A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a \u201csignificant forensic discrepancy\u201d in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundation. The FSB says NSA breached iPhones in Russia. Carole Theriault examines Utah's social media bills aimed at kids online. Our guest is Tucker Callaway of Mezmo to discuss the rise of telemetry pipelines. And spoofing positions and evading sanctions.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/105\n\nSelected reading.\nSupply Chain Risk from Gigabyte App Center backdoor (Eclypsium)\nAdo-be-gone: Armorblox Stops Adobe Impersonation Attack (Armorblox)\nDark Pink back with a bang: 5 new organizations in 3 countries added to victim list (Group-IB)\nSoutheast Asian hacking crew racks up victims, rapidly expands criminal campaign (CyberScoop)\nSuspected State-Backed Hackers Hit Series of New Targets in Europe, SE Asia (Insurance Journal)\nMitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive (Mitiga)\n2023-05-31 // SITUATIONAL AWARENESS // Spyboy Defense Evasion Tool Advertised Online (Reddit)\nAn In-Depth Look at Cuba Ransomware (Avertium)\nRussia\u2019s \u2018Silicon Valley\u2019 hit by cyberattack; Ukrainian group claims deep access (The Record)\nRussia says U.S. accessed thousands of Apple phones in spy plot (Reuters)\nFake Signals and American Insurance: How a Dark Fleet Moves Russian Oil (The New York Times\nLearn more about your ad choices. Visit megaphone.fm/adchoices