Use the Tools, The Dragon Spreads Its Wings, Going Big, System and Efficiency, Yes They Can, and Triad? It's CISO Intelligence for Wednesday, 2nd July 2025.
Stop the rampage, the Middle Kingdom is growing, a major event on the biggest stage, a very fine-toothed comb, keep them close: keep them safe, and not what you're thinking.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. The Empire Strikes Back: Europe's Biggest Data Breaches
2. The People’s Liberation Army Cyberspace Force: China’s Digital Fortress
3. When Justice Hits a Firewall: ICC's Cyber Mayhem During NATO's Glitz
4. Using AI to Identify Cybercrime Masterminds: When Algorithms Play Sherlock Holmes
5. Check Your Amazon S3 Permissions or Someone Else Will
6. Sticking It to the Triad: CIA Isn't Just a Spy Thing Anymore
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
The Empire Strikes Back: Europe's Biggest Data Breaches
_Data breaches: like a European vacation but with less fun and more panic!_
What You Need to Know
Europe has experienced some monumental data breaches over recent years, affecting millions of individuals and businesses. From corporate giants to governmental organizations, no sector has remained untouched by the critical issue of data privacy and cybersecurity threats. As a board or executive management group, your primary task is to understand the severity of these breaches, enhance awareness, and prioritize cybersecurity investments to mitigate future risks.
CISO focus: Data Breach Management
Sentiment: Strong Negative
Time to Impact: Immediate
*
Europe's Biggest Data Breaches: A Closer Look
Data breaches aren't just an IT problem; they are a profound business threat that can tarnish reputations and incur heavy financial penalties. Across Europe, these breaches have left no stone unturned, affecting sectors ranging from healthcare to finance.
The Biggest Breaches: Who, What, Where
1. British Airways (2018): The airline faced a cyber attack where personal and financial information of around 380,000 customers was stolen. It highlighted significant vulnerabilities in payment systems.
2. Desjardins Group (2019): Although a Canadian company, the Desjardins breach affected many European customers, with data from 4.2 million users exposed due to an insider threat.
3. Marriott International (2018): This breach stood out due to its prolonged nature, with unauthorized access over four years exposing records of approximately 339 million guests, with over 30 million of them being in Europe.
These incidents underscore the critical need for enterprises to adopt comprehensive cybersecurity strategies, ensure robust data protection mechanisms, and engage in continuous monitoring and response activities.
Impact Analysis
* Regulatory Scrutiny: With the General Data Protection Regulation (GDPR) in effect, organizations are now facing heavier fines for such breaches. British Airways, for example, faced a record £183 million fine post-incident.
* Reputation Risk: Public trust has severely been compromised, leading to loss of customer confidence and subsequent drops in revenue streams for affected companies.
* Operational Disruption: Breaches lead to operational downtimes as organizations scramble to contain the breach and reinforce their defenses.
Lessons Learned: Strengthening Cyber Defenses
The series of breaches serve as a stark reminder for companies to:
* Harden Defenses: Use advanced encryption, regular security audits, and robust firewall systems.
* Foster a Security Culture: Ensure that cybersecurity awareness is interwoven into the company culture at all levels, with regular training and reminders.
* Enhance Detection Systems: Adopt AI-driven monitoring systems that can detect and respond to anomalies in real-time.
The Role of Incident Response
While prevention is ideal, having an effective incident response plan is crucial in containing breaches. An efficient response plan includes clear communication channels, predefined roles, and post-breach audits to learn and rectify system vulnerabilities swiftly.
The GDPR Effect: Compliance Commandos
GDPR has become both the bane and boon of companies within Europe. While it enforces strong data protection standards, compliance is still a challenge for many organizations struggling with legacy systems and disparate data sources.
Organizations must prioritize GDPR compliance and leverage it as an opportunity to re-evaluate their data handling and protection methods.
In cyber battlegrounds, being prepared is half the victory. Keep data secure, and remember: even the most formidable fortress needs its walls checked regularly!
*
Vendor Diligence Questions
1. What measures does the vendor have in place to ensure compliance with GDPR and other privacy regulations?
2. Can the vendor provide a detailed account of their last security audit and the steps taken to address any findings?
3. How does the vendor manage incidents, and are they willing to share evidence or records of past incident responses?
Action Plan
1. Security Enhancement: Conduct a thorough audit of current security measures and implement necessary upgrades.
2. Employee Training: Initiate mandatory cybersecurity training sessions focusing on threat detection and data management protocols.
