logo
Two-year-old among 28 dead in Thursday's Russian attack on Kyiv

Two-year-old among 28 dead in Thursday's Russian attack on Kyiv

Dubai Eye3 days ago
A two-year-old child was found dead in the rubble after Thursday's sweeping Russian drone and missile attack on Kyiv, Ukraine's prime minister said on Friday, taking the death toll to 28, with over 150 wounded.
The toddler was the third child to have died in the attack, in which Russia launched more than 300 drones and eight missiles in the early hours of Thursday morning. The other two underage victims were six and 17 years old, the head of Ukrainian presidential office Andriy Yermak said.
The rescue service said 16 of the injured were children, the largest number of children hurt in a single attack on Ukraine's capital since Russia started its full-scale invasion almost 3-1/2 years ago.
City authorities declared Friday a day of mourning as rescue operations continued.
"This morning, the body of a 2-year-old child was pulled from the rubble, bringing the total dead to 28, of which 3 are children," Prime Minister Yulia Svyrydenko said on X, adding that over 150 people had been wounded.
"The world possesses every instrument required to ensure Russia is brought to justice. What is lacking is not power — but will," Svyrydenko said.
US President Donald Trump, speaking to reporters in the Oval Office on Thursday, sharply criticised Russia's "disgusting" behaviour against Ukraine but said he was not sure whether sanctions would deter Russia.
He has given Russian President Vladimir Putin until August 8 to make a deal or else he will respond with economic pressure.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Hidden Dangers: Supply Chain Cyberattacks in 2025
Hidden Dangers: Supply Chain Cyberattacks in 2025

