skip navigation
Subscribe to the CyberWire Email RSS Stitcher Google Play Music
Daily Briefing 11.19.18

Cozy Bear is back, and spearphishing in US waters. Ukraine says it stopped a malware campaign. "Cyber 9/11s." CISA now law.

Supported by Recorded Future.
Daily Podcast 11.16.18

GPS jamming. Bank phishing. Exposed server. Censorship, East, West, and South. Is there a sealed indictment of Julian Assange?

Supported by Cylance, VMware, and Techmeme.
Cylance Logo VMware Logo Techmeme Logo
Hacking Humans 11.15.18

Listener feedback on the "Can you hear me?" scam. Dave shares an ongoing Elon Musk Bitcoin giveaway scam. Joe describes the malicious use of a compromised DHL email address. This week's catch of the day comes from down under. Carole Theriault returns with an interview with MimeCast's Matthew Gardiner.

Supported by KnowBe4
Research Saturday 11.17.18

The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings.

Week that Was 11.17.18

US elections are over (save for recounts). BGP issues. Son of Stuxnet? Bank pilferage. Industry notes.

CyberWire-X 11.13.18

In this premier episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a closer look at cyber security regulation in the U.S. Joining us are Dr. Christopher Pierson from BlackCloak and Randy Sabett from Cooley LLP.

Supported by Gemalto.

Recent Stories

Featured Stories

Bringing Government Experience to Financial Services Security
Dale Drew, CSO at Zayo Group, shares his views on threat intelligence and why he’s leading an effort to champion open source tools in the industry.
Cosmic AES Signals and Space, November 2018
The United Nations, in its long-running deliberations over fostering the development of norms of conduct in cyberspace, was in October presented with two competing visions of what such norms should look like...
Making the business case for privacy. — Special Edition

In this CyberWire special edition, our guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution...

Supported by Cylance
5th Annual Women in Cyber Security Reception
The CyberWire is pleased to present the 5th Annual Women in Cyber Security Reception on Thursday, October 18, 2018, in Washington, DC.
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly as a natural language, we construct embeddings of identifiers at scale using a concept similar to word2vec, in which the output is a vector of related identifiers and their proximity.
Star Wars Episode IV 1 d The Pentesters Strike Back
It is a period of cyber war. In an effort to sustain commerce during these challenging times, the Galactic Trade Federation has required that the Empire retain the services of a consultancy on Kessel (a best-value provider, and only twelve parsecs away) to assess the state of their security before signing...

Sponsored Events

Are you holding an event? Feature it here! Contact us!

Support the CyberWire

Organizations from across the globe are invited to support the CyberWire Daily News Brief (news sponsors and event sponsors), or Daily Podcast through programming sponsorship.

For details on how to become a sponsor, please fill out the Contact Us form.

Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story.

Become a patron


If you like the CyberWire and think others would too, we'd appreciate it if you would spread the word!