3. Incident Response Upgrade: Revise and test incident response plans to ensure swift and efficient containment strategies.
4. Vendor Assessment: Reassess existing vendor partnerships with new diligence criteria.
5. GDPR Review: Initiate a compliance review to ensure alignment with GDPR and other relevant regulatory requirements.
*
_Source:[Biggest Data Breaches in Europe [Updated 2025] | UpGuard](https://www.upguard.com/blog/biggest-data-breaches-europe)_
*
The People’s Liberation Army Cyberspace Force: China’s Digital Fortress
_When the firewall becomes artillery, you know it’s time to update your malware._
What You Need to Know
The People’s Liberation Army (PLA) has solidified cyberspace as a new domain of warfare by inaugurating its Cyberspace Force. This unit, under the Central Military Commission's (CMC) direct control, is pivotal in China’s strategy for future conflicts. Its responsibilities include cybersecurity, electronic warfare, and maintaining information dominance. As a board or executive management group, the implementation of strategic countermeasures to bolster defenses against potential cyber threats stemming from this development is required. Investments in advanced cybersecurity initiatives and protocols must be prioritized.
CISO Focus: Cyber Espionage & Infrastructure
Sentiment: Negative
Time to Impact: Immediate
*
China's launch of the People’s Liberation Army Cyberspace Force marks a transformative shift in the global cyber warfare landscape. This newly established military branch underscores China’s strategic intent to leverage the digital realm as a theater of war. In doing so, it thrusts the international community into an urgent dialogue about cyber defense readiness and the evolving nature of warfare.
This article delves into how the PLA's Cyberspace Force sets a new precedent in the strategic deployment of cyber capabilities. Evaluating the scope and impact of this unprecedented force offers a wake-up call, demanding a more unified and effective global response to cybersecurity imperatives.
PLA's Revolutionary Leap
On April 19, 2024, China introduced the Cyberspace Force, situating it at the forefront of modern military strategy. Housed within the Beijing Haidian District and touted to have five antenna spread across the nation, this move represents the country's efforts to consolidate control over its digital activities while setting an aggressive stance for cyber capabilities. The Cyberspace Force exists to both defend against and execute cyber offensives, broadening China's operations beyond traditional conventional warfare.
Rise from the Ashes of the SSF
China's decision to dissolve the Strategic Support Force indicates a pivot towards streamlined organization within their military operations. This restructuring signifies a concerted effort to adapt to the demands of “informatised warfare,” a doctrine emphasizing the control of information flow that is crucial across all domains of combat. Moreover, the force maintains a comprehensive scope of operations, protecting sensitive digital assets while possessing the technology to disrupt adversaries’ cyber infrastructures strategically.
Operational Command & Infrastructure
Direct reporting to the Central Military Commission allows the PLA Cyberspace Force strategic autonomy and centralized governance, effectively facilitating consistent command and efficient execution of cyber missions. The centralized structure ensures quick decision-making capabilities, reinforcing China's ability to react and adapt to emerging threats or technological advancements swiftly.
Implications & Predictions
The inauguration of the PLA Cyberspace Force implies an immediate jolt to current international security dynamics. Nations must scrutinize their cyber posture, ensuring robust defense mechanisms are implemented against this newly articulated threat vector. It is anticipated that this move will spur an arms race in cyber capability development, encouraging other nations to fortify their core digital infrastructures.
Crack the Cyber Fort, Don't Get Zapped
Realizing the full extent of the PLA Cyberspace Force's capabilities remains challenging. Yet, the evolution signals that organizations worldwide should assess vulnerabilities within their ecosystems, safeguarding against espionage, sabotage, or data theft at unprecedented levels. Reactivity must give way to proactive measures, emphasizing collaboration between government entities and private sectors to share intelligence, identify threats, and disseminate best practices for mitigation.
Don Your Cyber Armor: Recommendations
The formation of this Cyber Force is China signaling it's not playing in the little leagues anymore. You might not be able to stop a digital war, but improving your defense is a start.
