron Dome system near Jerusalem to prevent attack</title>
		<link>https://en.spress.net/israel-deploys-iron-dome-system-near-jerusalem-to-prevent-attack/</link>
		
		<dc:creator><![CDATA[(Vietnam+)]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 09:52:14 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Battalion]]></category>
		<category><![CDATA[deploys]]></category>
		<category><![CDATA[Dome]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Guard]]></category>
		<category><![CDATA[Hamas Movement]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[Interceptor]]></category>
		<category><![CDATA[Iron]]></category>
		<category><![CDATA[Iron Dome]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Israel Defense Forces]]></category>
		<category><![CDATA[Israeli army]]></category>
		<category><![CDATA[Jerusalem]]></category>
		<category><![CDATA[Missile defense]]></category>
		<category><![CDATA[Palestine]]></category>
		<category><![CDATA[Parade]]></category>
		<category><![CDATA[Postpone]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Protesters]]></category>
		<category><![CDATA[Slightly spicy Hơi]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Throw grenades]]></category>
		<category><![CDATA[Times Of Israel]]></category>
		<category><![CDATA[WAFA]]></category>
		<guid isPermaLink="false">https://en.spress.net/israel-deploys-iron-dome-system-near-jerusalem-to-prevent-attack/</guid>

					<description><![CDATA[The Israel Defense Forces deployed several Iron Dome missile defense batteries near Jerusalem, ahead of the Jerusalem Day parade. The Iron Dome system tested to intercept missiles. (Photo broadcast by VNA) The Times of Israel on June 15 reported that Israel Defense Forces (IDF) deployed several Iron Dome missile defense batteries near Jerusalem, before the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Israel Defense Forces deployed several Iron Dome missile defense batteries near Jerusalem, ahead of the Jerusalem Day parade.</strong><br />
<span id="more-23665"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_293_39197196/b2ff06430e01e75fbe10.jpg" width="625" height="351"> </p>
<p> <em> The Iron Dome system tested to intercept missiles. (Photo broadcast by VNA)</em> The Times of Israel on June 15 reported that <strong> Israel Defense Forces</strong> (IDF) deployed several Iron Dome missile defense batteries near Jerusalem, before the anniversary parade <strong> Jerusalem Day</strong> takes place. The parade, originally scheduled for May 10, was postponed due to the 11-day Israel-Gaza military conflict. The parade, scheduled to start at 6pm on June 15 (Israel time), is one of the issues that threaten to escalate tensions between Israel and Palestine. In a related development, clashes broke out between a group of Palestinian protesters and IDF soldiers at the Gaza border. A Palestinian is said to have been shot in the leg and suffered minor injuries. <strong> Hamas Movement</strong> threatened to resume missile strikes on Israel if the parade continued. The Palestinian news agency WAFA reported on June 15 that dozens of Palestinians were gassed with tear gas when the Israeli army attacked a crowd protesting against a march that was about to take place in Jerusalem. According to WAFA, the Israeli military fired tear gas and hurled stun grenades at protesters at the entrance to the town of al-Ram in Northeast Jerusalem. In addition, the Israeli army also attacked and drove away Palestinian protesters at the Bab al-Amoud area (also known as the Damascus gate), one of the gates to the Old City of Jerusalem. At least two Palestinians were arrested in the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23665</post-id>	</item>
		<item>
		<title>After hacker attack, investigators reach extorted millions in pipeline It has been a month since the largest gasoline pipeline in the USA was the victim of a hacker attack. The operator paid millions to the extortionists. Now the investigators report a success.</title>
		<link>https://en.spress.net/after-hacker-attack-investigators-reach-extorted-millions-in-pipeline-it-has-been-a-month-since-the-largest-gasoline-pipeline-in-the-usa-was-the-victim-of-a-hacker-attack-the-operator-paid-millions/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 19:03:11 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[As the]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[extorted]]></category>
		<category><![CDATA[extortionists]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[investigators]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Millions]]></category>
		<category><![CDATA[month]]></category>
		<category><![CDATA[operator]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[reach]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[success]]></category>
		<category><![CDATA[USA]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=22868</guid>

					<description><![CDATA[After a hacker attack Investigators come to extorted pipeline millions Status: 08.06.2021 02:12 a.m. It has been a month since the largest gasoline pipeline in the United States was hacked. The operator paid millions to the extortionists. Now the investigators report a success. After the hacker attack on the largest gasoline pipeline in the United [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/pipeline-hacker-103https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="An aerial view of a colonial pipeline in the US state of Maryland. | AFP" title="An aerial view of a colonial pipeline in the US state of Maryland. | AFP"></p>
<h1> After a hacker attack Investigators come to extorted pipeline millions </h1>
<p>Status: 08.06.2021 02:12 a.m. </p>
<p> <strong> It has been a month since the largest gasoline pipeline in the United States was hacked. The operator paid millions to the extortionists. Now the investigators report a success.</strong> After the hacker attack on the largest gasoline pipeline in the United States, investigators recovered most of a ransom payment in the digital currency Bitcoin. The US Department of Justice announced that 63.7 Bitcoin, currently valued at around 2.3 million US dollars, had been seized. The FBI was able to identify a digital wallet that hackers allegedly used to collect a payment from the company concerned, said the agency&#8217;s deputy director Paul Abbate.</p>
<h2> Hacker from Russia suspected behind the act</h2>
<p>The company Colonial Pipeline announced in early May that it had been the victim of a hacker attack. As a result, the pipeline, through which about 45 percent of all fuel consumed on the US east coast runs, was temporarily completely shut down. There were petrol shortages in parts of the country. The capital Washington was particularly hard hit, where at times 88 percent of the gas stations ran out of fuel. &#8220;It was an attack on one of our most important national infrastructures,&#8221; said Lisa Monaco from the US Department of Justice. The US government suspects hackers from the DarkSide group from Russia behind the crime. Both US authorities and IT security experts strongly advise companies against paying ransom so as not to incentivize cyber criminals to blackmail them. But the pipeline operator paid, as company boss Joseph Blount admitted in the &#8220;Wall Street Journal&#8221; at the end of May. He authorized a payment of $ 4.4 million. Blount explained the controversial decision by saying that the company was unsure about the extent of the system damage caused. According to the US Department of Justice, Colonial Pipeline had quickly notified the FBI that DarkSide had broken into the computer network and the company had paid the requested ransom of 75 Bitcoin.</p>
<h2> Colonial boss praises investigators</h2>
<p>In so-called ransomware attacks, data on computers is encrypted &#8211; and the attackers usually demand a ransom for the release. Cases in which companies paid were also known before. But it is extremely rare to get the money back. Colonial chief Blount praised the work of the FBI investigators in a statement. He also said the private sector needs to take cyber threats seriously and invest to better defend against them. &#8220;Ransomware attacks have increased in scope and sophistication over the past year, targeting our critical infrastructure, businesses of all kinds, entire cities and even law enforcement agencies,&#8221; said Monaco from the Justice Department. &#8220;Ransomware and digital extortion pose a threat to national and economic security in the United States.&#8221; Just a few weeks after the attack on the gasoline pipeline, the world&#8217;s largest meat company JBS was hit by a massive cyber attack. Large parts of the production in North America and Australia were paralyzed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22868</post-id>	</item>
		<item>
		<title>The organization behind the SolarWinds attack is back</title>
		<link>https://en.spress.net/the-organization-behind-the-solarwinds-attack-is-back/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 12:55:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advisory]]></category>
		<category><![CDATA[Aim]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brad Smith]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[Le Duyen]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Corporation]]></category>
		<category><![CDATA[NOBELIUM]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Oil pipeline]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[US Department of Homeland Security]]></category>
		<category><![CDATA[USAID]]></category>
		<category><![CDATA[Wave]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-organization-behind-the-solarwinds-attack-is-back/</guid>

