A massive credential dump hits the online underground. CISA and the FBI issue joint guidance on drones. TensorFlow frameworks are prone to misconfigurations. Swiss federal agencies are targets of nuisance DDoS. Cybercriminals hit vulnerable Docker servers. Quarkslab identifies PixieFAIL in UEFI implementations. Google patches Chrome zero-day. The Bigpanzi botnet infects smart TVs. Proofpoint notes the return of TA866. In our Threat Vector segment, David Moulton dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. And we are shocked- SHOCKED! - to learn that Facebook is tracking us.\xa0\nRemember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nThis segment of Threat Vector dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. This thought-provoking discussion, hosted by David Moulton, director of thought leadership at Unit 42, ffocuses on the current state and future trends of AI in cyberthreats. Discover how AI is reshaping the landscape of cyberattacks, the role of generative AI in threat actor tactics, and the challenges of attribution in AI-driven cyberattacks. Visit Unit 42 by Palo Alto Networks\ufeff to learn more.\xa0\nCheck out the Threat Vector podcast and follow it on your favorite podcast app.\xa0\n\nSelected Reading\nResearcher uncovers one of the biggest password dumps in recent history (Ars Technica)\nTroy Hunt: Inside the Massive Naz.API Credential Stuffing List (Troy Hunt)\nFeds warn China-made drones pose risk to US critical infrastructure (SC Media)\nTensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks (The Hacker News)\nSwiss Government Reports Nuisance-Level DDoS Disruptions (Data Breach Today)\nMalware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners (HACKREAD)\nPixieFail: Nine flaws in UEFI open-source reference implementation (Security Affairs)\nUpdate Chrome! Google patches actively exploited zero-day vulnerability (Malwarebytes)\nCybercrime crew infects 172,000 smart TVs and set-top boxes (Risky Biz News)\nRussian threat group COLDRIVER expands its targeting of Western officials to include the use of malware (Google Threat Analysis Group)\nSecurity Brief: TA866 Returns with a Large Email Campaign (Proofpoint)\nEach Facebook User Is Monitored by Thousands of Companies (Consumer Reports)\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 2023 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices