We can expect to see a surge in hacktivism over the next three weeks as important anniversaries arrive: October 30 (the day Ottoman Turkey surrendered in the First World War), November 1 (the disestablishment of the Caliphate), and, of course, November 5 (Guy Fawkes Day). We see a preview of this activity in cyber rioting in Azerbaijan, Armenia, Algeria, and Pakistan (this last spilling over into the UK).
RedHack and Anonymous have already promised big things for November 5. While such threats have more often than not fizzled, it would be imprudent to ignore them.
The Syrian Electronic Army is back, with weekend attacks on Qatar.
Malicious email troubles British Internet users. Fake Chrome and Adobe Flash updates are also circulating as convincing malware vectors. PRNewswire recovers from an attack that appears linked to the recent Adobe exploit.
South African banks work to contain the Dexter attacks. A similar campaign—Apollo—is active in Eastern Europe.
Researchers note a melancholy trend: children now regard cyber-bullying as a normal part of life.
Former US Vice President Cheney was concerned enough about medical device hacking to take steps to secure his pacemaker.
In industry news, QinetiQ seems ready to sell its QNA unit. Sino-US cyber tensions have recently receded behind the Snowden affair, but Huawei reopens the question of a modus vivendi by proposing an independent safeguard regime.
More NSA allegations prompt a diplomatic backlash from France and Mexico. Also, NSA reportedly delayed installation of insider-threat detection tools at Snowden's former workplace.
Today's issue includes events affecting Algeria, Armenia, Azerbaijan, Belarus, Brazil, China, Finland, France, Germany, Iran, Israel, Republic of Korea, Mexico, Netherlands, Oman, Pakistan, Poland, Qatar, Russia, South Africa, Syria, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States, and Vietnam..
Qatar Restores Websites Defaced by Syrian Electronic Army(Softpedia) Over the weekend, the Syrian Electronic Army defaced several high-profile websites from Qatar after hacking the country's domain registry. The hacktivists altered the DNS records of Google, Vodafone, Facebook, and various government and military domains
RedHack and Anonymous Team Up for November 5 Protests(Softpedia) November 5 is a symbolic date on which hacktivists and activists from all over the world plan on protesting and marching for various causes. RedHack and some members of the Anonymous movement have teamed up for such a protest in Turkey
U.K. users targeted with fake 'Confirming your Sky offer' malware serving emails(Webroot Threat Blog) British users, watch what you execute on your PCs! Over the last week, cybercriminals have launched several consecutive malicious spam campaigns targeting users of Sky, as well as owners of Samsung Galaxy devices, into thinking that they've received a legitimate MMS notification to their email address. In reality though, these campaigns 'phone back' to the same command and control botnet server, indicating that they're related
British Users Targeted By Health–Related ZBOT Spam(TrandLabs Security Intelligence Blog) Spam may be seen by the public as a minor nuisance now, but this couldn't be further from the truth. We recently encountered spam that triggers an infection chain with ZBOT malware as the end result
Fake Chrome, Adobe Flash updates(ZDNet) Be on the lookout for fake updates to Chrome and Adobe Flash using high-quality techniques. This morning I stumbled across what seems to be a new malware–spreading technique: A fake updates for Google Chrome and a fake "media player" update that is designed to look like it's coming from Adobe
A Disclosure of What's Behind the #w00tw00t Attack(Malware Must Die) Not so long ago I received this attack came into our web server: #MalwareMustDie! 1st attack attempt came into our new server is by "Romanian AntiSec" from China IP…October 5, 2013. That was actually the first time of attack series we received as per listed here
Banks on high alert after Dexter attack(ITWeb) The recent POS data breach highlights the need for businesses to institute security measures and become PCI DSS compliant.