TECHx

time3 hours ago

  • TECHx

Hidden Dangers: Supply Chain Cyberattacks in 2025

Home » Editor's pick » Hidden Dangers: Supply Chain Cyberattacks in 2025 Supply chain cyberattacks are rising fast in 2025, exposing enterprises to hidden threats through trusted vendors, weak links, and third-party vulnerabilities. In 2025, it's not the hackers breaching your firewalls that should keep you up at night. It's the vendors you trust the most, the small software firm managing your data sync, the overseas hardware supplier, or even your outsourced payroll provider. Cybercriminals are no longer attacking the front doors of the world's most secure enterprises. They're slipping through the side gates, quietly piggybacking on the digital supply chains that keep global business ticking. Verizon's 2025 Data Breach Investigations Report (DBIR) highlights this troubling trend with hard numbers: one in three breaches now involves a third party. The percentage of incidents tied to partners or suppliers has doubled from the previous year, underscoring how deeply embedded these risks have become. What's more, ransomware, often delivered via these indirect attack paths has seen a 37% increase, now factoring into nearly half of all reported breaches. The Hertz-Cleo Fallout Take the Hertz incident earlier this year. The car rental giant itself wasn't hacked. Instead, the Russian-linked ransomware gang Clop infiltrated Cleo Communications, a trusted third-party file transfer provider used by Hertz and gained indirect access to sensitive customer information. By exploiting an unknown vulnerability in Cleo's software, the attackers avoided Hertz's own hardened defenses altogether. This tactic, often called a supply chain attack, isn't new. But what's changed is how quickly it's become the go-to method for sophisticated cybercriminals, including state-backed groups. Why try to breach a billion-dollar enterprise with enterprise-grade security, when you can compromise a smaller supplier with minimal resistance and get the same prize? The damage from these attacks goes far beyond lost data or a ransom paid. They undermine trust in entire ecosystems. If an organization can't vouch for its vendors' security posture, how can it vouch for its own? A Threat Hiding in Plain Sight Supply chains have always been complex. But now it has also become invisible. Many large enterprises now rely on thousands of vendors, software-as-a-service providers, open-source libraries, cloud partners, APIs, and more, creating sprawling digital ecosystems where a single weak link can compromise an entire network. Recent data shows that software supply chain incidents are sharply on the rise. According to Cyble, the average number of such attacks per month increased by 25% from late 2024 to mid-2025. In the last two months alone, this number nearly doubled. Attackers are getting more strategic, more patient, and more effective at exploiting interdependencies between systems that most companies barely map, let alone monitor. Credential abuse remains a leading cause of breaches, with nearly a quarter of attacks stemming from stolen or weak credentials. Vulnerability exploitation is close behind, accounting for 20%. These numbers reflect a sobering reality: as businesses grow more interconnected, the attack surface is no longer within their walls. Sectoral Impact: Healthcare, Manufacturing, and More Certain sectors are feeling the burn more than others. Healthcare, with its sensitive patient data and critical uptime requirements, remains a prime target. The DBIR found 1,710 incidents in the sector this year, with over 1,500 involving confirmed data disclosure. The most compromised data types? Medical and personal. Manufacturing is facing a different but equally insidious threat: espionage. Breaches in the industry nearly doubled this year, and for the first time, 20% were tied to espionage, up from just 3% the year before. Analysts believe this rise is likely linked to state-sponsored actors targeting supply chains to access emerging technologies and industrial secrets. Meanwhile, the financial and education sectors continue to grapple with familiar foes: phishing campaigns, credential stuffing, and basic web application attacks. But the thread tying all of these sectors together is supply chain vulnerability. Regardless of industry, the weakest point isn't the organization, it's often the people and partners just outside of it. Why We're Still Behind Despite years of warnings and a growing pile of headlines, many organizations still don't conduct comprehensive security reviews of their suppliers. Some don't even know how many third-party services are connected to their systems. A recent survey found that fewer than 30% of enterprises require a Software Bill of Materials (SBOM), a basic inventory of components used in applications, from their vendors. The regulatory landscape is beginning to catch up. New compliance mandates in the U.S., EU, and GCC region are placing greater onus on companies to verify vendor security. In the UAE, cybersecurity requirements tied to national digital transformation efforts are already pushing public and private organizations to step up. But policy alone won't solve the problem. Security teams must rethink their architecture from the ground up. The old model, perimeter defense, no longer applies in an age where the perimeter includes thousands of third parties. Strategies like Zero Trust architecture, real-time threat intelligence sharing, and continuous monitoring of third-party behavior are no longer 'nice to haves.' They are essential. A Chain Only as Strong as… The phrase 'a chain is only as strong as its weakest link' is now a cybersecurity cliché. But in 2025, it's painfully accurate. As enterprises double down on digital transformation, AI tools, and cloud-first strategies, their reliance on supply chains will only deepen. That means vigilance can't stop at the firewall, it must extend across every digital handshake. Because in today's cyber era, the breach you didn't notice might just be the one that shuts everything down.

Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says
Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says

Dubai Eye

time5 hours ago

  • Dubai Eye

Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says

More than 120 firefighters were trying to extinguish a blaze at an oil depot in the Russian city of Sochi that was sparked by a Ukrainian drone attack, regional Governor Veniamin Kondratyev said early on Sunday on the Telegram messaging app. In the Krasnodar region on the Black Sea where Sochi is located, a fuel tank with a capacity of 2,000 cubic metres was on fire, Russia's RIA news agency reported, citing emergency officials. The Russian defence ministry said in its daily morning report on Telegram that its air defence units destroyed 93 Ukrainian drones overnight, including one over the Krasnodar region and 60 over the waters of the Black Sea. The ministry reports only how many drones its units destroy, not how many Ukraine launched. Rosaviatsia, Russia's civil aviation authority, temporarily halted flights at Sochi's airport to ensure air safety before saying on Telegram that flights resumed as of 0200 GMT on Sunday. Reuters could not independently verify the reports. There was no immediate comment from Ukraine. The attack, which Kondratyev said was in the Adler district of the coastal resort city, would be Ukraine's latest on infrastructure inside Russia that Kyiv deems key to Moscow's war efforts. Attacks on Sochi, which hosted the 2014 Olympic Winter Games, have been infrequent in the war that Russia launched in February 2022. The Krasnodar region is home to the Ilsky refinery near the city of Krasnodar, among the largest in southern Russia and a frequent target of Ukraine's drone attacks. Also on Sunday, the governor of Voronezh region in southern Russia said four people were injured in a Ukrainian drone strike that caused several fires, while Russia launched a missile attack on Kyiv, according to the military administration of the Ukrainian capital. The Russian defence ministry said that its units destroyed 18 Ukrainian drones over the Voronezh region that borders Ukraine.

