F-Secure offers insight into Dark Seoul's spread through South Korean networks, but attribution remains cloudy. North Korea appears implicated in newly reported attacks on defector organizations operating from South Korea.
Turkish hackers deface McDonald's South Korean Website as part of a campaign against high-profile companies (several in the fast-food sector). The "Tunisian Cyber Army" hacks UPS and exposes customer information. A New Zealand government goof exposes Christchurch earthquake insurance claimants' personal information. Spam impersonates ADP Payroll Invoice emails.
Currently appearing in the wild: a revenant Grum botnet, Lime Pop Android malware, Yontoo (a Windows Trojan now infecting Macs), a new version of the TDL rootkit (abusing Chromium), and vSkimmer point-of-sale malware.
Palo Alto Networks reports that older ports are being exploited as attack vectors (68% of undetected infections, they say, arrive via browsing).
Apple, Mozilla, Novell, and HP address vulnerabilities in their products.
Dark Reading suggests that the protection security tools provide networks should be balanced against the complexity those tools also usually introduce (complexity itself being a major source of vulnerability). The oil and gas sector worries over its vulnerability to cyber attack, and Saudi Aramco warns that Shamoon-like attacks remain a threat.
Australian business media note sales advantages of security clearances. General Dynamics establishes a rapid response service. KEYW prepares more acquisitions.
Security experts mull the value of training and compliance.
US Federal agencies try to recruit cyber talent as early as middle school.
NATO and the US Government struggle toward a consensus on laws of cyber conflict.