"So what do I get for becoming a Producer's Circle patron of the CyberWire?" we've been asked. Well, unlike that membership in the ShadowBrokers' exploit-of-the-month club you might have been considering (not that we'd necessarily recommend signing up for that club, Wealthy Elite), your support of the CyberWire gets you more than an EternalBlue tote bag or a Guccifer 2.0 bobblehead. You now receive exclusive access to our new Quarterly Report. If you'd like to see a sample (redacted, of course), here you go. And thanks to all the Patrons who've been so generous in their support of the CyberWire.

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com
Qatar accuses UAE of hacking, violations of international law. NotPetya's not over for shippers. Devil's Ivy vulnerability found in gSOAP IoT code. GhostCtrl, Adwind, are out, about, and dangerous. G-Men say don't buy kids IoT toys.
Qatar continues to accuse the United Arab Emirates of hacking Qatar News Agency and other targets to plan disinformation discreditable to Qatar's government. The Emirates continue to deny involvement. Relying on an anonymously sourced report in the Washington Post said to derive from the US Intelligence Community, officials in Qatar call the incident a violation of international law and several international agreements.
NotPetya continues to reverberate in the shipping and logistics sector even after the malware attack itself has been contained and remediated. Delays in receipt of various shipments are being ascribed to the attack. NotPetya's effect on FedEx seems, at the very least, to have put the brakes on the shipping company's full integration of its TNT acquisition. Other companies have experienced material consequences as well, which gives added point to insurance giant Lloyd's assessment that a major cyber attack could inflict worldwide damages in the range of $53.1 billion to $121.4 billion.
Axis Communications patched an issue Senrio researchers found with Axis high-end and widely used security cameras. Axis deserves some credit here, because they're early to the patching. The flaw, "Devil's Ivy," is found in the widely used open-source code gSOAP. The problem is widespread and extends far beyond Axis. The vulnerability is likely to endure, given the notoriously low rates at which IoT devices are patched.
GhostCtrl, a versatile Trojan afflicting Android devices, is active in the wild. So is a resurgent Adwind RAT.
The FBI warns parents against buying their children toys with IoT features.
Today's issue includes events affecting Australia, Bahrain, Egypt, European Union, France, Germany, Israel, New Zealand, Pakistan, Qatar, Russia, Saudi Arabia, Singapore, Thailand, United Arab Emirates, United Kingdom, and United States.
Artificial intelligence is key to making sense of big data and scaling security data analytics. The “spray and pray” shotgun approach is too expensive and too imprecise to combat advanced attacks. So how do you harness the power of AI to increase precision and to proactively stay ahead of advanced attacks? How do you evaluate threat hunting tools? Join an online fireside chat with guests Josh Zelonis and Stephen Pieraldi to get the answers.
In today's podcast we hear from our partners at the University of Maryland's Center for Health and Homeland Security, as Markus Rauschecker talks about how Facebook ran afoul of European privacy laws. Our guest is Tina Ladabouche, NSA GenCyber Program Manager, on the program that supports summer camp for middle school girls. And don't miss Recorded Future's latest threat intelligence podcast, produced in partnership with the CyberWire. This edition is the second part of their discussion of how to educate yourself for a career as a threat analyst.