Looking back at election hacking, it's worth noting that for all the crying of havoc (and legitimate concerns) about interference with US voting, other places probably had it worse. Consider Montenegro's experience, as described by Wapack Labs.
Since July ATM hackers (probably affiliated with the Buhtrap mob) have been at work, mostly in Taiwan and Thailand, stealing cash by inducing installation of a bogus firmware update that directed the machines to empty themselves. Taipei police realized something was amiss when they started receiving reports of cash lying around ATMs. This isn't conventional carding, but a direct manipulation of the ATMs themselves. Buhtrap has spawned at least one associated gang, "Cobalt," which has been active in Europe, and the FBI warns US banks that they could be at risk as well.
Cerber has now begun to target high-value database files for encryption and extortion. There is some good news on another ransomware strain, however: ESET has released a free decryption tool for Crysis ransomware.
Anubis Networks finds another Android backdoor, this one associated with software from Ragentek Group. The backdoor enables potential exploitation of over-the-air updating.
A patch fixes exploitable issues with Siemens-branded security cameras.
Check Point scans the malware landscape and finds that Conficker remains number one.
In industry news, Oracle announces it will acquire Dyn, recently famous as the victim of Mirai-DDoS. Telstra is buying security analytics shop Cognevo, part of the dissolving New Zealand security firm Wynyard.
The US Defense Department's Hack-the-Pentagon program gets more wide-open than ever.