Nations should pursue bilateral or multilateral agreements emphasizing cyber non-aggression pacts.
Private sectors need to collaborate with national agencies to align their cybersecurity strategies and policy frameworks.
Investment in research and development for cutting-edge cybersecurity tools and AI-based threat detection should be amplified.
Don't just hold onto your bytes, protect them like your life depends on it—because it might.
*
Vendor Diligence Questions
1. What measures has your company implemented to deter infiltration attempts by state-sponsored cyber operatives?
2. How regularly do you update and audit your security measures to detect vulnerabilities effectively?
3. Can you provide evidence of compliance with international cybersecurity standards and data protection regulations?
Action Plan
Review cybersecurity policies and risk management frameworks to address potential threats from state-sponsored entities.
Enhance training programs to assure staff are well-educated on emerging cyber threats and defensive protocols.
Collaborate with international cybersecurity organizations for expert consultations and threat intelligence sharing.
Prioritize investments in technology that offers real-time threat analysis and incident response automation.
*
Source: Grey Dynamics
*
When Justice Hits a Firewall: ICC's Cyber Mayhem During NATO's Glitz
_Even Lady Justice wasn't blind enough to miss this one._
What You Need to Know
The International Criminal Court (ICC) suffered a significant cyber attack during the NATO summit, placing sensitive global judicial operations at risk. Immediate action is required to assess data compromises, fortify cyber defenses, and communicate transparently with stakeholders to mitigate reputational damage. The board and executive management are expected to lead the communication strategy and ensure resources for enhanced cybersecurity measures.
CISO focus: Incident Response & Crisis Management
Sentiment: Negative
Time to Impact: Immediate
*
ICC Under Siege: Cyber Attack At A Global Arena
It's all fun and games until someone gets hacked at a summit.
In an audacious cyber offensive coinciding with the high-profile NATO summit, the International Criminal Court (ICC) suffered a crippling breach that sent shockwaves through global justice systems. At a time when international leaders congregated to discuss global security issues, an unseen adversary took center stage, exploiting lapses in cybersecurity to potentially compromise sensitive legal data.
The Attack During NATO: A Timeline
During the NATO summit, cyber attackers orchestrated a sophisticated breach into the ICC’s digital fortress, marking a sobering reminder that no target is too high-profile.
Initial Breach Report: Details of the breach started surfacing while global leaders were attending sessions at the NATO summit.
Response Efforts: Immediate defensive measures were undertaken to lock down systems and prevent further data exfiltration.
Data Compromise Concerns: An urgent audit has been initiated to determine if sensitive documents and communications were compromised.
The Broader Implications
Why It Matters: The ICC stands as the centerpiece of international justice, handling cases of genocide, war crimes, and crimes against humanity. A breach in its data systems could expose sensitive information, endanger witnesses, and disrupt ongoing investigations.
Impact on Global Justice: A data leak could compromise undercover operations and potentially endanger lives.
Reputational Damage: The breaches cast doubts on the ICC’s ability to safeguard sensitive information, as well as trust from the international community.
The Forensic Puzzle
Security experts are now engaged in a cyber forensic investigation to trace the attackers and understand the methods and technology used. Early indications suggest a state-sponsored entity, although attribution is notoriously challenging in the cyber domain.
Tools and Techniques: Advanced persistent threat (APT) methods were likely employed, involving phishing attacks and possibly sophisticated malware to bypass security measures.
Investigative Challenges: The complexity of the attack necessitates collaboration across international cybersecurity agencies and law enforcement.
Cyber Defense Reimagined
The incident underscores a critical need for the ICC and similar institutions to re-evaluate their cybersecurity strategies.
Immediate Recommendations:
Ensuring robust encryption protocols for all sensitive communications.
Implementing multi-factor authentication across all user access points.
Conducting employee training to recognize and report phishing attempts effectively.
Moving Forward
The ICC must pivot towards a security-first operational model, with a comprehensive strategic overhaul to ward off future attacks.
Cultural Shift: Embedding cybersecurity awareness into the organizational culture.
Technological Investment: Upgrading existing cybersecurity infrastructure to incorporate AI and machine learning for anomaly detection.
