Citizen Lab and security company Lookout disclose iOS persistent spyware they found on a UAE dissident's iPhone. The tool, "Pegasus," is an intercept product of NSO Group; it was apparently deployed by UAE authorities. The researchers were given the affected phone after its owner saw a suspicious text message on August 10. They located the exploits (which they've called "Trident") and disclosed them to Apple. Apple's patch, now generally available, was ready in ten days. The Citizen Lab and Lookout reports are linked below; see also commentary from Errata Security for brief, interesting perspective.
Cisco, Huawei, and Juniper Networks are said to be downplaying the impact of the Shadow Brokers' leaked exploits. The US Intelligence Community continues to investigate the incident.
Zscaler's ThreatLabZ reports finding a cybersquatting campaign that's delivering the AgentTesla keylogger.
The Ramnit banking Trojan is out and about, again, now afflicting six major British banks. Proofpoint tracks another banking Trojan, Dreambot (an Ursnif or Gozi ISFB variant) that's spreading via Tor.
Russia feels it's more sinned against than sinning in cyberspace, and points an accusatory finger Beijing-ward. Cybercrime rises in India as a function of device use. A FireEye study suggests many cyber incidents in the Asia-Pacific region are kept very quiet.
In the US, NIST issues a draft publication on de-identifying personal data in government systems.
The Canadian Security Establishment (CSE) has dramatically increased electronic monitoring; no one's quite sure why.
Clinton email sensitive content (more coming, by court order) prompts calls for a special prosecutor.