The two major competing jihadist brands pursue somewhat different lines of attack. ISIS concentrates on information operations (currently going through a rough patch with countermessaging, counterhacking, and arrests making inroads against it) with an incipient threat to infrastructure hacking that UK authorities seem to be taking seriously. Al Qaeda is apparently working to hide bombs in IT devices for smuggling through airport security.
Two new RATs are observed in the wild: Felismus (by Forcepoint) and RedLeaves (by JPCERT).
The International Association of Athletics Federations (IAAF) reports being compromised by Fancy Bear, the latest in a series of athletic association hacks since a number of Russian Olympians were booted from Rio last year on doping beefs.
Attribution skepticism induces some to call official findings of Russian DNC doxing a "cyber Tonkin Gulf" incident. (Recent skepticism from the left speculates that the DNC emails were leaked by an insider.) We don't know about this case (there's much evidence of active Russian influence operations, so this doesn't look like radar ghosts and dolphin wakes), but we do agree that hasty and mistaken attribution is problematic, especially when governments consider kinetic retaliation for cyberattacks. (And the CyberWire has been warning about the possibility of a cyber Tonkin Gulf incident since October 2013.) FBI investigations continue, as do those in both houses of Congress. The Senate's hearings are concentrating on Russian disinformation operations.
WikiLeaks' latest dump of purported CIA cyber-operations documents is said to reveal Langley's obfuscation techniques (which some read as a false-flag capability).