Connect with us

News

Troops intercepted medical supplies, foiled terrorist attacks, rescued hostages: Nigerian Army

info

Published

on

381D94BA 6588 4DA2 BA92 D3F97C66D8E6.jpeg

The Nigerian Army says troops recorded major operational gains, including intercepting suspected logistics supplies, foiling terrorist attacks and rescuing kidnapped victims across theatres in the last 24 hours.

An operational report on Monday revealed that Operation Hadin Kai troops intercepted a truck conveying large quantities of medical supplies suspected to be intended for terrorist elements in the North-East.

The report said the interception occurred at a checkpoint in Nguru, Yobe, where the driver initially presented a waybill for beverages and household items. According to the report, a detailed search revealed hundreds of cartons of drugs, including antibiotics, injections, bandages and other medical items.

The report said the driver and three occupants were apprehended, adding that the suspect later confessed the consignment was bound for the Republic of Chad through Geidam.

“In a related development, troops arrested a suspected ISWAP/JAS terrorist in Ngamdu, Borno, who confessed he was sent from Jilli to procure food items for insurgents. The suspect disclosed that terrorists were currently converging around Gubio and Magumeri areas.

“Troops also arrested two suspected terrorist collaborators in Monguno, who were allegedly facilitating the movement of a terrorist’s family members. Items recovered from them included mobile phones, cash and other personal effects, while a woman and her three children linked to a terrorist kingpin were later apprehended,” the report said.

It also revealed that troops foiled an attempted infiltration by terrorists in Askira Uba local council.

The report added that troops engaged the insurgents during an ambush, forcing them to flee and abandon weapons and other items, adding that follow-up operations led to the rescue of three kidnapped victims from a terrorist enclave.

“In Bama local government area, troops destroyed a terrorist camp during clearance operations, forcing insurgents to withdraw under pressure.

“Similarly, troops of Operation Safe Haven recovered weapons from suspects during stop-and-search operations in Plateau. They also arrested a suspected gunrunner and rescued additional kidnapped victims in Bauchi following exploitation of earlier airstrikes.

“In the Federal Capital Territory, troops conducting anti-illegal mining operations raided a site in Gwagwalada, recovering mining equipment, while suspects fled,” it added.

In the southern part of the country, the report said troops of Operation Delta Safe responded to a communal clash in Delta, restoring normalcy after one person was killed.

It said troops also intensified anti-illegal bunkering operations in Rivers, destroying illegal refining sites and recovering large volumes of stolen crude oil and refined products.

Military authorities reiterated their commitment to sustaining offensive operations, disrupting logistics networks and ensuring security across the country.

(NAN)

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

News

Hackers are abusing unpatched Windows security flaws to hack into organizations

info

Published

on

By

Photo mosh getty windows logo.jpg

Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm.

On Friday, cybersecurity company Huntress said in a series of posts on X that its researchers have seen hackers taking advantage of three Windows security flaws, dubbed BlueHammer, UnDefend, and RedSun. 

It’s unclear who the target of this attack is, and who the hackers are.

BlueHammer is the only bug among the three vulnerabilities being exploited that Microsoft has patched so far. A fix for BlueHammer was rolled out earlier this week. 

It appears that the hackers are exploiting the bugs by using exploit code that the security researcher published online. 

Earlier this month, a researcher who goes by Chaotic Eclipse published on their blog what they said was code to exploit an unpatched vulnerability in Windows. The researcher alluded to some conflict with Microsoft as the motivation behind publishing the code. 

“I was not bluffing Microsoft and I’m doing it again,” they wrote. “Huge thanks to MSRC leadership for making this possible,” they added, referring to Microsoft’s Security Response Center, the company’s team that investigates cyberattacks and handles reports of vulnerabilities.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Days later, Chaotic Eclipse published UnDefend, and then earlier this week published RedSun. The researcher published code to exploit all three vulnerabilities on their GitHub page

All three vulnerabilities affect the Microsoft-made antivirus Windows Defender, allowing a hacker to gain high-level or administrator access to an affected Windows computer.

TechCunch could not reach Chaotic Eclipse for comment.

In response to a series of specific questions, Microsoft’s communications director Ben Hope said in a statement that the company supports “coordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.”

