logo
#

Latest news with #PrimakovReadings'

Shashi Tharoor shreds Pakistan in fluent French—Watch the Congress MP's viral speech in Moscow
Shashi Tharoor shreds Pakistan in fluent French—Watch the Congress MP's viral speech in Moscow

Mint

time26-06-2025

  • Politics
  • Mint

Shashi Tharoor shreds Pakistan in fluent French—Watch the Congress MP's viral speech in Moscow

Congress MP from Thiruvananthapuram, Shashi Tharoor, is famously celebrated as a wordsmith, rhetorician, linguist, and logophile. However, did you know that this seasoned politician is also a polyglot, equally capable of impressing you with his fluent French? Tharoor's command of the language extends far beyond a mere 'Au revoir,' 'Bon appétit,' 'S'il vous plaît,' or 'C'est la vie.' In a striking display of his linguistic and diplomatic prowess, Shashi Tharoor openly criticised Russia in Moscow for its plans to include Pakistan in a counter-terrorism panel. In Moscow, Leonid Slutsky, chairman of the Russian Liberal Democratic Party, announced Russia's plans to host a conference early next year involving the parliamentary leaders of six countries: Turkey, Iran, Russia, India, Pakistan, and China. He emphasised the necessity for concrete action, rather than mere discussion, on the issue of terrorism. Congress MP Shashi Tharoor shared his speech on his Instagram account, captioning it, 'My conversation (in French) with Russian Liberal Democratic Party (LDPR) Chair Leonid Slutsky, on Tuesday in Moscow, addressing the problem of Pakistan providing a safe haven for the terrorist groups.' Upon hearing Russian Slutsky's proposal, Shashi Tharoor said in fluent French, 'Il y a un pays qui, malheureusement, offre un refuge sûr à ces groupes terroristes.' (There is a country that unfortunately provides a safe haven for these terrorist groups) Tharoor further remarked, 'Ils ont leur quartier général, ils forment des terroristes dans leur pays, les financent, les arment, et les envoient dans d'autres nations.' (They [Pakistan] have their headquarters, train terrorists in their country, fund them, arm them, and send them to other nations.) "Il est difficile pour nous d'ignorer le fait qu'ils bénéficient d'un patronage au Pakistan." (It is difficult for us [India] to ignore the fact that they enjoy patronage in Pakistan) Tharoor concluded. Congress leader Shashi Tharoor on Wednesday met Russian Foreign Minister Sergey Lavrov on the sidelines of an event in Moscow. "Good to catch up with old friend Russian Foreign Minister Sergey Lavrov on the sidelines of the #PrimakovReadings in Moscow," Tharoor, who is currently visiting Russia, said in a post on X. Tharoor, who is the head of Parliamentary Standing Committee on External Affairs, also met former Russian Ambassador to the UN Andrey Denisov, who is now the First Deputy Chair of the Committee on International Affairs of the Russian Federation Council. "Enjoyed catching up with old friend Andrey Denisov, former Russian Ambassador to the @UN and to China , and now the First Deputy Chair of the Committee on International Affairs of the Russian Federation Council," Tharoor said in another post. The annual 'Primakov Readings' is a meeting of experts of international relations and world economy from 40 countries including India.

Shashi Tharoor meets Russian Foreign Minister in Moscow during Primakov Readings
Shashi Tharoor meets Russian Foreign Minister in Moscow during Primakov Readings

India Today

time26-06-2025

  • Politics
  • India Today

Shashi Tharoor meets Russian Foreign Minister in Moscow during Primakov Readings

Congress leader Shashi Tharoor on Wednesday met Russian Foreign Minister Sergey Lavrov on the sidelines of an event in Moscow."Good to catch up with old friend Russian Foreign Minister Sergey Lavrov on the sidelines of the #PrimakovReadings in Moscow," Tharoor, who is currently visiting Russia, said in a post on X. Tharoor, who is the head of Parliamentary Standing Committee on External Affairs, also met former Russian Ambassador to the UN Andrey Denisov, who is now the First Deputy Chair of the Committee on International Affairs of the Russian Federation catching up with old friend Andrey Denisov, former Russian Ambassador to the @UN and to China , and now the First Deputy Chair of the Committee on International Affairs of the Russian Federation Council," Tharoor said in another annual 'Primakov Readings' is a meeting of experts of international relations and world economy from 40 countries including recently led a multi-party delegation to the United States and four other countries to convey India's stand following the April 22 Pahalgam terror attack and the subsequent military operation.- EndsMust Watch IN THIS STORY#Shashi Tharoor#Russia

Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks
Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks

