Hacktivists go after national governments in Brazil (over plans for a dam) and the US (for various reasons). Anonymous has for some months been making successful low-grade nuisance attacks on US government sites, and a vaguely worded FBI report to this effect fuels much speculation about the techniques Anonymous is using to get in.
Radio Free Europe and Radio Liberty have sustained intermittent denial-of-service attacks since last week. Attribution and motive remain unclear, but many of the bots used in the attacks are located in Russia and China. (This means little for attribution, but does indicate where the criminal botnet market is moving.)
VBulletin denies hacker claims of a zero-day enabling them to execute shell commands on a server, but someone's selling an exploit claiming to do just that.
The Chinese gang APT12, blamed for last year's New York Times hack, may be back. Symantec researchers detect the gang's spoor in exploitation of Japanese Ichitaro word-processing software.
Bitdefender reports that fake AV "Antivirus Security Pro" is using stolen certificates to evade detection.
Vulnerabilities in JBoss Java EE application servers are being exploited in the wild to expose the HTTP Invoker service.
CryptoLocker ransomware continues its malign spread. One small Massachusetts police department actually pays up to get its files decrypted.
Chinese security authorities tighten their grip on that country's Internet and social media to shore up "national stability." Britain's GCHQ allegedly tracks diplomats' hotel reservations through its "Royal Concierge" program. UK PM Cameron defends (and praises) both GCHQ and NSA.