					<description><![CDATA[Microsoft Corporation said that the organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, consulting agencies and non-profit organizations. goverment. Microsoft said on its Blog: &#8220;This week, we discovered cyberattacks by Nobelium &#8211; the group that is targeting government agencies, research and consulting organizations and NGOs government&#8221; Also according [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Microsoft Corporation said that the organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, consulting agencies and non-profit organizations. goverment.</strong><br />
<span id="more-19780"></span> Microsoft said on its Blog: &#8220;This week, we discovered cyberattacks by Nobelium &#8211; the group that is targeting government agencies, research and consulting organizations and NGOs government&#8221;</p>
<p> Also according to Microsoft, Nobelium is the &#8220;Russian guy&#8221; and is also the person behind the attack targeting SolarWinds customers in 2020. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_107_39008801/6264eddffa9d13c34a8c.jpg" width="625" height="413"> The organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, think tanks and NGOs. The comments come weeks after a May 7 ransomware attack on the Colonial Pipeline that shut down the largest US fuel pipeline network for several days, disrupt the national supply, On May 27, Microsoft announced that: &#8220;This wave of attacks targeted approximately 3,000 email accounts at more than 150 different organizations.&#8221; Microsoft said that US organizations are the most vulnerable to attacks, targeted victims come from at least 24 different countries. According to Microsoft, at least a quarter of the organizations targeted are engaged in international development, humanitarian and human rights issues. This week, Nobelium launched attacks by breaking into a marketing email account of the United States Agency for International Development (USAID), thereby launching phishing attacks to multiple organizations. other. In statements issued Friday, the US Department of Homeland Security and USAID both said they have received and are in the process of investigating the above attack. The attack on information technology company SolarWinds, identified in December, accessed the information of thousands of companies and government offices using its products. Microsoft President Brad Smith described the attack as &#8220;the largest and most sophisticated attack the world has ever seen&#8221;. The attacks announced Thursday appear to be a continuation of multiple attempts to target government agencies involved in foreign policy, as part of an intelligence-gathering effort, Microsoft said. Intelligence. The company is currently in the process of notifying all of its target customers and has &#8220;no reason to believe&#8221; that these attacks are related to any exploits or vulnerabilities in the system. Microsoft products or services. <strong> Le Duyen</strong> (According to Reuters)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19780</post-id>	</item>
		<item>
		<title>&#8216;Attack&#8217; the Covid-19 epidemic with technology</title>
		<link>https://en.spress.net/attack-the-covid-19-epidemic-with-technology/</link>
		
		<dc:creator><![CDATA[Phạm Vinh -]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 01:20:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[Department of Informatization]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[Face mask]]></category>
		<category><![CDATA[Information Technology Department]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[NCOVI]]></category>
		<category><![CDATA[Nguyen Truong Nam]]></category>
		<category><![CDATA[Official Letter No 3440 VPCP KGVX]]></category>
		<category><![CDATA[Pham Minh Chinh]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Vietnam health declaration]]></category>
		<guid isPermaLink="false">https://en.spress.net/attack-the-covid-19-epidemic-with-technology/</guid>

					<description><![CDATA[Facing the complicated developments of the Covid-19 epidemic, Prime Minister Pham Minh Chinh has requested to promote the use of advanced technology in epidemic prevention and control. Always wear a mask, open the Bluezone app, declare health when going to public places. Accordingly, for technologies that are promoting effective epidemic prevention and control, it is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Facing the complicated developments of the Covid-19 epidemic, Prime Minister Pham Minh Chinh has requested to promote the use of advanced technology in epidemic prevention and control.</strong><br />
<span id="more-19669"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_3_39002651/fa6bed92fad0138e4ac1.jpg" width="625" height="383"> </p>
<p> Always wear a mask, open the Bluezone app, declare health when going to public places. Accordingly, for technologies that are promoting effective epidemic prevention and control, it is necessary to change and switch from voluntary encouragement to compulsory installation of some basic applications. <strong> THREE &#8220;Attack&#8221; against COVID-19</strong> Currently, there are three &#8220;attacks&#8221; to prevent the Covid-19 epidemic: Increasing testing on a large scale, implementing a vaccine strategy and applying technology for tracing. In particular, the use of technology chaired by the Ministry of Information and Communications is promoting effectively. Deputy Minister of Information and Communications Nguyen Huy Dung said that the new approach from the Prime Minister&#8217;s point of view is a harmonious combination between prevention and attack. Previously, medical declaration applications for epidemic prevention and control, and support for tracing only recommended people to use, but now will become mandatory. Second, anti-epidemic data sources must be centralized in one processing hub. Previously, because people declared through different applications, the data was scattered. Now the data must be centralized so that advanced and modern technology can be applied to perform the analysis to produce the required results. Mr. Nguyen Truong Nam, Deputy Director of the Information Technology Department (Ministry of Health), said that for the health declaration for the entire population, people can declare through 3 applications: NCOVI, Bluezone and Vietnam Health Declaration. Specifically, Vietnam Health Declaration is a software of the Military Telecommunications Industry Corporation (Viettel), so the declared data is stored at Viettel. Data declared by people on Bluezone (of Bkav Technology Group) and NCOVI (of Vietnam Posts and Telecommunications Group &#8211; VNPT) are stored centrally at the Department of Informatization (Ministry of Information and Communications). After being collected, the medical declaration data will be collected by the Centers for Disease Control and Prevention (CDC) in provinces, agencies and units according to their competence. This data is used for control, analysis and case tracing. Meanwhile, many units still use paper declaration and electronic declaration in parallel. Faced with the fact that medical declaration data is still scattered, the Information Technology Department (Ministry of Health) is working with units to promote data interoperability and build a centralized medical declaration database. central, connected. <strong> INSTALLATION AND USE OF THE APP WILL BE REQUIRED </strong> According to experience from previous infections, the next epidemic is more difficult, complicated, unpredictable than the previous one, the consequences are more severe, the treatment is more difficult, and the impact is worse. At the Government Standing Meeting on Covid-19 epidemic prevention a few days ago, the Prime Minister noted: currently the number of new infections and deaths on the world epidemic map continues to increase; illegal entry and residence tend to be more in recent times; appeared subjective, negligent and unwary thoughts of many localities, agencies, units and people; centralized isolation management, after isolation (when returning to the locality) is still inadequate; The new strain of the SARS-Cov-2 virus spreads quickly, is difficult to detect, and has complicated developments. It is predicted that the epidemic situation will continue to be complicated, it will be long, it is not possible to confirm the time when the epidemic will end. Therefore, we must be ready to deal with the epidemic at the highest level, and we must live safely while the epidemic is still around us. Following the direction of the Prime Minister, the Ministry of Information and Communications has issued the document &#8220;Guide to use the set of solutions to support Covid-19 prevention, control and tracing in the community&#8221;. This set of solutions includes Bluezone (a close contact warning application for suspected Covid-19 patients), NCOVI (voluntary health declaration management system), medical declaration for people on entry, and a system to record people coming and going to public places (via QR code scanning) and Covid-19 safe anti-epidemic map system. Currently, there are 9 provinces and cities nationwide that have implemented Covid-19 epidemiological information mapping software (called CovidMaps). The CovidMaps map allows real-time monitoring of the epidemic situation in Da Nang, Bac Giang, Vinh Phuc, Bac Ninh, Quang Ninh, Quang Nam, Gia Lai, Phu Yen and Lang Son. The Covid-19 epidemiological information map (CovidMaps) helps the community to visually monitor epidemiological information of local cases via the Internet, the government has more digital technology solutions to serve management and control. practice in epidemic prevention and control. According to the information in the document &#8220;Guidelines for using a set of solutions to support Covid-19 prevention, control and tracing in the community,&#8221; if 60% of adults install the Bluezone application on their phones, the reported data about cases of close contact, contact with people with Covid-19 will reach an almost absolute level of accuracy. Therefore, in order to promote effectiveness in epidemic prevention and control, it is necessary to join hands to use and voluntarily declare accurately information of the people and the community. Many people think that installing and using the application will become a mandatory requirement, like wearing a mask. For industrial parks and factories, the Ministry of Information and Communications has proposed that people working in industrial parks, factories and enterprises must install the Bluezone application and the NCOVI medical declaration application. .<br />
At public places, offices need to scan QR Codes to be able to collect digital data on the system to record arrivals or departures at public places. In addition, any citizen when going to crowded places needs to install the Bluezone application, to be able to detect close contact with infected people (data already stored on the system). The Government Office issued Official Letter No. 3440/VPCP-KGVX to the Ministry of Health and the Ministry of Information and Communications with the content considering the proposal of the Ministry of Information and Communications on the implementation of a number of information technology applications and Connecting surveillance cameras to support the prevention and control of the Covid-19 epidemic. Persons subject to medical supervision and isolation must declare mandatory information on the application. This mandatory also requires the awareness of the community not only to install the application on the mobile device, but to enable the connection for the application to work. Moreover, using Bluezone and turning on Bluetooth when going to public places, when exposed to large numbers of people, will help people protect themselves and the community, and at the same time help in zoning out the epidemic and tracing it quickly. . When a Covid-19 patient is detected, only those at high risk are quarantined instead of isolating everyone involved. The Ministry of Information and Communications has just sent an official dispatch to the People&#8217;s Committees of the provinces and centrally-run cities and the Departments of Information and Communications of the provinces and cities about the implementation of the surveillance camera system at the agencies. centralized isolation facility to prevent Covid-19.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19669</post-id>	</item>
		<item>
		<title>US issues new security guidelines after Colonial Pipeline attack</title>
		<link>https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</link>
		
