Armis reports finding two zero-day flaws in Texas Instruments' Bluetooth Low-Energy chips, widely used in Wi-Fi access points. An attacker would need to be within one-hundred to three-hundred feet of a vulnerable device to gain unauthenticated access to the supported Wi-Fi networks. Armis calls the issue "Bleeding Bit." Texas Instruments has issued a patch for the flaws.
US Cyber Command continues to reach out to individual Russian trolls to deter more extensive information operations aimed at US elections. The direct, unconcealed approach is thought to be disconcerting enough (the US Government knows you, and where you are, and what you do, and it won't forget) to give individual operators (if not the Russian government) pause.
Despite efforts to screen accounts for coordinated inauthenticity, social networks continue to find that denying information operators and their bots access to social media is harder than it looks. Vice News tested Facebooks new commitment to transparency by sending them political ads that falsely represented themselves as being paid for by one-hundred US Senators (that's all the Senators there are). Facebook approved all of them. It's an inherently hard problem.
Dueling bots and fake news sites continue to push rival versions of the murder of Jamal Khashoggi.
Bitdefender's free decryptor for GandCrab ransomware is thought to have deprived the crooks of about a $1 million in ill-gotten revenue. That's not a death-blow to GandCrab, of course, but nonetheless, bravo Bitdefender.
Zscaler has found that the matchmaking app Soulmates, found on Google Play, is actually spyware.