A long-running Russian cyber espionage campaign ("Sandworm," as it's been named by iSight) is uncovered targeting NATO and other organizations. The campaign operated for five years against actual and potential opponents of Russia's slow-motion re-engorgement of the Near Abroad. Sandworm exploited a Microsoft Windows zero-day; its malware is linked to the BlackEnergy kit.
Chinese security services succeed in compromising sites associated with Hong Kong's pro-democracy umbrella protesters. Those services also continue actions directed against Australian businesses. The US State Department looks askance at New York hotel acquisitions by the Anbang Insurance Group, thought closely associated with the PRC's ruling party.
Snowden levels fresh accusations of widespread surveillance at Britain's GCHQ. New Zealand's Five Eyes participation is also mentioned in dispatches.
The Syrian Electronic Army may be offering its own operating system, "SEANux." If they are, well, caveat emptor.
Tensions between India and Pakistan find continuing expression in cyber rioting.
Some possible good news from Uganda: the US Army says information campaigns are prompting mass defections from the bizarre, deplorable Lord's Resistance Army, long known for its record of atrocity and conscription of child-soldiers.
Shellshock remains a threat, turning up in Siemens industrial software.
K-Mart discovered a paycard breach Thursday, disclosing it first to the SEC, then generally in a press release Friday. The company and law enforcement are investigating.
Europol warns of Russian gang chatter auguring social engineering prep for a major attack on Western banks.
Snapchat's ephemeral photos endure, and leak. Dropbox suffers a compromise via a third-party site.