Two new attack techniques similar to Spectre have been identified. These speculative execution side-channel attacks are researchers' discoveries, not attacks being observed in the wild. ARM, AMD, and Intel chipsets are all susceptible to the attacks. Speculative execution is a common and important feature of contemporary chip design, so any methods of exploiting it will have widespread impact. Intel, which paid a bug bounty of $100 thousand to the researchers, has offered advice on mitigating the issue. ARM says most of its chips are probably unaffected, but it has mitigation suggestions as well. AMD is still considering the matter.
Manuals covering, among other militaria obtained from US sources, the MQ-9 Reaper drone and the MI Abrams main battle tank, have turned up for sale on the dark web. According to Recorded Future the asking price was only $200, knocked down recently to $150. The person responsible (described by Naked Security as a "sad sack") apparently had no real understanding of what he or she had, what it was worth, or where to sell it. But the sad sack knew enough to find Netgear routers with the password "admin" and follow familiar steps to exploit an FTP vulnerability, change the password, and get access. Some of the material appears to have been stolen from a US Air Force captain, other material is openly available from Defense Department sites. None of it is likely to be classified, but some at least was restricted from distribution to foreigners.
Twitter is purging bogus accounts.