This is a case of what the cybersecurity industry calls “full disclosure.” When researchers find a flaw, they can report it to the affected software maker to help them fix it. At that point, usually the company acknowledges receipt, and if the vulnerability is legitimate, the company works to patch it. Often, the company and researchers agree on a timeline that establishes when the researcher can publicly explain their findings. 

Sometimes, for a variety of reasons, that communication breaks down and researchers publicly disclose details of the bug. In some cases, in part to prove the existence or severity of a flaw, researchers go a step further and publish “proof-of concept” code capable of abusing that bug.

When that happens, cybercriminals, government hackers, and others can then take the code and use it for their attacks, which prompts cybersecurity defenders to rush to deal with the fallout. 

“With these being so easily available now, and already weaponized for easy use, for better or for worse I think that ultimately puts us in another tug-of-war match between defenders and cybercriminals,” John Hammond, one of the researchers at Huntress who has been tracking the case, told TechCrunch. 

“Scenarios like these cause us to race with our adversaries; defenders frantically try to protect against ill-intended actors who rapidly take advantage of these exploits… especially now as it is just ready-made attacker tooling,” said Hammond.

Continue Reading

Business

Lagos Police Arrest 23 Suspected Cultists, Recover Firearms in Statewide Raids

info

Published

on

By

D6077332 4a2c 41a4 94cd e5230132d054.jpeg

The Lagos State Police Command has recorded significant breakthroughs through coordinated and simultaneous operations targeting cultism and illegal arms proliferation across Ikorodu, Lagos Island, Okoko, Ilasan, Ogba, and Iju areas of the State.

The operations resulted in the arrest of twenty-three suspected cultists, recovery of five (5) firearms and other incriminating exhibits.

During the operation in Ikorodu, four suspects were arrested following credible intelligence linking them to cult-related activities. Preliminary findings indicate links to the Buccaneers Confraternity (Sea Lords).

In Lagos Island, nine  suspected cultists were arrested during a raid on a criminal hideout. In Ilasan, five suspects in connection with a cult-related killing of one Emmanuel Obioson were arrested. In Okoko, one suspect with ties to the Eiye Confraternity was intercepted in possession of a firearm.

Similarly, in Ogba and Iju areas, the operations led to the arrest of four (4) suspects involved in illegal cult gatherings, assault, and other related violent crimes. Weapons used in the attacks were recovered, and victims are currently receiving medical attention.

The suspects are: Shina Wale ‘m’ 36yrs, Kehinde Kareem ‘m’ 18yrs, Mohammed Aileru ‘m’ 18yrs, Bada Mujeeb ‘m’ 18yrs, Salam Kosoko ‘m’ 30yrs, Yusuf Anjorin ‘m’ 19yrs, Quadri Abubakar ‘m’ 21yrs, Lateef Salako ‘m’ 18yrs, Fawaz Bello ‘m’ 30yrs, Oyesola Olalekan ‘m’ age 36yrs, Ubaka Justice ‘m’ age 36yrs, Emmanuel Obekpa ‘m’ age 36yrs, Sodiq Ademola ‘m’ age 36yrs, Balogun Taofeek ‘m’ 33yrs, Azeez Owolabi ‘m’ age 28yrs, Meshack Obini ‘m’ age 24yrs, Fabulous John ‘m’ age 25yrs, Promise Israel ‘m’ age 28yrs, Bright Aniedi ‘m’ age 27yrs, Familola Fikayo David ‘m’ age 24yrs, Akeem Olamilekan ‘m’ aka Magali age 43yrs, Muiz Oyedele ‘m’ age 20yrs, Hamzat Sadiq ‘n’ age 19yrs

The exhibits include: Five (5) locally made pistols, one (1) toy pistol, fifteen (15) live cartridges, three (3) expended cartridges, one (1) Police camouflage face cap, one (1) Army camouflage face cap, one (1) jack knife with the pouch.

The Commissioner of Police, Lagos State Command, reiterates the Command’s unwavering commitment to eradicating cultism and violent crimes.
He urges members of the public to remain vigilant and continue to support the Police with timely and credible information through the Command emergency lines: 07061019374, 08065154338, 08063299264, 08039344870, and 09168630929.

The post Lagos Police Arrest 23 Suspected Cultists, Recover Firearms in Statewide Raids appeared first on Business Today NG.

Continue Reading

Trending