Connect with us

Press Release

KING365:redefines decentralized finance

Published

on

No matter how important the traditional financial service facility is, it is still plagued by many problems. The main source of the problem lies in its centralized operation mode, which makes the individual’s economic freedom deprived to some extent.

DeFi is decentralized finance. It has the ability to solve many problems of the traditional financial system through peer-to-peer finance. It is a landing scenario that perfectly fits the characteristics of the blockchain (decentralization, openness, anonymity, trustworthiness, and value transfer).

DeFi is the first real application in the decentralized world after Bitcoin. We firmly believe that DeFi will step out of the Crypto circle one day and become the trend of open finance!

As of the end of July 2020, there are about 5 million users of digital assets in the world, of which about 50,000 DeFi users, accounting for only 1%. As of August 9, 2020, the value of digital assets composed of DeFi is approximately 29.3 billion yuan, which is equivalent to approximately 1.13% of the entire encrypted asset market.

The KING365 team members have been deeply involved in the blockchain for a long time, and they have a keen insight into the industry and a practical spirit. We have always firmly believed that everyone should have equal access to high-quality financial products and services.

KING365 is a DeFi distributed intelligent financial circulation system based on the TRON public chain. The core team comes from top fund companies such as Blackstone Group, KKR Group, Bridgewater Associates, Millennium Partners, etc. , And international institutions such as Prudential Group, JPMorgan Chase, Morgan Stanley, and Wells Fargo Bank. From nearly a hundred typical cases such as listings and mergers and acquisitions, to the baptism of global financial crisis, they have been on the battlefield and are famous far.

KING365 adopts the business model of storage, circulation, and mining. All logic is pre-programmed into smart contracts and stored on the chain. There is no central account, no trader, 100% transparent and open source; the system cannot be tampered with, hackers cannot attack, and the network will never be shut down, everyone Fair and free from any third-party control.

In the KING365 ecosystem, all users only need to bind their USDT wallet address to participate in the first 100% decentralized DeFi financial circulation in history, and obtain circulation rewards. Low threshold, zero risk, high returns, and transparent rewards. expected.

At present, more than 500,000 players in 23 countries around the world have participated in the KING365 smart contract, and more countries will participate in the future. The daily increase of 10,000+ users will quickly advance the global consensus of KING365 and improve the KING365 smart contract in the block The global position of the chain industry.

KING365 is not only DeFi, but also focuses on Define The DeFi Future. KING365 has launched a large-scale ecological strategy to link the real world and the digital world. In the future, KING365 will be upgraded to a DeFi financial public chain to support the development of various DeFi derivative applications on the chain, such as the KING365 Pay synthetic asset platform, the KING365 Game NFT protocol, and the integration of financial services such as lending, insurance, stable coins, banks, and hedge funds. KING365 Finance.

The new financial species KING365 smart contract is opening a new paradigm of decentralized finance, promoting global economic circulation and short-term capital flow, saving the global economy that has been hit hard by the epidemic, and creating a new lightweight, open and free financial that everyone can participate in world.

With the gradual expansion of the global consensus, we firmly believe that KING365 will quickly get out of the crypto circle and spread to hundreds of industries, redefining the infinite possibilities of decentralized finance.

KING365 is determined to become a leader in the implementation of blockchain + smart contract applications, and build a strong ecosystem around smart contracts + financial industry digital capital to detonate a new wave of assets.

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

CGTN: Mother’s Day: How Xi Jinping lives up to his mother’s heart

Published

on

CGTN published an article detailing how Chinese President Xi Jinping was deeply influenced by his mother’s words and actions, showcasing his respect and care for her. This heartfelt story reflects the enduring Chinese traditional values of filial piety and respect for the elderly, embodying the admirable moral character of the Chinese people.

They say a mother is a kid’s first teacher.

Chinese President Xi Jinping once said that he would never forget the story of Yue Fei, as told by his mother, Qi Xin, when he was a child.

Yue Fei was a patriotic military commander from the 12th century whose mother tattooed “serve the country with the utmost devotion,” a phrase that embodies “zhong” or loyalty, in Confucian philosophy, on his back.

“I bear the sentence in mind till this day, and it’s also a goal I’ve pursued my whole life,” Xi said.