SA's banks are on high alert after falling prey to a sophisticated cyber attack that cost them tens of millions of rands this year
Regional Banking Threats: The Apollo Campaign(TrendLabs Security Intelligence Blog) While most banking Trojans are indiscriminate in infecting users to gather as many victims/revenues as possible, some have chosen to go the regional route. For example, the Citadel incident in our previous blog post where the target was mainly Japanese users. This time, we are looking at another case that seems to target Eastern Europe
A peek inside the administration panel of a standardized E–shop for compromised accounts(Webroot Threat Blog) At Webroot's Threat Blog, we often discuss the dynamics of the cybercrime ecosystem. Through the prism of basic business, marketing and economic theories, the idea is to help make them easy to comprehend by most readers. Constructively raising awareness on some of the driving factors behind the epidemic growth of cybercrime. We also often emphasize on concepts such as standardization, vertical integration, for hire, rent or on demand business models, commoditization and economies of scale. This further highlights the legitimate market-like state of the underground marketplace, in terms of the variety of business models, pricing schemes, and current/long term centered
Spammers are dodging Twitter's DM URL bug by sending links to tweets(The Next Web) When sending Twitter direct messages with links stopped working for some users earlier this week, speculation arose that it was a new feature intended to discourage DM spam. Twitter confirmed that it was actually a "technical issue" that the company was responding to by "restructuring back-end elements of (its) direct message system", but that hasn't stopped some spammers from finding a way around the bug
Zombies Gone, Problems Persist With Emergency Alert System(Security Ledger) More than six months after hacked Emergency Alert System (EAS) hardware allowed a phony warning about a zombie uprising to air in several U.S. states, a security consulting company is warning that serious issues persist in software from Monroe Electronics, whose equipment was compromised in the earlier attack
Dick Cheney feared assassination by wireless heart hack(Graham Cluley) Dick Cheney, the former vice president of the United States, was so worried about the possibility of a hacker assassinating him that he had the wireless feature of his implanted heart defibrillator deactivated
Security Patches, Mitigations, and Software Updates
VMware Release Multiple Security Updates(Internet Storm Center) VMware released the following security updates. The first one is VMSA-2013-0012 which address multiple vulnerabilities in vCenter Server, vSphere Update Manager, ESXi and ESX. The second is VMSA-2013-0006.1 which address multiple vulnerabilities in vCenter Server Appliances and vCenter Server running on Windows. The last is VMSA-2013-0009.1 which address multiple vulnerabilities in vCenter Server, ESX and ESXi that updates third party libraries
Cyber Risk and the Board of Directors—Closing the Gap(Bloomberg Law) The responsibility of corporate directors to address cyber security is commanding more attention and is obviously a significant issue. Yet here is how one writer entitled her Forbes article about the 2012 Carnegie Mellon Cylab Report: "Boards Are Still Clueless About Cybersecurity"
United States: The Price Tag For Cyber Crime Continues To Increase(Mondaq) Cyber crime is not new. And despite grappling with it now for years, the cost of cyber crime continues to increase. This has been made plain by the 2013 Cost of Cyber Crime Study by the Ponemon Institute that was sponsored by Hewlett-Packard. What do we learn from this study? Well, for starters, the annual cost of cyber crime is a staggering $11.56 million per U.S. organization. This represents a 26 percent increase from the $8.9 million figure from last year
When Size Matters(Light Reading) It is easy to get lost in the numbers when discussing distributed denial of service (DDoS) attacks and other network breaches but the figures Arbor Networks released this week regarding DDoS attacks are worthy of special note. They are a strong indication of new threats for which network operators need to be prepared
The Trajectories of Government and Corporate Surveillance(Schneier on Security) Historically, surveillance was difficult and expensive. Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves in a world of ubiquitous surveillance, where everything is collected, saved, searched, correlated and analyzed
Forget the NSA, that spy may be your spouse(Sydney Morning Herald) It's not just the US National Security Agency spying on smartphones. Many ordinary people are also using sophisticated software to eavesdrop on the wireless communications of their lovers, children and business rivals
NSA Leaks Prompt Need For Broader Security Discussion, Huawei Says(CRN) Huawei, which pledged to not retreat from the U.S. market following concern from lawmakers that its hardware components could contain back-door access for Chinese surveillance, is using the ongoing National Security Agency leaks as a stepping stone for a broader discussion about cybersecurity and transparency at technology providers