*
Vendor Diligence Questions
1. How often are your security protocols updated to reflect the latest cybersecurity threats?
2. What strategies do you employ to prevent and respond to Advanced Persistent Threats (APTs)?
3. Can you provide case studies or references showcasing your ability to protect high-profile organizations like the ICC?
Action Plan
Immediate Assessment: Conduct a full-scale forensic investigation to assess the breach severity and scope.
Enhance Security Measures: Deploy advanced monitoring tools to detect unusual activity and prevent further breaches.
Communicate Transparently: Develop a communication plan to update stakeholders on the breach status regularly.
Collaboration: Coordinate with international cybersecurity agencies for threat intelligence sharing.
*
Source: International Criminal Court hit with cyber attack during NATO summit_
*
Using AI to Identify Cybercrime Masterminds: When Algorithms Play Sherlock Holmes
_Why chase cyber villains when AI can outsmart them?_
What You Need to Know
AI is revolutionizing the way cybercriminals are identified by combing through dark web forums with unprecedented speed and accuracy. Executives should be aware of the breakthroughs presented by Sophos and strategic partners, which leverage artificial intelligence to identify prime cybercrime operatives seamlessly. Management should consider how AI can be implemented within their organization's cybersecurity strategy to preemptively address emerging threats.
CISO focus: Cyber Threat Intelligence
Sentiment: Positive
Time to Impact: Mid-term (18-60 months)
*
Cyber Sleuths in Silico: AI Tracking Dark Web Criminals
As the cyber threat landscape continually evolves, AI promises a new frontier for threat intelligence by meticulously scouring dark web forums for leads on cybercriminal masterminds. This cutting-edge approach is upheld by Sophos and its research collaborators, who have introduced a transformative method that could redefine how organizations navigate the murky waters of cybercrime.
AI: The Digital Detective
AI researcher Francois Labreche, with contributions from Estelle Ruellan of Flare and academics from Université de Montréal, has pushed the limits of automated cyber threat detection. The team's innovative solution was showcased at the 2024 APWG Symposium on Electronic Crime Research. By automating the process, it transcends the traditional, time-consuming manual monitoring of forums, ensuring crucial details do not slip through the cracks.
Why This Matters
1. Efficiency : AI systems can analyze large volumes of forum data far more quickly than human analysts, freeing them to focus on strategic tasks.
2. Accuracy : Reduces human error by cross-referencing multiple sources in real time for credible lead generation.
3. Scalability : Allows organizations to monitor multiple threat vectors simultaneously without multiplying manpower resources.
For organizations, integrating AI can make cybersecurity teams proactive rather than reactive, pinpointing cyber threats before they escalate.
The Method Behind the Madness
Sophos' method employs AI algorithms to comb through encrypted communications and trace patterns indicative of criminal activity. This involves natural language processing (NLP) to decode the vernacular of the underworld, linking disjointed data points into a coherent map of activity that indicates key players.
Challenges Ahead
The journey is not without its hurdles. AI must constantly evolve to keep up with the evolving encryption methods and jargon adaptation of cybercriminals. Moreover, ethical concerns around privacy and the potential for AI missteps necessitate ongoing scrutiny.
What's Next?
The implications are vast. Organizations must consider the adoption of these tools—not just for threat identification but for strategic risk management across all digital conduits. The continued collaboration between cybersecurity firms, academia, and industry will be key in refining these technologies to assure accuracy and compliance with global standards.
Dressing for the Occasion in Digital Armor
Much like the arms race, the AI-cybercrime dynamic will continue to escalate, with each advancement leading to a corresponding countermeasure. However, organizations equipped with AI-driven intelligence are better positioned to deflect these assaults before they reach critical thresholds.
In the high-stakes game of cyber cat and mouse, it's heartening to see AI proving to be the Sherlock Holmes of our digital age—you can almost hear the algorithms muttering, "The game's afoot!" as they unravel the criminal tapestry one forum post at a time.
*
Vendor Diligence Questions
1. How does your AI solution ensure the accuracy of threat detection in encrypted environments?
2. Can you provide insights into how your system improves over time with evolving cyber threat patterns?
3. What protocols are in place to safeguard against AI misinterpretation or false positives?
Action Plan
1. Evaluate AI Solutions : Assess suitable AI-driven threat intelligence tools that align with organizational cybersecurity objectives.
