ISIS follows its unforgiveable murder of a journalist with a chilling intrusion into her Facebook account, which observers read as a search for her contacts.
Evidence tying disruption of Ukraine's power grid to Russia accumulates: "It is a Russian actor operating with alignment to the interest of the state," iSight Partners says. And here, too, inspiration may conceivably replace command-and-control, since iSight goes on to add, "Whether or not it's freelance, we don't know."
The user-account compromise Linode recently sustained was accompanied by denial-of-service attacks that, observers say, served as misdirection for data theft.
Talos takes a look at the Rig exploit kit and sees interesting similarities to Angler.
Lookout finds (and Google removes) thirteen malicious "Brain Test" apps from Google Play.
Check Point reports finding a vulnerability in the EZCast streaming television dongle that can provide attackers access to a user's home network. This flaw, with those recently found in some Comcast Xfinity products, arouses more consumer-level worries about the Internet-of-things.
The US Federal Government mops up issues emerging from the backdoor Juniper Networks disclosed in some products. A University of Illinois researcher reports that Juniper added the insecure algorithm that enabled the backdoor after it had already implemented a more secure algorithm.
Mozilla retreats from banning SHA-1 as it finds the consequences of deprecation more widespread than initially envisioned.
In meetings today, the US Government solicits the tech industry's help against terrorism. That industry also pushes back against proposals in the UK and elsewhere that would weaken encryption.