logo
Zelenskyy appoints Hennadiy Shapovalov as new ground forces chief

Zelenskyy appoints Hennadiy Shapovalov as new ground forces chief

India Today16 hours ago

Ukrainian President Volodymyr Zelenskyy has named Hennadiy Shapovalov as the new commander of Ukraine's land forces, following the resignation of Mykhailo Drapatyi after a deadly Russian attack on a military training site in the southeast.Shapovalov's appointment was confirmed Thursday through a presidential decree. He previously served as a liaison officer at a NATO coordination center in Germany and held the position of commander within Ukraine's Operational Command South.advertisementIn his nightly address, Zelenskiy emphasized the importance of Shapovalov's NATO experience, saying it would be vital in implementing reforms within Ukraine's armed forces. "All this useful experience of this coordination and all the real combat experience of our soldiers must be applied now within Ukraine's land forces," he stated. "Changes are needed and this is an imperative."
Former commander Drapatyi, who stepped down earlier this month in the wake of the Russian strike, has been reassigned to lead Ukraine's joint forces command as part of a broader restructuring within the military.With inputs from ReutersMust Watch

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Dutch launch operation Orange Shield to keep NATO summit safe
Dutch launch operation Orange Shield to keep NATO summit safe

Hindustan Times

time17 minutes ago

  • Hindustan Times

Dutch launch operation Orange Shield to keep NATO summit safe

By Charlotte Van Campenhout and Bart Biesemans Dutch launch operation Orange Shield to keep NATO summit safe AMSTERDAM, - The Netherlands has launched operation Orange Shield to protect next week's NATO summit, deploying combat helicopters, sea patrols, over 10,000 military and police personnel, bomb squads and air defence systems. About 6,000 delegates and leaders from 32 countries, including U.S. President Donald Trump, French President Emmanuel Macron, and British Prime Minister Keir Starmer, will attend the closed-off event at The Hague's World Forum. The Dutch navy will deploy seven frigates as part of the country's largest security operation. "The aim is to observe everything that's happening in the area, at sea, and in the air," commander of the Tromp frigate Dennis Oorburg told Reuters. Dutch counterterrorism chief Pieter-Jaap Aalbersberg told Dutch broadcaster NOS that cybersecurity risks were also being closely monitored. Heads of state and ministers from NATO countries will arrive at Schiphol Airport on Monday and be escorted to The Hague via a secure highway corridor. On Tuesday, Dutch King Willem-Alexander will host a state dinner for NATO leaders. Ukrainian President Volodymyr Zelenskiy, who is set not to attend the summit, has also been invited to the dinner but has not yet confirmed his attendance. The summit officially begins on Wednesday, with NATO boss Mark Rutte aiming to get consensus from leaders on a 5% defence spending target, demanded by Trump. But Spanish Prime Minister Pedro Sanchez has opposed the higher target. Protests are expected around the summit, including a planned highway blockade by Extinction Rebellion environmental activists and demonstrations against the war in Gaza and LGBTI hate speech. Police say protests will be allowed "within the limits of the law". This article was generated from an automated news agency feed without modifications to text.

No US In NATO? That's Ok. Rafale Calling, Says Emmanuel Macron On X
No US In NATO? That's Ok. Rafale Calling, Says Emmanuel Macron On X

