skip navigation
Subscribe to the CyberWire Email RSS Stitcher Google Play Music
Daily Briefing 6.20.18

Chinese cyberespionage campaign. Rootkit masquerades as VPN. Leaky Firebase apps. Kardon Loader in beta. EU copyright law.

Supported by CyberSecJobs.
Daily Podcast 6.20.18

Satellite communications suffer from Thrip(s). Zacinlo rootkit poses as a VPN. Insecure Firebase apps. EU copyright legislation. Kardon Loader. Bithumb robbed. #Opicarus2018. Bitcoin Baron jailed.

Supported by ThreatConnect and VMware.
ThreatConnect Logo VMware Logo
Hacking Humans 6.14.18

In this episode we discuss scammers taking advantage of natural disasters, romance scams, and a strange voice mail. Stephen Frank from the National Hockey League Players Association joins us to share how professional athletes protect themselves from online scams.

Supported by KnowBe4
How to Empower Teams With Threat Intelligence
In this episode of the Recorded Future podcast, we examine how threat intelligence applies to a variety of roles within an organization, and how security professionals can integrate it to empower their team to operate with greater speed and efficiency.
Research Saturday 6.16.18

Cyber bank heists — Research Saturday

Week that Was 6.16.18

Summitry and sanctions. Speculative execution bug. Baba Yaga malware. Wiper misdirection. DoJ IG reports. Industry notes.

Recent Stories

Featured Stories

Optimizing the Intelligence Cycle at Optum
Vince Peeler, manager of cyber intelligence services at Optum, shares his thoughts on the intelligence cycle and the role it can play in organizing and focusing the efforts of cybersecurity teams.
Cosmic AES Signals and Space, May 2018
The leaders of North and South Korea, Kim Jong-un and Moon Jae-in, met in the treaty village of Panmunjom along the demarcation line between the two states. As has been widely noted, the meeting represented a historic first, the only time a North Korean leader has visited the South since partition...
2018 RSAC Outlook — Special Edition

Just before the RSA conference this year, we spoke with a pair of industry experts for their take on the year so far, and what they expect to see in the coming months. In this CyberWire special edition, we hear from Craig Williams, Director of Talos Outreach at Cisco, and later in the show from Jon Rooney, Vice President of Product marketing at Splunk.

Supported by Cylance
5th Annual Women in Cyber Security Reception
The CyberWire is pleased to present the 5th Annual Women in Cyber Security Reception on Thursday, October 18, 2018, in Washington, DC.
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly as a natural language, we construct embeddings of identifiers at scale using a concept similar to word2vec, in which the output is a vector of related identifiers and their proximity.
Star Wars Episode IV 1 d The Pentesters Strike Back
It is a period of cyber war. In an effort to sustain commerce during these challenging times, the Galactic Trade Federation has required that the Empire retain the services of a consultancy on Kessel (a best-value provider, and only twelve parsecs away) to assess the state of their security before signing...

Sponsored Events

Are you holding an event? Feature it here! Contact us!

Support the CyberWire

Organizations from across the globe are invited to support the CyberWire Daily News Brief (news sponsors and event sponsors), or Daily Podcast through programming sponsorship.

For details on how to become a sponsor, please fill out the Contact Us form.

Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story.

Become a patron


If you like the CyberWire and think others would too, we'd appreciate it if you would spread the word!