Holy Innocents Catholic School vandalized, statues smashed in attack

0

NEWYou can now listen to Fox News articles!

The leader of a California Catholic school which was desecrated after a break-in is urging the community to “make many acts of reparation for this offense against God and Our Lady.”  

Images of the destruction at Holy Innocents Catholic School in Long Beach, which was discovered Monday morning, show smashed statues, images of Mary and other religious figures destroyed and a photograph of the pope knocked to the floor. 

In a letter obtained by Fox News Digital Tuesday and sent to school parents, Fr. G. Peter Irving, pastor and head of the school, and Cyril Cruz, the school’s principal, wrote, “We ask everyone to make many acts of reparation for this offense against God and Our Lady.”

MISSISSIPPI SYNAGOGUE BURNED IN ARSON ATTACK, SUSPECT IN CUSTODY

A Catholic school was vandalized in California.

A Catholic school was vandalized in California. (KTTV)

Cruz told EWTN News that “Our statue of the Virgin Mary was smashed, and the tabernacle was removed and thrown to the floor in an apparent attempt to force it open. The atrium lovingly prepared by the Carmelite Sisters for our scholars was completely destroyed.”

In their letter, Irving and Cruz announced that security would be heightened following the attack. 

“Out of an abundance of caution, we have requested increased security patrols, especially after school hours and weekends,” they wrote. “The hall was the only building affected. Classes will continue as scheduled. We hope to resume Mass in the hall as soon as we are able.”

DRIVER RAMS CAR REPEATEDLY INTO DOORS OF NYC JEWISH SITE, SUSPECT DETAINED

Woman holding rosary beads

Fr. G. Peter Irving, pastor and head of the school, and Cyril Cruz, the school’s principal, wrote, “We ask everyone to make many acts of reparation for this offence against God and Our Lady.” (Dan Kitwood/Getty Images)

The school leaders also asked parents to pray for the perpetrator.

“Please join us in prayer for those who committed this act so that they may turn away from darkness and embrace the loving grace of our Lord,” they wrote. “We particularly ask for the intercession of our Blessed Mother for our school, our families, and our community.”

MISSISSIPPI SYNAGOGUE ARSON SUSPECT’S DAD TURNS HIM IN AFTER LAUGHING CONFESSION, FBI SAYS

U.S. Justice Department logo is seen at Justice Department headquarters in Washington

The Justice Department is launching an investigation. (Kevin Lamarque/Reuters/File Photo)

On Monday, the Justice Department’s Civil Rights Division announced it was launching an investigation into the incident. 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Fox News’ Landon Mion contributed to this report. 



Source link

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

0

A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++.

The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7.

The development comes shortly after Notepad++ maintainer Don Ho said that a compromise at the hosting provider level allowed threat actors to hijack update traffic starting June 2025 and selectively redirect such requests from certain users to malicious servers to serve a tampered update by exploiting insufficient update verification controls that existed in older versions of the utility.

The weakness was plugged in December 2025 with the release of version 8.8.9. It has since emerged that the hosting provider for the software was breached to perform targeted traffic redirections until December 2, 2025, when the attacker’s access was terminated. Notepad++ has since migrated to a new hosting provider with stronger security and rotated all credentials.

Rapid7’s analysis of the incident has uncovered no evidence or artifacts to suggest that the site’s plugin or updater-related mechanisms were exploited to distribute malware.

“The only confirmed behavior is that execution of ‘notepad++.exe’ and subsequently ‘GUP.exe’ preceded the execution of a suspicious process ‘update.exe’ which was downloaded from 95.179.213.0,” security researcher Ivan Feigl said.

“Update.exe” is a Nullsoft Scriptable Install System (NSIS) installer that contains multiple files –

  • An NSIS installation script
  • BluetoothService.exe, a renamed version of Bitdefender Submission Wizard that’s used for DLL side-loading (a technique widely used by Chinese hacking groups)
  • BluetoothService, encrypted shellcode (aka Chrysalis)
  • log.dll, a malicious DLL that’s sideloaded to decrypt and execute the shellcode

Chrysalis is a bespoke, feature-rich implant that gathers system information and contacts an external server (“api.skycloudcenter[.]com”) to likely receive additional commands for execution on the infected host.

