ISIS opponents (including some rivals from al Qaeda) push back with information operations.
The Putinist hackers who disrupted Ukrainian sites during the recent election sought to pass off old Russian atrocities in Chechnya as fresh Ukrainian murders of ethnic Russians in Donbas. FireEye (with appropriate lawyerly reservations) attributes the APT28 cyber espionage campaign to Russian security services. FireEye notes APT28's careful, sophisticated stealth, but the attribution rests on more than a priori probability.
A wide range of apparently unrelated targets (Uyghur activists, a US think tank, a Japanese industrial site, and the Korean hospitality industry — all, however, surely of some interest to China) suggests that several groups are using the ScanBox keylogger framework.
The Novetta-led industry group that's been investigating a long-running cyber espionage campaign has reported. They call the campaign "Operation SMN," and attribute it to the "Axiom Threat Actor Group" (said to be a Chinese government unit).
CrowdStrike reviews its research into Chinese and Iranian threats.
Intel researchers promise to show how they can forge RSA certificates by exploiting the Mozilla Network Security Services cryptographic library.
Industry observers cry up the importance of risk analysis (and suggest you do some before you buy cyber insurance). Some make it sound simple, flogging the familiar risk equation, but of course the devil's in the details (that is, in the values you assign those variables.)
Banks are increasingly taking stakes in cyber start-ups.
The US releases its cyber operations manual.
The FBI thinks it may have found the NSA's "second leaker."