Germany's Bundestag was able to fend off an attack on its networks in January. Mounted by unspecified third-parties through a compromised Jerusalem Post site, the attack came during a period of heightened tension and concern over the prospect of influence operations targeting Western European elections. (Such concern continues, with Russian operations prompting the most fear.)
US General Votel, commanding US Central Command (which operates in the Middle East) says ISIS has sophisticated cyber capabilities (meaning, probably, information operations capabilities) but that the US is making significant (unspecified) inroads against those capabilities.
Cisco's efforts ("scramble") to close vulnerabilities in its products disclosed in WikiLeaks' Vault 7 release draw fresh, critical media attention to the US Vulnerabilities Equities Process. Some observers ask why Cisco should have learned about the exploitable bugs from Assange's group and not the US Intelligence Community. (Others think the answer is obvious: CIA is an espionage service interested in collection, not quality assurance.)
Imperva reports that a new Mirai variant engaged in a fifty-four-hour distributed denial-of-service attack against an unnamed university network in the US.
A market failure in the black market might be regarded as a good thing, but perhaps not in this case: after failing to convince fellow criminals that his attack tool was worth buying, the creator of the NukeBot banking Trojan has simply released his (her?) source code to the world.
US prosecutors charge a State Department employee with "obstructing an official proceeding and making false statements." The underlying case involves spying for China.