The command-and-control (C2) server is currently offline. However, a deeper examination of the obfuscated artifact has revealed that it’s capable of processing incoming HTTP responses to spawn an interactive shell, create processes, perform file operations, upload/download files, and uninstall itself.

“Overall, the sample looks like something that has been actively developed over time,” Rapid7 said, adding it also identified a file named “conf.c” that’s designed to retrieve a Cobalt Strike beacon by means of a custom loader that embeds Metasploit block API shellcode.

One such loader, “ConsoleApplication2.exe” is noteworthy for its use of Microsoft Warbird, an undocumented internal code protection and obfuscation framework, to execute shellcode. The threat actor has been found to copy and modify an already existing proof-of-concept (PoC) published by German cybersecurity company Cirosec in September 2024.

Rapid7’s attribution of Chrysalis to Lotus Blossom (aka Billbug, Bronze Elgin, Lotus Panda, Raspberry Typhoon, Spring Dragon, and Thrip) based on similarities with prior campaigns undertaken by the threat actor, including one documented by Broadcom-owned Symantec in April 2025 that involved the use of legitimate executables from Trend Micro and Bitdefender to sideload malicious DLLs.

“While the group continues to rely on proven techniques like DLL side-loading and service persistence, their multi-layered shellcode loader and integration of undocumented system calls (NtQuerySystemInformation) mark a clear shift toward more resilient and stealth tradecraft,” the company said.

“What stands out is the mix of tools: the deployment of custom malware (Chrysalis) alongside commodity frameworks like Metasploit and Cobalt Strike, together with the rapid adaptation of public research (specifically the abuse of Microsoft Warbird). This demonstrates that Billbug is actively updating its playbook to stay ahead of modern detection.”

Kaspersky Observes 3 Infection Chains

Kaspersky, in its own breakdown of the Notepad++ incident, said it observed three different infection chains that were designed to target about a dozen machines belonging to individuals located in Vietnam, El Salvador, and Australia, a government organization located in the Philippines, a financial organization located in El Salvador, and an IT service provider organization located in Vietnam.

“Over the course of four months, from July to October 2025, attackers who have compromised Notepad++ have been constantly rotating C2 server addresses used for distributing malicious updates, the downloaders used for implant delivery, as well as the final payloads,” security researchers Georgy Kucherin and Anton Kargin said.

The company said it did not detect any payloads being deployed starting from November 2025. The details of the three infection sequences are below –

Chain #1 (Between late July and early August 2025)

Attackers were found to deploy a malicious Notepad++ update hosted at “45.76.155[.]202/update/update.exe,” which was then launched by the legitimate Notepad++ updater process WinGUp (“gup.exe”). The executable, an NSIS installer, was used to send system information to a temp[.]sh URL by executing a series of shell commands (whoami and tasklist). This behavior was described by a user named “soft-parsley” on the Notepad++ community forums in October 2025.

Like in the case of “update.exe” documented by Rapid7, the “update.exe” used in this chain leveraged DLL side-loading by abusing a legitimate binary associated with ProShow software (“ProShow.exe”) to deploy two shellcodes: one that’s not meant to be executed and functioned as a distraction mechanism, while the second shellcode decrypted a Metasploit downloader payload that retrieves a Cobalt Strike beacon shellcode from a remote URL.

Chain #2 (Between the middle and the end of September 2025)

The malicious update continued to be delivered via “45.76.155[.]202/update/update.exe,” while the “update.exe” NSIS installer featured slight tweaks to collect more system information (whoami, tasklist, and netstat) and deliver a completely different set of payloads, including a Lua script that’s engineered to execute shellcode. The launched shellcode was a Metasploit downloader that drops a Cobalt Strike beacon.

A subsequently observed “update.exe” variant towards the end of September 2025 also harvested the results of the systeminfo shell command alongside whoami, tasklist, and netstat. Another version of the binary changed the system information upload URL to self-dns.it[.]com/list, along with the URL used by the Metasploit downloader and Cobalt Strike Beacon C2 server.

Chain #3 (October 2025)

This infection chain altered the NSIS installer distribution URL to “45.32.144[.]255/update/update.exe” and initiated the same sequence of events described by Rapid7 above. What’s common to all three sets of attacks is the fact that the Beacons are loaded through a Metasploit downloader shellcode.

