Improved (and improving) versions of the Egobot Trojan are being used in a cyber espionage campaign directed against financial, industrial, and infrastructure targets. While the targets are located in many countries, including Australia, Brazil, South Korea, and the US, they all appear "Korea-related." No attribution yet, but a South Korean MP releases ROK government reports on long-standing North Korean cyber attacks. (North Korea says tu quoque, and besides, it's all just a provocation anyway.)
The usual cyber-rioting continues in the Middle East and the Subcontinent. RedHack again defaces a Turkish Website, and the Greek Foreign Ministry discloses its email system has been hacked by Anonymous.
Two denial-of-service attacks were committed over the weekend, one hitting Germany's Pirate Party, the other GitHub.
Britain's Independent uses its experience with the Syrian Electronic Army as a study in the Assad regime's attempts at information warfare by spoofed accounts.
Mandiant, long subject to retailiation by Chinese agencies displeased by Mandiant's exposure of their activities, receives bogus limo-service invoices. The pdfs carry a malicious payload and originate (unsurprisingly) with Chinese cyber units.
A Dexter variant has been used to compromise thousands of South African bankcards.
A D-Link router firmware flaw opens a backdoor vulnerability. Chrome appears susceptible to exposure of user history files.
Several attack surfaces are newly worrisome: vessel-tracking systems, GPS, smartphone sensors, and public Wi-Fi hotspots. Digital fingerprinting of physical devices raises controversy.
Reports of NSA email contact list harvesting prompt more surveillance backlash. Brazil creates a government email system to thwart interception.
Today's issue includes events affecting Australia, Brazil, Canada, China, European Union, Germany, Greece, India, Iran, Israel, Democratic People's Republic of Korea, Republic of Korea, Morocco, Netherlands, Pakistan, Russia, Saudi Arabia, South Africa, Syria, Turkey, United Kingdom, United States..
Cyber Attacks, Threats, and Vulnerabilities
Cybercriminals Use Egobot Trojan to Target South Korea–Related Organizations(Softpedia) Symantec researchers have been monitoring a cyber-espionage campaign aimed mainly at South Korean organizations and executives doing business with South Korea. According to experts, the attackers target financial and investment companies, infrastructure and development organizations, defense contractors and government agencies. The targets are located all around the world, including in Korea, Australia, Brazil and the United States
'Thousands' of North Korea Cyber Attacks on South: Ministry Data(SecurityWeek) North Korea has staged thousands of cyber attacks against the South in recent years, causing financial losses of around $805 million, a Seoul lawmaker said Tuesday citing government data. "A lot of data related to our national infrastructure, including chemical storage facilities and information relating to personal financial dealings have been stolen," ruling party MP Chung Hee-Soo said
BSNL Telecom India Domain Hacked and Defaced by P4K-M4D-HUNT3R-Z(HackRead) A Pakistani hacker going with the handle of Ch3rn0by1 from P4K-M4D-HUNT3R-Z has hacked and defaced the official domain of India's Bharat Sanchar Nigam Limited (BSNL) Telecom yesterday. The defaced domain belongs to BSNL's Regional Telecom Training Centre (RTTC), Ahmedabad which was left with a deface page along with a message, bashing the site admin for poor security. The deface message was expressed
Iranian Hacker Hacks Israeli Job Portal, Leaks 3349 Login Accounts of Israeli Users(HackRead) An Iranian hacker going with the handle of Dr.3v1l from Black_Devils B0ys hacking group has breached to an Israeli based job search portal, as a result login account information of over 3349 Israeli citizens have been leaked and dumped online. Dr.3v1l contacted me on Twitter regarding his latest hack with a Pastebin link that shows login accounts of over 3000 site users. The link also shows a message
Union of Turkish Public Enterprises Hacked by RedHack(Softpedia) Hackers of the RedHack group have breached and defaced the official website of the Union of Turkish Public Enterprises. This is just the latest in a long series of attacks launched by the hacktivist collective against the Turkish government
Germany's Pirate Party Hit by Another DDOS Attack(Softpedia) The website of Germany's Pirate Party, an organization that militates for the freedom of the Internet, has been disrupted once again due to a distributed denial-of-service (DDOS) attack
GitHub Down Due to DDOS Attack(Softpedia) GitHub is once again unavailable due to a distributed denial-of-service (DDOS) attack. Both GitHub.com and Gist are impacted. "We have confirmed GitHub.com and Gist are both undergoing a large DDoS attack and are working to mitigate the attack," reads a message posted moments ago on GitHub's status page
The Long Shadow Of Saudi Aramco(Dark Reading) New threats, realities of targeted attacks forcing oil and gas companies to rethink and drill down on security. There's a mindset shift slowly permeating the oil and gas industry that it's no longer immune to hackers
WhatsApp crypto snafu drops trou on users' privates(Register) 'Very basic error' leaves messaging app open to snoopers. Mobile messaging service WhatsApp came for criticism over the robustness of its cryptography last week after a fix for a January security snafu was slammed for not being robust enough
