China sets sights on US critical infrastructure.

Published: Dec. 11, 2023, 9:10 p.m.

China allegedly targets US critical infrastructure, while a small Irish village goes without water due to an Iranian CyberAv3ngers attack. The EU sets a global precedent with new AI regulations. Unraveling the latest maneuvers of the Lazarus Group. The Sandman APT's links to Chinese cyber threats. "5Ghoul" vulnerabilities represent\xa0 a new challenge in telecom security. The deceptive dangers of the MrAnon infostealer in a booking app. The GRU's phishing tactics lead to the spread of Headlace malware. On today\u2019s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K\u2019s President Simone Petrella about DXC\u2019s \u201cAll in on Cyber\u201d program. And 23andMe's controversial update to its terms and conditions.\nRemember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nOn today\u2019s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K\u2019s President Simone Petrella about DXC\u2019s \u201cAll in on Cyber\u201d program. Kristie is DXC\u2019s Senior Vice President and Chief Information Officer.\xa0\n\nSelected Reading\nChina\u2019s cyber army is invading critical US services (Washington Post)\xa0\nHackers hit Erris water in stance over Israel (Western People)\nFBI: Cyberattack against Aliquippa water authority was a targeted 'escalation' on overlooked technology (Post Gazette)\nWhite House aide says Iranian hack of US waterworks is call to action (C4ISRNet)\nEU reaches deal on landmark AI bill, racing ahead of US (Washington Post)\xa0\nOperation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang (Cisco Talos)\nSandman APT | China-Based Adversaries Embrace Lua (SentinelOne)\n5Ghoul\xa0 : Unleashing Chaos on 5G Edge Devices (Singapore University of Technology and Design)\nMrAnon Stealer Spreads via Email with Fake Hotel Booking PDF (Fortinet)\xa0\nITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware (Security Intelligence)\n23andMe changes terms of service amid legal fallout from data breach (Axios)\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 2023 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices