Airports in Istanbul were hacked earlier this month; over the weekend the Indian Customs website for Indira Ghandi International Airport in Mumbai suffered defacement by a Pakistani hacktivist.
US diplomatic facilities in the Middle East and North Africa remain closed on the basis of threat intelligence emerging from "an intercepted message among senior al Qaeda operatives."
Many Tor Network sites disappeared over the weekend as the US FBI took down child pornographers organized around Freedom Hosting. The operation is interesting in that it appears to have used a Firefox zero day to breach Tor anonymity.
A researcher demonstrates an Android app that can steal login credentials by exploiting Google's one-click authentication. Analysts forecast trouble in the emerging "app economy."
In unrelated news, Google warns webmasters against inserting pages into a browser's history. The warning, which strongly reiterates earlier cautions, suggests that the deceptive practice is becoming more widespread, and troublesome.
XKeyscore receives more attention, some of it breathless (uncharacteristically so from Naked Security—troublesome or not, a tool's existence is hardly a closely held secret when it appears liberally on job boards, ads, LinkedIn resumes, etc.).
Dell SecureWorks says it's fingerprinted "Beijing Group" industrial espionage. Huawei hits back at DCI emeritus Hayden's allegations of spying. Lenovo stays in the Western doghouse over similar allegations as governments and companies struggle to come to grips with a globalized supply chain.
Congress continues to weigh electronic surveillance policy. GCHQ receives its own unwanted scrutiny. Germany limits information sharing with the US and UK.
Today's issue includes events affecting China, Germany, India, Ireland, Pakistan, Russia, Thailand, United Kingdom, United States..
Dateline SINET Innovation Summit
LOGIIC — Linking the Oil and Gas Industry to Improve Cyber Security(DHS S&T) The LOGIIC (Linking the Oil and Gas Industry to Improve Cybersecurity) program is an ongoing collaboration of oil and natural gas companies and the U.S. Department of Homeland Security, Science and Technology Directorate. LOGIIC was formed in 2004 to facilitate cooperative research, development, testing, and evaluation procedures to improve cybersecurity in petroleum industry digital control systems. The program undertakes collaborative research and development projects to improve the level of cybersecurity in critical systems of interest to the oil and natural gas sector. The program objective is to promote the interests of the sector while maintaining impartiality, the independence of the participants, and vendor neutrality. After a successful first project, the LOGIIC consortium was formally established as a collaboration between DHS, the Automation Federation, and five of the major oil and gas companies
Security and Software Engineering Research Center(SERC) The mission of the Security and Software Engineering Research Center is to conduct a program of applied and basic research on software security, system security, and software engineering problems in order to enable technology gains in member organizations
About TCIPG: Trustworthy Cyber Infrastructure for the Power Grid(TCIPG) Researchers from the University of Illinois at Urbana-Champaign, Dartmouth College, Cornell University, the University of California at Davis, and Washington State University are together addressing the challenge of how to protect the nation's power grid by significantly improving the way the power grid infrastructure is built, making it more secure, reliable, and safe. This Department of Energy-funded project, with support from the Department of Homeland Security, recognizes that today's quality of life depends on the continuous functioning of the nation's electric power infrastructure, which in turn depends on the health of an underlying computing and communication network infrastructure that is at serious risk from both malicious cyber attacks and accidental failures. These risks may come from cyber hackers who gain access to control networks or create denial of service attacks on the networks themselves, or from accidental causes, such as natural disasters or operator errors
Chinese Hacking Team Caught Taking Over Decoy Water Plant(Technology Review) A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems. Although security vulnerabilities in industrial systems have been well documented, evidence that people are actively trying to exploit them has been scarce. A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher revealed on Wednesday
Cyber Attacks, Threats, and Vulnerabilities
