As high-level Sino-American diplomacy (said to be "frank and productive") addresses cyber tensions, the US Department of Homeland Security acknowledges that Office of Personnel Management (OPM) networks were successfully attacked in March of this year. The attack was traced to China, but DHS stops short of attributing it to the Chinese government. The extent of penetration and data loss is unknown, or at least undisclosed, but the hackers were apparently after personal information on cleared US personnel.
Deep Panda appears to be a Chinese attempt to assess probable US courses of action with respect to Iraq and China's oil interests therein.
Combat in and around Gaza prompts hacktivist calls for an anti-Israel operation. Israeli security analysts expect denial-of-service attacks.
Foreign Policy marvels at ISIS/ISIL's information operations, asking bluntly how "a barbaric medieval caliphate" can use social media so deftly.
India's National Informatics Center was compromised to issue bogus Google certificates, quickly detected and revoked, but this is another blow to the shaky CA regime.
Cyphort discovers a "low-signal" campaign — "Nighthunter" — that's been quietly harvesting user credentials for five years. No attribution, but it appears to be reconnaissance for some unknown larger criminal or espionage effort.
FireEye finds the "BrutPOS" botnet active in the wild, going after poorly secured retail systems.
Zeus continues its evolution with a step back into retro obfuscation using PIF extensions.
The Blackshades RAT — multipurpose, easy-to-use, and relatively stealthy — remains a favorite of less technical cyber criminals.
Public disclosure of FireEye product vulnerabilities prompts discussion of NDAs.