The US General Services Administration (GSA) discloses that its System for Award Management (SAM) may have exposed vendor information (including personally identifying information). The problem was reported on March 8 and fixed on March 10. In somewhat more welcome news from the US Government, NIST reports the National Vulnerability Database is back online.
Various hacktivist groups cyber-riot across Asia and North Africa. The Syrian Electronic Army hacks Human Rights Watch; the Syrian Cyber Eagles deface the official Saudi tourism site. Anonymous promises to "erase Israel from the Internet." Algerian Anonymous hits international targets of opportunity for disinterestedly anarchistic reasons. The Philippines National Telecommunications Commission is breached, and Malaysian authorities sensibly put "patriotic hackers" on notice that cyber-rioting is a crime, whatever its motivation.
Norwegian telco Telenor discloses that it's been the victim of a "sophisticated cyber espionage campaign."
China's new premier denounces US accusations of cyber war. Chinese Internet censorship may be tightening, and official media begin a propaganda campaign against Western businesses (Apple prominent among them). This early-stage trade war so far amounts to media bad-mouthing and official slow-rolling of business opportunities.
Huawei's USB modems and update server are said to be vulnerable (the server is called a "massive malware vector"). Ramnit malware is back and more evasive. A new version of the Zeus Trojan hits the black market. Security blogger Brian Krebs undergoes a cyber attack and spoofed-911 SWAT.
Internet Governance suggests a demand-side restraint on the malware black market. A US Federal Court halts National Security Letters.