An analysis of Royal ransomware. PaperCut vulnerability detection methods can be bypassed. Man-in-the-middle phishing attacks are on the rise. A new wave of BEC attacks from an unexpected source. Thomas Etheridge from CrowdStrike, has the latest threat landscape trends. Our guest is Dan Amiga of Island with insights on the enterprise browser category. And a look into recent Russian cyberattacks against Ukraine.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/89\n\nSelected reading.\nThreat Assessment: Royal Ransomware (Unit 42)\nPaperCut Exploitation - A Different Path to Code Execution (VulnCheck)\nNew PaperCut RCE exploit created that bypasses existing detections (Bleeping Computer)\nMan-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 (Cofense)\nExploring the Rise of Israel-Based BEC Attacks (Abnormal Security)\nRussians launch mass cyber attack on online service for queueing to cross border by trucks (Ukrainska Pravda)\nReverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613) (CERT-UA)\nLearn more about your ad choices. Visit megaphone.fm/adchoices