Then, starting mid-October 2025, the attackers began to propagate the installer via three different URLs to launch a combination of both #2 and #3 execution chains –

  • 95.179.213[.]0/update/update.exe
  • 95.179.213[.]0/update/install.exe
  • 95.179.213[.]0/update/AutoUpdater.exe

The compromise of Notepad++’s update infrastructure is the latest example of how the software ecosystem has increasingly become the target of supply chain attacks in recent years. In breaching the mechanism used to distribute updates, it enabled the attackers to selectively break into machines of high-profile organizations across the world, the Russian cybersecurity vendor noted.

“The variety of infection chains makes detection of the Notepad++ supply chain attack quite a difficult and at the same time creative task,” Kaspersky said. “The attackers made an effort to avoid losing access to this infection vector — they were spreading the malicious implants in a targeted manner, and they were skilled enough to drastically change the infection chains about once a month.”



Source link

Access Denied

0

Access Denied You don’t have permission to access “http://hindi.gadgets360.com/mobiles/oppo-reno-14-5g-price-in-india-discount-upto-rs-6000-smartphone-cheapest-flipkart-deals-today-news-10942229” on this server.

Reference #18.8eaf0660.1770172869.1ba4d092

https://errors.edgesuite.net/18.8eaf0660.1770172869.1ba4d092

Mitch McConnell admitted to hospital with ‘flu-like symptoms’ | Republicans

0

The Republican senator Mitch McConnell was admitted to a hospital on Monday night due to “flu-like symptoms”, his office said in a statement.

“In an abundance of caution, after experiencing flu-like symptoms over the weekend, Senator McConnell checked himself into a local hospital for evaluation last night,” the statement reads. “His prognosis is positive and he is grateful for the excellent care he is receiving.”

McConnell, 83, missed votes in the Senate on Monday and Tuesday, according to Politico. He has struggled with his mobility in recent years, repeatedly taking falls and suffering a concussion in 2023.

The Kentucky senator said last year he would not seek re-election in 2026, after a more than 40-decade career in the US Senate.

More details soon …



Source link

Ind Vs Sa Warm Up: Ishan Kishan completes half-century in 20 balls, Abhishek also present at the crease – Ind Vs Sa Warm Up: India Vs South Africa T20 World Cup Warm Up Match Live Score Updates

0

The T20 World Cup practice match between India and South Africa continues. India’s batting is going on. Ishan Kishan came out to bat with Abhishek Sharma for India. Ishan Kishan scored a half-century in just 20 balls. Ishaan scored 53 runs in 20 balls with the help of two fours and seven sixes. After scoring a half-century, the team management called Ishaan back and he retired. Now Abhishek and Tilak Verma are at the crease.



Ishaan-Abhishek opened
Ishan Kishan came out to bat with Abhishek Sharma for India. The opening pair of these two gave a great start to India and the team crossed the 50-run mark in the fifth over itself. India made a change in the opening combination in the practice match before the World Cup and sent Ishan to open in place of Sanju Samson. Ishaan took full advantage of this opportunity and hit a fifty. Ishan Kishan scored a half-century in just 20 balls. Ishaan scored 53 runs in 20 balls with the help of two fours and seven sixes. After scoring a half-century, the team management called Ishaan back and he retired.

Washington Sundar returns
India has won the toss and decided to bat in the T20 World Cup practice match against South Africa. Washington Sundar and Tilak Verma are also included in the Indian team for this match. Both these players were injured due to which they could not participate in the T20 series against New Zealand. Captain Suryakumar Yadav confirmed during the toss that Ishan Kishan will open the innings with Abhishek Sharma.

Both teams for the practice match:
India: Abhishek Sharma, Ishan Kishan (wicketkeeper), Suryakumar Yadav (captain), Tilak Verma, Sanju Samson, Hardik Pandya, Rinku Singh, Shivam Dubey, Axar Patel, Arshdeep Singh, Varun Chakraborty, Jasprit Bumrah, Washington Sundar, Harshit Rana, Kuldeep Yadav.
South Africa: Aiden Markram (captain), Quinton de Kock (wk), Ryan Rickleton, Dewald Brewis, Tristan Stubbs, Jason Smith, David Miller, Marco Yansen, George Linde, Robin Bosch, Keshav Maharaj, Kwena Mfaka, Lungi Ngidi, Anrich Nortje, Kagiso Rabada.

