Indonesian hackers deface US State Department diplomatic mission sites. The motive is unclear: they may have done it just for the lulz.
The International Atomic Energy Agency (IAEA) warns member states it found malware on its networks in recent months. The IAEA doesn't think any data were lost.
International SOS—a medical and security service commonly used by study abroad programs—has been hacked, and users are advised to look to their data. This service sees heavy academic use, and it's worth reflecting that this episode, along with recent breaches at Sacramento State and Michigan State, can serve as a warning that academic networks represent a huge de facto BYOD experiment. It's no accident that uncontrolled endpoints, a vast attack surface, and attractive targets make them extraordinarily susceptible to attack. Note that younger users in universities and the workplace are so connected to their devices that they routinely ignore BYOD policies and prudent Internet hygiene. Surely there's work to be done here.
CryptoLocker ransomware continues to evolve in malice and efficiency. The SANS Institute blegs for info you may have on the campaign.
Here's a partial answer to what would fill Blackhole's niche in the criminal ecosystem: Cutwail hoods have replaced it with the Magnitude exploit kit.
SAP reports an "explosion" in its cloud revenue, which it happily attributes to post-Snowden surveillance backlash.
The Atlantic Council advises governments to get out of the way of industry cyber intelligence sharing. Governments worldwide struggle to evolve effective, workable security and privacy legislation.