Telerik exploited, for carding (probably) and other purposes. Cloud storage re-up attacks. Cybercriminals use new measures to avoid detection of phishing campaigns. "Winter Vivern" seems aligned with Russian objectives. Microsoft warns of a possible surge in Russian cyber operations. Boss Sandworm. Johannes Ullrich from SANS talking about malware spread through Google Ads. Our guest is David Anteliz from Skybox Security with thoughts on federal government cybersecurity directives. And don't fear the Reaper.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/51\n\nSelected reading.\nThreat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server (Cybersecurity and Infrastructure Security Agency CISA)\nThreat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server | CISA (Cybersecurity and Infrastructure Security Agency CISA)\nCISA: Federal civilian agency hacked by nation-state and criminal hacking groups (CyberScoop)\xa0\nUS govt web server attacked by 'multiple' criminal gangs (Register)\nThe Cloud Storage Re-Up Attack (Avanan)\nThreat Spotlight: 3 novel phishing tactics (Barracuda)\nWinter Vivern | Uncovering a Wave of Global Espionage (SentinelOne)\nIs Russia regrouping for renewed cyberwar? (Microsoft On the Issues)\xa0\nA year of Russian hybrid warfare in Ukraine (Microsoft Threat Intelligence)\nRussian hackers preparing new cyber assault against Ukraine - Microsoft report (Reuters)\nMicrosoft Warns Russia May Plan More Ransomware Attacks Beyond Ukraine (Bloomberg)\nThis Is the New Leader of Russia's Infamous Sandworm Hacking Unit (WIRED)\xa0\nWhat's known and not about US drone-Russian jet encounter (AP NEWS)\nRussia tries to retrieve downed US drone in Black Sea (The Telegraph)\nDowned U.S. drone points to cyber vulnerabilities (Washington Post)\nLearn more about your ad choices. Visit megaphone.fm/adchoices