Palestinian hacktivists deface WhatsApp and AVG sites with an anti-Zionist message; they also deface a LeaseWeb page (with no particular message). Pakistani hackers (motivation unclear) are also active, hitting ASPX Vietnam and three Caribbean domains.
Macau's gaming industry attracts cyber criminals—the city's Internet access was almost lost to a hack over the weekend. Customers of Hong Kong's PureVPN receive a bogus message falsely warning of the service's imminent shutdown—the attackers exploited a WHMCS zero-day.
Several new vulnerabilities and exploits are reported, including a flaw in iOS that enables a thief to halt a stolen iPhone's "Find My Phone" feature long enough to extract personal data or even re-register the phone.
A new virtual dedicated server crops up to serve the cyber black market, occupying part of the niche left by the Russian Business Network. More reports appear that the Blackhole exploit kit's author has been arrested by Russian authorities, and FoxIT has observed chatter around Blackhole users suggesting that in fact this has happened. Look for cyber criminals to move on to other kits.
A FireEye report outlines national styles as expressed in cyber attacks. Vormetric thinks most unauthorized data access goes undetected.
Former Director NSA McConnell warns that there's a war in cyberspace, and the US is losing. Debate over the proper conduct of that war continues, with a mix of tu quoque and me too from Germany, the United Kingdom, and Australia.
Aspiring gumshoes take note—some computer forensic types are now getting private eye licenses.
Today's issue includes events affecting Antigua and Barbuda, Australia, Canada, China, European Union, Germany, Pakistan, Palestinian Territories, Russia, Saint Lucia, Singapore, Suriname, United Kingdom, United States, and Vietnam..
World's Largest Web Hosting Company LeaseWeb Hacked by KDMS Team(Hackers Post) LeaseWeb, one of the worlds largest hosting company has been hacked and defaced by a Palestinian hacker group named "KDMS Team". "Who Are you? Who is but the form following the function of what and what are you is a hosting company with no security. KDMS Team: Well, we can see that ", The hackers
ASPX Vietnam official website hacked by Anon Cop(Hackers Post) The official ASPX Vietnam website has been hacked and defaced by a Pakistani hacker with the handle Anon Cop. The hacker is a member of "Pak Mad Hunters" hacking group. There is no specific reason mentioned by the hacker on the deface page."RooT@admin: StampeD By Anon Cop. Aspx.vn Pawned!", the hacker wrote on the deface
WHMCS Zero–Day vulnerability used against PureVPN(CSO) PureVPN customers got a shock over the weekend, when attackers leveraged a flaw in WHMCS to send emails warning of a loss of privacy and legal issues. Hong Kong–based PureVPN faced problems this weekend, after someone used a Zero-Day vulnerability in WHMCS to send the networking firm's customers an alarming message. The rogue email stated that the VPN service was going to shutdown due to legal issues, and that customer information was handed over to the authorities
WHMCS SQL Injection Vulnerability in the Wild(Sucuri Blog) A few days ago, a zero-day SQL injection vulnerability in WHMCS was disclosed by…along with the exploit code. It was quickly patched by the WHCMS team and rated as critical since it allows an attacker full access to the database hosting WHMCS
New iOS 7 Flaw Thwarts 'Find My iPhone' Feature(InfoSecurity Magazine) A fresh Apple iOS 7 bug has been uncovered, which would allow a remote attacker shut down the "find my iPhone" functionality that allows users to remotely wipe stolen or lost phones
Hacking The Adobe Breach(Dark Reading) Financially motivated attackers could abuse stolen source code for broader attacks. At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack: Not only did the bad guys steal customer data and payment card information from the software company, but they also nabbed the source code for Adobe's ColdFusion, Acrobat, and Reader software
"Gameover" trojan hides activity in encrypted SSL connections to defraud victims(SC Magazine) Saboteurs spreading the Gameover banking trojan are hosting the Zeus variant on a number of infected websites and using an encrypted secure sockets layer (SSL) connection to remain undetected. Researchers at Dell SecureWorks Counter Threat Unit (CTU) detailed attackers' latest schemes to spread the financial malware in a blog post published last Friday
Hesperbot: An Atrocious Banking Trojan(InfoSec Institute) Last month, a newly effective banking trojan has been discovered, targeting online banking users. This malware uses very reliable looking link addresses or domains which are related to trusted organizations to attract victims into running them. Even though this trojan has analogous functionality and goals like that of the ignominious Zeus and SpyEye, its architecture and way of implementation makes it fall in a new malware family . This banking trojan, regardless of being a new malware program, emerged as Win32/Spy.Hesperbot. The main aim of the offender is to obtain credentials giving access to the victim's bank account and making them install a mobile component of the malware on smartphone platforms (Symbian, Android, and Blackberry)