Indira Gandhi International Airport, Indian Customs Website Hacked by Pakistani Hacker(Hack Read) A Pakistani hacker going with the handle of Hasnain Haxor has hacked and defaced the official website of Indian Customs at Indira Gandhi Int Airport Mumbai, India and a website of Tamilnadu State Agricultural Marketing Board . Hacker managed to root the whole server with 800+ Indian sites on along with Indian Customs site which is a very high profile one that contains sensitive information on its server
Thailand's Police Nursing College Website Hacked, Login Details Leaked by Pak Cyber Eaglez(Hack Read) A Pakistani hacker going with the handle of Sizzling Soul from Pak Cyber Eaglez has hacked in to the official website of Thai Police Nursing College, as a result the site has been defaced, database along with login details of site's admin and 64 college's staff have been leaked online. The reason for targeting Thai website remains unknown as the deface page only contains a note, claiming that site has been
Firefox Zero-Day Used in Child Porn Hunt?(Krebs on Security) A claimed zero-day vulnerability in Firefox 17 has some users of the latest Mozilla Firefox browser (Firefox 22) shrugging their shoulders. Indeed, for now it
Child porn bust takes half of Tor's hidden sites offline(The Verge) A man in Ireland believed to be behind Freedom Hosting, the biggest service provider for sites on the encrypted Tor network, is awaiting extradition on child pornography charges, reports The Independent. Denied bail until there is a ruling on the extradition request, Eric Eoin Marques has been described by an FBI special agent as "the largest facilitator of child porn on the planet," and faces up to 30 years in prison if tried in the US
Google Warns: Don't Insert Pages Into Users' Browser History(Search Engine Watch) Google has warned webmasters many times about the dangers of using manipulative or deceptive behavior. Now Google has issued a special warning regarding a practice where a website inserts new pages into a user's browsing history
Beijing hacking combine exposed(USA Today) A Beijing-based hacking combine that has broken into hundreds of company networks — and continues to do so with near impunity — may have a tougher go of it from here on out. That's because here at the Black Hat Conference researchers from DellSecureWorks disclosed evidence that helps fingerprint the handy work of one of the top two cyber espionage gangs operating out of China
Fake 'iPhone Picture Snapshot Message' themed emails lead to malware(Webroot Threat Blog) We've just intercepted a currently circulating malicious spam campaign that's attempting to trick iPhone owners into thinking that they've received a 'picture snapshot message'. Once users execute the malicious attachment, their PCs automatically join the botnet operated by the cybercriminal/gang of cybercriminals, whose activities we've been closely monitoring over the last couple of months
Earn £8,000 a MONTH with bogus apps from Russian malware factories(The Register) DIY SMS-scam kits anyone can use - even your grandparents! Just 10 professionally run malware-making workshops in Russia are responsible for 30 per cent of the Trojans, spyware and other nasties infecting smartphones globally. That's according to a study by mobile security outfit Lookout
Rodecap — a New Spam Bot in Town(Infosecurity Magazine) Just over a week ago Symantec published a note on a new spam bot that it was and is currently investigating. A Swiss researcher, however, was already on it, having trapped the first instance in his sandnet two days earlier
Colin Powell's Emails Tapped by Hacker(Infosecurity Magazine) The hacker known as Guccifer, who makes a habit of hacking the rich and powerful – the 'Illuminati' in his own terms – has struck again, this time forcing former US Secretary of State Colin Powell to deny an affair
DDoS myths and misconceptions(FierceCIO: TechWatch) In our Internet-connected age, DDoS attacks are a perennial problem that regularly make it into the news. In an attempt to better understand this topic, we posed a number of questions to Dan Holden, director of security research for Arbor Networks
Picking up the SLAAC with Sudden Six(Neohapsis Labs) The people that run The Internet have been clamoring for years for increased adoption of IPv6, the next generation Internet Protocol. Modern operating systems, such as Windows 8 and Mac OS X, come out of the box ready and willing to use IPv6, but most networks still have only IPv4. This is a problem because the administrators of those networks may not be expecting any IPv6 activity and only have IPv4 monitoring and defenses in place
