logo
Trapped Ukrainian soldier escapes on e-bike delivered by drone

Trapped Ukrainian soldier escapes on e-bike delivered by drone

Gulf Today3 days ago
An injured Ukrainian soldier stuck behind enemy lines for days was rescued after being delivered an e-bike by a drone.
A video of the dramatic rescue showed a UAV drone airdropping the 40kg bike down to the wounded man, who was surrounded by Russian forces, before he cycled away.
The soldier's Rubizh brigade said three men were killed by enemy fire during a skirmish in Siversk, northern Ukraine, leaving the soldier on his own for five days.
In a video the soldier, call sign 'Tanker', said: 'Our drones covered us from above as best as they could. Then they threw two gas cylinders straight into our hole and a lighter. We caught fire.
'Every day, I was surrounded, from all sides. I fought back as best I could.'
Brigade commander Mykola Hrytsenko explained the challenges they faced in trying to rescue their stranded comrade.
'The enemy was in front, behind, and on both flanks, completely surrounded,' the commander said. 'It was impossible to drive up with equipment because the enemy was everywhere. He couldn't get out on his own either, because he had to walk 1.5km to the nearest position.
'In his condition, with his injuries, he simply wouldn't have made it.'
The bike was lowered to the wounded soldier so he could make his escape
The bike was lowered to the wounded soldier so he could make his escape (Rubizh Brigade)
The brigade then came up with the bold plan to deliver a vehicle to him by drone.
The first two attempts to fly the bike in failed, with Russian forces shooting the first out of the sky and the second crashing.
They managed to get the bike to the soldier on the third attempt – but his ordeal was not over yet.
After fleeing 400m, he hit a remote mine. Tank limped a further 200m with a leg injury before he was rescued. A second e-bike was then delivered, which he rode for 15 minutes to an evacuation point.
'To carry out this operation, they had to calculate the right time of day, the right weather conditions that would allow him to do it,' Cdr Hrytsenko added.
The soldier fled around 400m on an e-bike delivered by drone, before hitting a mine and limping the rest of the way
The soldier fled around 400m on an e-bike delivered by drone, before hitting a mine and limping the rest of the way (YouTube/Rubizh Brigade)
Reports of the rescue effort emerged after Vladimir Putin's forces launched a wave of missile attacks on the capital Kyiv in the early hours of Thursday, killing 16 people, including a six-year-old boy and his mother.
Ukrainian president Volodymyr Zelensky urged his allies to bring about 'regime change' in Russia following the attack.
'If the world doesn't aim to change the regime in Russia, that means even after the war ends, Moscow will still try to destabilise neighbouring countries,' he said.
'Today the world has once again seen Russia's response to our desire for peace ... Therefore, peace without strength is impossible,' the Ukrainian president added.
The Independent
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Hidden Dangers: Supply Chain Cyberattacks in 2025
Hidden Dangers: Supply Chain Cyberattacks in 2025

