Twitter has warned some users that their accounts "may have been targeted by state-sponsored actors." The warning's text suggests the actors may be looking for email addresses, IP addresses, or phone numbers. The BBC reports speculation that the state sponsoring the reconnaissance is either China or North Korea, but it's unclear whether this is based on evidence or a priori probability.
The US Justice Department describes ISIS/Daesh's social media "crowdsourcing of terrorism," where inspiration substitutes for command-and-control.
Anonymous takes a break from fighting ISIS to attempting a DDoS attack against one of Donald Trump's commercial websites. Their "#OpTrump" is prompted by the US presidential candidate's remarks about Islamic immigration. Other Anonymous cells romp farther afield, releasing personally identifiable information stolen from European Space Agency subdomains. The motive? The lulz.
FireEye describes "LatentBot" — obfuscated, modular, easily updated, and dangerous, but still pretty noisy, flagged by many AV products as a generic Trojan.
Ransomware continues its proliferation.
In Europe, Trend Micro sees something new: the development of a German cyber criminal underground. Not as big as that a few hundred kilometers to the east, but well-organized and active.
In industry news, LookingGlass acquires QinetiQ cyber unit Cyveillance.
Israel mulls calling for a NATO-like international organization for cyber security. The aspiration isn't Article 5 (collective response to attacks), "but rather...to detect and mitigate before Article 5."
Europe moves closer to a Safe Harbor replacement. France won't ban Tor or public Wi-Fi after all. US debates over both Wassenaar and controls over encryption resume.