Data\u2019s stolen from a US "Defense Industrial Base organization." Major sideloading cryptojacking campaign is in progress. Nord Stream and threats to critical infrastructure. US Cyber Command describes "hunt forward" missions in Ukraine. Andrew Hammond from SpyCast speaks with hacker Eric Escobar about the overlap of traditional intelligence and cybersecurity. Our guest is AJ Nash from ZeroFox with an update on the current threat landscape. Fraud meets romance.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/192\n\nSelected reading.\nImpacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization (CISA)\nCISA: Multiple government hacking groups had \u2018long-term\u2019 access to defense company (The Record by Recorded Future)\nUS Govt: Hackers stole data from US defense org using new malware (BleepingComputer)\xa0\nSide-Loading OneDrive for profit \u2013 Cryptojacking campaign detected in the wild (Bitdefender Labs)\nDrone-loaded seabed ship is latest weapon in Royal Navy's arsenal to counter Russian threat (The Telegraph)\nOpinion Undersea pipeline sabotage demands the West prepare for more attacks (Washington Post)\nUkraine Hasn\u2019t Won the Cyber War Against Russia Yet (World Politics Review)\xa0\nUSCYBERCOM Executive Director David Frederick Outlines Cyber Threats & Highlights Importance of Industry Partnerships (GovCon Wire)\xa0\nRomance scammer and BEC fraudster sent to prison for 25 years (Naked Security)\nLearn more about your ad choices. Visit megaphone.fm/adchoices