Vulnerable and aggressive adware threatening millions(Help Net Security) FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party software included by host
The Challenges in Analyzing 'Bite-Sized' Attacks(SecurityWeek) Recent reports in the media are detailing how various government, media and technology companies in Japan and South Korea were victims of a new kind of cyberattack dubbed Icefog. The attacks originated in China and are the work of cybercriminals hired on a project basis, according to Kaspersky Lab. The attackers appeared to know exactly what they were trying to steal, and they left as soon as they found it. In many circles, the Icefog attacks have been called "hit-and-run APTs" - an oxymoron so blatant that it makes my head hurt. However, semantics aside, this trend of relatively focused, contracted attacks will likely have an effect on how the industry deals with advanced threats moving forward
Blackhole exploit kit author reportedly arrested, changes already noticeable(Malware Bytes) Blackhole is one of the most popular crimeware toolkits serving browser-based exploits from compromised or malicious websites. Their end goal is to deliver malware (ransomware, banking trojans etc) onto unsuspecting visitors. A few hours ago, a tweet from Maarten Boone, a security researcher at Fox-IT, a Dutch security firm didn't go unnoticed
Newly launched VDS–based cybercrime–friendly hosting provider helps facilitate fraudulent/malicious online activity(Webroot Threat Blog) Realizing the market segment potential of bulletproof hosting services in a post-Russian Business Network (RBN) world — although it can be easily argued that as long as its operators are at large they will remain in business — cybercriminals continue supplying the cybercrime ecosystem with market-relevant propositions. It empowers anyone with the ability to host fraudulent and malicious content online. A newly launched Virtual Dedicated Server (VDS) type of bulletproof hosting vendor is pitching itself to prospective cybercriminals, offering them hosting services for spam, malware, brute-forcing tools, blackhat SEO tools, C&C (command and control) servers, exploit kits and warez. In addition to offering the "standard cybercrime-friendly" bulletproof hosting package, the vendor is also excelling in terms of the hardware it relies on for providing the infrastructure to its customers
Hacking and the value of a Zero Day(Marketplace Morning Report) The San Francisco tech geek arrested last week in an Internet drug bust may have been caught because of National Security Agency operations. Or, experts say, the feds could have broken into the Silk Road, his alleged illicit goods network, using a Zero Day exploit
Hackers turn US health services site into online Ugg boots store(Naked Security) For at least the past two months, scammers have been hawking football shirts, Ugg shoes and Armani perfume from hacked US government pages that are actually supposed to provide services such as mental health counseling, suicide prevention and help for drug addicts
Security Patches, Mitigations, and Software Updates
Router Flaw Could Disclose Sensitive Cofiguration, Password Information(Threatpost) Taiwanese electronics company Asus has released an update for one of its routers that corrects an authentication bypass vulnerability discovered in the devices over the summer. The vulnerability is in Asus' RT-N10E brand of routers, sold primarily throughout Europe, China and South America
Microsoft Critical Patches Address Windows, IE Zero–Day Flaw(CRN) Microsoft (NSDQ:MSFT) will address critical errors in Internet Explorer including a zero-day flaw in the browser that has been tied to a group that has carried out at least one serious data breach. Microsoft said the update this week would address a critical remote code execution vulnerability in Internet Explorer. The zero-day flaw has been tied to a group responsible for carrying out the Bit9 data breach. Additional attacks were detected targeting firms in Japan, according to security firm FireEye, which warned that attacks could become more widespread. Microsoft issued a temporary IE patch Sept. 17 shielding the flaw from further zero-day attacks
Cyber-Security in 2013: Software, People Still Have Vulnerabilities(eWeek) Both cyber-security awareness and the security threat landscape itself have changed over the past decade, but some of the basics about how individuals and enterprises can stay secure have not. October 2013 marks the 10th anniversary of National Cyber Security Awareness Month, which is all about helping educate users and enterprises on how best to secure themselves against online threats
War Drums Beat Louder For 'World War C'(Forbes) If the lingo of cyber security experts, zombie warfare might that be that far fetched after all. Call it "World War C", and it playing right now at a nation near you. It is quiet, mostly invisible and oddly as safe as it is dangerous
Most unauthorized data access goes undetected(Help Net Securiy) With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security processes and the technologies