Demand to implement new rules of UGC, students protest in Delhi University intensifies, take out ‘Equity March’

0

Hundreds of students of Delhi University (DU) took out a march in the North Campus on Tuesday, February 3, demanding immediate implementation of the UGC Equality Rules 2026. This protest named ‘Equity March’ was organized by various student organizations including All India Students Association (AISA).

Holding placards and raising slogans, the students said that the long-pending effort to tackle caste-based discrimination in higher education has failed due to the recent court stay on these rules.

This demand of the protesters

The protesters said the parity rules are not just procedural guidelines, but an important measure to ensure accountability and protection for SC, ST and OBC students, which should be implemented in the spirit of the ‘Rohit Act’.

‘Rohit Act’ refers to the proposed Rohit Vemula Act, which seeks to enact a central law to prevent caste/identity-based discrimination against students in Indian higher education. This law is named after Hyderabad University student Rohith Vemula, who committed suicide in 2016 allegedly due to caste discrimination.

‘The weaker section will feel insecure’

Students said these rules are the result of years of agitation on university campuses across the country. He alleged that due to restrictions on rules, students from weaker sections will once again feel unsafe in universities.

Addressing the gathering, former JNUSU president Nitish said, “After years of sacrifice and struggle on the streets, we forced the University Grants Commission (UGC) to come up with rules to ensure accountability. The stay on these guidelines clearly shows that casteism is still deeply rooted at the highest levels in our institutions. We will not rest until real equality is achieved.”

Iran internet disruption drains $1.56 million hourly from economy, analyst says

0

NEWYou can now listen to Fox News articles!

Iran is losing an estimated $1.56 million every hour because of its state-imposed internet blackout, draining its struggling economy and disrupting life for more than 90 million people, according to an internet privacy analyst.

The prolonged disruptions originated amid spiraling protests through January with losses he claimed were continuing even after partial connectivity was restored.

“The current blackout is costing Iran an estimated $37.4 million per day, or $1.56 million every hour,” Simon Migliano, head of research at PrivacyCo, told Fox News Digital. “The full internet blackout itself cost Iran more than $780 million, and the subsequent strict filtering continues to have a significant additional economic impact.”

“Iran has already drained $215 million from its economy in 2025 by disrupting internet access,” the internet privacy and security analyst added.

IRAN WILL RETALIATE ‘WITH EVERYTHING WE HAVE’ IF US ATTACKS, SENIOR DIPLOMAT WARNS

Iran blackout in protests.

The Iran internet blackout started Jan. 8 and reportedly costs $1.56 million per hour amid protests. ( Maria/Middle East Image /AFP via Getty Images)

Migliano said his estimates were calculated using the NetBlocks COST tool, an economic model that measures the immediate impact on a nation’s gross domestic product when its digital economy is forced offline.

The model assesses direct losses to productivity, online transactions and remote work, drawing on data from the World Bank, the International Telecommunication Union, Eurostat and the U.S. Census Bureau.

IRAN PUSHES FOR FAST TRIALS AND EXECUTIONS OF SUSPECTS DETAINED IN PROTESTS DESPITE TRUMP’S WARNING: REPORT

Netblocks logo.

According to the organization NetBlocks, internet access was completely cut off in Iran since January 9, 2026, following protests that swept the country. (Samuel Boivin/NurPhoto via Getty Images)

Iranian authorities abruptly cut off communications on the night of Jan. 8 amid widespread protests against the clerical regime.

While officials later restored much of the country’s domestic bandwidth, as well as local and international phone calls and SMS messaging, the population is largely unable to freely access the internet because of heavy state filtering.

“The recent 579% surge in VPN demand reflects a scramble for digital survival,” Migliano said before describing how even when access is briefly restored, the internet remains “heavily censored and effectively unusable without circumvention tools such as VPNs.”

“We can see spikes showing that as soon as connectivity returned, users immediately sought VPNs to reach sites and services outside the state-controlled network, including global platforms such as WhatsApp and Telegram that remain otherwise inaccessible,” he added.

