society
Solomon Lagoke Nominated for Outstanding Young Record Label Entrepreneur of the Year
Solomon Lagoke Nominated for Outstanding Young Record Label Entrepreneur of the Year
The Chief Executive Officer of Bloom Recordz, Comrade Solomon Lagoke, has received a nomination for Outstanding Young Record Label Entrepreneur of the Year at the forthcoming Cool Wealth Awards 9.0.
The award ceremony is scheduled for Sunday, January 11, 2026, at Azalea Hall, 37 Glover Court, Ikoyi, Lagos. The red-carpet reception will begin at 3:00 p.m., followed by the main event at 4:00 p.m.
Now in its ninth edition, the Cool Wealth Awards annually acknowledges young professionals and industry leaders whose work has contributed to growth and innovation across Nigeria’s creative and business sectors.
Lagoke’s nomination follows his increasing involvement in the country’s entertainment industry through Bloom Recordz, a music label he established to develop and promote emerging talent. His recognition highlights the expanding role of young entrepreneurs in driving Nigeria’s music and creative economy.
Speaking on his nomination, Lagoke expressed appreciation for the acknowledgment and reaffirmed his commitment to building a platform that empowers artists and fosters creativity within the Nigerian music scene.
The Cool Wealth Awards 9.0 is expected to attract leading figures from entertainment, media, and business, celebrating individuals making measurable impact in their respective fields.
society
Group Calls for Independent Probe into Alleged Kwara Govt Arming of Bandits
*Group Calls for Independent Probe into Alleged Kwara Govt Arming of Bandits*
The Crisis and Situation Monitoring Room (CSMR), a human rights advocacy organisation, has issued a strong demand for an immediate, independent investigation into serious allegations linking the Kwara State Government to the arming of criminal elements responsible for escalating banditry in the state.
The group’s intervention follows widespread public concern over claims that prohibited firearms and a government-branded security vehicle ended up in the hands of suspected bandits operating in Ifelodun Local Government Area and beyond.
In a statement, Dr. Anthony Rowland Attah, Executive Director of CSMR, sharply criticised Governor AbdulRahman Abdulrazaq’s administration for what he described as a dangerous pattern of insecurity and potential complicity that has eroded public trust.
“The allegations emerging from recent security operations are not mere rumours but point to a profound crisis of governance in Kwara State,” he said.
“If officials under Governor Abdulrazaq have facilitated the distribution of AK-47 rifles – weapons exclusively reserved for federal security forces – to non-state actors masquerading as patrol operatives, this constitutes a direct assault on national security and a blatant violation of the 1999 Constitution.
“Section 14(2)(b) unequivocally states that the security and welfare of the people shall be the primary purpose of government. Yet, under this administration, communities in Ifelodun, Edu, Patigi, and other areas have endured relentless attacks, kidnappings, and killings, with hundreds displaced and lives lost.
“Arming criminals, whether intentionally or through gross negligence, transforms the state from protector to perpetrator, amounting to nothing short of state-enabled terrorism.
“We reject any attempt to dismiss these claims as misinformation without transparent accountability. The presence of a local government security vehicle in the possession of armed suspects raises unavoidable questions about oversight, procurement, and distribution chains within the governor’s apparatus.
“No state governor possesses the constitutional authority to procure or distribute military-grade weapons like AK-47s, as confirmed repeatedly by legal precedents and federal regulations.
“To ensure an impartial process free from executive interference, we insist on a federal-led independent probe, ideally through a judicial commission of inquiry or special panel appointed by the President.
“This investigation must trace the provenance of the weapons, examine logistical support provided to alleged vigilante groups, and identify any officials involved, including those referenced in public accounts.
“Furthermore, in light of the gravity of these allegations and to prevent any tampering with evidence or witnesses, we call on President Bola Ahmed Tinubu to invoke necessary constitutional measures to suspend Governor AbdulRahman Abdulrazaq from office pending the conclusion of investigations.
“Such action would uphold due process, restore confidence in governance, and align with established precedents in cases of serious misconduct threatening public safety.”
Dr. Attah emphasised that CSMR’s demand stems from a commitment to constitutionalism and human rights, warning that failure to act decisively could embolden criminal networks and further destabilise the North-Central region.
