Thanks to our fans, sponsors, and supporters like you, we've grown from a small cyber security market intelligence briefing into a news service with readers and listeners in more than 120 countries. We'd like to say "thanks," and to invite you to help us continue to move forward by becoming part of our story as we bring the stories to you. Become a patron today and help us deliver the news you’ve come to rely on every day.

Last-minute email hack and the French election. (UK and Germany brace for similar operations.) Intel authentication bypass vulnerability scheduled to be fixed this week. HandBrake download server compromised.
Emmanuel Macron was elected President of France yesterday, despite eleventh-hour leaks of hacked emails. French election law (for the most part followed by the press) prohibits distribution of such material within forty hours of voting. Macron's En Marche movement disclosed that it had been breached shortly before the legally mandated blackout began. A variety of social and alternative media (several based in the US) did push the material (with some magnet linking by WikiLeaks). En Marche says most of the material is genuine, but that it's also been salted with fabricated content aimed at disinformation. The dump is very large and will take time to sort out, but preliminary looks suggest most of the material is anodyne, routine, not particularly scandalous.
French authorities, of course, are investigating, and early speculation about attribution looks toward Russia, since the incident resembles influence operations Russian intelligence services are generally (and officially) regarded as having conducted during the last US campaign cycle. Before the last-minute tranche of leaks, President-elect Macron had called for closer ties between French and US intelligence services.
British and German officials prepare for cyberattacks and influence operations against their own upcoming elections. German officials engage in public musing about hacking back at offending servers. (Predictable "Germany attacks" alarmism ensues.)
In more ordinary security news, the Intel chip authentication bypass flaw set to be fixed later this week seems more dangerous than initially thought. And a mirror download server for video-conversion app HandBrake has been compromised to serve the Proton RAT.
Today's issue includes events affecting France, Georgia, Germany, Russia, Slovakia, United Kingdom, and United States.
In today's podcast we talk with our partners at Terbium Labs: dark web expert Emily Wilson looks back at the annual Anonymous fizzle that is OpIsrael.