IRAN REGIME OPENED FIRE WITH LIVE AMMUNITION ON PROTESTERS, DOCTOR SAYS: ‘SHOOT-TO-KILL’

Protester holding sign in Tehran.

“The recent 579% surge in VPN demand reflects a scramble for digital survival,” Migliano said. (UGC via AP)

“Sustained demand — averaging 427% above normal levels — indicates Iranians are stockpiling circumvention tools in anticipation of further blackouts,” Migliano said.

“The usual strategy is to download as many free tools as possible and cycle between them. It becomes a cat-and-mouse game, as the government blocks individual VPN servers and providers rotate IP addresses to stay ahead of the censors,” he added.

Iran’s minister of information and communications technology, Sattar Hashemi, acknowledged the economic toll caused by the blackout tactics.

He said recent outages were inflicting roughly “5,000 billion rials” a day in losses to the digital economy and nearly 50 trillion rials on the wider economy, according to Iran International.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“Iran’s three-week internet blackout may have been lifted, but connectivity remains severely disrupted still,” Migliano claimed.

“Access is still heavily filtered. It is restricted to a government-approved ‘whitelist’ of sites and apps and the connection itself remains highly unstable throughout the day,” he added.



Source link

Most Parked Domains Now Serving Malicious Content

0

Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier: A new study finds the vast majority of “parked” domains — mostly expired or dormant domain names, or common misspellings of popular websites — are now configured to redirect visitors to sites that foist scams and malware.

A lookalike domain to the FBI Internet Crime Complaint Center website, returned a non-threatening parking page (left) whereas a mobile user was instantly directed to deceptive content in October 2025 (right). Image: Infoblox.

When Internet users try to visit expired domain names or accidentally navigate to a lookalike “typosquatting” domain, they are typically brought to a placeholder page at a domain parking company that tries to monetize the wayward traffic by displaying links to a number of third-party websites that have paid to have their links shown.

A decade ago, ending up at one of these parked domains came with a relatively small chance of being redirected to a malicious destination: In 2014, researchers found (PDF) that parked domains redirected users to malicious sites less than five percent of the time — regardless of whether the visitor clicked on any links at the parked page.

But in a series of experiments over the past few months, researchers at the security firm Infoblox say they discovered the situation is now reversed, and that malicious content is by far the norm now for parked websites.

“In large scale experiments, we found that over 90% of the time, visitors to a parked domain would be directed to illegal content, scams, scareware and anti-virus software subscriptions, or malware, as the ‘click’ was sold from the parking company to advertisers, who often resold that traffic to yet another party,” Infoblox researchers wrote in a paper published today.

Infoblox found parked websites are benign if the visitor arrives at the site using a virtual private network (VPN), or else via a non-residential Internet address. For example, Scotiabank.com customers who accidentally mistype the domain as scotaibank[.]com will see a normal parking page if they’re using a VPN, but will be redirected to a site that tries to foist scams, malware or other unwanted content if coming from a residential IP address. Again, this redirect happens just by visiting the misspelled domain with a mobile device or desktop computer that is using a residential IP address.

According to Infoblox, the person or entity that owns scotaibank[.]com has a portfolio of nearly 3,000 lookalike domains, including gmai[.]com, which demonstrably has been configured with its own mail server for accepting incoming email messages. Meaning, if you send an email to a Gmail user and accidentally omit the “l” from “gmail.com,” that missive doesn’t just disappear into the ether or produce a bounce reply: It goes straight to these scammers. The report notices this domain also has been leveraged in multiple recent business email compromise campaigns, using a lure indicating a failed payment with trojan malware attached.

Infoblox found this particular domain holder (betrayed by a common DNS server — torresdns[.]com) has set up typosquatting domains targeting dozens of top Internet destinations, including Craigslist, YouTube, Google, Wikipedia, Netflix, TripAdvisor, Yahoo, eBay, and Microsoft. A defanged list of these typosquatting domains is available here (the dots in the listed domains have been replaced with commas).

David Brunsdon, a threat researcher at Infoblox, said the parked pages send visitors through a chain of redirects, all while profiling the visitor’s system using IP geolocation, device fingerprinting, and cookies to determine where to redirect domain visitors.

