German authorities have long been concerned about the security of the Federal elections, scheduled for September 24th, and have sought to increase cyber readiness appropriately. Election-related cyber operations appear to have begun, as a CDU/CSU party colleague of Chancellor Merkel says her website has sustained attacks (type unspecified) mounted from a large number of Russian IP addresses.
Citing irregularities in electronic balloting, late last week Kenya's supreme court nullified the results of that country's presidential election. Voting will be reprised within the next two months.
Bitdefender researchers have connected the Pacifier APT to the Turla Group (in turn connected to Russian intelligence services).
Palo Alto Networks' Unit 42 reports that a wave of KHRAT Trojan infections across Cambodia appears politically motivated, evidently designed to surveil or disrupt domestic political activity. No attribution, but the attacks coincide with the Prime Minister's suspension of the country's leading opposition daily.
Sometimes rival, sometimes cooperating jihadist groups continue online recruiting and inspiration efforts. US Cyber Command is said to be conducting cyber operations that mirror US kinetic action against ISIS. The intention is to deny the caliphate physical and virtual safe havens.
More misconfigured AWS S3 buckets expose information that ought to have remained private. UpGuard found resumes submitted to security firm TigerSwan exposed by recruiting vendor TalentPen. Kromtech researchers found user information belonging to Time Warner Cable customers exposed by Broadsoft, which developed Time Warner Cable's MyTWC app.
A largescale ransomware campaign has hit MongoDB databases.
Evolved Locky ransomware continues its recent rampage.