NDTV

time27 minutes ago

  • NDTV

No US In NATO? That's Ok. Rafale Calling, Says Emmanuel Macron On X

New Delhi: Emmanuel Macron has a message for the rest of Europe - the Rafale fighter jet is calling. The French President's quirky X post Friday afternoon featured an Apple iPhone with an incoming call from 'Rafale' and a close-up of the jet arcing over barren and rocky land. "European friends, you have a call," Macron wrote. Amusing, yes. But there was a clear message to the rest of Europe - 'we need to strengthen our combined defences and act independently on matters of continental security'. Macron has sought repeatedly to push the European Union to be self-reliant on defence, driven by concerns like Russia's war in Ukraine and Donald Trump's repeated warning to other NATO members - up your defence contributions to match that of the US, or risk losing the American military umbrella. European friends, you have a call. — Emmanuel Macron (@EmmanuelMacron) June 20, 2025 To that end the 'Rafale calling' X post is a shout-out to Europe to increase collaboration in matters of military hardware and reduce dependence on American imports. Rafale = 'Independent Europe'? But why is the Rafale a symbol for this European independence? Because it is almost entirely built and designed within Europe, in France, and its manufacturing and maintenance represents autonomy from Trump's administration. It is a 4.5 generation multirole fighter capable of air superiority and ground attack missions, with a range of munitions, including the Meteor, a beyond visual range air-to-air missile that can target enemy aircraft 150km away, and the SCALP cruise missile that has a range of 300km. Rafales also have the MICA, a versatile air-to-air missile. But, as capable as it is, in recent years many European nations have opted for the US' F-35 stealth fighter, a 5th generation aircraft widely seen as one of the most advanced in the world. In April India signed a deal to buy 26 Navy variants of the Rafale fighter jet (File). Poland and Finland, for example, chose the F-35. The former bought 32 F-35 Lightning II variants for US$4.6 billion, while Finland is in the process of buying 64 for US$9.4 billion. Apart from these two, the United Kingdom, Germany, Italy, Switzerland, Romania, Greece, Austria, Czechia, and other European countries also have F-35s parked in their airbases. All of this is despite the F-35's infamous fragility; a British F-35, for example, has been parked in at Thiruvananthapuram airport for nearly a week because of a "technical snag". Both the Rafale and the F-35 have seen combat; the former was used by the Indian Air Force during Operation Sindoor, Delhi's military response to the April terror attack in Pahalgam. To that end, Macron's 'Rafale calling' X post is seen as an 'ad' for EU military independence. 'Massive Common Funding' In March, ahead of a special summit, Macron called for "massive, common funding... probably hundreds of billions of euros... to define our capacity needs for a common defence". He said the need to make that shift had become all the more urgent because the US, under Trump's 'America First' foreign policy, was slowly but surely pivoting away from Europe. "It's quarter to the midnight. As there are doubts over the support of the Americans towards Europe over time, we need to mobilise hundreds of billions of euros... it is Europe's strategic wake-up moment," French daily Le Parisien quoted him as saying. "We must offer European alternatives to countries accustomed to US equipment... scaling up production of these will lower costs and create a self-sustaining defence network across Europe." He isn't alone in this; Friedrich Merz, then the incoming German Chancellor, said it was his "absolute priority" to strengthen his nation and Europe to "achieve independence from the US".

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets
China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

