Challenges to intelligence-sharing. The complexity of supply-chain security. Ransomware developments. Notes on Russias hybrid war, including possible sensor data manipulation.

Published: Aug. 8, 2023, 8:30 p.m.

Reports on a 2020 Chinese penetration of Japan's defense networks. MOVEit-connected supply chain issues aren't over. Akamai looks at the current state of ransomware. Mallox ransomware continues its evolution. Machine identities and shadow access. Ukrainian hacktivist auxiliaries hit Russian websites. Joe Carrigan unpacks statistics recently released by CISA. Our guest is Jeffrey Wheatman from Black Kite discussing the market shift from SRS to cyber risk intelligence. And radiation sensor reports from Chernobyl may have been manipulated.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/150\n\nSelected reading.\nChina hacked Japan\u2019s sensitive defense networks, officials say (Washington Post)\xa0\nJapan says cannot confirm leakage after report says China hacked defence networks (Reuters)\nMOVEit hack spawned around 600 breaches but isn't done yet - cyber analysts (Reuters)\nMallox Ransomware Group Revamps Malware Variants, Evasion Tactics (Dark Reading)\nTargetCompany Ransomware Abuses FUD Obfuscator Packers (Trend Micro)\nNew IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers (Business Wire)\nUkraine-Linked Group Claims It Hacked Website Of Moscow Property Registration Bureau (RadioFreeEurope/RadioLiberty)\nUkraine-linked group claims it hacked Moscow property registration bureau website \u2013 RFE/RL (Euromaidan Press)\nPro-Ukrainian hackers breach Moscow engineering service website (New Voice of Ukraine)\nUkrainian state agencies targeted with open-source malware MerlinAgent (Record)\nThe Mystery of Chernobyl\u2019s Post-Invasion Radiation Spikes (WIRED)\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices