The FBI warns the US military of against the possibility of ISIS attacks against military personnel inside the United States, and strongly advises security and counterintelligence scrubbing of service (and service member) social media accounts.
The chair of the US House Intelligence Committee sees Iranian cyber attacks spiking should nuclear talks with the Islamic Republic break down.
The Sony hack (which the North Koreans decline to disavow, although they don't actually claim credit) prompts another FBI warning, this time to businesses. Reports say the Bureau regards the risk to corporate enterprises as high, and, because of the probability of data destruction, unusually dangerous. (Data corruption is a serious and lingering problem: the US Postal Service, for example, won't be releasing its required annual financial report because it cannot determine whether the hack it sustained this summer altered business data.)
Yesterday's news of apparently successful financial market manipulation remains the subject of analysis and speculation. "FIN4," as FireEye calls the group responsible, used sophisticated spearphishing (backed up by clever manipulation of email filters and warnings) to steal credentials and gain access to information on targeted companies. Most interested in healthcare and pharma, FIN4 sought data material to stock prices, notably merger-and-acquisition information. Observers think this was a criminal as opposed to state-sponsored operation, probably conducted by native or near-native speakers of English based in North America or Western Europe. That FIN4 was current in American investment-banking argot is telling. An interesting case of social engineering: phishing remains very much a threat.