skip navigation
Subscribe to the CyberWire Email RSS Stitcher Google Play Music
Daily Briefing 2.15.19

GandCrab exploits unpatched plug-in. Big Tech and privacy, content moderation. Security testing for 5G. Info ops. Apophis Squad.

Supported by Recorded Future.
Daily Podcast 2.14.19

Former Air Force counterintelligence specialist indicted on charges of spying for Iran. Where’s the stolen Equifax data? Two alleged Apophis Squad clowns indicted.

Supported by Recorded Future and ObserveIT.
Recorded Future Logo ObserveIT Logo
Hacking Humans 2.14.19

On this Valentines Day edition of Hacking Humans, Joe and Dave examine romance scams, including the sad tale of woman bilked out of hundreds of thousands of dollars. There's a silly, non-murdering catch of the day, and Dave interviews Max Kilger from UTSA on the six motivations of bad actors.

Supported by KnowBe4
The Value Proposition of Finished Intelligence
David Carver explains the best ways to define finished intelligence and shares practical insights based on his experience collaborating with customers.
Research Saturday 2.9.19

The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.

Supported by Juniper Networds and Enveil
Week that Was 2.2.19

Time out. Doxing prominent Russians. Private eyes are watching you. Iran wants your PII. Legal and industry notes.

Recent Stories

Featured Stories

Active Threat Hunting Within Your Organization
Mike Morris, CTO at root9B, shares his professional journey from the military to the private sector, his philosophy on threat intelligence, and more.
Cosmic AES Signals and Space, February 2019
US National Intelligence Strategy. Space competition. Emerging technologies. Space Force. Procurement and prototypes. Industry notes.
Making the business case for privacy. — Special Edition

In this CyberWire special edition, our guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution...

Supported by Cylance
CyberWire-X 1.30.19

In the final episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we examine some of the game changing high profile breaches like Yahoo, Equifax and OPM, along with their impacts and lessons learned. Our guest is Dr. Christopher Pierson, CEO and founder of BlackCloak.

Supported by Gemalto
5th Annual Women in Cyber Security Reception
The CyberWire is pleased to present the 5th Annual Women in Cyber Security Reception on Thursday, October 18, 2018, in Washington, DC.
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly as a natural language, we construct embeddings of identifiers at scale using a concept similar to word2vec, in which the output is a vector of related identifiers and their proximity.

Sponsored Events

Are you holding an event? Feature it here! Contact us!

Support the CyberWire

Organizations from across the globe are invited to support the CyberWire Daily News Brief (news sponsors and event sponsors), or Daily Podcast through programming sponsorship.

For details on how to become a sponsor, please fill out the Contact Us form.

Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story.

Become a patron


If you like the CyberWire and think others would too, we'd appreciate it if you would spread the word!