		<dc:creator><![CDATA[Minh Châu (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Sun, 30 May 2021 03:28:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alejandro Mayorkas]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Cisa]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Department of Cybersecurity]]></category>
		<category><![CDATA[Department of Transportation Security]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Guidelines]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Show]]></category>
		<category><![CDATA[State of Maryland]]></category>
		<category><![CDATA[TANK]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[TSA]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</guid>

					<description><![CDATA[The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA) US Department of Homeland Security (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system.</strong><br />
<span id="more-19182"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_293_38989113/b5ac52c9448badd5f49a.jpg" width="625" height="415"> </p>
<p> <em> Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA)</em> <strong> US Department of Homeland Security</strong> (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber attack on the company&#8217;s fuel pipeline system <strong> Colonial Pipeline</strong> , leading to gas supply disruptions on the US East Coast this month. Homeland Security Secretary Alejandro Mayorkas said: &#8220;The recent malware attack on a major fuel pipeline shows that the cybersecurity of pipeline systems is a critical factor. pivotal to the homeland security of the United States.” Under DHS, owners and operators of <strong> fuel pipeline</strong> Key players will be required to immediately report confirmed and probable cyber-attacks to the Department of Cybersecurity and Infrastructure Security under their respective jurisdictions. <strong> DHS</strong> (CISA), and appoint a cybersecurity coordinator available 24 hours a day and 7 days a week. The issuance of the new guidance also requires fuel pipeline owners and operators to review current cybersecurity measures to detect any vulnerabilities, as well as remedial actions if necessary. there is a risk of a cyber attack. They must notify this result to the Transportation Security Administration (TSA), a unit of DHA, and CISA within 30 days. The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Previously, on May 7, Colonial Pipeline announced that it was attacked by ransomware and forced to close some systems. This incident caused a large-scale supply disruption, causing thousands of gas stations on the US East Coast to fall into shortages and gasoline prices to the highest level since 2017. The US government has issued an order. state of emergency in 17 states and Washington, D.C. After more than 1 week of being affected, the Colonial Pipeline oil pipeline has returned to normal operation. Colonial Pipeline has publicly confirmed paying a ransom to restore computer networks. Meanwhile, the US Federal Bureau of Investigation (FBI) identified DarkSide as the hacker group behind the attack.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19182</post-id>	</item>
		<item>
		<title>The room contains the &#8216;weapon&#8217; to attack the Covid-19 epidemic</title>
		<link>https://en.spress.net/the-room-contains-the-weapon-to-attack-the-covid-19-epidemic/</link>
		
		<dc:creator><![CDATA[Việt Linh]]></dc:creator>
		<pubDate>Sat, 29 May 2021 17:35:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bac Giang]]></category>
		<category><![CDATA[Chloramine]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[Extraction]]></category>
		<category><![CDATA[Field War]]></category>
		<category><![CDATA[Gene]]></category>
		<category><![CDATA[High power]]></category>
		<category><![CDATA[Ho Huu Tho]]></category>
		<category><![CDATA[Installation]]></category>
		<category><![CDATA[LAB]]></category>
		<category><![CDATA[Military Medical University]]></category>
		<category><![CDATA[REALTIME]]></category>
		<category><![CDATA[Room]]></category>
		<category><![CDATA[Sensitivity]]></category>
		<category><![CDATA[Specificity]]></category>
		<category><![CDATA[Specimens]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[The room]]></category>
		<category><![CDATA[Tran Hoang Minh]]></category>
		<category><![CDATA[weapon]]></category>
		<category><![CDATA[Weapons]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-room-contains-the-weapon-to-attack-the-covid-19-epidemic/</guid>

					<description><![CDATA[The field Covid-19 laboratory of the Military Medical Academy deployed in Bac Giang has a capacity of up to 50,000 samples per day. The large-capacity &#8220;field&#8221; Covid-19 laboratory at the Bac Giang Center for Disease Control has been fully installed with the cooperation and transfer support of the Military Medical Academy (Hanoi). This area has [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The field Covid-19 laboratory of the Military Medical Academy deployed in Bac Giang has a capacity of up to 50,000 samples per day.</strong><br />
<span id="more-19067"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/6a62c1d9d79b3ec5678a.jpg" width="625" height="416"> </p>
<p> <em> The large-capacity &#8220;field&#8221; Covid-19 laboratory at the Bac Giang Center for Disease Control has been fully installed with the cooperation and transfer support of the Military Medical Academy (Hanoi). This area has an area of ​​​​about 200 m2 and was built quickly in 3 days. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/20e5895e9f1c76422f0d.jpg" width="625" height="397"> <em> The center consists of 8 specialized rooms. In which, 2 laboratories meet biosafety level 2. The most dangerous room is the initial sample processing room. This is the workplace of many officers from the Military Medical Academy, Bac Giang Center for Disease Control and volunteer technicians. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/ef8b59304f72a62cff63.jpg" width="625" height="416"> <em> Responsible for operating the laboratory is Lieutenant Colonel, Dr. BS Ho Huu Tho (Head of Department of Gene Technology and Cell Genetics, Military Medical Academy). According to Dr. Tho, the special feature of this laboratory is that the SARS-CoV-2 virus detection process is highly sensitive, with the cost savings being reduced by nearly half compared to traditional methods. At the same time, the center has the capacity to test tens of thousands of people every day. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/28499ff289b060ee39a1.jpg" width="625" height="427"> <em> According to Dr. Tho, this is the world&#8217;s first gene technology, using artificial intelligence to analyze PCR results to detect SARS-CoV-2 pathogens (known as AIMS RT-PCR technology). </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/325d81e697a47efa27b5.jpg" width="625" height="416"> <em> The sensitivity of this method was evaluated against an in vitro RNA standard set for a detection threshold of 7.2 copies/reaction, nearly 7 times lower than the WHO recommended procedure, when evaluating under the same experimental conditions (50 copies/reaction). </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/4dd5fd6eeb2c02725b3d.jpg" width="625" height="416"> <em> This study was clinically evaluated on 142 positive cases, 1,034 negative cases for SARS-CoV-2 and 14 other respiratory viruses. The sensitivity and specificity of the method were both 100%. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/435ffee4e8a601f858b7.jpg" width="625" height="416"> <em> More importantly, the procedure was successful in mixing 100 patient samples in a single real-time reaction without compromising sensitivity. As such, this is a simple, super-sensitive and potential test method for large-scale screening of SARS-CoV-2 with cost savings many times over. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/f91a43a155e3bcbde5f2.jpg" width="625" height="416"> <em> According to Dr. Tho, this method is like a weapon we switch from a defensive state to an attack against the Covid-19 epidemic. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/e230598b4fc9a697ffd8.jpg" width="625" height="428"> <em> To communicate with the staff working in the lab, the commander had to use a walkie-talkie system because the windows were always foggy because of the mist and Chloramin B disinfectant. Besides, the technician was wearing clothes For protection, entering the lab will be called by the number corresponding to the job they are undertaking. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/f3fc4b475d05b45bed14.jpg" width="625" height="434"> <em> After each opening to receive samples, the room is sprayed with disinfectant to avoid the risk of infection. All generated waste is also collected and treated according to regulations of the Ministry of Health. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/c57d7cc66a8483dada95.jpg" width="625" height="416"> <em> To maintain testing capacity, nearly 100 cadets of the Military Medical Academy are divided into small teams working for 8 hours, with 3 rotating teams each day to ensure that the laboratory is always open 24 hours a day. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_119_38984160/24b6a20db44f5d11045e.jpg" width="625" height="416"> <em> Tran Hoang Minh (student of Military Medical Academy) and friends relax before the shift. He is in charge of the work of separating and taking samples, so the risk of infection is very high. However, Minh feels proud to work at this center. &#8220;The laboratory capable of large-scale testing is a very powerful weapon in the fight against the epidemic. With mobilized human strength, strong weapons and high determination, I believe the epidemic will be quickly controlled.&#8221; male students share. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19067</post-id>	</item>
		<item>
		<title>Gasoline shortage continues after Colonial Pipeline attack tấn</title>
		<link>https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Tue, 25 May 2021 04:31:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Continue]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Panic]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Rio Grande Valley]]></category>
		<category><![CDATA[shortage]]></category>
		<category><![CDATA[South Caroline]]></category>
		<category><![CDATA[Southeast America]]></category>
		<category><![CDATA[Status]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Tan]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[US East Coast]]></category>
		<category><![CDATA[Virginia]]></category>
		<guid isPermaLink="false">https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</guid>

