Hacktivists strike in Syria (anti-government), Peru (LulzSec), and Saudi Arabia (anti-female driver).
Reports suggest Stuxnet was accompanied by a second exploit designed to disable Iranian uranium refining centrifuges at Natanz. (Note the broader implications for industrial control security, especially for the power grid.)
Strategy Page assesses China's Unit 61398, a PLA organization widely believed responsible for cyber espionage.
BadBIOS has dropped from the news lately, but the US Navy appears to take acoustic cyber threats seriously.
CryptoLocker ransomware continues to spread. Many US-based bots are joining Russian and Chinese ones in the distribution system.
Weak GitHub passwords are brute-forced; users should re-set them.
Australia's Cupid Media adds injury to its lovelorn customers' loneliness: over 40 million unencrypted personal records have been exposed. The attackers behind the recent Adobe breach are suspected.
Oversupply has driven down the black-market cost of stolen identities. Other investigations of the underground market reveal more on cyber arms merchants and crimeware-as-a-service.
Enterprises continue to look for better ways of sharing attack information and more dynamic approaches to supply chain security.
Shortages of skilled cyber workers prompt calls for more open immigration and further investment in education. A US Presidential plan to offer grants for tech education bears watching: it will probably disproportionately benefit cyber training.
Australia and Indonesia are in a major dust-up over allegations of Australian cyber espionage. US Senators continue their scrutiny of NSA.