Anonymous ID: bde01d July 4, 2022, 8:45 p.m. No.16600764   🗄️.is 🔗kun   >>0771 >>0776 >>0787 >>0809 >>0921 >>1044 >>1162 >>1248 >>1291 >>1314

 

Police rule out 'act of terror' in Copenhagen shooting, send suspect to 24 days in mental facility

 

The victims ranged in age from 15 to 50

 

By Madeleine Hubbard

Updated: July 4, 2022 - 7:31pm

 

The suspect in the Copenhagen mall shooting in which three people were killed and several others injured has been sent to a psychiatric ward for 24 days, Danish officials said Monday.

 

Ten people were shot and 20 people were injured in the chaotic evacuation from the mall on Sunday in Denmark's capital, police said.

 

The suspect has been identified as a 22-year-old Danish man, who is in police custody.

 

The deceased include "a 17-year-old male Danish citizen, a 17-year-old female Danish citizen and a 46-year-old Russian man who lived in Copenhagen," officials said.

 

Four of the seven who were wounded are seriously injured, including two Danish women, ages 19 and 40, and two Swedish citizens, a 50-year-old man and a 16-year-old girl.

 

Two Danish teenagers, ages 15 and 17, were slightly injured from gunfire, as well as a 45-year-old Afghan man residing in Denmark.

 

Copenhagen police stated that the Copenhagen City Court ruled that the names of the victims and the suspect cannot be released.

 

"Our preliminary investigation continues to indicate that the perpetrator acted on his own," Chief Police Inspector Soren Thomassen said early Monday morning. "We are in the process of a massive and very extensive investigation, which will continue throughout the night and in the coming days."

 

He also said investigators plan on question the suspect Monday and that he is "known to people in the psychiatric field," as translated by CNN.

 

The last major mass shooting in Denmark occurred in 2015 when two people killed at a free speech event featuring a cartoonist famous for drawing the Islamic Prophet Mohammad

 

https://justthenews.com/world/europe/police-rule-out-act-terror-copenhagen-shooting-send-suspect-24-days-mental-facility?utm_source=sf&utm_medium=social&utm_campaign=twjtn

 

https://twitter.com/JustTheNews/status/1544103295865815042

Anonymous ID: bde01d July 4, 2022, 9:04 p.m. No.16600845   🗄️.is 🔗kun   >>0922 >>0961

>>16600833

>gives me hope that a few white hats in the MIL may still be pulling the strings.

 

Trump, Scavino, Patel, Grenel, Durham, fuck, even Banon are all free….not in jail.

 

That's all the proof you really need.

Anonymous ID: bde01d July 4, 2022, 9:11 p.m. No.16600876   🗄️.is 🔗kun   >>0922 >>0958

https://twitter.com/TheHackersNews/status/1544153367189958656

 

UPDATE your #Google Chrome browser for Windows, #macOS, #Linux and #Android devices to patch a newly discovered high-severity zero-day #vulnerability (CVE-2022-2294) that is being exploited in the wild.

 

https://thehackernews.com/2022/07/update-google-chrome-browser-to-patch.html

 

July 04, 2022Ravie Lakshmanan

Google Chrome Browser

 

Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild.

 

The shortcoming, tracked as CVE-2022-2294, relates to a heap overflow flaw in the WebRTC component that provides real-time audio and video communication capabilities in browsers without the need to install plugins or download native apps.

 

Heap buffer overflows, also referred to as heap overrun or heap smashing, occur when data is overwritten in the heap area of the memory, leading to arbitrary code execution or a denial-of-service (DoS) condition.

 

"Heap-based overflows can be used to overwrite function pointers that may be living in memory, pointing it to the attacker's code," MITRE explains. "When the consequence is arbitrary code execution, this can often be used to subvert any other security service."

 

Credited with discovering and reporting the flaw on July 1, 2022, is Jan Vojtesek from the Avast Threat Intelligence team. It's worth pointing out that the bug also impacts the Android version of Chrome.

 

As is usually the case with zero-day exploitation, details pertaining to the flaw as well as other specifics related to the campaign have been withheld to prevent further abuse in the wild and until a significant chunk of users are updated with a fix.

 

CVE-2022-2294 also marks the resolution of the fourth zero-day vulnerability in Chrome since the start of the year -

 

CVE-2022-0609 - Use-after-free in Animation

CVE-2022-1096 - Type confusion in V8

CVE-2022-1364 - Type confusion in V8

 

Users are recommended to update to version 103.0.5060.114 for Windows, macOS, and Linux and 103.0.5060.71 for Android to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.