Time of India

time30 minutes ago

  • Time of India

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

China hackers target Russia despite alliance, seeking war secrets and battlefield data- China hackers targeting Russia have raised serious concerns as multiple cyberattacks linked to Chinese state-sponsored groups have reportedly breached Russian military and defense systems since the Ukraine war began. Despite public declarations of friendship between Moscow and Beijing, cyber analysts say the Chinese government has been actively spying on Russian technologies, including nuclear submarines, drone systems, and battlefield tactics. The breach highlights a growing undercurrent of distrust and strategic intelligence gathering even among so-called allies. Cyber groups tied to Beijing—like APT27 and APT31—are believed to be behind these stealthy operations, using phishing emails and malware to infiltrate sensitive Russian networks. Why are China hackers targeting Russia amid growing friendship? Despite a publicly strong relationship between China and Russia, cybersecurity experts say China hackers have been quietly breaching Russian systems since May 2022 — just months after Russia launched its full-scale invasion of Ukraine. These hacking attempts have continued steadily, with Chinese-linked groups digging into Russia's defense and military data. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Air conditioners without external unit. (click to see prices) Air Condition | Search Ads Search Now Undo According to cybersecurity researchers from TeamT5, one group named Sanyo impersonated a Russian engineering firm's email to seek data on nuclear submarines. The intention behind these cyber intrusions appears to be collecting information about Russia's battlefield operations, modern warfare tactics, and Western weapon technologies seen in Ukraine. Che Chang, a TeamT5 researcher, stated, 'China likely seeks to gather intelligence on Russia's military operations, defense progress, and geopolitical strategies.' This information could help China boost its own military readiness for future conflicts — particularly in regions like Taiwan, which remains a hotbed of geopolitical tension. Live Events What exactly did China's hackers target in Russia? According to cybersecurity researchers at SentinelLabs and Recorded Future, Chinese Advanced Persistent Threat (APT) groups , including APT27 (Emissary Panda) and APT31 (Zirconium) , have been aggressively targeting: Russian military contractors Government departments involved in defense R&D Email servers and document archives linked to Ukraine war planning The hackers reportedly used spear-phishing campaigns , spoofing Russian Ministry of Health notices to plant malware into classified internal systems. One malware strain, called PlugX , known for remote access and data exfiltration, was flagged in these Russian environments—previously used by China in espionage campaigns across Southeast Asia and the Middle East. What kind of information are Chinese hackers after in Russia? The China hackers targeting Russia campaign has been aimed at extracting sensitive military intelligence, especially battlefield-tested insights. Russian defense firms, including Rostec , were among the major targets. Cyber experts from Palo Alto Networks revealed that Chinese hacking groups have sought data on radar systems, satellite communications, drone warfare, and electronic warfare technology. Another method used by these hackers involved Microsoft Word-based malware files, which exploited software vulnerabilities to breach aviation and defense sectors. One particularly dangerous tool spotted in these attacks was Deed RAT , malware considered 'proprietary' among Chinese state-sponsored groups. According to Russian cybersecurity firm Positive Technologies, this malware has been used to attack Russian aerospace, security, and military sectors. Though Russian authorities have not officially acknowledged these attacks, a leaked classified document from Russia's FSB — the domestic security agency — described China as an 'enemy,' confirming internal concerns about Chinese espionage. While China and Russia continue to cooperate publicly, including military drills and joint diplomatic efforts, cyber experts say Beijing has long pursued a "friend-but-watcher" strategy . This means China often spies on both allies and adversaries to: Gauge battlefield conditions in Ukraine Evaluate Russia's military capabilities and vulnerabilities Shape its own geopolitical strategies, including Taiwan preparations According to Recorded Future, China increased cyber-espionage targeting Russia by 87% since early 2023 , focusing particularly on regions near Ukraine and Crimea . Who are the major Chinese hacking groups involved? Several well-known Chinese hacking groups have been identified by cybersecurity teams as being behind these operations. Mustang Panda , one of China's most active state-backed cyber espionage groups, expanded its activities after the war in Ukraine began. TeamT5 and Sophos researchers found that Mustang Panda targeted Russian government agencies and military officials — particularly near the China-Russia Siberian border. According to Rafe Pilling from Sophos, the group's operations often follow China's political or economic interests. 'Wherever China invests — whether West Africa, Southeast Asia, or Russia — Mustang Panda follows with targeted hacking,' said Pilling. He and U.S. intelligence sources believe Mustang Panda operates under the Chinese Ministry of State Security. The group even drew attention from American law enforcement. In January, the U.S. Justice Department indicted individuals tied to Mustang Panda for infecting thousands of systems worldwide, including government networks and devices used by Chinese dissidents. Another Chinese hacking group, Slime19 , has been consistently attacking Russia's energy, government, and defense infrastructure, according to TeamT5's Chang. Has China broken its cybersecurity pact with Russia? In 2009 and 2015, China and Russia publicly agreed not to hack each other's systems. However, analysts have long viewed those agreements as symbolic, lacking enforcement or trust. The evidence emerging since Russia's invasion of Ukraine proves that those deals hold little practical weight. The FSB document accessed by The New York Times shows that Russian intelligence views China's digital espionage as a serious threat. China, while outwardly cooperative with Russia in forums and bilateral trade, appears unwilling to rely on Moscow for open sharing of battlefield learnings. Instead, cyber intrusions have become the preferred route for collecting war data. 'The war in Ukraine shifted the priorities of both countries,' said Itay Cohen from Palo Alto Networks. 'Even though the public narrative was one of close ties, in reality, espionage increased.' How is Russia reacting to these cyber intrusions? Thus far, the Kremlin has not officially condemned China, possibly to avoid diplomatic fallout. However, anonymous Russian cybersecurity sources have told investigative outlet iStories that internal firewalls have been tightened and communications protocols are under review. The Federal Security Service (FSB) reportedly issued an internal memo warning of 'unusual East Asian-origin threats' in mid-2024. Still, no public attribution has been made. This silence may signal Russia's reluctance to publicly challenge China at a time when it faces intense pressure from NATO and the West. What does this mean for future China-Russia relations? While China remains one of Russia's most crucial trade partners — especially with the West largely isolating Moscow — the depth of China hackers targeting Russia reveals a fragile foundation beneath this alliance. The relationship, often described by Presidents Xi and Putin as a 'no-limits' partnership, is evidently full of limits when it comes to trust. China's hunger for military intelligence, especially regarding real-time warfare experience, is pushing it to take bold steps. For China, Russia's war offers a rare, real-world military case study that it can't afford to ignore — especially with tensions rising in the Taiwan Strait. Cyber intrusions are likely to continue, if not grow. As Russian officials stay silent and Chinese hackers grow more sophisticated, the digital battlefield between these two "allies" is already active — and evolving quickly. FAQs: Q1: Why are China hackers targeting Russia during the Ukraine war? To secretly collect Russian military intelligence and battlefield data. Q2: Who is Mustang Panda in the China hacking campaign? Mustang Panda is a top Chinese state-backed hacking group targeting Russia.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store