Banks' Improved Security Defenses Disarm Cyber Attackers(American Banker) The latest cyberattacks launched by the Al Qassam Cyber Fighters — the group that has taken credit for most of the devastating distributed-denial-of-service attacks on banks that began last fall — have been for the most part deflected by banks this time around. This fourth round of attacks, threatened by the Al Qassam hacktivist group on Pastebin July 23 ("Well, misters! The break's over and it's now time to pay off," the group wrote), are said to have targeted four banks, including Regions Bank and JPMorgan Chase
The App Economy: A Ticking Cybersecurity Timebomb(Forbes) In the last 5 years we have seen the quick rise of the App Economy, which spans mobile apps downloaded on smartphones/tablets and web apps used directly on browsers. Annual revenues in the mobile based App Economy are estimated at $72 billion today and are expected to double to $151 billion by 2017. The web based App Economy is far bigger. This App Economy has permeated our everyday lives and has changed the way we interact with each other, purchase virtual goods, order physical retail goods and entertain ourselves. Netflix, Twitter, Zynga, Facebook etc. are only a few of well-known companies behind this wave. The App Economy is also a great equalizer. Hundreds of other startups like Uber, WhatsApp, Fab, Instagram (acquired by Facebook) and Square are equally important to our everyday lives. New distribution channels and new cloud infrastructure technologies enable even smaller startups with a handful of employees and little funding to reach millions of users in a few months and effectively compete with bigger established players like Google, Electronic Arts and HBO. Unfortunately, security is an afterthought to many of these smaller startups, which are focused on product innovation and user acquisition
We Need a Dialogue on Cyber Security(Radio World) Like it or not, cyber security will continue to be a fact of life for broadcasters and ... The Department of Homeland Security, along with the Department of Energy
Working as an ethical hacker(Help Net Security) The term "ethical hacker" as it used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own moral compass on what is right and what is wrong - the only difference is that those ethics aren't compatible with those held by most people
NSA revelations could hurt collaboration with 'betrayed' hackers(Chicago Tribune) The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private researchers express disillusionment with the National Security Agency. Though hackers tend to be anti-establishment by nature, the NSA and other intelligence agencies had made major inroads in recent years in hiring some of the best and brightest, and paying for information on software flaws that help them gain access to target computers and phones
Michael Dell Sweetens Buyout Bid(InformationWeek) Dell CEO and partners raise their bid to take the company private. In exchange, they've secured a change in the voting rules and increased their likelihood of sealing the deal
Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract to Support C4ISR, Cybersecurity Programs(BusinessWire) Booz Allen Hamilton today announced it has now won four of the Full and Open Pillar contracts involving a range of full system lifecycle support activities for the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic). Most recently, the firm won a contract with a total ceiling of nearly $900 million to support the integrated cybersecurity and Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) operations of the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic). The competitive ID/IQ contract has an initial one-year period of performance, with four, one-year options that could extend the work through July 2018. SSC Atlantic, an engineering command within the U.S. Navy, delivers adaptive and secure solutions to many naval, joint and national agencies. Under the terms of the MAC, Booz Allen will support a broad array of cybersecurity, information assurance and information operations projects for the Navy, Marine Corps, and other components of the Department of Defense
How To Hire A Spy. Meet the Man Who Offered Edward Snowden A Job(LinkedIn) Now he is out of his Moscow airport hideaway, protected by a year-long political asylum, Edward Snowden, the contractor accused by America of spying, will have no problem finding work. He has already been offered a job by VKontakte, Russia's most popular social networking site
Huawei Lashes Out at ex-CIA Chief Over Spying Claims(SecurityWeek) Chinese telecoms giant Huawei has hit back at allegations by a former CIA chief that the company spies for Beijing, labeling them "defamatory" and "baseless". Michael Hayden, who headed the Central Intelligence Agency in 2006-09, was quoted two weeks ago as saying China was engaged in unrestricted espionage against the West and that Huawei would have shared information with state agencies