TECHx

time7 hours ago

  • TECHx

Hidden Dangers: Supply Chain Cyberattacks in 2025

Home » Editor's pick » Hidden Dangers: Supply Chain Cyberattacks in 2025 Supply chain cyberattacks are rising fast in 2025, exposing enterprises to hidden threats through trusted vendors, weak links, and third-party vulnerabilities. In 2025, it's not the hackers breaching your firewalls that should keep you up at night. It's the vendors you trust the most, the small software firm managing your data sync, the overseas hardware supplier, or even your outsourced payroll provider. Cybercriminals are no longer attacking the front doors of the world's most secure enterprises. They're slipping through the side gates, quietly piggybacking on the digital supply chains that keep global business ticking. Verizon's 2025 Data Breach Investigations Report (DBIR) highlights this troubling trend with hard numbers: one in three breaches now involves a third party. The percentage of incidents tied to partners or suppliers has doubled from the previous year, underscoring how deeply embedded these risks have become. What's more, ransomware, often delivered via these indirect attack paths has seen a 37% increase, now factoring into nearly half of all reported breaches. The Hertz-Cleo Fallout Take the Hertz incident earlier this year. The car rental giant itself wasn't hacked. Instead, the Russian-linked ransomware gang Clop infiltrated Cleo Communications, a trusted third-party file transfer provider used by Hertz and gained indirect access to sensitive customer information. By exploiting an unknown vulnerability in Cleo's software, the attackers avoided Hertz's own hardened defenses altogether. This tactic, often called a supply chain attack, isn't new. But what's changed is how quickly it's become the go-to method for sophisticated cybercriminals, including state-backed groups. Why try to breach a billion-dollar enterprise with enterprise-grade security, when you can compromise a smaller supplier with minimal resistance and get the same prize? The damage from these attacks goes far beyond lost data or a ransom paid. They undermine trust in entire ecosystems. If an organization can't vouch for its vendors' security posture, how can it vouch for its own? A Threat Hiding in Plain Sight Supply chains have always been complex. But now it has also become invisible. Many large enterprises now rely on thousands of vendors, software-as-a-service providers, open-source libraries, cloud partners, APIs, and more, creating sprawling digital ecosystems where a single weak link can compromise an entire network. Recent data shows that software supply chain incidents are sharply on the rise. According to Cyble, the average number of such attacks per month increased by 25% from late 2024 to mid-2025. In the last two months alone, this number nearly doubled. Attackers are getting more strategic, more patient, and more effective at exploiting interdependencies between systems that most companies barely map, let alone monitor. Credential abuse remains a leading cause of breaches, with nearly a quarter of attacks stemming from stolen or weak credentials. Vulnerability exploitation is close behind, accounting for 20%. These numbers reflect a sobering reality: as businesses grow more interconnected, the attack surface is no longer within their walls. Sectoral Impact: Healthcare, Manufacturing, and More Certain sectors are feeling the burn more than others. Healthcare, with its sensitive patient data and critical uptime requirements, remains a prime target. The DBIR found 1,710 incidents in the sector this year, with over 1,500 involving confirmed data disclosure. The most compromised data types? Medical and personal. Manufacturing is facing a different but equally insidious threat: espionage. Breaches in the industry nearly doubled this year, and for the first time, 20% were tied to espionage, up from just 3% the year before. Analysts believe this rise is likely linked to state-sponsored actors targeting supply chains to access emerging technologies and industrial secrets. Meanwhile, the financial and education sectors continue to grapple with familiar foes: phishing campaigns, credential stuffing, and basic web application attacks. But the thread tying all of these sectors together is supply chain vulnerability. Regardless of industry, the weakest point isn't the organization, it's often the people and partners just outside of it. Why We're Still Behind Despite years of warnings and a growing pile of headlines, many organizations still don't conduct comprehensive security reviews of their suppliers. Some don't even know how many third-party services are connected to their systems. A recent survey found that fewer than 30% of enterprises require a Software Bill of Materials (SBOM), a basic inventory of components used in applications, from their vendors. The regulatory landscape is beginning to catch up. New compliance mandates in the U.S., EU, and GCC region are placing greater onus on companies to verify vendor security. In the UAE, cybersecurity requirements tied to national digital transformation efforts are already pushing public and private organizations to step up. But policy alone won't solve the problem. Security teams must rethink their architecture from the ground up. The old model, perimeter defense, no longer applies in an age where the perimeter includes thousands of third parties. Strategies like Zero Trust architecture, real-time threat intelligence sharing, and continuous monitoring of third-party behavior are no longer 'nice to haves.' They are essential. A Chain Only as Strong as… The phrase 'a chain is only as strong as its weakest link' is now a cybersecurity cliché. But in 2025, it's painfully accurate. As enterprises double down on digital transformation, AI tools, and cloud-first strategies, their reliance on supply chains will only deepen. That means vigilance can't stop at the firewall, it must extend across every digital handshake. Because in today's cyber era, the breach you didn't notice might just be the one that shuts everything down.

Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says
Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says

Dubai Eye

time9 hours ago

  • Dubai Eye

Ukraine's drone attack sparks fire at oil depot in Russia's Sochi, governor says

More than 120 firefighters were trying to extinguish a blaze at an oil depot in the Russian city of Sochi that was sparked by a Ukrainian drone attack, regional Governor Veniamin Kondratyev said early on Sunday on the Telegram messaging app. In the Krasnodar region on the Black Sea where Sochi is located, a fuel tank with a capacity of 2,000 cubic metres was on fire, Russia's RIA news agency reported, citing emergency officials. The Russian defence ministry said in its daily morning report on Telegram that its air defence units destroyed 93 Ukrainian drones overnight, including one over the Krasnodar region and 60 over the waters of the Black Sea. The ministry reports only how many drones its units destroy, not how many Ukraine launched. Rosaviatsia, Russia's civil aviation authority, temporarily halted flights at Sochi's airport to ensure air safety before saying on Telegram that flights resumed as of 0200 GMT on Sunday. Reuters could not independently verify the reports. There was no immediate comment from Ukraine. The attack, which Kondratyev said was in the Adler district of the coastal resort city, would be Ukraine's latest on infrastructure inside Russia that Kyiv deems key to Moscow's war efforts. Attacks on Sochi, which hosted the 2014 Olympic Winter Games, have been infrequent in the war that Russia launched in February 2022. The Krasnodar region is home to the Ilsky refinery near the city of Krasnodar, among the largest in southern Russia and a frequent target of Ukraine's drone attacks. Also on Sunday, the governor of Voronezh region in southern Russia said four people were injured in a Ukrainian drone strike that caused several fires, while Russia launched a missile attack on Kyiv, according to the military administration of the Ukrainian capital. The Russian defence ministry said that its units destroyed 18 Ukrainian drones over the Voronezh region that borders Ukraine.