2. Pilot Programs : Initiate small-scale pilot projects to test AI efficiency in threat detection and response.
3. Training and Development : Foster internal capabilities by training teams to utilize AI tools effectively.
4. Ethical Guidelines : Develop comprehensive guidelines to govern AI use in threat detection, ensuring ethical compliance.
*
Source: Sophos Article
*
Check Your Amazon S3 Permissions or Someone Else Will
_A little S3 misstep can make your data slip away!_
What You Need to Know
If your organization utilizes Amazon S3 storage services, immediate attention is required to review your bucket permissions. A significant number of data breaches stem from misconfigured S3 permissions, which can lead to unauthorized access to sensitive information. As board members or executives, it is imperative to prioritize this auditing process and ensure that the organization's data is secure. You are expected to engage with your cybersecurity team, led by the CISO, to examine and rectify any accessibility issues found with your S3 buckets.
CISO focus: Cloud Security & Data Protection
Sentiment: Strong Negative
Time to Impact: Immediate
*
Is Your Cloud Feeling Breezy? Check Those S3 Permissions!
The vulnerabilities of Amazon S3 buckets have once again been thrust into the spotlight, riding on a tidal wave of recent high-profile data breaches. The crux of the issue? Faulty or overly permissive bucket permissions which unapologetically expose sensitive organizational data. This threat isn’t a theoretical “maybe” — it’s a very real "already happened", compelling firms to reevaluate their cloud security with a fine-toothed comb.
The Achilles' Heel of Cloud Storage
Amazon S3, a widely adopted storage service, appeals to businesses for its scalability and flexibility. However, the convenience it offers can quickly turn into a double-edged sword if permissions are not properly managed. Misconfigured S3 permissions can allow anyone on the internet to access your sensitive data, akin to leaving the vault door wide open with a gaudy 'Free to Browse' sign.
Why Misconfigurations Happen
1. User Error : Often, configurations are changed without proper understanding, leaving buckets exposed.
2. Complexity : With the intricate design of permission settings, it's easy to overlook critical security aspects.
3. Default Settings : Many times, the default settings are not changed, which are meant for ease-of-access rather than security.
High-Profile Breaches: The Cautionary Tale
From Verizon to an endless list of Fortune 500 companies, the list of victims is extensive and growing. These incidents often involve millions of exposed records, leading to significant financial, reputational, and regulatory damages. The recurring theme is eerily simple — a gap in permissions turning into an open invitation for data breaches.
Immediate Steps to Mitigate Risks
1. Audit Your Permissions : Begin with a thorough assessment of who can access what within your S3 buckets.
2. Implement Least Privilege : Only grant access to those who absolutely need it, minimizing unnecessary exposure.
3. Regular Monitoring and Review : Make it a practice to routinely check and update permissions as your organizational needs evolve.
S3 Best Practices: Reducing Your Exposure
Authentication and Encryption : Use AWS best practices to encrypt your data at rest and in transit.
Event Notifications : Enable logging and notifications to alert you to any unauthorized access attempts.
IAM Policies : Leverage Identity and Access Management (IAM) policies for detailed access control and accountability.
This balanced approach can shift you from reactive to proactive data protection, averting the 'S3 permissions nightmare' before it happens.
*
Vendor Diligence Questions
1. Has the vendor conducted a recent audit of their S3 bucket permissions and how frequently do they perform these audits?
2. What measures are in place to ensure that data encryption at rest and in transit is upheld?
3. How does the vendor manage IAM policies and what processes are in place for regular reviews and updates?
Action Plan for the CISO Team
1. Immediate Permissions Audit : Task teams to conduct a detailed review of all S3 bucket permissions.
2. Staff Training : Develop training sessions focusing on understanding S3 permissions and security implications.
3. Update Security Policies : Refresh current policies to align with the least privilege model and ensure they are consistently enforced.
4. Engage Third-party Security Tools : Where necessary, collaborate with third-party tools to automate and enhance the security of S3 permissions.
5. Regular Updates and Communication : Set up regular update meetings to discuss findings and action steps with stakeholders.
