8base ransomware is overlooked and spiking. GuLoader targets law firms. Akira ransomware for Linux systems targets VMs. Kaspersky tracks the Lazarus group: typos and mistakes indicating an active human operator. Charming Kitten goes spearphishing. Securing continuous integration/continuous delivery operations. No emojis for the SEC, please.Unconfirmed reports say the Wagner Group hacked a Russian satellite communications provider. Our guest is Hanan Hibshi from Carnegie Mellon's picoCTF team. Chris Novak from Verizon discusses their 2023 Data Breach Investigations Report (DBIR). And Anonymous Sudan wants you to know that they\u2019re not just a bunch of deniable Russian crooks\u2013where\u2019s the love, man?\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/124\n\nSelected reading.\n8Base Ransomware: A Heavy Hitting Player (VMware Security Blog)\xa0\nGuLoader Campaign Targets Law Firms in the US (Morphisec)\xa0\nAkira Ransomware Extends Reach to Linux Platform (Cyble)\xa0\nAndariel\u2019s Mistakes Uncover New Malware in Lazarus Group Campaign (Infosecurity Magazine)\nCharming Kitten Updates POWERSTAR with an InterPlanetary Twist (Volexity)\nCISA and NSA Release Joint Guidance on Defending Continuous Integration/Continuous Delivery (CI/CD) Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA)\nNSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments (National Security Agency/Central Security Service)\nWall Street Regulators\u2019 New Target: Emojis (Wall Street Journal)\xa0\nRussian satellite telecom Dozor allegedly hit by hackers (Cybernews)\nHacking Group Says It Attacked Microsoft for Sudan. Experts Say Russia\u2019s Behind It (Bloomberg)\xa0\n\u2018Hactivists\u2019 who targeted Microsoft claim they\u2019re working for Sudan (Fortune)\nLearn more about your ad choices. Visit megaphone.fm/adchoices