					<description><![CDATA[Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas. Illustration. https://tinhtexaydung.petrotimes.vn According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas.</strong><br />
<span id="more-18031"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_232_38942005/9a8ccdedd9af30f169be.jpg" width="625" height="261"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and Tennessee are also experiencing significant blackouts. Colonial Pipeline&#8217;s main pipeline transporting gasoline and diesel to the US East Coast has been shut down, following a ransomware attack earlier this month. More than a thousand fuel stations in the Southeast have run out of petrol and diesel due to panic buying and pipeline closures. Even people in Texas, in the Rio Grande Valley, are flocking to gas stations to fill up with fuel, when news of gas stations running out of fuel. Colonial Pipeline paid almost $5 million in ransom in the form of a cryptocurrency to the hackers. But 2 weeks after shutting down, some gas stations are still shutting down. In Georgia, according to AAA data, the average price of a gallon of regular retail gasoline was $2,944 as of May 20, up from $2,708 a month before the pipeline failure. In North Carolina, the average price for gasoline is $2,929 per gallon, compared with $2,627 a month ago. According to Reuters, U.S. gasoline consumption is nearing pre-pandemic levels and is now down just 4% in the four weeks since May 14 from the five-year pre-pandemic average. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18031</post-id>	</item>
		<item>
		<title>Biden declares state of emergency after serious cyber attack</title>
		<link>https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</link>
		
		<dc:creator><![CDATA[Thanh Hảo]]></dc:creator>
		<pubDate>Fri, 21 May 2021 06:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[declares]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Planes]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State of emergency]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</guid>

					<description><![CDATA[The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code. Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code.</strong><br />
<span id="more-16831"></span> Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed after being attacked by a cyberattack on May 7 and is still in the process of restoring operation.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/84535b29466baf35f67a.jpg" width="625" height="351"> <em> Colonial Pipeline transports 2.5 million barrels of fuel per day. Photo: Colonial Pipeline</em> According to the BBC, the state of emergency allows fuel to be transported by road. The news agency quoted experts as saying that fuel prices could increase by 2-3% on May 10, but the real impact would be much worse if this situation continued for longer. Many sources confirm that the malicious code attack is caused by a cybercriminal gang called DarkSide, which infiltrated Colonial&#8217;s system on May 6 and stole nearly 100GB of data as a &#8220;hostage&#8221;. After taking over the data, the group of hackers locked this data on some computers and servers, demanded a ransom and warned that if they did not receive the money, they would release the data on the internet. Colonial is working with law enforcement, cybersecurity and the US Department of Energy to restore service. On the evening of May 9, the company announced that although the four main pipelines continued to stop, some smaller lines between the terminals and delivery points were still operating. &#8220;Immediately after learning of the attack, Colonial proactively shut down certain systems to stop the threat. These actions temporarily halted all pipeline operations and affected some systems. our information technology system, which we are actively working on restoring,&#8221; said Colonial. &#8220;We are in the process of restoring service to other pipelines and will bring the entire system back online when we believe it is safe and in full compliance with all federal regulations. &#8220;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/ff0927733a31d36f8a20.jpg" width="625" height="414"> <em> The DarkSide message appears on the victim&#8217;s computer screen. </em> DarkSide isn&#8217;t the largest cybercriminal gang in the field, but the incident demonstrates the heightened risk that malware poses to critical U.S. industrial infrastructure, not just businesses. This gang lists all types of stolen data and sends the victim the URL of the &#8220;personal leak site&#8221;, where the data is pre-loaded waiting for automatic publication, if the company or organization does not. payment before the deadline. DarkSide claims to provide proof of the data obtained, and is ready to delete all such data from the victim&#8217;s network. According to Digital Shadows, a London-based cybersecurity company that tracks global cybercrime groups to help businesses limit their risk of being hacked, DarkSide acts like a company.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16831</post-id>	</item>
		<item>
		<title>Ransomware Attack Targets US Fuel Pipelines</title>
		<link>https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</link>
		
		<dc:creator><![CDATA[Anh Duy]]></dc:creator>
		<pubDate>Fri, 21 May 2021 01:15:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Pipelines]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Targets]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</guid>

					<description><![CDATA[On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security. Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security.</strong><br />
<span id="more-16746"></span> Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to close a network. an important fuel supply to the populous states in the East.</p>
<p> The attack was one of the most disruptive digital ransom schemes reported, prompting US lawmakers to call for increased protection of America&#8217;s critical energy infrastructure from hackers. Commerce Secretary Gina Raimondo said pipeline repairs were a priority for the Biden administration and Washington was working to avoid more severe fuel supply disruptions by helping Colonial restart the road network. The tube is more than 5,500 miles (8,850 km) long. &#8220;Right now it&#8217;s an all-in-one effort,&#8221; Raimondo said on CBS&#8217;s &#8220;Face the Nation.&#8221; &#8220;We are working closely with company, state and local officials to ensure they return to normal operations as quickly as possible and without disruption to supplies,&#8221; Colonial said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/fbf5adbdb0ff59a100ee.jpg" width="625" height="473"> <em> The pipeline network was attacked &#8211; Photo: Reuters</em> Their main fuel lines are still offline, but some of the smaller routes between the terminals and delivery points are now up and running. Neither Raimondo nor the company has given an estimate of a full reboot date. U.S. gasoline futures rose more than 3% to $2,217 a gallon, the highest since May 2018 as trading opened for the week and market participants reacted to pipeline closures. Colonial ships about 2.5 million barrels per day of gasoline and other fuels from refineries on the Gulf Coast to consumers. Its extensive pipeline network serves major US airports including Atlanta&#8217;s Hartsfield Jackson Airport, the world&#8217;s busiest airport by passenger traffic. A spokeswoman for Charlotte Douglas International Airport said the airport had supplies on hand and was &#8220;monitoring the situation closely&#8221;. Retail fuel experts including the American Automobile Association say outages lasting several days could have a significant impact on fuel supplies in the region, particularly in the southeastern US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/427e10360d74e42abd65.jpg" width="625" height="326"> <em> Colonial Pipeline&#8217;s fuel tanks &#8211; Photo: Reuters</em> While the US government investigation is in its early stages, a former official and three industry sources said the suspected hackers were a professional cybercrime group called DarkSide. DarkSide is one of many gangs that often use malware to extort victims. These groups gain access to private networks, encrypt files with software, and often steal data. They ask for money to decrypt the files and ask for more money to not publish the stolen content. During the Colonial attack, the hackers stole more than 100 gigabytes of data.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16746</post-id>	</item>
		<item>
		<title>US &#8216;red alert&#8217; after malicious code attack on fuel system</title>
		<link>https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</link>
		
		<dc:creator><![CDATA[Ngọc Hà (TTXVN)]]></dc:creator>
		<pubDate>Thu, 20 May 2021 12:44:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</guid>

					<description><![CDATA[America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack. Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack.</strong><br />
<span id="more-16577"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38793245/cd9b8e6093227a7c2333.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com</em> The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid disruption to supply. Experts say gas prices will not be affected if the company resumes normal operations in the next few days. However, this cyberattack, rated as the worst ever for the US infrastructure system, should be a warning bell for other companies about the risk they will become the next target of similar attacks. According to Colonial Pipeline, the company&#8217;s pipeline carries gasoline and other fuels from Texas to the Northeast, providing nearly 45 percent of the fuel for the East Coast of the United States. Although Colonial Pipeline has not revealed who is responsible for the cyber attack, an unnamed person on the team investigating the incident confirmed that the culprit was a hacker group nicknamed Darkside. This group has been spreading ransomware since August 2020 and is classified as one of the most attackable groups. Over the past 3 years, Darkside has become more and more professional and has caused Western countries tens of billions of dollars in losses. Ransomware attacks are malicious code designed to lock down computer systems using encrypted data and demand a ransom to restore access. US Commerce Secretary Gina Raimondo on May 9 warned US businesses to be wary of ransomware attacks. The female minister affirmed that she would work closely with the Department of Homeland Security to handle the issue, considering this a top priority of the government. Reuters news agency, citing a notice from the White House, said the administration was working to help Colonial Pipeline company resume operations to avoid supply disruptions. According to sources, before activating ransomware, hackers often steal data, which is used to blackmail businesses or distort the truth. Sometimes stolen data is more valuable to hackers than the benefit they get by disrupting business operations. Security experts say the attack is a warning to operators and managers of essential infrastructure in the US such as electricity, water, energy and transportation facilities that have long been built. do not update the method to ensure security against the risk of being attacked. Mr. David Kennedy, a senior security consultant and founder of the security consulting firm TrustedSec, admitted that ransomware attacks have spiraled out of control in the US and are currently under development. is one of the greatest threats facing the United States. However, most American companies lack the ability to prepare for such threats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16577</post-id>	</item>
		<item>
		<title>Launching 5-layer protection solution, attack prevention for digital transformation</title>
		<link>https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Wed, 19 May 2021 12:25:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Launching]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[transformation]]></category>
		<category><![CDATA[Unnecessary]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</guid>