“It was often a chain of redirects — one or two domains outside the parking company — before threat arrives,” Brunsdon said. “Each time in the handoff the device is profiled again and again, before being passed off to a malicious domain or else a decoy page like Amazon.com or Alibaba.com if they decide it’s not worth targeting.”

Brunsdon said domain parking services claim the search results they return on parked pages are designed to be relevant to their parked domains, but that almost none of this displayed content was related to the lookalike domain names they tested.

Samples of redirection paths when visiting scotaibank dot com. Each branch includes a series of domains observed, including the color-coded landing page. Image: Infoblox.

Infoblox said a different threat actor who owns domaincntrol[.]com — a domain that differs from GoDaddy’s name servers by a single character — has long taken advantage of typos in DNS configurations to drive users to malicious websites. In recent months, however, Infoblox discovered the malicious redirect only happens when the query for the misconfigured domain comes from a visitor who is using Cloudflare’s DNS resolvers (1.1.1.1), and that all other visitors will get a page that refuses to load.

The researchers found that even variations on well-known government domains are being targeted by malicious ad networks.

“When one of our researchers tried to report a crime to the FBI’s Internet Crime Complaint Center (IC3), they accidentally visited ic3[.]org instead of ic3[.]gov,” the report notes. “Their phone was quickly redirected to a false ‘Drive Subscription Expired’ page. They were lucky to receive a scam; based on what we’ve learnt, they could just as easily receive an information stealer or trojan malware.”

The Infoblox report emphasizes that the malicious activity they tracked is not attributed to any known party, noting that the domain parking or advertising platforms named in the study were not implicated in the malvertising they documented.

However, the report concludes that while the parking companies claim to only work with top advertisers, the traffic to these domains was frequently sold to affiliate networks, who often resold the traffic to the point where the final advertiser had no business relationship with the parking companies.

Infoblox also pointed out that recent policy changes by Google may have inadvertently increased the risk to users from direct search abuse. Brunsdon said Google Adsense previously defaulted to allowing their ads to be placed on parked pages, but that in early 2025 Google implemented a default setting that had their customers opt-out by default on presenting ads on parked domains — requiring the person running the ad to voluntarily go into their settings and turn on parking as a location.



Source link

Russia-Ukraine war: List of key events, day 1,441 | Russia-Ukraine war News

0

These are the key developments from day 1,441 of Russia’s war on Ukraine.

Here is where things stand on Wednesday, February 4:

Fighting

  • At least two teenagers were killed, and nine other people were injured following a Russian strike targeting the southeastern Ukrainian city of Zaporizhzhia, regional Governor Ivan Fedorov wrote on the Telegram messaging app.
  • A 24-hour air raid alert was issued in the Zaporizhia region following the attack, which damaged four high-rise apartment buildings.
  • Three people were killed in Ukrainian shelling of the Moscow-occupied southern Ukrainian town of Nova Kakhovka, in the Kherson region, Kremlin-installed authorities said.
  • Russia launched an overnight attack described as the “most powerful” this year on Ukraine’s battered energy facilities, officials in Kyiv said, leaving hundreds of thousands of people without heating amid glacial winter temperatures and in advance of talks to end the four-year war.
  • The latest Russian operation against Ukraine’s energy sector was the biggest since the start of 2026, Ukraine’s leading private energy company DTEK said on Telegram.

  • A power plant in Ukraine’s second-largest city of Kharkiv was also badly damaged in the Russian attack, Kharkiv Mayor Ihor Terekhov said. The attack on Kharkiv also injured at least five people, according to officials.

  • Ukrainian Foreign Minister Andrii Sybiha said that Russia deployed 450 attack drones and more than 60 missiles during the onslaught and accused Moscow of waiting for temperatures to drop before carrying out the strikes.
  • A power plant in Kyiv’s eastern Darnytskyi district was seriously damaged in the Russian attack, Ukrainian Energy Minister Denys Shmyhal said on Telegram, prompting officials to redirect resources to restoring heating to thousands of residents in the city.

  • At least 1,142 high-rise apartment blocks have been left without heating in the Ukrainian capital following the Russian attacks, Ukrainian Deputy Prime Minister Oleksii Kuleba said.

