The BBC points out that the cause of the explosion at the Natanz power distribution system remains unclear: Natanz has been the target of both cyber sabotage (with Stuxnet) and physical sabotage (the Homeland Tigers' bombing). Most coverage, like that in Slate, is treating the incident as a probable Israeli cyberattack, and is citing Israeli media reports in support of that conclusion. The Guardian notes that the incident displays the vulnerability to sabotage of industrial systems like those in the centrifuge facility at Natanz.
Iran says it intends to retaliate: "Iran's answer will be to take revenge against the Zionist regime at the right time and place," WION quotes a spokesman from the Iranian Foreign Ministry as saying. PressTV, Iran's English language news service, explains Tehran's policy more colorfully: "Israel awaits Iran’s response: terrifying days ahead for Zionist entity!"
The US Administration said that it had "of course" seen reports of the Natanz incident, that the US "was not involved in any manner," had nothing to add to public speculation, and that it expected this week's nuclear talks involving Iran to proceed as planned.
Researchers at Forescout and JSOF today reported their discovery of nine vulnerabilities (collectively "NAME:WRECK") in Domain Name System (DNS) implementations found in four widely used TCP/IP stacks. The researchers particularly note NAME:WRECK's effect on FreeBSD and Siemens' Nucleus NET.
Armorblox warns of a tax-season W-2 scam using Typeform for credential harvesting.
A researcher has tweeted proof-of-concept exploit code for a Chromium-based browser vulnerability, the Record reports.