QinetiQ could sell U.S. business after $385 mln writedown(Reuters) British defence technology company QinetiQ Group could sell its U.S. services division after a 256 million pound ($385 million) writedown prompted it to launch a strategic review of the business. QinetiQ and other defence contractors have been hurt by continuing uncertainty over the impact of mandatory U.S. government spending cuts that have already caused some contracts to be delayed. "We're not ruling out anything at this moment in time, Chief Executive Leo Quinn told Reuters when asked if the QinetiQ was considering selling the division, though he added that it was "far too early"
DHS, SANS Institute join forces to give agencies cyber primer(Federal News Radio) Federal cybersecurity workers have gotten the message: A static defense of their computer networks and systems is no longer acceptable or useful. But chief information security officers and other their staffs continue to struggle to move to a more dynamic approach, commonly known as continuous diagnostics and monitoring
Ogilvy PR New York Adds Two Clients to Roster(MarketWatch) Altec and Bitdefender® Broaden Agency's Expertise in Technology and Consumer Products. Ogilvy Public Relations (Ogilvy PR), an integrated global communications firm, today announced two new client additions to its New York roster: Altec Lansing, audio electronics manufacturer and Bitdefender®, security and anti-virus software creator
Webroot Enhances Mobile Threat Protection To Secure Corporate Data And Strengthen BYOD Policies(Dark Reading) Webroot, a leader in cloud-based security intelligence solutions, today announced the release of the new edition of Webroot SecureAnywhere™ Business — Mobile Protection to ensure mobile devices and company data stay secure. As more organizations face the challenges of corporate data on personal devices, otherwise known as bring–your–own device (BYOD), information security becomes a primary concern. In a recent survey of mobile security decision-makers, results showed that 83% of respondents believe that mobile devices create a high security risk within the corporate environment
4 New Ways to Smuggle Messages Across the Internet(IEEE Spectrum) SkyDe, StegTorrent, StegSuggest, and WiPad make hiding messages in plain sight--steganography--untraceable.Their neighbors thought they were just ordinary U.S. residents, but secretly they were spies, sent by Russia's Foreign Intelligence Service to gather information on U.S. policies and programs. For years they thwarted detection partly by hiding secret correspondence in seemingly innocent pictures posted on public websites. They encoded and decoded the dispatches using custom-made software
Lemko Corporation Announces Engineering Alliance Embedding SAIFE Technology(IT Business Net) Lemko Corporation, the leader in re-engineering mobility for Internet economics, today announced an alliance with Cummings Engineering, creator of SAIFE. Under the terms of the agreement, Lemko will include the SAIFE NSA Suite B FIPS 140-2 validated framework with its patented SwarmNet solution. Focused on fulfilling the needs of government, the combination of the two COTS solutions provides an unprecedented level of security across mobile environments
Understanding Severity And Criticality In Threat Reporting(Dark Reading) How do you prioritize newly disclosed threats and vulnerabilities? Here are some tips. "Does this vulnerability pose risk to my organization?" Arriving at the answer to this question isn't easy. Indeed, the answer, at least partially, is a measure of your own internal visibility into the technology in use inside and, in some cases, outside your network
New tricks that may bring DNS spoofing back or: "Why you should enable DNSSEC even if it is a pain to do"(Internet Storm Center) Recently, two papers independently outlined new attacks against DNS, undermining some of the security features protecting us from DNS spoofing. As Dan Kaminsky showed, 16 bit query IDs are an insufficient protection against DNS spoofing. As a result, DNS servers started to randomize the source port of DNS queries in order to make DNS spoofing harder. This was never meant to "fix" DNS spoofing, but worked well enough for DNSSEC to be pushed back yet again
Viewpoint: Know your cyber enemy(Federal Times) When analyzing threats, don't forget the human element. When facing a new technology or social change, it can be helpful to draw on the lessons of history. Information security experts attempting to build predictive, effective cyber-intelligence programs may look to the roots of artificial intelligence and data analytics for clues to how earlier analysts solved similar problems
4 Ways to Teach Your Child Cyber Awareness(Better Business Bureau) As a parent, one of your top priorities is the safety of your children. You teach your child not to talk to strangers and to look both ways when crossing the road, but how often do you talk to your child about cyber security
Keeping your endpoint data safe: some simple precautions(The Register) People are out to get you. Your business, your users, your systems and your data all have value to someone. You could be targeted because you have something that someone specifically wants, or because attackers are hoping to find bank account details or email addresses to spam, or because they want your compute power for a botnet