AirPatrol Corporation Relocates Corporate Headquarters To Howard County, Maryland(Area Development) An innovator in cyber security, providing location-based mobile and wireless enterprise solutions to both private businesses and government agencies, AirPatrol Corporation, plans to relocate and expand its corporate headquarters to that St. John Properties' Maple Lawn Corporate Center park in Howard County, Maryland
Trend Micro Launches New Intern Program, Offers Cyber Security Scholarships, Performance Incentives(PRNewswire) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software and solutions, announced a new global internship program today. Inspired by CEO Eva Chen, the initiative will offer a behind the scenes look at a global pioneer in security and privacy technology. These interns – known as, "TrendTerns" – will also have the opportunity to earn academic scholarships and other performance incentives while gaining real-world experience
The InsideIQ™ Building Automation Alliance Partners with Cylance, Inc. to Promote ICS Security Services for Buildings(PR Newswire) The InsideIQ Building Automation Alliance, an international alliance of independent building automation contractors, has partnered with cybersecurity provider Cylance, Inc. in order for member firms to offer high level building automation system (BAS) security practices, training and certification for their customers. By joining forces with Cylance, a global leader in cybersecurity technology and services, InsideIQ member firms can provide customers using industrial control systems (ICS) and BASs with security assessments, incident response, best practices in cybersecurity services and on-site training
Self-encrypted 2.5" SATA SSD from Microsemi(Help Net Security) Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data protection
Technologies, Techniques, and Standards
Cutting Through The Mystique Of Testing The Mainframe(Dark Reading) Mainframes are not enterprise dinosaurs—they're modern systems running mission critical data that must be scrutinized as much as any other part of the IT infrastructure. Las Vegas – While most IT security teams tend to lump mainframe systems into the category of legacy systems unnecessary or impossible to scrutinize during regular audits, that couldn't be farther from the truth, says a researcher at Black Hat USA who this week released a number of free tools meant to help bridge the understanding gap between mainframe experts and security professionals
AhnLab Receives High Scores in NSS Labs' Breach Detection System Product Analysis(Consumer Electronics Net) AhnLab, a leading provider of information security products and services for enterprise and government organizations, today announced that the AhnLab Malware Defense System (MDS) appliance has scored in the 90 percentile and above, in all major facets, of the July "Breach Detection System Product Analysis" report conducted by NSS Labs
Think twice about that burner: your phone's signal has a unique digital fingerprint(The Verge) Researchers at the Dresden University of Technology have developed a surprisingly reliable tracking method that can remotely identify individual GSM phones based on unique characteristics in their radio signals, even if the phone's identification codes or SIM cards have been swapped. In lab tests using "real-world conditions," the researchers were able to identify 13 different mobile phones 97.62% of the time. That's an impressive initial result, and the team behind the work says that it's just the first step in this type of remote mobile forensics
Not even Congress knows how the NSA works(The Verge) While the president and the intelligence community cling to "Congressional oversight" as a justficiation for the pervasive intelligence-gathering programs in place within the US, members of Congress theselves are saying that they don't have the information they need to exercise real authority over the NSA. A recent report in The Guardian quotes two House members, Morgan Griffith (R-VA) and Alan Grayson (D-FL), who have both requested information about the agency and its programs from the House Intelligence Committee, only to be rebuffed
Graham says NSA proving its worth(Politico) Lindsey Graham expressed support on Sunday for the National Security Agency and its programs and their contribution to the intelligence gathered on the
Lawmakers deny being stonewalled on National Security Agency information(The Hill) Senior members of Congress denied a report on Sunday that the National Security Agency (NSA) is refusing to turn over basic information about its operations to lawmakers. Speaking on Sunday talk shows, Sen. Saxby Chambliss (R-Ga.) and Reps. Peter King (R-N.Y.) and Dutch Ruppersberger (D-Md.) argued that the NSA has been responsive to congressional requests for information
