Intel Chain
Elites in both China and the U.S. are too easily tempted to buy into their own myths. Source: Foreign Policy
Evidence Chain (2 linked intel)
The Iran-linked hacking group MuddyWater (a.k.a. Seedworm, Static Kitten) launched a broad cyber-espionage campaign targeting at least nine high-profile organizations across multiple sectors and countries. [...] Source: BleepingComputer
Macron joined marathon legend Eliud Kipchoge for an early morning run in Nairobi on day three of his Africa tour, later thanking the two-time Olympic champion for his "patience." Source: News | Euronews RSS
A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by an unauthenticated remote attacker to execute arbitrary code. [...] Source: BleepingComputer
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers -- including Apple, Google, Microsoft, Mozilla and Oracle -- fixing near record volumes of security bugs, and/or quickening the tempo of their patch releases. Source: Krebs on Security
The Administration is closely monitoring the situation with U.S. travelers. Source: CDC Online Newsroom
Have related intel?
Corroborate, contradict, or expand this intelligence chain.