How to define a security incident(ITPro) Asking 'what is a security incident?' may seem like something of a silly question, however when Lancope recently conducted a survey of IT and security professionals the results pointed towards the answer being far from straightforward
Three–day cyber security drill begins tomorrow(Oman Tribune) The Regional Cyber Security Centre hosted by the national CERT is to conduct the first cyber drill for the Arab region from Tuesday. The three-day exercise is expected to let participants from national Computer Emergency Response Teams (CERT) have an opportunity to test their skills and knowledge in the event of a cyber attack
Five More Hacker Tools Every CSO Should Understand(Tripwire: The State of Security) As we mentioned in the first article, Top Five Hacker Tools Every CISO Should Understand, the role of the CISO continues to evolve within organizations towards that of an executive level position. Nonetheless, CISOs need to keep on top of the best tools and technologies available that can benefit their organization's security posture
Research and Development
A plan to turn every lightbulb into an ultra–fast alternative to Wi–Fi(Quartz) Current wireless networks have a problem: The more popular they become, the slower they are. Researchers at Fudan University in Shanghai have just become the latest to demonstrate a technology that transmits data as light instead of radio waves, which gets around the congestion issue and could be ten times faster than traditional Wi-Fi
CyberPoint Wins $5.4M Advanced Cyber Research Contract for DARPA VET Program(Herald Online) CyberPoint announced today that it has been awarded a $5.4M research contract with the Defense Advanced Research Projects Agency (DARPA) for the agency's Vetting Commodity IT Software and Firmware (VET) program. CyberPoint Labs, CyberPoint's dedicated research and development team, will collaborate with program teams to solve hard technical problems and advance the state-of-the-art in cyber-defense testing. The overarching goal is to counter the serious cyber threats to an increasingly globalized technology supply chain. Together, they will be looking for innovative, large-scale approaches to verifying the security and functionality of commodity IT software and hardware devices to help ensure they are free of hidden backdoors and malicious functionality
Eugene Kaspersky receives honorary doctorate and discusses viruses and cyber threats in Armenia(Panorama) Kaspersky Lab announces that Eugene Kaspersky, Chairman and CEO of Kaspersky Lab, received an honorary doctorate from the State Engineering University of Armenia (SEUA), the country's leading technical university. Eugene Kaspersky and the company's top IT security experts met representatives of the education and the business community, as well as students from local technical universities during the recent visit to Armenia. They spoke about current cyber threats in Armenia and the wider world and discussed ways to combat them
Legislation, Policy, and Regulation
Brazil to host summit on internet governance(The Hindu) With a wave of anger sweeping the South American nations, especially Brazil, the April 2014 meeting could be a game-changer for the management of the world wide web
Cyber Warfare: The Modern Cold War?(Huffington Post) On the day of his assassination, President John F. Kennedy was due to deliver a speech in Dallas on national security. In his speech, Kennedy would reference the need to move beyond the traditional roles of military force, and towards methods that combat those who "threaten freedom in a less direct but equally dangerous manner." He would have continued - "over-whelming nuclear strength cannot stop a guerrilla war. Formal pacts of alliance cannot stop internal subversion." Without explicitly referencing cyber war, and despite living in an era dominated by brute force and nuclear power, it's clear that JFK recognised that not all threats with the capacity to destruct were physical, and that a time was coming when these alternative threats would play an important role in defining national security policies
Changes Coming Atop US Intelligence Agencies(Voice of America) Some U.S. intelligence agencies are undergoing changes in leadership. The director of the National Security Agency and his deputy are resigning, and President Barack Obama has nominated a new secretary of Homeland Security
Cyber security: Why military forces should take a back seat(The Interpreter) I'm grateful once again to have the chance to respond to some comments my 27 September cyber piece (Is There Such a Thing as Cyberwar?). Although I enjoyed reading Tony Healy's comments, I disagree with his suggestion that 'Whether cyberwar is real war is not important
NSA hacked Mexican President's emails(IT Pro Portal) The government of Mexico has been revealed as the latest victim of the US National Security Agency (NSA) and its widespread spying operations, according to the latest reports. Targets include the private email accounts of former President Felipe Calderon, and that of the current sitting President Enrique Peña Nieto
France in the NSA's crosshairs: phone networks under surveillance(Le Monde) The future will perhaps tell us one day why France has remained so discreet in comparison with Germany or Brazil, for example, after the first revelations about the extent of the American electronic espionage programmes in the world as revealed by Edward Snowden, the ex-employee of an NSA (National Security Agency) sub-contractor. France was also concerned and today has at its disposition tangible proof that its interests are targeted on a daily basis