Amash: Snowden a whistle-blower, 'old us what we need to know'(Fox News) Rep. Justin Amash said Sunday that Edward Snowden is a whistle-blower — adding to the debate about whether the American should be considered a traitor for leaking National Security Agency secrets while working as a federal contractor. Amash, R-Mich., acknowledged that Congress was aware that U.S. intelligence agents could gather information on Americans under the post-9/11 Patriot Act but not to the extent Snowden revealed this spring
Intelligence director James Clapper should resign for 'lying to Congress,' say lawmakers(The Verge) Shortly after an attempt to curtail the NSA's surveillance capabilities failed narrowly in Congress, two of the measure's co-sponsors have said that Director of National Intelligence James Clapper should still be held accountable for giving false testimony. "[Clapper] was here in March and unambiguously lied to Congress," Rep. Thomas Massie (R-KY) told Democracy Now. "And I believe he was under oath. And it really sets a bad precedent for the whole organization to let him keep his post. I think he should be relieved of his post for lying to Congress." Rep. John Conyers (D-MI) said that he "completely" agreed. "We're now at the point of having a more honest disclosure of what's going on in our intelligence community, which we now find was very deliberately ignoring parts of the law that they knew perfectly well they were violating," he said
Damaged Goods(Slate) How the NSA traveled down a slippery slope—and how it can regain Americans' trust. "When you see something that is technically sweet, you go ahead and do it, and you argue about what to do about it after you've had your technical success." –J. Robert Oppenheimer. The father of the atomic bomb made this observation in 1951 while testifying before a panel that wound up revoking his security clearance as a result of reports that he'd opposed going ahead with the much more powerful hydrogen bomb. He was explaining to the panel why he'd initially supported the H-bomb project—it was so "technically sweet" that "the moral and ethical and political issues" dropped by the wayside
True national security needs true oversight(Columbus Ledger-Enquirer) Jim Sensenbrenner, R-Wis., author of the Patriot Act. He told National Security Agency officials at a House Judiciary Committee meeting last month that "unless
Why Wasn't the NSA Prepared?(The Atlantic) But General Alexander also heads Cyber Command, the new 4000-strong military force responsible for protecting military networks, and attacking the networks
King George's Revenge: Is Britain Using Our Tax Money to Spy on Us?(Government Executive) Weeks ago, I worried that surveillance officials in allied countries might conspire with one another to spy on one another's citizens. The NSA is restricted in the spying it can do on Americans. But it can spy on the British all it wants. And there's no law that prevents the Brits from spying on Americans. What if spy agencies in the U.S., Britain, New Zealand, Canada, and Australia were all in cahoots? Today there is even greater reason to be worried about that possibility
Verizon, BT, and Vodafone reportedly assisted UK's massive Tempora spying effort(The Verge) In June, The Guardian reported that Tempora — the surveillance program that is essentially the UK's version of PRISM — was tapping into undersea fiber-optic lines to access massive amounts of emails, social-media posts, video chats, and other online data. On Friday, the German newspaper Süddeutsche published a new story that claims Britain's Government Communications Headquarters (GCHQ) executed the spying program with the help of Verizon, BT, and Vodafone. In the process, these telecommunications companies and others have reportedly given the UK intelligence agency unrestricted access to the data that passes through their fiber-optic cables
Jimbo Wales: ISP smut blocking systems simply 'ridiculous'(The Register) Wikipedia man labels filters 'technologically incompetent'. Wikipedia founder Jimmy Wales has attacked "absolutely ridiculous" network-level porn-blocking systems that are being introduced by the UK's biggest telcos over the course of the next few months
Litigation, Investigation, and Law Enforcement
Cybercriminals are doing a better job than the companies they target(Help Net Security) What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney's Office in NJ unsealed their indictment against a mostly Russian—one American co-conspirator was also named—gang of cybercriminals who are alleged to have snatched over 160 million credit card numbers resulting in more than $300 million in losses over seven years.