Now the Chinese Are Hacking Us Through Our Limos(Foreign Policy) Kevin Mandia, CEO of the cybersecurity company Mandiant, takes a lot of limo rides. Normally, his limo company emails him PDF copies of his invoices after every trip. Recently, though, something changed
SA banks in massive data breach(Mail & Guardian) A variant of malware called Dexter has cost local banks tens of millions of rand in one of the worst breaches of customer card data in SA history
Spamvertised T–Mobile "Picture ID Type:MMS" themed emails lead to malware(Webroot Threat Blog) The cybercriminals behind last week's profiled fake T-Mobile themed email campaign have resumed operations, and have just spamvertised another round of tens of thousands of malicious emails impersonating the company, in order to trick its customers into executing the malicious attachment, which in this case is once again supposedly a legitimate MMS notification message
Attackers in Asia compromise data for nearly 150k in California(SC Magazine) Hackers said to be located overseas may have compromised the personal data of tens of thousands of California residents in a computer attack that dates back to March. Among the sensitive information that may have been accessed are the names, addresses, dates of birth and Social Security numbers of 144,493 Monterey County residents
Thousands of Sites Hacked Via vBulletin Hole(Krebs on Security) Attackers appear to have compromised tens of thousands of Web sites using a security weakness in sites powered by the forum software vBulletin, security experts warn
Android Scareware Delivered via Advertising SDK(Softpedia) Security researchers warn that the Android advertising SDK from InMobi is leveraged by cybercriminals to distribute a piece of scareware. Bitdefender experts have uncovered several legitimate applications that include the advertising SDK in question, including an older version of the Brightest Flashlight Free app hosted on Google Play
Flaw In Chrome May Leave Users' Personal Information At Risk(Dark Reading) Vulnerability in Chrome browser could enable attackers to collect data from history files, Identity Finder says. Security flaws in Google Chrome could enable attackers to capture personal data stored in the browser's history files, researchers said Friday. In a blog posted last week, researchers at security firm Identity Finder outlined methods for accessing personal data from Chrome's History Provider Cache, even if the data has been entered on a secure website. Some data also may be accessible through Chrome's Web Data and History databases, the researchers say
'Paunch' Arrest Puts Blackhole Hackers on Data Diet(TechNewsWorld) While Paunch will be out of circulation for awhile, the arms bazaar where he sold his wares will continue to operate. "Americans must be cognizant that there is a organized community of cyberweapons merchants who have developed and sold capabilities which bypass traditional cyberdefenses," said Tom Kellermann, vice president of cyber security for Trend Micro
Captain, Where Is Your Ship — Compromising Vessel Tracking Systems(Trend Labs Security Intelligence Blog) In recent years, automated identification systems (AIS) have been introduced to enhance ship tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS is currently mandatory for all passenger ships and commercial (non-fishing) ships over 300 metric tons. It works by acquiring GPS coordinates and exchanging vessel's position, course and information with nearby ships, offshore installations, i.e. harbors and traffic control stations, and Internet tracking and visualization providers
Hacking GPS On Columbus Day(Kaspersky Lab Daily) In 1492, under a charter from the monarchs of Spain, an Italian man named Christopher Columbus severely underestimated the Earth's circumference, sailing three ships into what he would reportedly die believing was the East Indies, but which was in actuality an Archipelago thousands of miles away, now known as the Bahamas
The many security problems of ATMs(Help Net Security) As much as they are useful, ATMs are also very vulnerable to tampering and attacks from individuals looking for money. eWeek reports that at the SecTor security conference held this week in Toronto, Canada, Trustwave senior consultant John Hoopes provided insight into the attacks that are frequently executed against Point of Sale (POS) systems and ATMs, and the things defenders can do to prevent them
Device tracking by web sites can be a good thing(ZDNet) Yes, many web sites try to keep track of the physical devices from which you connect to them. This could be nefarious, but much more likely the site has very good security reasons to do it
Do Smartphone Sensors Present Security Risk?(InformationWeek) Variations in how different smartphone accelerometers record data raise concerns that advertisers, intelligence agencies or others could use this information to identify individual devices
Public WiFi Hotspots Ripe for MITM Attacks(InfoSecurity Magazine) Ah, the public hotspot: oases of connectivity in airports, coffee shops, bookstores, town centers and at chains that range from Starbucks to Barnes & Noble to McDonalds
Security Patches, Mitigations, and Software Updates
D-Link to padlock router backdoor by Halloween(ComputerWorld) D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password
Are hackers really out to damage the networks?(Let's Talk Security) I don't know if you're aware that under EU legislation commonly known as Article 13a, telecommunications organisations are required to inform their national regulator of any major service outages (any that meet a certain criteria), and in the UK this would be Ofcom
