Reports over the weekend describe a "suspected state hacking campaign" active against Israeli and European military targets. The campaign, which CrowdStrike and Cymmetria describe as looking like the work of a "second-tier" cyber power, adapted Core Security testing software into attack tools. There's no attribution, but sources close to Israel CERT speculate that Iran might be responsible. Others independently note a trend of cyber attacks adapting legitimate tools (and not just the obvious lawful intercept tools) to disruptive ends.
North Korea's Internet suffered another outage Saturday, cause unknown. CloudFlare suggests that, given the fragility of the DPRK's information infrastructure, if the event indeed proves an attack as opposed to a failure, the hacker is most likely to be "a 15-year-old in a Guy Fawkes mask."
Microsoft and Sony have restored their Xbox and PlayStation networks. LizardSquad members claim responsibility, with an insouciance about exposure to prosecution that would be startling in a brighter group, but seems about par for LizardSquad. See KrebsOnSecurity for a clear (and hostile) profile of the group.
Having fooled with gaming networks, LizardSquad turned its attention to Tor with s Sybil attack aimed at controlling a significant portion of the network. Tor is actively mitigating the attack and purging compromised relays.
US members of Congress scowl in the direction of China, which they feel must have known about the (alleged) DPRK attack on Sony. For its part China's party-controlled media task Sony and the US Government with careless security and failure to regulate more stringently, respectively.