					<description><![CDATA[Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation. Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation.</strong><br />
<span id="more-16156"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38803011/5b5d6bf475b69ce8c5a7.jpg" width="625" height="375"> </p>
<p> Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. This set of solutions is applied artificial intelligence (AI) to kill viruses even without updating the identification pattern, especially integrating a series of new technologies to protect personal information and user data. Specifically, the set of AI application solutions aims to create a 5-layer protection system including: The network layer is responsible for protecting and monitoring all incoming and outgoing network connections; operating system layer to monitor and detect operating system vulnerabilities; the data layer is responsible for protecting and monitoring changes to data or system configuration; application layer that monitors the behavior and vulnerabilities of applications; The user layer helps ensure enforcement of information security policies. According to Mr. Vu Ngoc Son, Vice President in charge of anti-malware of Bkav, the new version of AI technology applied in Bkav 2021 can identify malicious code up to 99.9% as well as reduce the ability to &#8220;catch&#8221;. clean files down to approximately 0%. This new technology also optimizes performance 144% more than the previous 2020 version. The business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard, helping businesses get an overall picture of the periodic protection situation by week, month, and year, including the number of scanned files. , number of files are malicious code, number of controlled connections, number of dangerous connections blocked, rate of infected malware types, number of times to prevent data encryption, spy attacks, number of holes OS vulnerabilities&#8230; Customers who already have a license will be automatically upgraded to the new version for free from May 11, 2021.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16156</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>The mysterious calculation behind Elon Musk&#8217;s proposal to &#8216;nuclear attack on Mars&#8217;</title>
		<link>https://en.spress.net/the-mysterious-calculation-behind-elon-musks-proposal-to-nuclear-attack-on-mars/</link>
		
		<dc:creator><![CDATA[Việt Dũng]]></dc:creator>
		<pubDate>Sun, 16 May 2021 05:17:13 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[Astronaut]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Calculation]]></category>
		<category><![CDATA[Cosmic radiation]]></category>
		<category><![CDATA[Earth science]]></category>
		<category><![CDATA[Elon]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Explosion]]></category>
		<category><![CDATA[Explosive equivalent]]></category>
		<category><![CDATA[Fusion]]></category>
		<category><![CDATA[Ionize]]></category>
		<category><![CDATA[Lead plate]]></category>
		<category><![CDATA[MARS]]></category>
		<category><![CDATA[Megaton]]></category>
		<category><![CDATA[Musks]]></category>
		<category><![CDATA[Mysterious]]></category>
		<category><![CDATA[Nuclear]]></category>
		<category><![CDATA[Offer]]></category>
		<category><![CDATA[Ozone]]></category>
		<category><![CDATA[Planet]]></category>
		<category><![CDATA[proposal]]></category>
		<category><![CDATA[Radiation]]></category>
		<category><![CDATA[Red Planet]]></category>
		<category><![CDATA[Robert Walker]]></category>
		<category><![CDATA[secret]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-mysterious-calculation-behind-elon-musks-proposal-to-nuclear-attack-on-mars/</guid>

					<description><![CDATA[Billionaire Elon Musk is controversial about the idea of ​​​​making a series of nuclear explosions on Mars to renovate the Red Planet, is this proposal feasible? The idea of ​​​​conquering Mars has been a dream of mankind for many years, this could be the first step towards realizing the dream of many science fiction scientists [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Billionaire Elon Musk is controversial about the idea of ​​​​making a series of nuclear explosions on Mars to renovate the Red Planet, is this proposal feasible?</strong><br />
<span id="more-14857"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/eed7994486066f583617.jpg" width="625" height="356"> </p>
<p> <em> The idea of ​​​​conquering Mars has been a dream of mankind for many years, this could be the first step towards realizing the dream of many science fiction scientists that is to explore outer space.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/301a40895fcbb695efda.jpg" width="625" height="351"> <em> Sending humans to another planet, even within the solar system, has the effect of reducing the risk of a global catastrophe that could destroy life, such as a large asteroid impact or nuclear war.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/b381ff12e050090e5041.jpg" width="625" height="416"> <em> Even in the future, the Red Planet could be an abundant source of resources. Obviously the ambition to travel to Mars is impressive, but there are many doubts and obstacles attached.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/aa52e0c1ff8316dd4f92.jpg" width="625" height="370"> <em> Tech billionaire Elon Musk put forward the idea of ​​humans traveling to Mars on 1,000 rockets and creating land for 1 million inhabitants, this is clearly an extremely expensive and technologically difficult task. major barriers have been listed.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/9c09d49acbd822867bc9.jpg" width="625" height="468"> <em> First, Earth science has not yet been able to create spacecraft with the ability to send humans into distant space that is &#8220;immune&#8221; to deadly cosmic radiation.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/058743145c56b508ec47.jpg" width="625" height="390"> <em> The solution to this problem could be to wrap lead plates, but that would increase the weight of the ship and reduce its carrying capacity. Engines for spaceships are now well beyond construction.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/8d0cc89fd7dd3e8367cc.jpg" width="625" height="468"> <em> Second, solar radiation is a big problem, the Red Planet is different from Earth in that it doesn&#8217;t have a magnetic field protecting it from ionizing radiation. Astronauts will have to hide in bases hidden deep below the surface, not be able to walk freely on the surface.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/a7c1e652f910104e4901.jpg" width="625" height="351"> <em> Third, Mars is cold and has no atmosphere, but the radiation background is 2.5 times higher than that of astronauts on the International Space Station ISS. It is impossible to live in such conditions without a special space suit.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/e14ba1d8be9a57c40e8b.jpg" width="625" height="415"> <em> There are many other problems as well, but it is clear that expanding space into outer space requires accumulation and huge investments in technology.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/8279ddeac2a82bf672b9.jpg" width="625" height="416"> <em> Before this fact, scientists expressed doubts about Elon Musk&#8217;s initiative, when he proposed to carry out bombardments with thermonuclear warheads at both poles of the Red Planet.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/1b5a46c9598bb0d5e99a.jpg" width="625" height="351"> <em> A &#8220;fusion attack&#8221; would cause glaciers to melt, forming liquid water and releasing greenhouse gases, which help create the atmosphere on Mars. Then the &#8220;reclaimers&#8221; could walk around without a spacesuit.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/304f6bdc749e9dc0c48f.jpg" width="625" height="351"> <em> But mathematician Robert Walker calculates that to carry out the first part of the plan requires at least 1 million nuclear bombs with an explosive yield of 100 Megatons, must be assembled on Mars 3,500 a day for 7 weeks to achieve desired results.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/aceef67de93f0061592e.jpg" width="625" height="465"> <em> There are no such large numbers of nuclear weapons on Earth, and the lack of means to deliver them to another planet, is the first hurdle.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/630a3a9925dbcc8595ca.jpg" width="625" height="351"> <em> CO2 reserves on Mars would not be enough to create a suitable atmosphere, even if the first problem were solved. Since the Red Planet does not have a magnetic field, solar radiation will gradually &#8220;suck&#8221; the gas that has already formed, which is the second barrier.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/fbefa37cbc3e55600c2f.jpg" width="625" height="375"> <em> Finally, Elon Musk does not take into account that after many nuclear explosions, the surface of the planet will be radioactive for a long time, people cannot walk with oxygen masks and plant trees.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/9096c705d84731196856.jpg" width="625" height="301"> <em> Elon Musk&#8217;s initiative is clearly impractical and perhaps the billionaire himself understands this, but what is his meaning. The head of Russia&#8217;s state space corporation Roscosmos &#8211; Mr. Dmitry Rogozin made a remarkable remark.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/f982af11b053590d0042.jpg" width="625" height="379"> <em> &#8220;Anyone calling for the reclamation of Mars or other planets is well aware that this is just an excuse for launching nuclear weapons into space for military purposes on Earth.&#8221;</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/49f91c6a0328ea76b339.jpg" width="625" height="326"> <em> &#8220;It&#8217;s true, you can&#8217;t just put nuclear warheads on Mars. They need to first be put into orbit and assembled somewhere with the means to send them in large batches.”</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/9d45c9d6d6943fca6685.jpg" width="625" height="359"> <em> “Assuming an orbital station being built by the US and its allies will be tailored to target China and Russia. Will nuclear warheads reach the Red Planet then?</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_106_38830489/097e5aed45afacf1f5be.jpg" width="625" height="351"> <em> “It is no secret that Elon Musk is working closely with the Pentagon on the space and satellite program. So why not experiment with the best cause of Mars exploration, to advocate for the idea of ​​​​putting US nuclear weapons in space,&#8221; concluded Mr. Rogozin.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14857</post-id>	</item>
		<item>
		<title>The Problem Behind DarkSide&#8217;s Cyber ​​Attack</title>
		<link>https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Sat, 15 May 2021 10:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Colony]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[DarkSides]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Half]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[The White House]]></category>
		<category><![CDATA[worry]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</guid>