BlackBerry Reassures Customers in Open Letter: 'You Can Continue to Count on Us'(ABC News) BlackBerry has had a heck of a few weeks. It has reported a $1 billion quarterly loss, that 40 percent of its workforce will be laid off before the end of the year and its much anticipated BBM app for iPhone and Android was delayed. On top of that, there have been reports that Apple and Motorola have been snatching up its best employees and engineers and that two of the BlackBerry founders are looking to buy the company back
Northrop Grumman to Hackers: Can You Crack Me Now?(Daily Finance) Earlier this year, Chinese spies allegedly hacked Lockheed Martin's F-35 program, along with more than two dozen weapons systems. Further, last October the Defense Science Board found that the Department of Defense, and its contractors, had sustained "staggering losses," allowing adversaries to develop countermeasures to America's advanced weapons systems
Does Trend Micro Have 20/20 Vision of the Future?(PC Magazine) With great technology comes great power. Of course this also means it comes with greater threats from cybercriminals. To raise awareness of the need for cyber security and warn against increased dependence on technology, security software company Trend Micro released a new web series entitled "2020"
Draft RFP Details $6B Defense, Intell Community IT Program(GovConWire) The office responsible for the Defense Intelligence Agency's contracting functions has released a draft request for proposals for a potential five-year, $6 billion contract covering information technology services for defense and intelligence agencies
Twitter Makes Itself More Powerful by Making Private Messaging Simpler(Fast Company) Twitter has changed how you can receive direct messages so that users don't have to be "following" each other to exchange the private communications. The new system is opt-in only, which allows users to preserve the privacy and quiet state of their direct messages feed if they prefer
Real–time operational risk and compliance monitoring(Help Net Security) Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all information as it is
CipherCloud delivers searchable strong encryption(Help Net Security) CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables organisations to comply
Yara rules for leaked KINS toolkit(Help Net Security) Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank account credentials and related information from victims. Seen as a replacement to Citadel, it was identified in the wild not long ago. Now, this leak can lead to new variants and malware families
Big Data Detectives(Dark Reading) Could big data be the key to identifying sophisticated threats? Security experts are on the case. For Vigilant, it started in 2009. And as with most companies, it started small. The security services startup, now part of audit and consulting firm Deloitte, wanted a way to bring information about external threats to clients that were using SIEM (security information and event management) systems to monitor their own environments. The Vigilant team knew that the combination of external threat data with internal security event data could be a powerful way to improve enterprise defenses, but crunching all that data would be a monumental task
Rejiggering IT Security Budgets For Better Perimeter And Systems Control(Dark Reading) Put the 'boring' blocking and tackling tools before shiny new expenses. As is the case in any other business, IT security leaders must contend with finite resources and as a result they must depend on smart decisions about where to target their budget to ensure they leave as few gaps as possible. The only problem, one which security folk have dealt with for years, is that they tend to be seduced by the latest innovation over the fundamental management tools necessary to implement enough control over network and system infrastructure to properly manage their risks
Do You Have The Right Balance Of On–Premise And Cloud–based Technology For Cyber Security?(Forbes) While cyber-security technology may be one of the hottest areas in technology in terms of investment, it is also the most interesting. Right now we are living in an age in which the world is being run by a massive amount of technology that wasn't created to exist safely in a networked world. In addition, the rise of mobile devices and the Internet of Things has radically extended the data center and increased the need for cyber-security technology
A five–pillar survival guide for an insecure cyber world(CSO) Edward Snowden's action demonstrated that an ordinary insider with a U.S. security clearance can intercept and distribute highly confidential information, even in an age of complex technology designed to prevent such action. What further risks are there? Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which both values and risks increase daily
Security–Enhanced Android: NSA Edition(Bloomberg) Tech giants listed as part of the National Security Agency's Prism spying program have gone to some lengths to convince the world they aren't in bed with the U.S. government. Google has filed a request with the U.S. Foreign Intelligence Surveillance Act court asking permission to disclose more information about the government's data requests. So there's a certain irony that NSA programmers are now refining code that Google has approved for the company's mobile operating system, Android. Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSA's programming in Android OS. "All Android code and contributors are publicly available for review at source.android.com," Scigliano says, declining to comment further