SINET Chairman to Present One of the Nation's First Cyber Resumes(Herald Online) SINET's Chairman & Founder, Robert Rodriguez, will present one of the Nation's first Cyber Resumes at the CyberMaryland conference. America's leading Cybersecurity companies, agencies and organizations will join together with leading educators in Baltimore, Maryland, on October 8, 2013, at 3:30pm to kick off Cybersecurity Ideation Day at CyberMaryland 2013. Cyber Ideation is a web-based interactive classroom experience where schools enable their students to "test drive" future careers in Cybersecurity by living a day in the life of the nation's Cybersecurity leaders called LifeJourney Mentors
Amazon Web Services Wins Again In Battle To Build The CIA And NSA Cloud(TechCrunch) Amazon Web Services has won a major battle against IBM in the pursuit to build a cloud infrastructure for the intelligence community. In a ruling published today, U.S. Court of Federal Claims Judge Thomas Wheeler wrote that AWS legitimately won a $600 million contract with the CIA that IBM had contested. IBM plans to appeal the ruling. In a statement, the company said what the company offers is more cost-effective and that they have decades of experience working with the U.S. government
Obamacare Exchange Sign–ups Hobbled by IT Systems Not Ready for Prime Time(IEEE Spectrum) I don't need to tell anyone about the controversy surrounding the Affordable Care Act (more commonly known as Obamacare). It was the central issue in the game of brinksmanship that led to the U.S. government shutdown last week. But mirroring that mind-blowing dysfunction was the less-than-stellar 1 October rollout of the federal website healthcare.gov. The Obamacare-mandated Web portal lets consumers who don't have employer-sponsored medical insurance meet the legal requirement to sign up for health coverage through the states where they reside. (To be precise, healthcare.gov is for residents of 36 states whose governments opted not to set up independent healthcare exchanges.) Online exchanges for some of the other 14 states and the District of Columbia also debuted with disappointing results
5 design flaws of HealthCare.gov(FierceGovIT) Amid the government shutdown and partisan games plaguing Washington, D.C., and the rest of the country, something is actually happening--online signups for the Affordable Care Act. HealthCare.gov is finally open for business, but how well is it designed? The site has more than a few technical issues and was down for maintenance over the weekend
SSL Certificate Provider HydrantID Adopts Authentify's Authentication Services(Dark Reading) uthentify, the pioneer in employing telephony and telephones in authentication work flows, today announced that its services have been selected by HydrantID to strengthen the provisioning process for purchasing Secure Sockets Layer (SSL) Certificates via HydrantID's customer portal. HydrantID joins a cadre of security conscious organizations who use Authentify
Corero Partners with Neustar to Deliver Best of Both Worlds in DDoS Protection(Wall Street Journal) Corero Network Security (CNS:LN), a leading provider of First Line of Defense®solutions for Distributed Denial of Service (DDoS) and cyber threat protection, has entered into an agreement under the Strategic Alliance Program with Neustar, Inc. (NYSE: NSR), an information services company and leading provider of cloud-based DDoS protection services. As a Neustar Strategic Alliance Program partner, Corero enables its customers to extend the power of its on-premise always on protection with the added security and flexibility of Neustar's on-demand, cloud-based DDoS protection services to combat growing cyber threats
Can data science be put in a box?(ZDNet) Data science is one part analysis and one part art. It gathers together data from many sources and gleans important insights. Can this demanding practice be packaged as a piece of software? Prelert believes that it can
CSAM — RFI with a small twist(Internet Storm Center) Logs are under appreciated. We all collect them, but in a majority of organisations you will find that they are only ever looked at once something has gone wrong. Which is unfortunately usually when people discover that either they didn't collect "that" log or timestamps are out of whack, log files rolled over, etc. Which is unfortunate because log files can tell you quite a bit of information as we are hoping to show throughout October as part of the Cyber Security Awareness Month
False Expectations And Consumerized Devices(TrendLabs Security Intelligence Blog) Recently, there was a very public example of how not to do a tablet deployment. The Los Angeles Times reported that the Los Angeles Unified School District had been forced to suspend a program to provide iPads to students because several hundred students had figured out ways to remove security restrictions put in place by school administrators
Want to Evade NSA Spying? Don't Connect to the Internet(Wired) Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible. I also recommended using an air gap, which physically isolates a computer or local network of computers from the internet. (The name comes from the literal gap of air between the computer and the internet; the word predates wireless networks.) But this is more complicated than it sounds, and requires explanation
