ISIS has shown dismayingly effective information operations online and (especially) in social media. Observers see signs it may be acquiring broader, more sophisticated espionage and attack capabilities as well — ISIS isn't by any stretch the DPRK "city killer" of recent imagination, but its reach is growing. Note that June 29 is reckoned the Caliphate's anniversary: security specialists suggest increased vigilance as that date approaches.
Israeli cyber operators report a Hezbollah cyber campaign more advanced than any the group has hitherto undertaken.
Lawfare offers interesting speculation on the alleged Stuxnet whiff on Pyongyang's nuclear program.
A hacktivist group calling itself "Unicorn Nocturne" claims (in what Lawfare would probably call a "thinly sourced" story) to have pwned the security organs of the Chinese Communist Party.
Airbus confirms that flawed engine control software brought down the A400M destined for Turkey.
ESET tracks new variants of the Linux/Moose malware family, these designed not only for DDoS, but also to goose social media stats.
The IRS post mortems continue as revenue agencies look to avert return fraud as observers note how PII compromises cascade from enterprise to enterprise. Bay Dynamics CEO Rifai draws some lessons on the importance of detecting anomalous behavior. EY expert Remnitz outlines the coming trends in cyber crime.
The Japan Pension Service is also compromised.
The next moves on US surveillance policy now rest fully with Congress.
Some wonder if crooks scamming crooks in cyber black markets is karma. We prefer to see it as a smack-down by the invisible hand.