ISIS information operations remain successful, but also provide grist for OSINT.
Indian hacktivists engage Pakistan in the Subcontinent's ongoing cyber riot.
Defense and security intellectuals offer thoughts on the future of warfare — cyber operations enable and shape new modes of conflict, with Russia's encroachment into the Near Abroad and ISIS's establishment in the Levant serving as early prototypes.
The Tyupkin (a.k.a. "PadPin") ATM malware originated in Russia, and Interpol warns infections may be spreading. F-Secure looks at some samples found in Malaysia — it's early for either attribution or assessment of them as Tyupkin variants, but there are at least similarities.
Proofpoint walks DarkReading through another Russian criminal campaign (the one directing the Qbot botnet) with special attention to evasion techniques.
The Sednit cyber espionage group is now using a custom exploit kit.
The Selfmite SMS Android worm resurfaces in more aggressive form, but it's still pursuing an affiliate marketing scheme.
Bad as the BadUSB vulnerability may be, many security analysts rate the likelihood low of any given user falling victim to it. Other observers rate various mitigation techniques.
Shellshock continues to be widely exploited. Yahoo reassures users their data are safe as it repeats its earlier retraction of Shellshock vulnerability. Future South Technology, who's been investigating the bug (amid public woofing at Yahoo), gets a visit from the FBI, which wants to know more about Future South's research techniques.
CSO and the Internet Storm Center independently discuss recent waves of false positives.
South Korea announces intent to preempt cyber attacks.