Reports continue that North Korean targets have been infected with Konni and Inexsmar espionage tools. The incidents are not attributed, but speculation inevitably centers on the likelihood that the cyberattacks have been prompted by Pyongyang's increasingly aggressive and threatening missile and nuclear weapons programs.
Ukrpshoshta, Ukraine's postal service, on Monday and Tuesday came under a sustained distributed denial-of-service attack. Package-tracking was particularly disrupted.
The extortionist "Mr. Smith" claiming responsibility for the HBO hack has escalated his (her? their?) game by releasing mobile phone numbers belonging to Game of Thrones stars. "Mr. Smith" threatens a bigger release today if his demands for a six-month "salary" thought to amount to about $6 million are not met.
SurfWatch publishes an analysis that concludes the big story in cybercrime so far this year has been the extent to which it's been fueled by leaked Government exploits.
The business fallout from Wannacry and NotPetya continues, but observers think that not only could enterprises have done more to fend off the attacks in the first place, but that as a whole the world is lagging in preparing to avoid any recurrence.
A property cyber scam alerts the real estate industry to threats.
SAP patches some nineteen flaws in its products this week. Siemens is at work on a fix for medical scanner vulnerabilities.
Here's a dog that didn't bark: EU observers say Kenya's elections appear to have been conducted without vote-tally manipulation. (But then most "election hacking" has involved influence operations, not directly finagling the count.)