Ukraine hits Russian oil facilities, military airfield
Ukraine hits Russian oil facilities, military airfield

Gulf Today

time16 hours ago

  • Gulf Today

Ukraine hits Russian oil facilities, military airfield

Ukraine's military said on Saturday that it had struck oil facilities inside Russia, including a major refinery as well as a military airfield for drones and an electronics factory. In a statement on Telegram, Ukraine's Unmanned Systems Forces said they had hit the oil refinery in Ryazan, about 180 km southeast of Moscow, causing a fire on its premises. Also hit, the USF said, was the Annanefteprodukt oil storage facility in the Voronezh region that borders on northeastern Ukraine. The statement did not specify how the facilities were hit, but the USF specialises in drone warfare, including long-range strikes. There was no immediate comment from Russia on the reported attacks on its infrastructure sites. Separately, Ukraine's SBU intelligence agency said its drones had hit Russia's Primorsko-Akhtarsk military airfield, which has been used to launch waves of long-range drones at targets in Ukraine. The SBU said it also hit a factory in Penza that it said supplies Russia's military-industrial complex with electronics. At the start of Russia's full-scale invasion in 2022, Ukraine had no response to Moscow's vast long-range strike capacity but it has since built up a fleet of long-range kamikaze drones able to carry explosive warheads for many hundreds of kilometres. Russia's defence ministry said in its daily report that its defence units had downed a total of 338 Ukrainian drones overnight. Its reports do not say how many Ukrainian drones were launched at any given time. For its part, Ukraine's air force said it had downed 45 of 53 Russian drones launched towards its territory overnight. On Ukraine's eastern battlefront, Russia's defence ministry said, Russian forces had captured the village of Oleksandro-Kalynove in the Donetsk region on Saturday. Reuters could not immediately verify the battlefield report. Russian forces now control almost 20% of Ukraine in its east and south after three-and-a-half years of grinding war. Meanwhile, Ukrainian authorities said that they had arrested several politicians in connection with a 'large-scale corruption scheme' in the defence sector, shortly after an uproar over the independence of anti-graft bodies. A law passed at the end of July stripped the National Anti-Corruption Agency (NABU) and the Specialised Anti-Corruption Prosecutor's Office (SAP) of their independence and placed them under the supervision of the Prosecutor General, himself appointed by the head of state. President Volodymyr Zelensky on Thursday backtracked and restored the bodies' independence following an outcry from the country's allies and the first anti-government street demonstrations since the Russian invasion in 2022. The NABU said on Saturday that it and the SAP had exposed 'a scheme for the systematic misappropriation of budget funds allocated by local authorities for the needs of the defence forces, as well as the receipt and provision of unlawful benefits on an especially large scale.' It said the scheme involved inflating prices for electronic warfare and drone equipment, and then funnelling off 30 per cent of the contract amounts. The suspects include a member of parliament, heads of district and city administrations, members of the National Guard, and executives at defence companies. The NABU said it has made four arrests so far but did not identify those detained. The interior ministry said it had suspended the suspected members of the National Guard. Zelensky said in a statement: 'I am grateful to the anti-corruption agencies for their work. 'It is important that anti-corruption institutions operate independently, and the law passed on Thursday guarantees them all the tools necessary for a real fight against corruption.' The president initially said he needed to bring the NABU and the SAP under his control because they were inefficient and under 'Russian influence.' But he did an about-face when confronted with the outcry - first serious political crisis since he took office six years ago. Several cases of corruption - an endemic problem in the country - have been exposed within the armed forces and the defence ministry during the war with Russia. Agencies

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store