The group noted ongoing insecurity trends in Kwara, including killings, reported abductions and attacks that have prompted school closures and community displacements, arguing that the current administration has failed in its fundamental duty to safeguard citizens.
While the Kwara State Government has issued denials, asserting no arrests occurred within its borders and no authority to distribute prohibited arms, CSMR maintained that such responses fall short without verifiable independent scrutiny.
society
SPECIAL PROMOTION OF PRESIDENT’S ADC SPARKS CONTROVERSY: QUESTIONS RAISED OVER MERIT, PROCESS, AND MILITARY INTEGRITY
SPECIAL PROMOTION OF PRESIDENT’S ADC SPARKS CONTROVERSY: QUESTIONS RAISED OVER MERIT, PROCESS, AND MILITARY INTEGRITY
society
Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign
Cyber-Armageddon at Our Fingertips: Apple & Google Rush Emergency Updates to Thwart Sophisticated Zero-Day Hacking Campaign.
By George Omagbemi Sylvester | Published by SaharaWeeklyNG.com
“A Chilling Exposé of Unprecedented Cyber Threats, State-Linked Exploitation and the Battle for Digital Sovereignty.”
In a dramatic and sobering turn of events this December 2025, two of the world’s most revered technology giants (Apple and Google) have been forced to issue emergency cybersecurity updates in response to a sophisticated, actively exploited hacking campaign that has shaken the global digital ecosystem to its core. This episode not only reveals the raw power of advanced cyber adversaries but also lays bare the fragility of modern digital life, reminding every connected individual that no device is truly immune without vigilant defense.
At the heart of this crisis are zero-day vulnerabilities and security flaws unknown to software makers at the time of exploitation, leaving users defenseless until a fix arrives. These zero-day bugs are among the most dangerous security threats in existence precisely because they offer no warning; they represent blind spots in our digital armor that sophisticated attackers can and do exploit without limitation.
The Crisis Unfolds: Emergency Response from Silicon Valley. In mid-December 2025, Google released urgent patches for a series of critical security flaws in its Chrome browser—one of which was already being exploited in the wild by malicious actors before the patch could even be completed. The company’s initial decision to withhold details underscores the seriousness of the incident, a rare move reflecting an ongoing investigation into exploit activity.
Shortly thereafter, Google clarified that the vulnerability was discovered by Apple’s Security Engineering team working in collaboration with Google’s Threat Analysis Group (TAG)—a specialized unit renowned for tracking government-linked threat actors and mercenary spyware sellers. This collaboration alone signals the gravity of the threat, suggesting state-level resources or highly resourced private actors were involved.
Almost simultaneously, Apple unleashed a sweeping suite of emergency updates for devices across its ecosystem—iPhones, iPads, Macs, Apple Watches, Apple TV, Vision Pro headsets and Safari browsers. In formal advisories, Apple acknowledged that two zero-day vulnerabilities “may have been exploited in an extremely sophisticated attack against specific targeted individuals” on devices running older versions of iOS prior to iOS 26. This is the same phrasing Apple historically has used to signal confirmed real-world exploitation, often in espionage campaigns.
Understanding Zero-Day Vulnerabilities: The Invisible Threat. To grasp the magnitude of this crisis, one must understand what zero-day vulnerabilities represent in cybersecurity. A zero-day flaw is a software defect unknown to developers at the time hackers discover and exploit it, leaving developers with “zero days” to prepare a defense before exploitation begins. This creates a perfect storm for attackers: no signature exists in security tools, no patch is available, and unsuspecting users carry on with business as usual.
Security expert Bruce Schneier (renowned cryptographer and cybersecurity authority) has described zero-days as “the crown jewels of cyberattackers”, because they can be weaponized to bypass traditional cyber defenses, compromise sensitive data, and infiltrate personal and institutional devices without detection. His words resonate profoundly in the context of the present crisis.
The Engine Behind the Attacks: WebKit and Memory Corruption Flaws.
