Most security experts have reached consensus that the DNC hack was a Russian job, and in all likelihood a Russian-government job (albeit in a deniable, green-manish way). Evidence remains necessarily circumstantial, but a great deal of it has accumulated. Why the Russian government would be interested in hacking the DNC remains an open question—perhaps the sheer inertia of collection, possibly a desire to influence US elections.
As Turkey cracks down on dissenters and moves closer diplomatically to Russia, some see the DNC hacks as part of President Putin’s long game to discredit post-Cold-War democracy and dismantle sustaining institutions like NATO and the EU.
Why WikiLeaks released the hacked documents is no mystery at all: Julian Assange says he timed the release to damage US Democratic Presidential nominee Hillary Clinton, whom he views as an inveterate opponent and the author of many of Assange’s troubles.
ISIS claims credit online for the horrific attack outside of Rouen. Its haste to do so suggests the sort of content it finds effective in information operations.
Bastille Networks describes “KeySniffer,” a keylogging vulnerability in low-cost Wi-Fi keyboards that don’t encrypt keystrokes before sending them to the Wi-Fi dongle. (Bluetooth devices aren’t affected.)
Rapid7 reports nine vulnerabilities in Osram’s Lightify smart lightbulbs, the most serious of which could permit attackers to capture authentication handshakes. Osram has patched four of the nine bugs.
Insinia Security reports finding UK telco O2 customers’ credentials for sale on the dark net. The credential stuffing problem originates in password reuse.