How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users(Ars Technica) "Quantum cookie" attacks are plausible but only in highly limited cases. One of the more intriguing revelations in the most recent leak of NSA documents is the prospect that the spy agency is using browser cookies from Yahoo, Hotmail or the Google-owned DoubleClick ad network to decloak users of the Tor anonymity service
How Does Law Enforcement 'Subvert' Tor?(InfoSecurity Magazine) Last summer an FOI request showed that the FBI had abandoned an investigation into TSChan, allegedly a child pornography site on the Darknet, since "because everyone…connected to the TOR Network is anonymous, there is not currently a way to trace the origin of the website. As such no other investigative leads exist"
Research and Development
Algorithm to redact PHI takes opposite track(FierceHealthIT) Rather than training an algorithm to spot personal health information (PHI) for de-identification in physician notes, new research focused on words and phrases that are not PHI, according to a study published at BMC Medical Informatics and Decision Making. It achieved a recall rate of 98 percent of PHI from 220 discharge summaries, the authors report. All patient names, phone numbers, and home addresses were at least partially redacted
Air Force Cadets Earning Honors as Academic Hackers(Digital Forensic Investigator) The Air Force Academy's Cyber Competition Team has for the third year in a row earned a finalist spot in an international cybersecurity contest hosted by the Polytechnic Institute of New York Univ., placing 10th among 349 teams
Legislation, Policy, and Regulation
Could the revelations regarding the NSA PRISM program hinder U.S. relations around the world?(Council on Foreign Relations) Revelations about the National Security Agency's (NSA) electronic surveillance program were met with tough words from many of the United States' allies. German leaders criticized the United States and France threatened to delay the start of U.S.-EU trade talks. More recently, Brazilian president DilmaRousseff delivered a searing address to the United Nations General Assembly after canceling a state visit to the White House
Brazil determined to stop NSA spying(Help Net Security) Perhaps no country in the world has been as vocal about doing something about NSA's global Internet surveillance reach as Brazil. As one of the fastest-growing major economies in the world that is
Europe wants to regulate the cloud for a post-Snowden world(VentureBeat) It's not always clear where data travels on the Internet, but with American cloud providers like Amazon Web Services and others powering a sizable chunk of the modern web, there's a fair chance the National Security Agency can examine and store your data — even if you live across the pond
Japan Needs 80,000 More IT Security Experts(Softpedia) Japan wants to make sure government and other critical systems are properly protected against cyberattacks. However, experts have determined that the country needs an additional 80,000 IT security engineers
German NSA has deal to tap ISPs at major Internet Exchange(Ars Technica) Spy agency BND stays mum on how it's distinguishing domestic vs. foreign traffic. The rough German equivalent of the National Security Agency has secret arrangements with local telecom firms, providing direct access to data flowing over domestic fiber. According to the German magazine Der Spiegel (Google Translate), the Federal Intelligence Service (known by its German acronym, BND) has taps on the major Internet exchange point in Frankfurt known as DE-CIX
Paper finds fault in 'nothing to hide' government surveillance argument(FierceGovIT) A common response among Americans when learning of government surveillance programs, such as those managed by the National Security Agency, is to say surveillance is fine because "I have nothing to hide." A paper recently published in the San Diego Law Review, however, says there are several problems with the argument that if someone is a law-abiding citizen, they have nothing to worry about. "The nothing to hide argument is one of the primary arguments made when balancing privacy against security," writes George Washington University Law Professor Daniel Solove
The NSA Oversight Farce(TechCrunch) This weekend we learned that President Barack Obama's NSA surveillance panel, built at least in theory to vet our intelligence activities and weigh their performance against the right of privacy, went on hiatus after the government shutdown froze its funds. It was an emblematic moment. As a nation we couldn't even keep the farce of oversight in play long enough to have it ultimately disappoint us
Charges in cyber attack(Monadnock Ledger Transcript) A 65-year-old man identified as a Hancock resident was charged last week in a federal district court in Virginia with conspiracy to intentionally cause damage to
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Forensics and Incident Response Summit EU(Prague, Czech Republic, October 6 - 13, 2013) The Summit will focus on high quality and extremely relevant content as well as panel discussions in Digital Forensics and Incident Response. In addition, we encourage you to take every opportunity to...
CyberMaryland 2013(Baltimore, Maryland, USA, October 8 - 9, 2013) Join cybersecurity leaders, luminaries and rising stars at CyberMaryland 2013. This two-day event at the epicenter of the nation's cybersecurity innovation and education, will create opportunities for...