In Apple’s case, the two patched vulnerabilities (CVE-2025-43529 and CVE-2025-14174) both reside in WebKit, the web rendering engine that drives not just Safari but all iOS web content across apps. These flaws include a use-after-free condition and a memory corruption issue, both classic exploits that allow attackers to execute arbitrary code simply by tricking a device into processing malicious web content.
What makes these bugs particularly dangerous is that WebKit is central to web content across platforms, meaning that merely visiting a malicious website could be enough to trigger an exploit—without any explicit user action. This bears eerie resemblance to historical spyware campaigns such as Pegasus, a notorious Israeli-made spyware capable of remote infection via zero-click exploits and extensive privacy invasion.
Coordinated Industry Action: Google and Apple Unite. The fact that Google’s Threat Analysis Group and Apple’s security team independently discovered and jointly addressed these flaws is notable. TAG is known for its focus on sophisticated attackers, including state actors and commercial spyware firms. Its involvement strongly suggests the hacking campaign was no ordinary cybercrime operation, but part of a highly targeted exploitation effort.
One of the bugs patched in Google Chrome (tracked internally as bug 466192044) was believed to allow memory corruption and arbitrary code execution. Google advised users to update to the latest safe release immediately to mitigate these risks.
Who Was Targeted? The Fog of Attribution. Neither Apple nor Google disclosed the identities or numbers of affected users. This ambiguity is typical in zero-day remediation: until patches are deployed, revealing too much can empower attackers to adjust tactics and expand operations. However, the explicit language used by Apple (that the vulnerabilities may have been exploited against specific targeted individuals) strongly implies high-value targets were in the crosshairs.
Past incidents reinforce this narrative. In previous years, zero-day exploits have been linked to espionage campaigns targeting journalists, diplomats, political activists, and human rights defenders—often leveraging spyware tools marketed by commercial vendors but deployed with the backing or tacit approval of nation-state actors.
The Broader Implications: A World Under Digital Siege
This combined emergency response from Apple and Google serves as a stark reminder: our digital infrastructures remain vulnerable to determined adversaries. The increasing sophistication of these attacks underscores a broader global trend—cyber threat actors, whether state-sponsored or commercial, are continually refining their tools, exploiting undisclosed defects, and penetrating even the most “secure” platforms.
Cybersecurity researcher Bruce Schneier has observed that “security is a process, not a product,” emphasizing that no system is ever perfectly secure. This holds true even for systems held up as gold standards in security engineering. The present crisis confirms that vigilance, rapid response, and constant iteration of defenses are essential in a world where attackers innovate faster than we often realize.
What Individuals and Institutions Must Do Now
The immediate lesson from this cybersecurity drama is clear: update all affected devices without delay. Emergency patches, while disruptive, represent the frontline defense against exploitation. Users should ensure their Apple devices are updated to iOS 26.2 (or the latest versions for Macs, Watches, and Vision Pro), and all Chrome installations are updated to the versions containing the latest security fixes.
Beyond patching, cybersecurity professionals stress the importance of multi-layered defenses, including:
Regular software updates
Endpoint protection and threat detection tools
User education on social engineering and phishing avoidance
Network segmentation in enterprise environments
Closing Reflection: A Call to Digital Arms
The recent emergency updates from Apple and Google are more than just technical bulletins; they are a clarion call to the global community about the evolving nature of cyber threats. In an age where smartphones and broadband are extensions of our very identities, these vulnerabilities strike at the heart of personal and organizational security.
Cyber threats will continue to evolve as long as we innovate, but so too must our defenses. The strategy must be relentless preparation, robust response, and continuous improvement—transforming each crisis into a catalyst for stronger, more resilient digital ecosystems.
As the world watches and patches roll out, one lesson stands above all: cybersecurity is not merely an IT issue, it is a societal imperative.
-
Politics6 months agoNigeria Is Not His Estate: Wike’s 2,000‑Hectare Scandal Must Shake Us Awake
-
society6 months agoJUSTICE DENIED: HOW JESAM MICHAEL’S KINDNESS WAS TURNED AGAINST HIM
-
celebrity radar - gossips4 months agoWhy Babangida’s Hilltop Home Became Nigeria’s Political “Mecca”
-
society4 months agoPower is a Loan, Not a Possession: The Sacred Duty of Planting People