Xi and his mother

In 1939, Qi joined the Communist Party of China (CPC) and became a staunch supporter of the CPC’s values and beliefs. She kept the overall situation in mind and insisted on working at the grassroots level, working hard in various positions.

Qi took her husband’s words, “Work well, study well, and handle everything well,” as her motto and used her words and deeds to influence her children.

Over the years, Xi has emphasized the importance of family, family education and virtues on many occasions.

During a meeting with representatives to the first National Conference of Model Families in 2016, Xi said parents should instruct their children through words and deeds, give them both knowledge and virtues as well as practice what they teach. “They should help their children button the first button in their lifetime and take the first step on the ladder of life.”

In his adolescence, Xi was given a simple sewing kit by his mother, a gift that would give him the courage to weather a difficult time and make “the first step of life.”

Qi used red threads to stitch the words “niang de xin (mother’s heart)” on the coarse cloth of the kit bag.

‘The greatest filial piety’

As a filial son, Xi has always tried to spend time with his mother when possible. However, with more work duties calling, Xi could not always be with his mother.

“Doing your job well is the greatest filial piety to your father and mother,” Qi told her son.

Xi took that to heart, serving the public with the goal of achieving a good life for Chinese families.

As Xi said at the closing meeting of the first session of the 14th National People’s Congress, the people’s trust is the biggest motivation that drives him to march on and is a great responsibility he shoulders.

https://news.cgtn.com/news/2025-05-11/Mother-s-Day-How-Xi-Jinping-lives-up-to-his-mother-s-heart-1DhVWWiBOA8/p.html

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

GISEC Global 2025 Launches OT Security Conference as Cyberattacks on Critical Infrastructure Surge 49%

Published

on

New dedicated track at Middle East and Africa’s largest cybersecurity event tackles AI-driven industrial threats, Zero Trust adoption and the $44.9B OT security boom

Dubai, UAE, 11th May 2025, ZEX PR WIRE, As operational technology (OT) cyberattacks skyrocketed 49% in 2024 – targeting power grids, oil & gas facilities, factories and transport systems – GISEC Global 2025 is responding with the launch of its pivotal new OT Security track at the Middle East and Africa’s largest cybersecurity event, currently taking place until 8th May at the Dubai World Trade Centre.

The OT-focused conference on the second day of GISEC Global tackled evolving risks, system vulnerabilities and strategies for securing critical infrastructure. Other important considerations included AI in ICS/OT Security, Quantum Computing Threat, Protecting ICS and SCADA Systems & Digital Supply Chains in the presence of top CISOs, CIOs, OT security heads and policy-makers to fortify SCADA, ICS and digital supply chains.

The new addition arrives amid a perfect storm in the industry:

  • The global OT security market is projected to double to $44.9 billion by 2029 (Markets and Markets). 
  • According to research by IBM, the average cost of cyberattacks on organisations in the Middle East is $8.75 million, nearly double the global average.

Why OT Security? Why Now?

OT security encompasses advanced cybersecurity protocols designed to ensure the integrity, availability and safety of industrial control systems. As critical infrastructure faces escalating cyber threats, robust OT security is essential for maintaining continuity across the oil & gas, manufacturing, energy, transport and utility sectors. 

In late 2024, ransomware groups accelerated attacks on industrial sectors, with manufacturing, transportation and ICS operations prime targets. Only aggressive defence, intelligence sharing and cross-sector collaboration will safeguard critical infrastructure into 2025 and beyond.

On Wednesday, the audience heard from experts on the need for modern OT protection which delved into precision AI, leveraging machine learning, deep learning and large language models.

Discussing cybersecurity threats in the maritime industry, where ships can hold up to 10,000 passengers, are driven autonomously and each country has their own set of AI regulations, Simone Fortin, Global CISO Cruise Division at MSC Cruise Division, called for streamlined regulations that can be applied to all countries around the world.

He said: “For an industry like maritime, which is regulated by the UN, it is hard to interpret how to prevent AI threats for something critical like managing a ship. The UN gives the policy a broader scale, but then everything is regulated by bilateral agreements between the states and the regulators, and implemented by companies; but then, everything is defined by the fact that you could be in international waters. And ships can be owned by one entity, managed by another while sailing under a separate flag.”

Bridging the gap between AI-powered cyber defence and critical infrastructure resilience, the OT Security Track also put the spotlight the escalating IoT/IIoT threats in the oil & gas sector, featuring frontline insights from global CISOs defending the world’s most targeted industries.