  • Ukrainian President Volodymyr Zelenskyy accused Russia of launching “a deliberate attack against energy infrastructure”, which he said involved “a record number of ballistic missiles”.
  • Zelenskyy also said that Russia had exploited the recent brief United States-backed truce on attacks against Ukraine’s energy infrastructure to stockpile weapons, which had been used in the latest attacks. The latest Russian strikes came a day before the next scheduled trilateral talks in Abu Dhabi on Wednesday.
  • Part of the gigantic Motherland monument in Kyiv, an iconic Soviet-era World War II memorial featuring a woman holding a sword and a shield, was damaged during the latest Russian attack, with Ukrainian Culture Minister Tetyana Berezhna describing the damage inflicted as “both symbolic and cynical”.
Ukrainian national flag flies at half-mast near the Ukrainian Motherland Monument after Tuesday's deadly Russian missile strike, amid Russia's attack on Ukraine, in Kyiv, Ukraine June 18, 2025. REUTERS/Thomas Peter
Ukrainian national flag flies at half-mast near the Ukrainian Motherland Monument in Kyiv, Ukraine, in June 2025 [Thomas Peter/Reuters]
  • In remarks following the Tuesday attacks, US President Donald Trump defended Russian President Vladimir Putin, saying that he “kept his word” and had stuck to a short-term deal halting strikes on Ukraine’s energy infrastructure until Sunday.
  • Trump’s spokesperson, Karoline Leavitt, had said earlier that the US president was not surprised by the attacks.
  • NATO chief Mark Rutte, during a visit to Kyiv on Tuesday, said that Russia’s overnight attacks did not suggest Moscow was serious about making peace.
In this handout photograph released by the Telegram account of Ukraine's Minister of Energy Denys Shmyhal on February 3, 2026, shows Secretary General of NATO Mark Rutte (front L) and Ukraine's Minister of Energy Denys Shmyhal (C) during their visit to a combined heat and power (CHP) plant damaged by Russian air attacks in an undisclosed location in Kyiv.NATO chief Mark Rutte said on a visit to Kyiv on February 3, 2026 that Russia's overnight attacks did not suggest Moscow was serious about making peace, as the United States pushes talks to stop the fighting.
Ukrainian Energy Minister Denys Shmyhal, centre, shows NATO Secretary-General Mark Rutte (front left) a power plant damaged by Russian air attacks in an undisclosed location in the capital, Kyiv, on Tuesday [Handout: Denys_Smyhal via AFP]

Military aid

  • Sweden and Denmark will jointly procure and supply Ukraine with air defence systems worth 2.6 billion Swedish crowns ($290m) to help it defend against Russian attacks, Swedish Defence Minister Pal Jonson and his Danish counterpart, Troels Lund Poulsen, announced.

Politics and diplomacy

  • Ukraine has agreed with Western partners that any persistent Russian violations of a future ceasefire agreement would trigger a coordinated military response from Europe and the US, the Financial Times reported, citing people briefed on the discussions.

  • French President Emmanuel Macron said he was preparing to resume dialogue with Putin nearly four years after Russia’s full-scale invasion of Ukraine, but he stressed that Moscow was not showing any “real willingness” to negotiate a ceasefire.

  • UK Prime Minister Keir Starmer spoke to Trump and discussed the situation in Ukraine, including the overnight Russian attacks on the country, the United Kingdom government said.

  • Reaching a peace deal to end Russia’s war will require tough choices, NATO’s Rutte said in an address to Ukraine’s parliament during his Kyiv visit.

Economy

  • The Kremlin said it had heard no statements from India about halting purchases of sanctioned Russian oil after Trump announced that New Delhi had agreed to stop such purchases as part of a trade accord with Washington.
  • Kremlin spokesman Dmitry Peskov said Russia was carefully analysing Trump’s remarks on the trade deal with India. He added that despite the recent announcement, Moscow intends “to further develop our bilateral relations with Delhi”.
  • Russia’s economy grew by 1 percent in 2025, Putin said, marking a much slower expansion compared with the 2024 figure, as the country stutters under the burden of its war on Ukraine and international sanctions. Putin acknowledged during a government meeting that growth is “lower” than the two previous years.