US federal agencies want NSA data to help nab copyright violators(Quartz) The primary defense of the necessity of the US National Security Agency's broad spying powers—including, apparently, recording pretty much everything anyone anywhere is doing on the internet—is that its activities are necessary to protect against terrorists and violent criminals. But a report published Saturday in the New York Times indicates that federal agencies with far more mundane mandates are unable to resist the lure of the NSA's vast trove of data
Former spy: U.S. gains with Snowden in Russia(CNN) It was with a heavy heart that I heard Edward Snowden has been granted, and apparently accepted, temporary asylum in Russia for one year. Short of locking him naked in solitary confinement as an example to other leakers, as was done to Bradley Manning, Russia is exactly where the American intelligence community wants Snowden
Lynne Curry: Snowden, the NSA, you and your company(Anchorage Daily News) From the outside, the national Snowden-National Security Agency story seems far from your reality and your employer's decision-making. But is it? Edward Snowden, the 29-year-old defense contractor, Booz Allen Hamilton employee and source behind the biggest intelligence leak in the NSA's history, ranks as one of America's most notable whistleblowers
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Security in Government (SIG) (Canberra, Australia, August 12 - 14, 2013) The 25th annual Security in Government (SIG) conference is to be held from 12-14 August 2013 at the National Convention Centre in Canberra. Assistant Director for the National Security Resilience Policy...
International Conference on Cyber Security(New York, New York, USA, August 5 - 8, 2013) The Federal Bureau of Investigation and Fordham University will host the fourth International Conference on Cyber Security (ICCS 2013) on August 5 - 8, 2013 in New York City. ICCS, the White Hat Summit,...
SINET Innovation Summit(New York, New York, USA, August 6, 2013) The purpose of the Innovation Summit is to reinvigorate public private partnership efforts and increase relationships between industry, government and academia that fosters sharing of information and collaboration...
3rd Annual Cyber Security Training Forum(Colorado Springs, Colorado, USA, August 6 - 7, 2013) The Information Systems Security Association (ISSA) - Colorado Springs Chapter and FBC, Inc. will once again host the 3rd Annual Cyber Security Training Forum (CSTF). Formerly known as the Cyber Security...
AFCEA Tinker AFB Information Technology & Cyber Security Expo(Oklahoma City, Oklahoma, USA, August 8, 2013) Commercial vendors are invited to Tinker Air Force Base on Thursday, August 8th to exchange information and provide products demonstrations to the military and civilian personnel on base. IT and Information...
AIAA Aviation 2013(Los Angeles, California, USA, August 12 - 14, 2013) Leading cybersecurity experts will speak at AIAA AVIATION 2013, being held August 12-14 at the Hyatt Regency Century Plaza, Los Angeles, Calif. Hosted by the American Institute of Aeronautics and Astronautics,...
A Cloud Computing Introduction for Manager(Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...
Resilience Week 201(San Francisco, California, USA, August 13 - 15, 2013) 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...
Kirtland AFB/Sandia/DOE Cyber Security Seminar & IT Expo(Albuquerque, New Mexico, USA, August 15, 2013) This expo is designed to stimulate exchanges of information between industry partners and Kirtland AFB Information Management Officers', Information Technology personnel, Contracting Officers' as well...
National SCADA Conference(Melbourne, Victoria, Australia, August 15 - 16, 2013) The 12th Annual National SCADA Conference, Australia's largest and longest running SCADA conference, will bring together many of the luminaries of the Australian and International SCADA community to evaluate...
SANS Thailand 201(Bangkok, Thailand, August 19 - 31, 2013) SANS hands-on advanced Information Security training is coming to Thailand this August! SANS is bringing our Web App Penetration Testing course to the Crowne Plaza Bangkok Lumpini Park in Bangkok, Thailand.
Defense Logistics Agency Tech Expo(Fort Belvoir, Virginia, USA, August 20, 2013) Industry exhibitors are invited to showcase and discuss the latest information services and technology to the personnel at the McNamara HQ Complex.
Human Cyber Forensics Forum(Washington, DC, USA, August 21, 2013) This forum brings together subject matter experts to discover and share new means of recognizing the human indicators related to cyber intrusions, and the evolution of these human indicators in the coming...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.