Amal Krishna, Executive Director & CISO, ONGC, said: “To combat the surge in OT cyberattacks, businesses must prioritise asset visibility, network segmentation and secure remote access – but equally critical is breaking down silos between IT, OT and engineering teams. Cyber resilience in critical infrastructure isn’t just about technology, it’s about collaboration, continuous monitoring and a security-first culture.” 

Albert Vartic, Upstream OT Cybersecurity Officer, OMV Petrom, added: “Over the next five years, OT cybersecurity in the Middle East’s critical infrastructure will see significant evolution. The region’s rapid digitalisation has expanded the attack surface, making industrial systems more vulnerable – proactive measures like IEC 62443 adoption and cross-team collaboration will be essential to safeguard operational resilience.” 

Protect and plan against digital attacks

Exhibitors Ayman Al Issa (CPX) and Mohammed Mousa (CyberKnight) dissected the 49% surge in OT attacks, offering actionable defences for the energy, healthcare and manufacturing sectors.

Mousa, OT/xIoT Consultant at CyberKnight, warns that legacy OT systems weren’t built for today’s threats. 

He explained: “The escalation in intrusions is a consequence of accelerated digital transformation in industrial sectors. As organisations integrate IT and OT environments to improve efficiency and support the business, they inadvertently expand the threat surface. Furthermore, legacy systems remain in operation far beyond their intended lifespan and often lack native security controls. 

“Meanwhile, increased reliance on remote access, third-party integrations, and limited OT-specific cybersecurity governance heightens exposure. Simply put, organisations are moving faster than their security strategies are evolving.”

For businesses and governments to stay ahead of cyber criminals, Al Issa, Director – OT Cybersecurity at CPX, emphasised the importance of undertaking risk and threat assessments to understand what assets are at risk and how potential attackers might target them, sooner rather than later.

He said: “In today’s fast-shifting business landscape, organisations need to focus on identifying their most critical assets – those that are at the highest risk and that they care about the most, rather than trying to protect everything or plan for recovery across the entire business. As such, organisations should conduct in-depth threat and risk assessments specifically considering the unique characteristics of industrial control systems (ICS), including their physical consequences. 

“This involves mapping out interdependence, potential attack vectors and consequences of downtime. Using threat intelligence and aligning with frameworks like CIS ICS Controls can help organisations monitor suspicious activity, manage vulnerabilities and create tailored incident response plans. 

“Once this is clear, more targeted and practical defence measures can be put in place and continuously tested, using threat intelligence to stay ahead of evolving threats. Risk assessments should be continuous, evolving with technological changes and emerging threats and should be validated through regular penetration testing.”

Amr Elsayed, Regional OT/ICS Cybersecurity Specialist at CyberKnight, agrees, saying technology, collaboration and workforce training should be key priorities for businesses.

He said: “To enhance OT security resilience against rising cyber threats, businesses should adopt a Zero Trust approach, enforcing least-privilege access and micro-segmentation to limit breach impact. Advanced real-time monitoring and threat intelligence sharing (ISACs, public-private partnerships) are critical for proactive defences. 

“Additionally, maintaining accurate OT asset inventories, conducting OT-specific incident response drills and implementing risk-based vulnerability management (compensating controls, tailored patching) will strengthen security postures. Finally, OT-focused employee training ensures a security-aware workforce.

“By prioritising these measures – spanning technology, collaboration and workforce readiness – organisations can safeguard critical infrastructure, mitigate disruptions and build long-term cyber resilience in OT environments.”

Drafting the legislation playbook

With Middle East nations rapidly adopting digitisation into their day-to-day practices, the region is becoming a target for cyberattacks. However, the experts expect a number of measures to be put in place to protect cybersecurity infrastructure, and GISEC 2025 could be where policymakers and tech giants will draft the playbook.

Al Issa added: “Over the next five years, we can expect a major shift toward structured, regulation-driven cybersecurity approaches. AI-driven OT threat detection, the widespread adoption of Zero Trust principles and deeper integration of compliance frameworks will define the regional OT cybersecurity landscape. Stricter regulatory frameworks and compliance mandates region-wide will push for better security practices. 

