PLA hacking — from both the recently disclosed and attributed Putter Panda campaign as well as a resurgent APT 1 — leads the news and prompts discussion of differences between state-sponsored and criminal cyber operations. Cyber criminals tend toward the opportunistic: if you prove a harder target than your peers, they'll probably look for easier scores. State intelligence services display more focus, patience, and resources: carefully crafted infection vectors like Putter Panda's infrequently emerge from the black market.
The US and China continue their stare-down, with their respective national corporate champions seeing threats (US) and opportunities (China) in the marketplace.
Ukrainian media push back at Russian ambitions with what amount to citizen information operations.
Online betting shops fortify themselves in cyberspace as criminals seek World Cup marks. Anonymous defaces some Brazilian sites to protest the Cup's allegedly plutocratic matrix (and for some reason also goes after New York election commissioners).
Denial-of-service attacks seem to be on the rise. The ZeuS kit has evolved from its original banking fraud roots into a DDoS tool. Cloudflare is offering free DDoS protection to qualifying "citizen journalists and activists."
Twitter works to correct a Tweetdeck cross-site scripting vulnerability. Observers differ as to the episode's seriousness, but sensible precautions are surely in order.
Restaurant chain P.F. Chang's investigates an apparent paycard breach.
The recent takedown of GameOver ZeuS involved both extensive reverse engineering and collaboration among international police agencies, security companies, and universities. It was a valuable win, but it won't suppress the criminal market for long.