					<description><![CDATA[A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast. Illustration. https://tinhtexaydung.petrotimes.vn The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast.</strong><br />
<span id="more-14602"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_232_38828024/c76a29db3699dfc78688.jpg" width="625" height="362"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel line. However, the price of gasoline sold at pumping stations is higher and the possibility of fuel supply shortage is inevitable. After all, it is only temporary and its effects will be fleeting. But there&#8217;s a bigger problem: this has to do with America&#8217;s energy infrastructure, exactly how secure is its cybersecurity infrastructure? Experts soon said: The team that carried out this attack consisted of seasoned hackers. Later, a ransomware group called DarkSide claimed responsibility for the attack, and the FBI also pointed to this group as the culprit. Here&#8217;s what DarkSide said in its statement: “We are apolitical, we do not engage in geopolitics, do not need to tie us to a defined government, and seek our motives. . Our goal is to make money, and not create any other problems for society. Starting today, we&#8217;re introducing censorship and vetting of each company that our partners want to encrypt to avoid future social consequences.&#8221; The statement was clearly intended to address allegations made that Russia was behind the attack, but even the White House was careful not to point the finger at Moscow. President Biden said there was no evidence that they were involved in the attack. That&#8217;s related to geopolitical motives, but the statement also suggests that DarkSide and its partners won&#8217;t stop, even if they don&#8217;t intentionally cause problems. “Colonial may be at risk of leaking consignor confidential data,” said Vicki Knott, CEO of CruxOCM, a provider of control room operations services to the oil and gas industry. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14602</post-id>	</item>
		<item>
		<title>The cyber attack stagnates the leading fuel pipeline in the United States</title>
		<link>https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</link>
		
		<dc:creator><![CDATA[PHẠM TRUNG (Theo Reuters, AP)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 05:31:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[leading]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[stagnates]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</guid>

					<description><![CDATA[Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP. Leading American fuel pipeline company Colonial shut down its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack.</strong><br />
<span id="more-12826"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_14_38780441/8745c7efdaad33f36abc.jpg" width="625" height="416"> </p>
<p> <em> The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP.</em> Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. Every day, the Colonial company ships 2.5 million barrels of gasoline, diesel, jet fuel and other products through a 850-kilometer pipeline connecting the eastern and southern coasts of the United States. The company has shut down systems to stop the threat after learning about the attack. According to sources, hackers are most likely a highly professional cybercrime group. And the malware used in the attack is ransomware. Ransomware is a type of malware designed to lock systems by encrypting data and taps money to regain access. This malware has become popular in the past 5 years. The Colonial Company has invited a third-party cybersecurity company to conduct an investigation and contacted law enforcement and other federal agencies to initiate an investigation. Colonial provided no further details or said how long their fuel lines would be closed. “Cyber ​​vulnerabilities have become a systemic issue,” said Ms. Algirde Pipikaite, Head of Network Strategies at the World Economic Forum&#8217;s Cyber ​​Security Center. Without measures to protect cybersecurity, attacks are occurring more often on industrial systems such as oil and gas pipelines or water treatment plants. In 2017, Colonial shut down its gas distillation and production lines during Hurricane Harvey that hit the Gulf Coast. That contributes to tight supply and price increases in gasoline in the US.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12826</post-id>	</item>
		<item>
		<title>The background of this terrorist attack in Pakistan is not simple!</title>
		<link>https://en.spress.net/the-background-of-this-terrorist-attack-in-pakistan-is-not-simple/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 21:29:07 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Background]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Simple]]></category>
		<category><![CDATA[Terrorist]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-background-of-this-terrorist-attack-in-pakistan-is-not-simple/</guid>

					<description><![CDATA[Pakistan: Hotel explosion killed 4 people, Chinese ambassador stayed in the hotel and went out during the incident The explosion in Pakistan is not easy! Because it did not explode early or late, it happened when the Chinese ambassador was staying. The explosion was so tragic that at least five people were killed and more [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Pakistan: Hotel explosion killed 4 people, Chinese ambassador stayed in the hotel and went out during the incident </p>
<p> <img fifu-featured="1" decoding="async" src="https://p7.itc.cn/images01/20210423/3dae7bd061174cc29be259c580e17a0a.png" max-width="600"> The explosion in Pakistan is not easy! Because it did not explode early or late, it happened when the Chinese ambassador was staying. The explosion was so tragic that at least five people were killed and more than ten others were injured. Fortunately, the Chinese ambassador was returning from a trip, and there was still a few minutes&#8217; drive away from the hotel. At the Foreign Ministry press conference yesterday, Wang Wenbin strongly condemned the terrorist attack, expressed condolences to the unfortunate victims, and extended condolences to the injured. He also disclosed some information of concern to the outside world, which is what he said:</p>
<p>On the same day, Chinese Ambassador to Pakistan Nong Rongzheng led a delegation to visit the local area. When the attack occurred, the Chinese delegation was not in the hotel. Up to now, no reports of casualties of Chinese citizens in the attack have been received. At present, relevant departments in Pakistan are fully investigating the incident, and I believe that Pakistan will be able to find out the truth as soon as possible and bring the perpetrators to justice. China will continue to firmly support Pakistan’s counter-terrorism efforts, jointly maintain and promote regional security and stability, and ensure the safety of Chinese personnel and institutions in Pakistan. Is this a coincidence? Many friends said that this is clearly aimed at the Chinese ambassador. Don’t forget, this is in Balochistan, which is more divided. It may or may not be.<strong> Why do you say that, I will explain in detail later.</strong> <img decoding="async" src="https://p8.itc.cn/images01/20210423/286dd4df759644de91bbf3a49cbaf093.png" max-width="600"> A few superficial judgments. <strong> 1. There must be an internal response.</strong> Watching the video, a white car drove into the hotel. According to Pakistani officials, the car driven by the suicide attacker contained 60-70 kg of C4 explosives.</p>
<p>Obviously, this was a planned terrorist attack.</p>
<p>Regardless of whether the target is a Chinese ambassador or not, there are obviously internal responses. The internal response here may be the people in the hotel, or the whistleblower around, and the terrorists may have stepped on it in advance.</p>
<p><img decoding="async" src="https://p8.itc.cn/images01/20210423/07d20dfa62534495a048c959c24d18a2.png" max-width="600"></p>
<p><strong> 2. Pakistan is also prepared.</strong></p>
<p>I have to say that fortunately, the explosion happened ahead of time and it happened in the hotel parking lot, otherwise the consequences would be disastrous.</p>
<p>The reason for the explosion in the parking lot, I guess one reason may be that the Pakistani security check has played a role.</p>
<p>The suicide bomber knew that he could not enter the hotel to launch an attack, or the situation forced him to launch an attack early.</p>
<p>Hateful and pitiful, it became a victim of terrorist attacks.</p>
<p><img decoding="async" src="https://p4.itc.cn/images01/20210423/bbf2a8dee4a24472b0cba7a1c9ae9385.png" max-width="600"></p>
<p><strong> 3. Is it aimed at the Chinese ambassador?</strong></p>
<p>The truth is still confusing.</p>
<p>It is worth noting that it was Bata (Pakistan&#8217;s Taliban movement), not the so-called Balochistan Liberation Army, who had confessed to the attack. Bata also declared,<strong> The target is Pakistani security officials.</strong></p>
<p>If this is true, it does not rule out. The target is really high Pakistani officials, not the Chinese ambassador.</p>
<p>But in any case, we must oppose any form of terrorism.</p>
<p>After the explosion, the Chinese Ambassador to Pakistan Nong Rong tweeted without mentioning the attack. He wrote: &#8220;The visit to the Rasakai Special Economic Zone (SEZ) was very impressive. The economic zone has conducted effective communication to ensure its development and growth.&#8221;</p>
<p>The ambassador is to promote cooperation, whether or not a terrorist attack against him will not destroy the Sino-Pakistani friendship.</p>
<p>Seeing that Pakistani Minister of Interior Ahmed particularly emphasized that the Chinese ambassador is very safe, and the friendship between China and Pakistan is &#8220;higher than the Himalayas.&#8221; he thinks,<strong> The terrorist attack is intended to destabilize Pakistan.</strong> Prime Minister Imran Khan of Pakistan also spoke out immediately, condemning this as a &#8220;cowardly terrorist attack.&#8221;</p>
<p>Before going to interview the war in Afghanistan in 2001, he worked in Pakistan for a long time. There is no doubt that Pakistanis are friendly to the Chinese, but Pakistan’s anti-terrorism situation is grim, which is also an indisputable fact.</p>
<p>This can not help but reminiscent of the two previous terrorist attacks.</p>
<p><strong> One happened in 2019, also in Balochistan, in Gwadar Port, which is more familiar to the Chinese.</strong></p>
<p>At that time, terrorists also launched an attack on a five-star hotel. According to Pakistani media reports, at the time of the incident, there were at least 70 people in the hotel building, including about 40 Chinese citizens. Although the police later clarified that at the time of the attack, there were no Pakistani and Chinese guests in the hotel.</p>
<p>Most likely, the residents were evacuated in time. The terrorist attack killed a Pakistani guard and injured many others.</p>
<p>another time,<strong> In 2018, in Karachi, Pakistan’s largest city, three terrorists launched an attack on the Chinese Consulate in Karachi</strong> Fortunately, the Pakistani police arrived quickly, and none of the Chinese diplomats and their families were injured.</p>
<p>In the fierce exchange of fire at that time, three terrorists were killed and two Pakistani policemen were killed. They are really heroes. Without them, the consequences would be disastrous. Also in this terrorist attack, there was also the widely praised Pakistani female police chief Su Hai.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210423/626deb6aa7294c728811a6a114a23fa8.jpeg" max-width="600"></p>
<p><strong> The picture of her drawing her gun and rushing to the scene is impressive. On social media, many people praised her as &#8220;the daughter of Sindh&#8221; or &#8220;the daughter of Pakistan.&#8221;</strong></p>
<p>Why are some terrorist activities directed at China?</p>
<p>This illustrates the complexity of the situation. It is true that Pakistan is an iron buddy, but the close relationship between China and Pakistan has naturally made China a target of some terrorists, trying to put pressure on the Pakistani government.</p>
<p>This is not the first time, and it certainly won&#8217;t be the last.</p>
<p>After the consulate was attacked that year, the Minister of Foreign Affairs of China and Pakistan spoke quickly on the phone. According to Xinhua News Agency, Pakistani Foreign Minister Qureshi assured Wang Yi that<strong> Pakistan-China friendship is unique and precious, and Pakistan will protect the safety of Chinese friends in Pakistan just like protecting its own citizens.</strong></p>
<p>This sentence is still very important.</p>
<p>Of course, compatriots in Pakistan should also pay attention to safety!</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9982</post-id>	</item>
		<item>
		<title>&#8216;Southeast direction in Dong Nai province in historic Ho Chi Minh campaign&#8217;</title>
		<link>https://en.spress.net/southeast-direction-in-dong-nai-province-in-historic-ho-chi-minh-campaign/</link>
		
