Israeli officials (as they cautiously mull unification of their national cyber assets, not wishing to disrupt Unit 8200) describe what they characterize as recent Iranian–led and –supported attacks on Israeli networks.
Effects of the US Office of Personnel Management (OPM) breach continue to ripple outward, affecting the rest of the Government both directly and by drawing critical scrutiny to other agencies' cyber practices: "Login creds for US agencies found scrawled on web's toilet walls," as the Register spins Recorded Future's findings. Concerns focus on compromise of security-clearance-related data. (That's the unsurprising story Newsweek reports concerning the FBI: the Bureau wasn't hacked, as the headline somewhat misleadingly suggests, but of course its personnel data passed through OPM.) OPM has released an account of what it's doing to clean up the problem, leading with an ill-timed paean to its current director's security leadership — Congress is unlikely to be mollified. NSA Director Rogers sounds a prim note of caution over attribution.
The Bundestag winces as it prepares to pay for cleaning up its surprisingly stubborn spyware infestation.
Researchers disclose significant vulnerabilities in Adobe Reader, Windows, and Android's Instapaper. The Dyre banking Trojan is proving newly troublesome. Symantec has an analysis.
US Defense Secretary Ashton Carter wants NATO to upgrade cyber defensive capabilities before it works on offense.
Spectrum management will have significant implications for the Internet-of-things, and manufacturers want the US Federal Communications Commission to get allocation policies right.
The US SEC hunts "FIN4," a criminal group believed responsible for cyber-enabled insider trading.