LockBit 3.0 claims responsibility for Nagoya ransomware attack. Charming Kitten sighting. Spyware infested apps found in Google Play. Threats and risks to electric vehicle charging stations. Solar panels and cyberattacks. Dave Bittner speaks with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, to talk about CISA\u2019s effort for companies to build safety into tech products.Rick Howard sits down with Clarke Rodgers of AWS to discuss the mechanics of CISO roundtables. And Hacktivist auxiliaries remain active in Russia's hybrid war.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/127\n\nSelected reading.\nPro-Russian hackers target Port of Nagoya, disrupting loading of Toyota parts (The Japan Times)\xa0\nPort of Nagoya resumes operations later than planned after Russian hack (The Japan Times)\xa0\nRansomware Halts Operations at Japan's Port of Nagoya (Dark Reading)\xa0\nNagoya Port Faces Disruption After Ransomware Attack (Infosecurity Magazine)\xa0\nWelcome to New York: Exploring TA453's Foray into LNKs and Mac Malware | Proofpoint US (Proofpoint)\nTwo spyware tied with China found hiding on the Google Play Store (Pradeo)\nEV Charger Hacking Poses a \u2018Catastrophic\u2019 Risk (WIRED)\xa0\nExploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks (SecurityWeek)\nThe Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe (OODA Loop).\xa0\xa0\nRussian railway site allegedly taken down by Ukrainian hackers (Record)\nLearn more about your ad choices. Visit megaphone.fm/adchoices