2013 Maryland Cyber Challenge(Baltimore, Maryland, USA, October 8 - 9, 2013) Held in conjunction with Cyber Maryland and intended to let students and young professionals showcase their cybersecurity skills, Maryland Cyber Challenge offers competition in three divisions: high school,...
AFCEA Hill AFB Technology & Cyber Security Expo(Ogden, Utah, USA, October 9, 2013) The purpose of this first-time event is to allow base personnel the opportunity to learn about the latest computer security trends, network with peers, share remediation strategies and to view and demo...
NSU's Raising Savvy Cyber Kids with Ben Halpert(Fort Lauderdale, Florida, USA, October 10, 2013) Ben Halpert is an award-winning author of several books for diverse audiences. The Savvy Cyber Kids At Home: The Family Gets A Computer (October, 2010) is a picture book that teaches the concepts of online...
VizSec 2013(Atlanta, Georgia, USA, October 14, 2013) VizSec brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.
Hack-in-the-Box Security Conference 2013(Kuala Lumpur, Malaysia, October 14 - 17, 2013) The 11th annual HITB Security Conference (16th/17th October) will be a triple track offering featuring keynotes by Andy Ellis, Chief Security Officer at Akamai and Joe Sullivan, Chief Security Officer...
USDA Cyber Security Symposium and Expo 2013(Washington, DC, USA, October 15, 2013) The Cybersecurity Expo, running in conjunction with the Summit, will allow exhibitors the opportunity to provide live demos and share information with government personnel and industry partners. Summit...
SNW Fall 2013(Long Beach, California, USA, October 15 - 17, 2013) SNW is the world's largest independently produced conference series focused on the evolution of architecture for a new world of mobility, Big Data and business agility. Produced by Computerworld -- and...
Hexis Exchange(Athens, Greece, October 16 - 17, 2013) Attendees will have the opportunity to participate in a knowledge exchange of the latest enterprise security topics through expert led business and technology forums, hands-on sessions, and training. Such...
Cybersecurity Symposium: "Protect. Defend. Educate."(Linthicum, Maryland, USA, October 16 - 17, 2013) The Cybersecurity Symposium being held October 16-17, 2013, will deliver first-class training for government and industry security professionals while simultaneously offering high-level keynote speakers,...
NSU Healthcare Cyber Security Summit(Fort Lauderdale, Florida, USA, October 17, 2013) In today's modern healthcare systems, data is everywhere, including sensitive patient data that needs to be secured and monitored. Join top healthcare security professionals from Nova Southeastern University,...
Nuclear Regulatory Commission Cyber Security Conference & Expo(Rockville, Maryland, USA, October 17, 2013) This one-day conference will consist of cyber sessions in the NRC Auditorium given by government and industry speakers. Exhibit tables will be set-up just outside the Auditorium and companies will have...
Securing the Internet of Things Summit(San Francisco, California, USA, October 21, 2013) The Internet of Things is still in its infancy and the security community has a chance to build in new approaches to security if we get started now. More secure embedded operating systems and applications,...
13th Industrial Control Systems Cyber Security Conference(Atlanta, Georgia, USA, October 21 - 22, 2013) Industrial Control Systems (ICS) operate the infrastructures of electric power, water, chemicals, manufacturing, transportation, defense, etc. and link the digital and physical worlds. Their cyber security...
Cloud Connect(Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...
Cyber Security Seminar and IT Expo at Peterson AFB(Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest...
Hack.lu 2013(Luxembourg, October 22 - 24, 2013) Hack.lu is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society.
Joint Federal Cyber Summit 2013(Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...
NSU's 12 Simple Cybersecurity Rules For Your Small Business(Fort Lauderdale, Florida, USA, October 24, 2013) In this presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security...
BREAKPOINT 2013(Melbourne, Australia, October 24 - 25, 2013) Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.
Ruxcon(Melbourne, Australia, October 26 - 27, 2013) Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities...
2013 ACT–IAC Executive Leadership Conference(Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...
FIRST Energy Symposium(Leesburg, Virginia, USA, October 28 - 29, 2013) Recent reports have shown that the Energy Sector has seen a large increase in the reported number of cyber attacks. The need to protect against threats and improve upon incident management has never been...
SAP NS2: National Security Solutions Summit(Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.
RSA Conference Europe(Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...
Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...
NSA Hawaii — Cyber Security, Intelligence & IT Day(Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.