Snowden leaks: France summons US envoy over spying claims(BBC) Edward Snowden's leaks led to claims of systematic US spying across the world. French Foreign Minister Laurent Fabius has summoned the US ambassador over newspaper claims that the US spied on millions of phone calls in France
You Have Questions About The NSA; We Have Answers(KUHF) The revelations by National Security Agency contractor Edward Snowden has raised many complicated issues. NPR's national security correspondent Tom Gjelten answers questions submitted by NPR listeners and readers. For good reason. The surveillance programs are highly technical, involving the bulk interception of huge volumes of communication data as they traverse multiple links and networks. The laws governing what the NSA can do are complex and open to conflicting interpretations
Sen. Dianne Feinstein: Continue NSA call–records program(USA Today) The NSA call-records program is legal and subject to extensive congressional and judicial oversight. Above all, the program has been effective in helping to prevent terrorist plots against the U.S. and our allies. Congress should adopt reforms to improve transparency and privacy protections, but I believe the program should continue
Obama has chance to reshape the NSA(The Hill) The upcoming retirement of National Security Agency Director Gen. Keith Alexander will give President Obama an opportunity to transform the agency. Currently, he does not need Senate approval to appoint an NSA director, one of the most powerful positions in the intelligence community
Is TRIA for Cyber Terrorism?(Insurance Journal) The insurance industry will count on the Terrorism Risk Insurance Program (Program) if there is a terrorist strike on the United States, but will the Program respond if the act of terrorism is a cyber event
Time to display leadership as powerhouse in cyber space(Donga.com) The Seoul Conference on Cyberspace 2013 ended on Friday. It was the third annual conference since the first event in 2011. Unlike the first and second events that were gatherings of primarily advanced countries, this year's event was promoted to a truly global general assembly that bought together 87 countries and 18 international organizations. The event was especially significant because it represented the largest information communications technology-related international conference that took place in Korea, an ICT powerhouse
Experian Sold Consumer Data to ID Theft Service(Krebs on Security) An identity theft service that sold Social Security and drivers license numbers — as well as bank account and credit card data on millions of Americans — purchased much of its data from Experian, one of the three major credit bureaus, according to a lengthy investigation by KrebsOnSecurity
UCLA Health dodges $16 million breach claim(FierceHealthIT) In a ruling that seems to run counter to HIPAA, a California appellate court has ruled that providers aren't necessarily liable to patients when medical records are stolen or misappropriated unless they are accessed by a third party
When Journalists are called traitors(The New Yorker) A military lawyer had identified forty-one highly classified state secrets revealed in a single article. Senior officials were telling everyone who would listen that the journalists' revelations had made the country less safe and put lives at risk—the reporters were simply traitors. The Russians might be behind it, and who knew what secrets the journalists would hand over if they weren't immediately apprehended. Their publisher was already in Cuba, or maybe just headed there on a plane—anyway, he was a fugitive. A call was put in to a military attaché in Spain, to ask him to arrange to have another journalist stopped at the border; a soldier thought to be his source was arrested. The country's leader mocked the media outlet involved: "You've got a publication that prints a half a million copies and systematically engages in treason--to make itself some money." And not just a little treachery: "an abyss of treason." The whole thing was "just plain ugly"
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
STEM family night returning to Arundel Mills(Arundel Mills Mall, Maryland, USA, October 23, 2013) The Fort Meade Alliance is hoping to spark interest in future engineers and doctors at their third annual STEM family night Wednesday at Arundel Mills mall.
CEIC 2014(Las Vegas, Nevada, USA, May 19 - 22, 2014) It's no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for practical skills development. From sessions...
Securing the Internet of Things Summit(San Francisco, California, USA, October 21, 2013) The Internet of Things is still in its infancy and the security community has a chance to build in new approaches to security if we get started now. More secure embedded operating systems and applications,...
13th Industrial Control Systems Cyber Security Conference(Atlanta, Georgia, USA, October 21 - 22, 2013) Industrial Control Systems (ICS) operate the infrastructures of electric power, water, chemicals, manufacturing, transportation, defense, etc. and link the digital and physical worlds. Their cyber security...