Sport

  • Russia welcomed remarks by FIFA president Gianni Infantino, who said he wanted Russia’s four-year ban from international football tournaments lifted because it had “achieved nothing”, Peskov said, describing Infantino’s comments as “very good”.
  • Ukrainian Sports Minister Matvii Bidnyi called Infantino’s comments “irresponsible” and “infantile”, noting that Russia’s invasion had killed more than 650 Ukrainian athletes and coaches.
  • Ukrainian athlete Vladyslav Heraskevych said the International Olympic Committee’s allowing Russian and Belarusian athletes to compete as neutrals, despite their links to occupied territories or expressions of support for Moscow’s war on Ukraine, undermined the principle of neutrality. He said he intends to use the Winter Olympic Games to draw attention to the war in Ukraine.


Source link

Trump debuts new ‘America Is Back!’ hat at White House bill signing event

0

NEWYou can now listen to Fox News articles!

A new slogan and accompanying red hat made its debut at the White House on Tuesday as President Donald Trump signed the Consolidated Appropriations Act, reopening the federal government with a room full of Republican lawmakers in attendance.

The hat, bearing the phrase “America Is Back!” sat on the Resolute Desk in the Oval Office during the bill-signing ceremony, as House Speaker Mike Johnson praised the message while standing alongside the president.

“This is good for the country, and America is back,” said Johnson, who added that the hat was “appropriate” and “the right slogan.”

Trump confirmed the item’s novelty during the signing event, looking toward the hat held in Johnson’s hands. 

“It’s a new hat,” Trump said. “[It] just came out. America is back.”

Trump noticed CNN’s Kaitlan Collins in the press pool and quipped, “Look, CNN is thrilled [about the hat]. Look at her. She never smiles. I’d never see her [smile]. But someday I’ll see her smile.”

‘OPENING PANDORA’S BOX’: MIKE JOHNSON BACKS TRUMP AFTER WARNING WHITE HOUSE ABOUT DEAL WITH DEMOCRATS

President Trump and "America is Back!" hat

President Donald Trump sits at the Resolute Desk flanked by lawmakers and a new “America is Back!” hat during a bill signing to end the partial government shutdown in the Oval Office of the White House in Washington, D.C., Tuesday. (Yuri Gripas/Abaca/Bloomberg via Getty Images)

While the event focused on passage of the sweeping government funding package, the hat quickly became a visual focal point. As of Tuesday afternoon, however, the “America Is Back!” hat had not yet appeared for sale on the Trump Store official site, which currently features other Trump-branded merchandise, including MAGA hats.

Johnson’s remarks came as Republicans sought to champion the passage of the Consolidated Appropriations Act (CAA) after days of uncertainty, with Johnson standing behind Trump as the president signed the bill reopening the government.

The CAA signed Tuesday funds most federal agencies through the end of the fiscal year, though separate negotiations remain ongoing over longer-term funding for the Department of Homeland Security (DHS).

GOVERNMENT SHUTDOWN ENDS AS TRUMP SIGNS BILL, BUT DHS FUNDING DEADLINE LOOMS

An "America is Back!" hat is seen on the resolute desk, Tuesday, Feb. 3, 2026, after President Donald Trump signed legislation ending the partial government shutdown that began late last week.

An “America is Back!” hat is seen on the Resolute Desk, Tuesday, after President Donald Trump signed legislation ending the partial government shutdown that began late last week. (Pool / Fox News)

Trump later argued that the new phrase does not replace his longtime political slogan, “Make America Great Again.”

“We’ll never forget MAGA,” he said. “But I thought this was very appropriate.” Sen. Barasso, R-Wyo., added, “Love it.”

It is unclear when or if the “America Is Back” hat will be made available for purchase in the Trump online store.

An "America is Back!" hat is seen on the resolute desk, Tuesday, Feb. 3, 2026, after President Donald Trump signed legislation ending the partial government shutdown that began late last week.

An “America is Back!” hat is seen on the Resolute Desk, Tuesday, in the Oval Office. (Pool / Fox News)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Upon request for comment, the White House referred Fox News Digital to Trump’s stated remarks.

Fox News Digital’s Diana Stancy contributed to this reporting.  



Source link