Two telemetry projects should mean better testing and fewer false alarms(Naked Security) Two major cross-industry telemetry projects were presented at last week's Virus Bulletin conference in Berlin. The first is designed to up the standard of anti-malware testing, which in turn encourages better products, and the second aims to help reduce the chances of products mis-identifying clean
5 steps to survive a Meaningful Use audit(FierceHealthIT) Although the government will hit only a small percent of the nation's providers with a Meaningful Use attestation audit, the stakes are high: Any single attestation misstep could be grounds for loss of the full incentive payment
The Cybersecurity Pipeline(InfoSecurity Magazine) When it comes to educating the current and future information security workforce, the (ISC)² US Government Advisory Board Executive Writers Bureau asks: Where are universities in the flow
Legislation, Policy, and Regulation
Brazil creating email for gov't use to fight spies(San Jose Mercury News) Brazilian officials say that all government employees will start using an encrypted email service in an effort to stop foreign spies from intercepting emails. But experts question the ability of Brazil to protect its government emails from the eyes of the U.S. National Security Agency. The entire system is compromised if any user of an encrypted email sends a message to somebody on an outside program, like Gmail
NSA Leaks Prompt Rethinking of U.S. Control Over the Internet's Infrastructure(BBC) The leaders who run the internet's technical global infrastructure say the time has come to end U.S. dominance over it. In response to leaks by NSA whistleblower Edward Snowden, Fadi Chehadé, who heads the Internet Corporation for Assigned Names and Numbers, and others have called for "an environment, in which all stakeholders, including all governments, participate on equal footing"
Former spy agency chief calls for Parliamentary oversight(CTV News) The agency accused of spying on mining and energy operations in Brazil sure as "heck" does not collect intelligence to aid Canadian businesses, says its former head, who is calling for greater government oversight to assure Canadians that its work is not violating their civil liberties
NSA collects millions of e–mail address books globally(Washington Post) The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents
N.S.A. Director Gives Firm And Broad Defense Of Surveillance Efforts(Huffington Post) The director of the National Security Agency, Gen. Keith B. Alexander, said in an interview that to prevent terrorist attacks he saw no effective alternative to the N.S.A.'s bulk collection of telephone and other electronic metadata from Americans. But he acknowledged that his agency now faced an entirely new reality, and the possibility of Congressional restrictions, after revelations about its operations at home and abroad
It's risky business for companies that don't arm themselves against cyber threats(Washington Post) For the past couple of years, Gen. Keith Alexander, the head of both the National Security Agency (NSA) and the U.S. Cyber Command, has been outspoken in warning that private-sector computer networks, upon which the U.S. economy depends, are vulnerable to intrusion. Gen. Alexander stated repeatedly that such attacks -- attempts at espionage, intellectual property theft or sabotage -- should be met with stronger defenses that would require the sophisticated tools of the government. He argued this case before Congress, which considered legislation that would have eased the way for closer cooperation between the government and the private sector. The legislation made sense, but Congress failed to reach agreement on a bill in the last session
NSA Hack Attacks: Good Value For Money?(InformationWeek) Do the National Security Agency's online espionage capabilities provide good value for money? Recent reports have disclosed that the NSA uses a fleet of high-latency -- codenamed "Quantum" -- servers to redirect targeted systems to another fleet of servers, codenamed "FoxAcid," that launch tailored drive-by attacks. The agency's malware reportedly targets a range of vulnerabilities, from publicly known flaws to zero-day bugs that only the NSA possesses
NSA Claims It Doesn't Do Online Attacks; That's A Different Organization…Run By The NSA(TechDirt) There are times you just shake your head and wonder who the NSA top officials think they're kidding with their statements. Take, for example, some recent comments from the NSA's number two guy in charge, Chris Inglis, the Deputy Director, who gave an interview to the BBC where he tried to paint the NSA as not being quite as bad as everyone says, but admitted that there could be more transparency. That's all the usual stuff, but the following tidbit caught my eye
Government surveillance encounters growing backlash(Tulsa World) From Silicon Valley to the South Pacific, counterattacks to revelations of widespread National Security Agency surveillance are taking shape, from a surge of new encrypted email programs to technology that sprinkles the Internet with red flag terms to confuse would-be snoops