		<dc:creator><![CDATA[Đỗ Bình (TTXVN)]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 08:25:09 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[1975]]></category>
		<category><![CDATA[April 30 event]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Brigadier]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[Central Military Commission]]></category>
		<category><![CDATA[Chi]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Department of Propaganda and Training]]></category>
		<category><![CDATA[Direction]]></category>
		<category><![CDATA[Discussion]]></category>
		<category><![CDATA[dong]]></category>
		<category><![CDATA[Dong Nai]]></category>
		<category><![CDATA[Dong Nai Provincial Party Committee]]></category>
		<category><![CDATA[Historic]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[Ho Chi Minh]]></category>
		<category><![CDATA[Ho Chi Minh Campaign]]></category>
		<category><![CDATA[Infer]]></category>
		<category><![CDATA[Main army]]></category>
		<category><![CDATA[Minh]]></category>
		<category><![CDATA[Nai]]></category>
		<category><![CDATA[Nguyen Van Duc]]></category>
		<category><![CDATA[Nguyen Van Sau]]></category>
		<category><![CDATA[Province]]></category>
		<category><![CDATA[Seminor]]></category>
		<category><![CDATA[Southeast]]></category>
		<category><![CDATA[Southeast direction]]></category>
		<category><![CDATA[Southeast of Saigon]]></category>
		<category><![CDATA[The South revolution]]></category>
		<category><![CDATA[Total attack]]></category>
		<guid isPermaLink="false">https://en.spress.net/southeast-direction-in-dong-nai-province-in-historic-ho-chi-minh-campaign/</guid>

					<description><![CDATA[On the 46th anniversary of the liberation of the South and the reunification of the country (April 30, 1975 &#8211; April 30, 2021), the Ministry of Defense will coordinate with the Dong Nai Provincial Party Committee to organize a scientific seminar at the Ministry of Defense. &#8216;Southeast direction in Dong Nai province during historic Ho [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the 46th anniversary of the liberation of the South and the reunification of the country (April 30, 1975 &#8211; April 30, 2021), the Ministry of Defense will coordinate with the Dong Nai Provincial Party Committee to organize a scientific seminar at the Ministry of Defense. &#8216;Southeast direction in Dong Nai province during historic Ho Chi Minh campaign&#8217;, on April 28, in Dong Nai province.</strong><br />
<span id="more-6409"></span> The above information was said by Major General Nguyen Van Duc, Director of Department of Propaganda and Training, General Political Department, Ministry of National Defense at the press conference to introduce the seminar, held on the morning of April 23, in Hanoi.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_294_38612710/803ba0f586b76fe936a6.jpg" width="625" height="446"> <em> Major General Nguyen Van Duc, Director General of the Department of Propaganda and Training, General Political Department of Vietnam People&#8217;s Army made a speech.</em> According to Major General Nguyen Van Duc, the workshop aimed to affirm the strategic vision, right policy and the ingenious and creative leadership of the Politburo and the Central Military Commission; the excellent campaign direction, command and administration by the Ministry of National Defense; analyzing and clarifying the process of preparing for the battlefield, organizing forces and posture in Ho Chi Minh Campaign in general, especially the Southeast direction in Dong Nai. The seminar was also an opportunity to re-enact the tough and heroic battle of our army and people in the Southeast, especially the army and people of Dong Nai province in the historic Ho Chi Minh campaign; reflect the process of close, rhythmic and effective combat coordination between directions and attacks; analyzing and clarifying the outstanding development of Vietnam&#8217;s unique military art. On that basis, to focus on clarifying the great contributions of the main army units, the local armed forces and the people of all strata in Dong Nai; the initiative and creativity of Party committees at all levels and local authorities in mobilizing human and material resources, coordinating with the main army to fight and win in the Southeast. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_294_38612710/c9ffe531c3732a2d7362.jpg" width="625" height="436"> <em> Colonel Nguyen Van Sau, Deputy Director of the Vietnam Military History Institute gave a speech. Photo: Minh Duc / VNA</em> Colonel Nguyen Van Sau, Deputy Director of the Vietnam Military History Institute, said the workshop aimed to continue to affirm the strategic vision and right and wise policy of the Central Committee of the Vietnam Labor Party ( now the Communist Party of Vietnam), when seizing the opportunity and lowering determination in the strategy of opening the General offensive and rebellion in the spring of 1975, culminating in the Ho Chi Minh Campaign. At the same time, clarifying the role and position of the attack direction to Southeast Saigon in Dong Nai province in the Ho Chi Minh campaign; evaluate victories and draw lessons from history; applying and promoting the value of valuable lessons in the current cause of national construction and defense. &#8220;The seminar will draw valuable historical lessons and experiences, make a practical contribution to the education of revolutionary traditions for the entire people, especially the young generation; at the same time apply and promote in the career of construction. build up the army, consolidate the current national defense and security &#8220;, emphasized Colonel Nguyen Van Sau. Up to now, the Organizing Committee has received 76 speeches, including many articles from leaders, former leaders of the Party, State, Army, some localities, historical witnesses such as: Lieutenant General Nguyen Tan Cuong, member of the Party Central Committee, member of the Central Military Commission, and Deputy Minister of National Defense; Senior Lieutenant General Tran Quang Phuong, member of the Party Central Committee, member of the Central Military Commission, Deputy Chairman of the General Political Department of the People&#8217;s Army of Vietnam; Member of the Party Central Committee, Secretary of Dong Nai Provincial Party Committee Nguyen Phu Cuong; Major General Nguyen Truong Thang, Member of the Party Central Committee, Commander of Military Region 7 &#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6409</post-id>	</item>
		<item>
		<title>Daimler&#8217;s frontal attack on Tesla</title>
		<link>https://en.spress.net/daimlers-frontal-attack-on-tesla/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 19 Apr 2021 02:50:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Daimler]]></category>
		<category><![CDATA[Daimlers]]></category>
		<category><![CDATA[E cars]]></category>
		<category><![CDATA[Electric cars]]></category>
		<category><![CDATA[frontal]]></category>
		<category><![CDATA[future]]></category>
		<category><![CDATA[Gasoline engine]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[limousine]]></category>
		<category><![CDATA[Mercedes]]></category>
		<category><![CDATA[Quarterly balance sheet]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tesla]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=4593</guid>