Troubleshooters sent into wildlife charity linked to Carrie Johnson
Troubleshooters sent into wildlife charity linked to Carrie Johnson

Gulf Today

time20 hours ago

  • Gulf Today

Troubleshooters sent into wildlife charity linked to Carrie Johnson

Simon Walters, The Independent Troubleshooters have been sent in to investigate a charity linked to Boris Johnson's wife following claims that its funds were used improperly by the multimillionaire socialite who runs it. The Charity Commission has appointed a team of high-powered legal experts to act as interim managers and take over key decision-making at the Aspinall Foundation, run by former casino owner Damian Aspinall. According to the watchdog's code of conduct, interim managers are imposed on a charity when it believes there has been 'mismanagement and/or misconduct'. It defines misconduct as any 'criminal, unlawful or improper' act. The Aspinall Foundation is a global conservation group that releases zoo animals back into the wild, working with its sister charity the Howletts Wild Animal Trust, which runs two wildlife parks in Kent. Both charities have been under the Charity Commission's spotlight for five years, with a statutory inquiry launched in 2021. Its latest decision to send troubleshooters into the Aspinall Foundation over 'fresh issues of concern' marks a major tightening of the screw. Carrie Johnson was recruited by the Aspinall Foundation in January 2021 to a senior communications role on an estimated 'high five-figure salary' when her partner Johnson, whom she married in May that year, was prime minister. Johnson has been one of the charity's highest-profile cheerleaders. There is no suggestion of any wrongdoing by either of the Johnsons. The allegations against the Aspinall Foundation include allowing its chair, Aspinall, to rent its headquarters, Howletts House — a neo-Palladian, 30-bedroom mansion in Kent, set in a 90-acre estate — for £2,500 a month, equivalent to the cost of renting a house in nearby Canterbury. The rent was increased to £10,000 a month after a revaluation. Other allegations include paying £150,000 to Aspinall's wife, Victoria, for 'interior design', as well as making loans to Aspinall. In 2019, he reportedly owed the foundation £113,000. Allegations against the Howletts Wild Animal Trust include paying Aspinall's step mother Lady Sarah Aspinall a £30,000-a-year pension for 'gardening services'. In a statement to The Independent, the Charity Commission said: 'Our inquiry into the Aspinall Foundation is ongoing. Towards the end of last year, fresh issues of concern were identified requiring us to embark on a further phase of investigation, and our investigators are working hard to pursue these at pace. 'The commission has now appointed interim managers to the Aspinall Foundation, who will work alongside the existing trustees on specific areas in line with the charity's governing document.' The Charity Commission only imposes interim managers on a charity 'if it is satisfied that there has been misconduct and/or mismanagement' and it is considered 'necessary to protect the charity's property'. Misconduct 'includes any act that the person committing it knew — or ought to have known — was criminal, unlawful or improper'. Mismanagement is defined as 'any act that may result in charitable resources being misused — or the people who benefit from the charity being put at risk'. The Charity Commission troubleshooters have been tasked with making any decisions that cannot be made by the trustees because of 'a conflict of interest', and with 'reviewing the make-up of the board of trustees'. Crucially, they have also been ordered to find out whether any of the trustees — or their family members — 'received a direct or indirect benefit from the charity'. Aspinall's daughter Tansy is a trustee of both the Aspinall Foundation and Howletts Wild Animal Trust. Multimillionaire and Conservative peer Zac Goldsmith, a former minister and a close friend of Aspinall and both the Johnsons, was an Aspinall trustee until August 2019. Lord Goldsmith's brother Ben, a Tory donor who was given an advisory post in Johnson's government, was also an Aspinall Foundation trustee. Both left before the Charity Commission launched any inquiries. A spokesperson for the Aspinall Foundation said: 'We welcome the inquiry by the Charity Commission and will continue to work with them transparently, but until that has concluded we are unable to comment further to press.' A spokesperson for the Howletts Wild Animal Trust said: 'With the Charity Commission's inquiry ongoing, we are unable to comment further.' Carrie Johnson could not be contacted. The Aspinall Foundation declined to say whether she is still an employee.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store