BitTorrent Bashes NSA In Stunning Billboard Campaign(HackRead) If you live in New York or San Francisco, you will know the importance of its billboards and strange messages mentioned on them. Last week the popular internet protocol BitTorrent used the billboards to bash the United State's National Security Agency (NSA) for spying over people all over the globe. An important point is that BitTorrent did not reveled its identity until last Tuesday when its name was
Cybercom Activates National Mission Force Headquarters(DoDLive) Army Gen. Keith B. Alexander, Cybercom's commander, says the U.S. Cyber Command has activated the headquarters for its Cyber National Mission Force, the one of its three forces that would react to a cyber attack on the nation
Completely private email is not legal and shouldn't be(ZDNet) Lavabit, Edward Snowden's email provider back before he skipped town, is claiming in appeals court that it's immune from criminal subpoena. This is unreasonable and it's a good thing he will almost certainly lose
What We Learned From The First Jailhouse Interview With Alleged Silk Road Leader Ross Ulbricht(Forbes) Early Monday, San Francisco Magazine revealed that it had obtained the first interview with alleged Silk Road mastermind Ross Ulbricht since his arrest. Nearly two weeks ago, Ulbricht was arrested at the Glen Park branch of the San Francisco Public Library system, accused by federal prosecutors of narcotics trafficking, money laundering and hiring hitmen as the head of the $1.2 billion (sales) online drug bazaar, the Silk Road
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Hack-in-the-Box Security Conference 2013(Kuala Lumpur, Malaysia, October 14 - 17, 2013) The 11th annual HITB Security Conference (16th/17th October) will be a triple track offering featuring keynotes by Andy Ellis, Chief Security Officer at Akamai and Joe Sullivan, Chief Security Officer...
USDA Cyber Security Symposium and Expo 2013(Washington, DC, USA, October 15, 2013) The Cybersecurity Expo, running in conjunction with the Summit, will allow exhibitors the opportunity to provide live demos and share information with government personnel and industry partners. Summit...
SNW Fall 2013(Long Beach, California, USA, October 15 - 17, 2013) SNW is the world's largest independently produced conference series focused on the evolution of architecture for a new world of mobility, Big Data and business agility. Produced by Computerworld -- and...
Hexis Exchange(Athens, Greece, October 16 - 17, 2013) Attendees will have the opportunity to participate in a knowledge exchange of the latest enterprise security topics through expert led business and technology forums, hands-on sessions, and training. Such...
Cybersecurity Symposium: "Protect. Defend. Educate."(Linthicum, Maryland, USA, October 16 - 17, 2013) The Cybersecurity Symposium being held October 16-17, 2013, will deliver first-class training for government and industry security professionals while simultaneously offering high-level keynote speakers,...
NSU Healthcare Cyber Security Summit(Fort Lauderdale, Florida, USA, October 17, 2013) In today's modern healthcare systems, data is everywhere, including sensitive patient data that needs to be secured and monitored. Join top healthcare security professionals from Nova Southeastern University,...
Nuclear Regulatory Commission Cyber Security Conference & Expo(Rockville, Maryland, USA, October 17, 2013) This one-day conference will consist of cyber sessions in the NRC Auditorium given by government and industry speakers. Exhibit tables will be set-up just outside the Auditorium and companies will have...
Securing the Internet of Things Summit(San Francisco, California, USA, October 21, 2013) The Internet of Things is still in its infancy and the security community has a chance to build in new approaches to security if we get started now. More secure embedded operating systems and applications,...
13th Industrial Control Systems Cyber Security Conference(Atlanta, Georgia, USA, October 21 - 22, 2013) Industrial Control Systems (ICS) operate the infrastructures of electric power, water, chemicals, manufacturing, transportation, defense, etc. and link the digital and physical worlds. Their cyber security...
Cloud Connect(Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...
Cyber Security Seminar and IT Expo at Peterson AFB(Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest...
Hack.lu 2013(Luxembourg, October 22 - 24, 2013) Hack.lu is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society.
Joint Federal Cyber Summit 2013(Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...
NSU's 12 Simple Cybersecurity Rules For Your Small Business(Fort Lauderdale, Florida, USA, October 24, 2013) In this presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security...
BREAKPOINT 2013(Melbourne, Australia, October 24 - 25, 2013) Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.
Ruxcon(Melbourne, Australia, October 26 - 27, 2013) Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities...
2013 ACT–IAC Executive Leadership Conference(Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...
FIRST Energy Symposium(Leesburg, Virginia, USA, October 28 - 29, 2013) Recent reports have shown that the Energy Sector has seen a large increase in the reported number of cyber attacks. The need to protect against threats and improve upon incident management has never been...
SAP NS2: National Security Solutions Summit(Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.
RSA Conference Europe(Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...
Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...
NSA Hawaii — Cyber Security, Intelligence & IT Day(Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.