ISIS continues its depraved propaganda of the deed online, releasing video of two mass executions of Ethiopian Christians in Libya. The Caliphate's horrific record continues to succeed in attracting recruits, as weekend arrests of aspiring jihadists in Minnesota and California attest.
Haaretz reports Israeli military networks have fallen to a long-running phishing campaign. The IDF declines to confirm the incident.
Reports of Iranian cyber offensives prompt debate — are the observed probes reconnaissance, attack attempts, dry runs, or simply ordinary benign Internet traffic?
Hackers associated with the Russian government exploited Windows and Adobe zero-days to gather intelligence on Western sanctions imposed in response to Russia's incursions into Ukraine. The Pawn Storm campaign (also probably linked to the Russian government) shows renewed activity.
One of the more significant patches Microsoft issued last week, MS15-034, is being actively exploited in the wild.
Trend Micro reports that the Fiesta exploit kit is spreading. Cisco warns against falling for Upatre vectors.
The security outlook for the Internet-of-things looks, for now, gloomy. While industry analysts call for designing for security ab initio (a little late, perhaps, given that the Internet-of-things is already here), a senior official at the US National Institute of Standards and Technology calls the IoT "indefensible."
In industry news, venture capital surges into security start-ups.
Major integrator Raytheon is buying Websense for a reported $1.6B.
The US Army's counter-intuitive approach to addressing cyber labor needs: preserve the training investment by helping "transitioning" soldiers into the private sector, seeking thereby to develop public-private partnerships.