Tahawul Tech

time28-03-2025

  • Tahawul Tech

Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks

Kaspersky has identified and helped patch a sophisticated zero-day vulnerability in Google Chrome (CVE-2025-2783) that allowed attackers to bypass the browser's sandbox protection system. The exploit, discovered by Kaspersky's Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical complexity. Kaspersky researchers have been acknowledged by Google for discovering and reporting this vulnerability. In mid-March 2025, Kaspersky detected a wave of infections triggered when users clicked personalised phishing links delivered via email. After clicking, no additional action was needed to compromise their systems. Once Kaspersky's analysis confirmed that the exploit leveraged a previously unknown vulnerability in the latest version of Google Chrome, Kaspersky swiftly alerted Google's security team. A security patch for the vulnerability was released on March 25, 2025. Kaspersky researchers dubbed the campaign 'Operation ForumTroll', as attackers sent personalised phishing emails inviting recipients to the 'Primakov Readings' forum. These lures targeted media outlets, educational institutions, and government organisations in Russia. The malicious links were extremely short-lived to evade detection, and in most cases ultimately redirected to the legitimate website for 'Primakov Readings' once the exploit was taken down. The zero-day vulnerability in Chrome was only part of a chain that included at least two exploits: a still-unobtained remote code execution (RCE) exploit that apparently launched the attack, while the sandbox escape discovered by Kaspersky constituted the second stage. Analysis of the malware's functionality suggests the operation was designed primarily for espionage. All evidence points to an Advanced Persistent Threat (APT) group. 'This vulnerability stands out among the dozens of zero-days we've discovered over the years', said Boris Larin, principal security researcher at Kaspersky GReAT. 'The exploit bypassed Chrome's sandbox protection without performing any obviously malicious operations – it's as if the security boundary simply didn't exist. The technical sophistication displayed here indicates development by highly skilled actors with substantial resources. We strongly advise all users to update their Google Chrome and any Chromium-based browser to the latest version to protect against this vulnerability'. Google has credited Kaspersky for uncovering and reporting the issue, reflecting the company's ongoing commitment to collaboration with the global cybersecurity community and ensuring user safety. Kaspersky continues to investigate Operation ForumTroll. Further details, including a technical analysis of the exploits and malicious payload, will be released in a forthcoming report once Google Chrome user security is assured. Meanwhile, all Kaspersky products detect and protect against this exploit chain and associated malware, ensuring users are shielded from the threat. This discovery follows Kaspersky GReAT's previous identification of another Chrome zero-day (CVE-2024-4947), which was exploited last year by the Lazarus APT group in a cryptocurrency theft campaign. In that case, Kaspersky researchers found a type confusion bug in Google's V8 JavaScript engine that enabled attackers to bypass security features through a fake cryptogame website. To safeguard against sophisticated attacks like these, Kaspersky security experts recommend implementing these key protective measures: Ensure timely software updates: Regularly patch your operating system and browsers—especially Google Chrome—so attackers cannot exploit newly discovered vulnerabilities. Adopt a multi-layered security approach: Along with endpoint protection, consider solutions like Kaspersky Next XDR Expert that leverage AI/ML to correlate data from multiple sources and automate detection and response against advanced threats and APT campaigns. Leverage threat intelligence services: Up-to-date, contextual information—such as Kaspersky Threat Intelligence—helps you stay informed about emerging zero-day exploits and the latest attacker techniques. Image Credit: Kaspersky

Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks
Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks

Zawya

time27-03-2025

  • Zawya

Kaspersky discovers sophisticated Chrome zero-day exploit used in active attacks

Kaspersky has identified and helped patch a sophisticated zero-day vulnerability in Google Chrome (CVE-2025-2783) that allowed attackers to bypass the browser's sandbox protection system. The exploit, discovered by Kaspersky's Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical complexity. Kaspersky researchers have been acknowledged by Google for discovering and reporting this vulnerability. In mid-March 2025, Kaspersky detected a wave of infections triggered when users clicked personalized phishing links delivered via email. After clicking, no additional action was needed to compromise their systems. Once Kaspersky's analysis confirmed that the exploit leveraged a previously unknown vulnerability in the latest version of Google Chrome, Kaspersky swiftly alerted Google's security team. A security patch for the vulnerability was released on March 25, 2025. Kaspersky researchers dubbed the campaign 'Operation ForumTroll', as attackers sent personalized phishing emails inviting recipients to the 'Primakov Readings' forum. These lures targeted media outlets, educational institutions, and government organizations in Russia. The malicious links were extremely short-lived to evade detection, and in most cases ultimately redirected to the legitimate website for 'Primakov Readings' once the exploit was taken down. The zero-day vulnerability in Chrome was only part of a chain that included at least two exploits: a still-unobtained remote code execution (RCE) exploit that apparently launched the attack, while the sandbox escape discovered by Kaspersky constituted the second stage. Analysis of the malware's functionality suggests the operation was designed primarily for espionage. All evidence points to an Advanced Persistent Threat (APT) group. 'This vulnerability stands out among the dozens of zero-days we've discovered over the years,' said Boris Larin, principal security researcher at Kaspersky GReAT. 'The exploit bypassed Chrome's sandbox protection without performing any obviously malicious operations – it's as if the security boundary simply didn't exist. The technical sophistication displayed here indicates development by highly skilled actors with substantial resources. We strongly advise all users to update their Google Chrome and any Chromium-based browser to the latest version to protect against this vulnerability.' Google has credited Kaspersky for uncovering and reporting the issue, reflecting the company's ongoing commitment to collaboration with the global cybersecurity community and ensuring user safety. Kaspersky continues to investigate Operation ForumTroll. Further details, including a technical analysis of the exploits and malicious payload, will be released in a forthcoming report once Google Chrome user security is assured. Meanwhile, all Kaspersky products detect and protect against this exploit chain and associated malware, ensuring users are shielded from the threat. This discovery follows Kaspersky GReAT's previous identification of another Chrome zero-day (CVE-2024-4947), which was exploited last year by the Lazarus APT group in a cryptocurrency theft campaign. In that case, Kaspersky researchers found a type confusion bug in Google's V8 JavaScript engine that enabled attackers to bypass security features through a fake cryptogame website. To safeguard against sophisticated attacks like these, Kaspersky security experts recommend implementing these key protective measures: Ensure timely software updates: Regularly patch your operating system and browsers—especially Google Chrome—so attackers cannot exploit newly discovered vulnerabilities. Adopt a multi-layered security approach: Along with endpoint protection, consider solutions like Kaspersky Next XDR Expert that leverage AI/ML to correlate data from multiple sources and automate detection and response against advanced threats and APT campaigns. Leverage threat intelligence services: Up-to-date, contextual information—such as Kaspersky Threat Intelligence—helps you stay informed about emerging zero-day exploits and the latest attacker techniques. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company's comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store