As Russia sleeps the sleep of repletion before further feedings on the near abroad, FireEye notes an interesting trend: a spike in malware callbacks to command-and-control servers as tension between Russia and Ukraine increased—probably worth adding to any list of indicators and warnings.
Iranian security services made effective use of both social media and front news organizations in recent espionage campaigns, but over-reached in their construction of fake identities: they impersonated former UN ambassador John Bolton, spent months cultivating trust with a (well-selected) US Baha'i advocate, connected through LinkedIn, but were blown by Google who warned the victim that someone from Tehran had tried to break into her Gmail account.
Investigators and researchers continue to work on two mysteries: how is the "Oleg Pliss" ransomware getting on iPhones, and what is actually up with TrueCrypt?
South- and Southwest-Asian hacktivists resume exploitation of targets-of-opportunity.
BitSight rates sectors on cyber security. From best to worst, they're finance, retail, energy utilities, and then healthcare and pharma.
Former US Defense Secretary and ex-DCI Gates says France is as big a cyber industrial espionage threat as China. Where there are advanced technological capabilities in a dirigiste political economy, there's also the likelihood of industrial espionage.
China continues to kick back at US indictment of PLA officers, suggesting evidence was fabricated.
NSA releases an email exchange between Snowden and its General Counsel. Snowden's email is so muted it hardly counts as whistleblowing. Perhaps IGs and OGCs should work on their ability to discern and read subtext?