The Sony hack still dominates the news, and is likely to do so for some time (barring some comparably hysteria-inducing event). Official FBI attribution of the attack to North Korea just came out: the President may address the matter early this afternoon. (Heed the attribution, but also heed prudently skeptical voices from the security world. Cyber attribution is said to be notoriously difficult.) The soi-disant Guardians of Peace, generally regarded as a DPRK front, tell Sony they're pleased "The Interview" won't be released and promise not to leak any more embarrassing data. The Guardians even go so far as to say they'd be happy to watch the movie themselves as long as Kim Jong-un's death scene is edited out.
Other companies in other sectors have their guard up, since the Sony hack revealed both attacker capabilities and potential for economic damage. Some fear copycat attacks, others fear caving to demands will embolden fresh attackers, still others see this as the opening round in a new wave of state cyber offensives (power grid vulnerabilities are prominently mentioned in dispatches).
Assuming attribution to North Korea holds up, observers wonder what the US response will be. There's much talk of cyber war, but why this hack should constitute a casus belli (when other, lethal, kinetic attacks have not) puzzles some.
Elsewhere in the world an ISIS malware campaign fizzles, but it augurs a troubling interest in using cyber tools in actual kinetic combat support as well as a nascent capability for doing so.