ISIS continues its grotesque recruiting propaganda (some it seems to have run through Seattle).
The Israeli Defense Forces watch for signs of Hezbollah cyber capabilities and think they've spotted some.
Russia (whose intentions, SACEUR says in an evergreen remark, remain difficult to discern) apparently used an ad fraud botnet to goose approval for pro-Russian videos posted to DailyMotion.
Several new or at least evolved threats are reported in the wild. Crypt0L0cker (a Torrentlocker as opposed to a Cryptolocker variant: note the zeros in the name) is circulating in Europe, Asia, and Australia. Curiously, Crypt0L0cker seems coded to avoid devices in the US. An enhanced version of Dyre has gained some ability to evade commercial sandboxes. ESET announces discovery of Mumblehard, malware that exposes Linux and BSD systems to remote code execution. SANS reports a spam campaign distributing CTB-Locker (a.k.a. Critroni) ransomware. TROJ_WERDLOD, a new banking Trojan using techniques earlier seen in Operation Emmental, hits Japanese targets. And F-Secure provides an update on the CozyDuke espionage toolkit.
WordPress vulnerabilities remain under discussion, as do issues with D-Link and Trendnet Wi-Fi routers and Oracle's MySQL database.
Dropbox takes steps to block phishers from distributing Bartalex macro malware.
Revenant RawPOS point-of-sale malware appears in hotels and casinos on four continents. Other breaches affect retail customers of Harbortouch point-of-sale systems.
Barracuda patches firmware in its Web Filter appliances. Google introduces Password Alert, a Chrome extension designed to help users avoid exposing their passwords.
Airbus plans to file a criminal complaint over alleged BND snooping.