*
Source: Check your Amazon S3 permissions or Someone Else will. | UpGuard
*
Sticking It to the Triad: CIA Isn't Just a Spy Thing Anymore
_The bedrock of cyber wisdom - confidentiality, integrity, availability. It's the Holy Trinity of InfoSec, minus the incense._
What You Need to Know
The CIA Triad—Confidentiality, Integrity, and Availability—is the cornerstone of cybersecurity. These principles, fundamental to protecting information assets, have grown increasingly pertinent in today's digital landscape. As an executive, ensuring your company’s adherence to the CIA Triad not only secures data but also solidifies your organization's reputation. You are expected to review current practices, ensure your strategies align with the CIA principles, and allocate appropriate resources for maintaining robust security standards.
CISO focus: Information Security Fundamentals
Sentiment: Strong Positive
Time to Impact: Immediate
*
The Timeless Relevance of the CIA Triad
In the evolving world of cybersecurity, where threats tirelessly adapt, some principles stand the test of time. The CIA Triad is that sacred trio—Confidentiality, Integrity, and Availability—ensuring a resilient information security posture. Information assets are increasingly becoming the lifeblood of any organization, demanding protection aligned with these precepts.
Confidentiality: The Art of Keeping Secrets
Confidentiality is akin to the secret sauce of cybersecurity. It's all about access control—keeping data within the boundaries of those who are supposed to know. Whether it’s controlling personnel access to sensitive data or ensuring encrypted communication channels, confidentiality is your stealthy sentinel.
Access Control: Devices and systems should be appropriately restricted to authorized users.
Encryption: All sensitive data must use robust encryption both in transit and at rest.
Policy Enforcement: Regular audits and reviews ensure policies keep pace with emerging threats.
Integrity: Trustworthiness of Information
Integrity guarantees that data remains untainted and trustworthy. It’s the hymn ensuring that your company can depend on the accuracy and consistency of its information whenever it's accessed.
Data Validation: Implement checks for data alterations and unauthorized changes.
Version Control: Use systems that track historical changes, reducing errors and data corruption.
Audit Logs: Keep detailed records of data interactions and modifications.
Availability: Ensuring Business Continuity
Availability speaks to keeping your systems and data accessible whenever needed, emphasizing business continuity. Imagine a scenario where employees or customers cannot access necessary systems—crippling productivity or service delivery.
Fault Tolerance: Architect systems to withstand crashes or data loss.
Backup Systems: Regular backups and testing restore systems swiftly.
Patch Management: Ensure software and hardware are current to prevent disruptions.
The CIA Triad in Modern Security Practices
Recent high-profile data breaches underscore the importance of adherence to the CIA Triad. A failure in any of the triad's aspects can bring severe reputational and financial repercussions. As such:
Organizations are adopting zero-trust architectures—ensuring that each access request validates integrity and confidentiality.
Companies invest in cybersecurity insurance, acknowledging the necessity of preparedness against inevitable threats.
Automation is embedded within monitoring systems for real-time threat detection, maintaining availability seamlessly.
The CIA Triad's simplicity and broad applicability make it indispensable in a robust security strategy. Organizations that prioritize these three dimensions demonstrate leadership that respects stakeholder trust and governance.
In the realm of cybersecurity, the CIA Triad is more than a theoretical construct—it's a pragmatic guide that shapes and defines effective information protection. As organizations continue to navigate a complex digital landscape, the enduring relevance of Confidentiality, Integrity, and Availability speaks to their timeless efficacy.
*
Vendor Diligence Questions
1. How does your solution enhance all three aspects of the CIA Triad—Confidentiality, Integrity, and Availability?
2. What measures are in place to ensure compliance with the latest data protection regulations related to the CIA Triad?
3. Can you provide references or case studies demonstrating successful implementation of the CIA Triad principles within your systems?
Action Plan
Review Current Security Measures: Conduct a comprehensive assessment of your current practices concerning confidentiality, integrity, and availability.
Educate and Train Staff: Implement continuous education programs focused on the CIA Triad to maintain awareness of policies and protocols.
Engage with External Experts: Regularly hire third-party experts to audit your systems and provide an unbiased security evaluation.
Enhance Incident Response Plans: Update and test the response plans to ensure swift reactions to any breach affecting the CIA Triad.
*
Source: What is the CIA Triad? | UpGuard
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