Organised by Dubai World Trade Centre, GISEC Global 2025 is hosted by the UAE Cybersecurity Council under the theme of ‘Securing an AI-Powered Future’, and supported by Dubai Electronic Security Center (DESC), UAE Ministry of Interior and Dubai Police.

To learn more about GISEC Global 2025, visit www.gisec.ae

About GISEC Global

GISEC Global, Middle East & Africa’s largest and most impactful cybersecurity event, will return to Dubai World Trade Centre for its 14th edition taking place from 6th to 8th May 2025, under the overarching theme of “Securing an AI-Powered Future.” Following the monumental success of 2024, the super-connector event for the region’s cybersecurity industry will bring together over 25,000 attendees, 750 exhibiting brands and 350-plus speakers hailing from over 160 countries. GISEC Global stands as the unrivalled platform for navigating the ever-evolving landscape of cybersecurity. More information: www.gisec.ae

About Dubai World Trade Centre

A global business facilitator since 1979, Dubai World Trade Centre (DWTC) is home to the region’s leading purpose-built convention and exhibition centre. DWTC provides a platform for connecting people, products, innovation and ideas from around the world through a dynamic calendar of international trade exhibitions and its own roster of sector leading mega events. As a designated free zone, complemented by award-winning commercial real estate, DWTC plays an integral role in Dubai and the region’s growth story. Since its inauguration, DWTC has hosted over 6,000 events, with an estimated economic output of AED 248 billion, attracting over 38 million business visitors to Dubai.

Building on this legacy, DWTC’s second flagship venue, the Dubai Exhibition Centre (DEC), stands as a premier destination for prominent national and international mega events. Strategically aligned with the Dubai 2040 Urban Master Plan, DEC’s recently announced AED 10 billion expansion is integral to Expo City Dubai’s vision of becoming a global business hub for exhibitions and events. 

Press information and photographic material: click here 

Media Contact:

Jane Oneill – PR Manager

Jane.oneill@dwtc.com 

 

Ahmad Khalloudi – PR Manager

Ahmadkhalloudi@sevenmedia.ae

 

Follow GISEC Global on social media: Facebook | X | Instagram | LinkedIn | Youtube 

Hashtag: #GISECGlobal

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

The First-Ever School of Cyber Defense (CTF) Competition Successfully Concluded at GISEC GLOBAL 2025

Published

on

Dubai, UAE, 11th May 2025, ZEX PR WIRE, The highly anticipated School of Cyber Defense (CTF) competition, held as part of GISEC GLOBAL 2025, concluded with exceptional participation and fierce competition. On May 8, the Dubai World Trade Centre hosted the largest cybersecurity event in the Middle East, attracting participants across the UAE.

The Dubai Electronic Security Center (DESC), organized by TechFirm, launched this groundbreaking competition for the first time ever, drawing significant attention from the top universities in the UAE. Over 300 applications were submitted, with 130 participants selected to compete in the qualification rounds on May 6–8.

After the intense challenges, the top 50 scorers advanced to the final stage on May 8, where they formed 10 Incident Response Teams. These teams tackled high-pressure cybersecurity scenarios in real time, demonstrating not only their technical mastery but also their ability to collaborate, analyze rapidly, and adapt under pressure. The competition simulated real-world challenges such as network defense, threat management, system security, and incident response, with participants’ actions evaluated through an advanced scoring platform.

The Winners of the School of Cyber Defense (CTF) Competition:

  • 1st Place: ScriptKiddies (Al Ain University)
  • 2nd Place: Rage Quitters (University of Dubai)
  • 3rd Place: Hungry Sharks (Abu Dhabi University)

The event, with a prize pool valued at over AED 130,000, has further solidified the importance of nurturing the next generation of cybersecurity experts. The competition’s success was driven by the support of leading industry partners, including Spire Solutions, Huawei, HPE Networking, HONOR, Circularo, Great List and RAS Infotech, all of whom are committed to empowering young talents and advancing cybersecurity expertise. All competition infrastructure was powered by servers based on AMD EPYC™ processors, providing participants with industry-leading performance and advanced security features.

This competition is a key milestone in building a resilient digital future and highlights the increasing role of cybersecurity in shaping tomorrow’s technology landscape.

For more information, please contact:
+971522707567
gctf2025@techfirm.ae
https://techfirm.ae/ctf/

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

LATEST POST