Researchers and analysts describe the reciprocal reinforcement of information operations and battlefield success.
US-Ukrainian military cooperation revives interest in "electronic warfare," with its irreducible cyber dimension (and cyber operators have much to learn from practitioners of the older discipline).
An Angler variant has been found infecting point-of-sale systems.
"Windows 10 upgrade" emails are ransomware vectors, warns Cisco.
TrueCrypt, abandoned by its makers, resurfaces in a Trojanized variant directed against Russian-speaking targets.
Researchers claim that customer feedback tool Aptean SupportSoft can be exploited to steal credentials and other sensitive information.
The demonstrated Jeep-hack and subsequent vehicle recall by Fiat-Chrysler (now under investigation by the US National Highway Traffic Safety Administration) as well as similar vulnerabilities reported in GM's OnStar system continue to trouble consumers and industry. And on Friday the US Food and Drug Administration warned hospitals to stop using Hospira's Symbiq infusion pumps: they may be vulnerable to remote exploitation. Lloyd's report on the cyber vulnerability of power grids — disturbing enough — is criticized on technical grounds: perhaps the report should have been even more disturbing.
The Royal Bank of Scotland says a service outage last week was the result of a hack.
Businesses are warned against third-party risks.
The New York Times reports the US has decided upon some unspecified retaliation against China for the OPM breach and other cyber capers. US officials repeat their familiar "impose-costs-on-hackers" policy, but also talk about establishing an international cyber-deterrence regime.
Italian authorities suggest a terrorist connection in the Hacking Team breach.