Those curious about how terrorist organizations establish persistent networks will find Perspectives on Terrorism's study interesting.
This week's outages at the New York Stock Exchange and United Airlines remain under investigation, but the emerging consensus is that they were unrelated and not the result of an attack. (Complex systems do fail, and their very complexity can constitute in effect a vulnerability, as discussions of ERP systems suggest.) The incidents have pumped up the valuations of some cyber security stocks.
The OPM affair in the US looks worse: over 21 million individuals' records are now acknowledged to have been compromised. Director Archuleta resigned this morning.
The consensus on the just-patched OpenSSL certificate verification bug is that it's serious, but not quite as serious as Heartbleed. Nevertheless, patch.
Hacking Team's data are still out there. Netragard, whose name appears amid those data, says it's pleased to be mentioned in dispatches, since the data make it look pretty good.
Those interested in the difference between bug hunting for fixes and bug hunting for exploitation may contrast accounts in (unrelated) stories by OpenDNS (the former) and Ars Technica (the latter).
VMware patches three products against a privilege-escalation vulnerability.
Singer and Cole make flesh creep with visions of what a World War III would look like (no spoiler: lots of cyber action).
Splunk buys Caspida, Avast Remotium, Fortinet Meru Networks.
The FBI still hasn't convinced encryption advocates that backdoors are either desirable or realistic (even after announcing it stopped terror attacks planned around Independence Day).