OpIsrael may have largely fizzled, but attackers continue to seek new targets, including the Nigerian Ministry of Energy (for exporting oil to Israel). Elsewhere in the Middle East the Syrian Electronic Army defaces US NPR sites apparently out of displeasure over NPR's coverage of Syria's civil war.
The WordPress attacks, now characterized as a brute-force campaign continue, and observers note with concern their probable connection with earlier attacks on banks—the attackers appear to be assembling botnets that could be used in fresh campaigns against the financial sector.
Microsoft has found a Trojan (Nemin.gen) that erases itself to defeat reverse engineering and forensic analysis. It's also unusual in that the downloader is itself the payload.
Digital Defense announces discovery of a zero-day vulnerability in Dell EqualLogic storage solution that could enable a remote unauthenticated attacker to steal files. Kaspersky finds a new piece of Android malware targeting Uyghur activists.
A cyber riot brews up between Indian and Brazilian hacktivists: apparently national pride is at issue. Turkish hackers attack, with no clear motive, Taiwan's Gigabyte Technology.
Retailers and other businesses might learn from Schnucks' recent experience with a point-of-sale breach. The US Midwestern supermarket chain has a reputation for sophisticated early adoption of technology, and they are unlikely to have been a soft target. But their experience shows the increasing cunning and rapacity of cyber criminals.
Saudi Arabia plans a five-year $400M investment in data loss prevention. The US National Institute of Standards and Technology advances its public-private cyber framework partnership.