					<description><![CDATA[With the new fully electric luxury sedan EQS, Daimler wants to make up for the gap to the electric pioneer Tesla. Strong quarterly figures provide momentum. But the US rival has a big lead. &#8220;Tesla Hunters&#8221;, &#8220;Tesla Fighter&#8221; or even &#8220;Game Changer&#8221;: Industry experts and the media are praising the new fully electric Daimler luxury [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> With the new fully electric luxury sedan EQS, Daimler wants to make up for the gap to the electric pioneer Tesla. Strong quarterly figures provide momentum. But the US rival has a big lead.</strong> </p>
<p> &#8220;Tesla Hunters&#8221;, &#8220;Tesla Fighter&#8221; or even &#8220;Game Changer&#8221;: Industry experts and the media are praising the new fully electric Daimler luxury sedan EQS, which celebrated its world premiere yesterday. The Mercedes-S-Class is by far the most important and prestigious model series for the car manufacturer &#8211; a calling card for the car-interested world, with which one wants to present oneself from the best side and at the height of the engineering art. In the autumn of last year, the carmaker had already presented the S-Class with internal combustion engines. But that was yesterday&#8217;s world. The future, and actually the present, belongs to electromobility. And here the US competitor Tesla set the pace with its Model S in recent years.</p>
<h2> Overslept the future?</h2>
<p>According to Daimler&#8217;s plans, that should change from now on. &#8220;The EQS was developed to exceed even the expectations of our most demanding customers,&#8221; says CEO Ola Källenius, promoting the new luxury model. Above all, the management is concerned with catching up on the competition with Tesla at the top. &#8220;The importance of the EQS for Daimler&#8217;s reputation as an e-car builder is immense,&#8221; said industry expert Ferdinand Dudenhöffer <em> Deutsche Welle</em> . The new vehicle is both a technology carrier and a symbol of the Group&#8217;s ability to innovate. For a long time, critics have accused the group of lacking innovative strength. For too long, Daimler has stuck to the concept of gasoline and diesel cars, while Tesla has long been shaping the future and building a technological lead that needs to be caught up now.</p>
<h2> From now on it should go faster </h2>
<p>Tesla is also way ahead in terms of sales in the electrical sector. Last year, the Californian company set a new record with almost 500,000 vehicles sold worldwide. In the first quarter of 2021, the share of e-cars in total sales was only ten percent, but this sector is currently growing strongly. According to the current status, Daimler is aiming for a sales share of electrified cars of &#8220;more than 50 percent&#8221; in its passenger car division by 2030. This includes both all-electric cars and hybrids. According to Källenius, it could also be faster. At the moment you can feel a &#8220;strong demand&#8221; for purely electric cars and hybrid vehicles, he said at the presentation of the new electric sedan. If you project this momentum into the future, &#8220;it may well be that the planning bases that we have had so far are perhaps too conservative, that things can go faster, that things can be more.&#8221;</p>
<h2> Tesla still has a head start </h2>
<p>The fully electric EQS ​​should go on sale from summer. The price is not yet known. Jürgen Pieper, auto expert at Bankhaus Metzler, reckons with a proud price of 150,000 euros. With a range of 770 kilometers and the ability to charge quickly, Daimler’s EQS will be Tesla’s most important challenger, commented Kai Alexander Müller, Barclays auto analyst. The second generation of Tesla&#8217;s Model S, announced for this year, should travel 660 kilometers without having to recharge. Nonetheless, Tesla will remain unmatched for longer when it comes to software for communication and entertainment in the car, explained Metzler analyst Pieper. &#8220;Even the EQS does not yet offer as much as Tesla in terms of networking and constant software updates.&#8221; Nevertheless, the presentation is a success for Daimler: &#8220;The EQS is the challenge for pure electric car manufacturers, above all for the US electric car pioneer Tesla, says Stephen Reitman, analyst at Societe Generale.</p>
<h2> Operating profit ninefold &#8211; investors enthusiastic </h2>
<p>The Stuttgart-based carmaker is currently also receiving tailwind from the fresh quarterly figures that were published that morning. Earnings before interest and taxes (EBIT) rose to just under 5.8 billion euros in the first quarter. That was more than nine times the first quarter of 2020, which was marked by the outbreak of the corona pandemic &#8211; and more than experts had forecast. Daimler has not yet given information on sales and surplus, but it is clear that the group benefited in particular from the strong business in China. Daimler had reported a 22 percent increase in car sales for the first quarter, and sales soared by 60 percent in China alone. Investors like the latest news from Stuttgart. With a plus of almost three percent, the Daimler share leads the DAX.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4593</post-id>	</item>
		<item>
		<title>Taran warned that Moscow could attack Ukraine to ensure water supplies to the annexed peninsula Crimea</title>
		<link>https://en.spress.net/taran-warned-that-moscow-could-attack-ukraine-to-ensure-water-supplies-to-the-annexed-peninsula-crimea/</link>
		
		<dc:creator><![CDATA[Hà Linh (TH)]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 20:07:07 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[ANADOLU]]></category>
		<category><![CDATA[Andrii Taran]]></category>
		<category><![CDATA[Annexed]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Brussels]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Defense Minister]]></category>
		<category><![CDATA[Eastern Ukraine]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[European Parliament]]></category>
		<category><![CDATA[Exercise]]></category>
		<category><![CDATA[Merger]]></category>
		<category><![CDATA[minister]]></category>
		<category><![CDATA[Moscow]]></category>
		<category><![CDATA[Nuclear weapons]]></category>
		<category><![CDATA[Peninsula]]></category>
		<category><![CDATA[Practise]]></category>
		<category><![CDATA[Provocative]]></category>
		<category><![CDATA[SBU]]></category>
		<category><![CDATA[Subcommittee]]></category>
		<category><![CDATA[Supplies]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Taran]]></category>
		<category><![CDATA[The Ukrainian army]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[warned]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[water]]></category>
		<guid isPermaLink="false">https://en.spress.net/taran-warned-that-moscow-could-attack-ukraine-to-ensure-water-supplies-to-the-annexed-peninsula-crimea/</guid>

					<description><![CDATA[Taran warned that Moscow could attack Ukraine to secure water supplies for the annexed Crimean peninsula. On April 14, Ukraine&#8217;s Defense Minister Andrii Taran said that Russia was preparing to turn Crimea into a place to store nuclear weapons. Defense Minister of Ukraine Andrii Taran. Source: Anadolu Speaking to the defense subcommittee of the European [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Taran warned that Moscow could attack Ukraine to secure water supplies for the annexed Crimean peninsula.</strong><br />
<span id="more-1785"></span> On April 14, Ukraine&#8217;s Defense Minister Andrii Taran said that Russia was preparing to turn Crimea into a place to store nuclear weapons.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_541_38536074/2dc1e08acac823967ad9.jpg" width="625" height="351"></p>
<p><em>Defense Minister of Ukraine Andrii Taran. Source: Anadolu</em></p>
<p>Speaking to the defense subcommittee of the European Parliament in Brussels, Minister Taran warned that Moscow could attack Ukraine to secure water supplies for the annexed Crimean peninsula.</p>
<p>Besides, Mr. Tahan said, does not rule out the possibility that Russian forces in Crimea could &#8220;carry out major military provocations&#8221; in 2021, but he did not provide immediate evidence for this hypothesis.</p>
<p>Regarding developments, on the same day, the SBU national security agency of Ukraine announced that it was conducting a large-scale &#8220;anti-terror&#8221; exercise in the Kherson region near Crimea. SBU&#8217;s announcement said units of the Ukrainian armed forces together with police and border guards participated in the exercise.</p>
<p>The announcement emphasized: &#8220;The key strategic targets of key infrastructure in the Kherson region are being tightly controlled &#8230; These are seaport areas, power supply facilities, airports, demand and gas production plants &#8220;.</p>
<p>Earlier, the Ukrainian military posted a video, on a rock music scene, showing the country&#8217;s tanks deployed in formation with soldiers loaded and fired for artillery during a pushback drill. the attack of tanks and infantry infiltrated the defensive area near the Crimea border.</p>
<p>The drill comes a day after US President Joe Biden telephoned Russian President Vladimir Putin to discuss Russian troop reinforcement in Crimea and near eastern Ukraine, among other US concerns.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1785</post-id>	</item>
	</channel>
</rss>