Anonymous calls for a "day of rage" over Ferguson, Missouri, today.
Assad-sponsored (or at least supporting) malware worries observers in MENA and South Asia: it may be difficult for its operators to contain (if its operators care).
Reports surface that confidential files relating to the disappearance of MH370 were exfiltrated early in the investigation from Malaysian government systems to servers in China.
Kaspersky reports discovering a cyber-espionage campaign (they're calling it "Machete") that's focused on "high profile victims, including government, military, law enforcement agencies and embassies" for the past four years. Most of the targets are in Latin America, but the campaign has also been active in Russia, and (at significantly lower levels) North America and Europe.
Motives of the Community Health Systems hackers (still apparently Chinese) remain the subject of speculation, but the hack's enabling conditions are clearer, and overdetermined: loose patching, poor crypto, ineffectual network monitoring, inadequate data segmentation, and, oh, Heartbleed.
UPS discloses it's recently been the victim of Backoff retail point-of-sale malware. UPS says it contained the breach rapidly.
Gameover's rise from the botnet dead is being managed cautiously, the better to escape another swift takedown.
Bitcoin is being widely used as phishbait in targeted attacks on organizations.
Journalists seek to make our flesh creep with credible takes of 911 and traffic light vulnerabilities.
Stoners relax as the "Facebook Drug Task Force" is revealed to be a hoax.
Interesting comparisons are made between the cyber and maritime domains (but caveat lector — such compelling analogies can mislead).