skip navigation
Subscribe to the CyberWire Email RSS Stitcher Google Play Music
Daily Briefing 10.19.18

Supply-chain seeding story fades. Twitter blocks apparent Saudi info op. Latvian election defense. OceanLotus. Ransomware.

Supported by Recorded Future.
Daily Podcast 10.19.18

Chinese supply-chain hack story gets vanishingly thin. Twitter downs pro-Saudi bots. SEO poisoning. OceanLotus evolves. Ransomware notes.

Supported by ThreatConnect, VMware, and Cylance.
ThreatConnect Logo VMware Logo Cylance Logo
Hacking Humans 10.18.18

Dave reveals a stealthy trademark scam. Joe describes the invocation of a judge's name to lure a victim. A listener shares a business scam from India. Joe interviews "Shannon," a listener who enjoys wasting phone scammer's time.

Supported by KnowBe4
Research Saturday 10.20.18

Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients.

Week that Was 10.20.18

Chasing shadows. Facebook breach the work of spammers. Not Comment Crew. BlackEnergy now Grey. Law, commerce, innovation.

Meddling with the midterms. — Special Edition

In this CyberWire special edition, we explore the structure and fragile integrity of the US election system, how we got to where we are today, and what can be done to reestablish confidence in the system.

Supported by Cylance

Recent Stories

Featured Stories

Intelligence Sharing to Protect Ourselves and Each Other
TruSTAR's Paul Kurtz shares his views on information sharing and why we may not be able to count on the government to protect us in the cyber realm.
Cosmic AES Signals and Space, October 2018
The US has released its national cyber strategy, with a strong emphasis on deterrence. An introduction to the document answers the question "How did we get here?" It calls out, by name, Russia, Iran, North Korea, and China, describing them as repressive regimes that exploit open societies and systems while remaining themselves largely, and self-consciously, closed...
Data-centric security. — Special Edition

In this CyberWire special edition, we take a look at data-centric security, focusing on the security of the data itself, rather than the surrounding networks, application or servers.

Supported by Cylance
5th Annual Women in Cyber Security Reception
The CyberWire is pleased to present the 5th Annual Women in Cyber Security Reception on Thursday, October 18, 2018, in Washington, DC.
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly as a natural language, we construct embeddings of identifiers at scale using a concept similar to word2vec, in which the output is a vector of related identifiers and their proximity.
Star Wars Episode IV 1 d The Pentesters Strike Back
It is a period of cyber war. In an effort to sustain commerce during these challenging times, the Galactic Trade Federation has required that the Empire retain the services of a consultancy on Kessel (a best-value provider, and only twelve parsecs away) to assess the state of their security before signing...

Sponsored Events

Are you holding an event? Feature it here! Contact us!

Support the CyberWire

Organizations from across the globe are invited to support the CyberWire Daily News Brief (news sponsors and event sponsors), or Daily Podcast through programming sponsorship.

For details on how to become a sponsor, please fill out the Contact Us form.

Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story.

Become a patron


If you like the CyberWire and think others would too, we'd appreciate it if you would spread the word!