Sweden's armed forces disclose that they've sustained a cyber attack from an unnamed source. The incident required the services to shut down their Caxcis IT system.
Saudi Arabia remains on high alert for further infestations of system-killing Shamoon 2 malware. The infection is thought to be carried, for the most part, by malicious emails. See Symantec's report for an account of Shamoon's possible connection to the Greenbug cyber espionage group.
Bugs in AlphaBay, the big Dark Web "trading post" (as ZDNet calls it), have permitted a hacker (grey or black hat, take your pick) to obtain and leak more than 200,000 messages exchanged on the site.
A new strain of VirLocker, an easily spread but also easily defeated ransomware variant, is out in the wild. Both Sophos and ESET have provided decryption tools for earlier versions, but this latest edition seems even more easily thwarted than that, according to Malwarebytes researchers. Entering any sixty-four characters into the lock screen's text box (sixty-four zeroes will do, says Help Net Security), click "Pay Fine," and VirLocker touchingly believes it's been paid. In other ransomware news, the St. Louis, Missouri, library system has successfully recovered from its extortion incident because it had an effective file backup program in place.
Russian authorities have arrested Ruslan Stoyanov, a senior researcher at Kaspersky Lab, on charges of treason. Kaspersky itself seems not implicated, as the alleged offenses date to Stoyanov's pre-Kaspersky employment with Russia's Interior Ministry. It's thought those alleged offenses may involve corruption, not espionage.