The PurpleUrchin freejacking campaign. Bluebottle activity against banks in Francophone Africa. The PyTorch framework sustains a supply-chain attack. 2022's ransomware leaderboard. Cellphone traffic as a source of combat information.\xa0FBI Cyber Division AD Bryan Vorndran on the interaction and collaboration of federal agencies in the cyber realm. Our guest Jerry Caponera from ThreatConnect wonders if we need more "Carrots" Than "Sticks" In Cybersecurity Regulation. And two incommensurable views of information security.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/3\n\nSelected reading.\nAn analysis of the PurpleUrchin campaign. (CyberWire)\nPurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources (Unit 42)\nBluebottle observed in the wild. (CyberWire)\nBluebottle: Campaign Hits Banks in French-speaking Countries in Africa (Symantec)\nPyTorch incident disclosed, assessed. (CyberWire)\nPyTorch dependency poisoned with malicious code (Register)\nCompromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. (PyTorch)\nMost active, impactful ransomware groups of 2022. (CyberWire)\n2022 Year in Review: Ransomware (Trustwave)\nRussia says phone use allowed Ukraine to target its troops (AP NEWS)\nFor Russian Troops, Cellphone Use Is a Persistent, Lethal Danger (New York Times)\nKremlin blames own soldiers for Himars barracks strike as official death toll rises (The Telegraph)\xa0\nNo Water\u2019s Edge: Russia\u2019s Information War and Regime Security (Carnegie Endowment for International Peace)\nLearn more about your ad choices. Visit megaphone.fm/adchoices