Fighting in Gaza intensified over the weekend, accompanied by both Palestinian and Israeli information operations in social media. These aside, cyber operations in the conflict are so far apparently confined to jamming (by Israel) and website defacements (by Palestinian sympathizers).
Ukraine's SBU releases more intercepted phone conversations linking Russia with the insurgents' shoot-down of MH17. Russian security is observed altering Wikipedia pages to deflect blame for the atrocity (toward the Ukrainian government; few seem convinced).
Observers speculate that fighting in Gaza and Ukraine will prompt wider cyber warfare. Russian incursions into various Western networks, particularly diplomatic and energy sector networks, suggest that Russia at least has engaged in some battlespace preparation, but so far both conflicts have seen more information operations than classic cyber attacks. The destruction of MH17 has spawned both inflammatory pranks (hijacking sites to report bogus news reports that the US President's Air Force One had been shot down over Russia) and criminal scams (click trolling using #MH17 as phishbait).
MIT Technology Review warns of the risks posed by network-based steganography: Duqu's use of jpegs to transmit hidden information back to command-and-control servers is cited as an early example.
TrendLabs offers examples of smart meter attack scenarios — the sort of exploit one might encounter as the power grid is increasingly Internet-connected.
The market for insurance against cyber attack is, by consensus, growing rapidly, but insurers continue to grope toward credible actuarial methods in this unfamiliar space.
Investigators remain uncertain about attribution of the 2010 Nasdaq cyber attack.