Patch Tuesday. CISA releases two ICS Advisories and makes some additions to its Known Exploited Vulnerabilities Catalog. Dark Pink APT is active against Asian targets. Kinsing cryptojacking targets Kubernetes instances. Ukrainian hacktivists conduct DDoS against Iranian sites. Risk exposure and a hospital's experience with ransomware. The Health3PT initiative seeks to manage 3rd-party risk. Tim Starks from the Washington Post\u2019s Cyber 202 on cyber rising to the level of war crime. Our guest is Connie Stack, CEO of Next DLP, on the path to leadership within cyber for women. And phishing with Pok\xe9mon NFTs.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/7\n\nSelected reading.\nThe Daily 202 (Latest Cybersecurity 202)\nMicrosoft Releases January 2023 Security Updates (CISA) >\nAdobe Releases Security Updates for Multiple Products (CISA)\xa0\nBlack Box KVM (CISA)\nDelta Electronics InfraSuite Device Master (CISA)\nKnown Exploited Vulnerabilities Catalog (CISA)\nDark Pink (Group-IB)\nNew Dark Pink APT group targets govt and military with custom malware (BleepingComputer)\nKinsing cryptojacking. (CyberWire)\nUkraine at D+321: "Difficult in places." (CyberWire)\nIranian websites impacted by pro-Ukraine DDoS attacks (SC Media)\xa0\nRansomware attack against SickKids said to be unusual. (CyberWire)\nHealth3PT seeks a uniform approach to healthcare supply chain issues. (CyberWire)\nBreaking the glass ceiling: My journey to close the leadership gap. (CyberWire,\xa0Creating Connections)\nPok\xe9mon NFTs used as malware vectors. (CyberWire)\nLearn more about your ad choices. Visit megaphone.fm/adchoices