3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/78\n\nSelected reading.\n3CX Hackers Also Compromised Critical Infrastructure Firms (Infosecurity Magazine)\nThat 3CX supply chain attack keeps getting worse (Register)\nEnergy sector orgs in US, Europe hit by same supply chain attack as 3CX (Record)\xa0\nEven more victims found in complex 3CX supply chain attack (CybersecurityConnect)\xa0\nX_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe (Symantec Enterprise Blogs)\xa0\nURGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)\nPaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise (Horizon3.ai)\xa0\nRussian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers (The Hacker News)\xa0\nCISA KEV Breakdown | April 21, 2023 (Nucleus Security)\nCISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)\nCISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug (The Hacker News)\xa0\nCISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog (Record)\nBumblebee Malware Distributed Via Trojanized Installer Downloads (Secureworks).\nGoogle ads push BumbleBee malware used by ransomware gangs (BleepingComputer)\xa0\nBumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers (Record)\xa0\nDecoy Dog malware toolkit found after analyzing 70 billion DNS queries (BleepingComputer)\xa0\nAnalyzing DNS Traffic for Anomalous Domains and Threat Detection (Infoblox Blog)\xa0\nAirman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known (New York Times)\xa0\nFBI leak investigators home in on members of private Discord server (Washington Post)\nFrom Discord to 4chan: The Improbable Journey of a US Intelligence Leak (bellingcat)\xa0\nEurope\u2019s Planes Keep Flying Despite Cyberattack (Wall Street Journal)\nLearn more about your ad choices. Visit megaphone.fm/adchoices