Cloud Connect(Chicago, Illinois, USA, October 21 - 23, 2013) Cloud Connect returns to Chicago October 21-23, 2013 with an all new program built around the leading cloud platforms. Cloud Connect provides the independent guidance IT professionals need to successfully...
Cyber Security Seminar and IT Expo at Peterson AFB(Colorado Springs, Colorado, USA, October 22, 2013) The Cyber Security Seminar and IT Expo is a one-day event held on-site where industry vendors will have the opportunity to display their products to personnel attending briefings concerning the latest...
Hack.lu 2013(Luxembourg, October 22 - 24, 2013) Hack.lu is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society.
Joint Federal Cyber Summit 2013(Washington, DC, USA, October 23 - 24, 2013) This collaborative government wide event is truly one of a kind, with speakers and attendees anticipated to represent more than 10 federal government agencies. Information sharing will be accomplished...
NSU's 12 Simple Cybersecurity Rules For Your Small Business(Fort Lauderdale, Florida, USA, October 24, 2013) In this presentation twelve simple and inexpensive techniques for protecting small businesses from cyber threats will be discussed. While complex and expensive solutions exist to improve the security...
BREAKPOINT 2013(Melbourne, Australia, October 24 - 25, 2013) Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.
Ruxcon(Melbourne, Australia, October 26 - 27, 2013) Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities...
2013 ACT–IAC Executive Leadership Conference(Williamsburg, Virginia, USA, October 27 - 29, 2013) Advances in technology and massive increases in data available can both challenge and transform Government mission performance. ELC-2013 focuses on how to make this transformation a reality, in and for...
FIRST Energy Symposium(Leesburg, Virginia, USA, October 28 - 29, 2013) Recent reports have shown that the Energy Sector has seen a large increase in the reported number of cyber attacks. The need to protect against threats and improve upon incident management has never been...
SAP NS2: National Security Solutions Summit(Falls Church, Virginia, USA, October 29, 2013) Join us for a day of learning and networking focused on how to advance U.S. national security and homeland security through I.T. innovation. Top-notch speakers will address the new challenges facing U.S.
RSA Conference Europe(Amsterdam, the Netherlands, October 29 - 31, 2013) Information security today isn't optional. It's business-critical. Over three days, RSA® Conference Europe 2013 imparts the must-know actions to manage growing cyber threats. With over 60 sessions spanning...
Regional Cyber Security Forum & IT Day (CSFI) — Hawaii (Honolulu, Hawai'i, USA, October 30, 2013) 2013 marks the 10th anniversary of National Cyber Security Awareness Month and FBC will host the 1st Annual Cyber Security Forum & IT Day (CSFI) at Fort Shafter - Club Hale Ikena to coinside with the anniversary,...
NSA Hawaii — Cyber Security, Intelligence & IT Day(Honolulu, Hawai'i, USA, October 30, 2013) Be a part of the 1st Annual Cyber Security, Intelligence and IT Day set to take place at the new National Security Agency (NSA) Hawaii Rochefort facility. The event will be hosted by NS/CCS Hawaii Technology...
Ahead of the Threat: Driving Innovation for Cyber Security(Bethesda, Maryland, USA, October 30, 2013) Sponsored by the Tech Council of Maryland, this conference will feature a presentation by Sondra L. Barbour, Lockheed Martin Information Systems & Global Solutions (IS&GS) Executive Vice President, will...
TrustED 2013(Berlin, Germany, November 4, 2013) In this workshop we consider selected aspects of cyber physical systems and their environments. We aim at bringing together experts from academia, research institutes, industry and government for discussing...
OKTANE 1(San Francisco, California, USA, November 3 - 5, 2013) OKTANE13 is an identity, security and mobility event. Whether you're just getting started with cloud applications, evaluating a mobile strategy, building a hybrid enterprise IT, or looking to make your...
MIRcon 2013(Washington, DC, USA, November 5 - 6, 2013) With targeted attacks becoming more prevalent, today's incident responders are faced with the tremendous challenge of accelerating their response times while capturing relevant data from attacks in progress.
KMWorld 2013(, January 1, 1970) KMWorld 2013 is a must-attend event for those concerned with improving their organizations' bottom line, business processes, and productivity, as well as streamlining operations, and accelerating development...
Cyber Education Symposium(Arlington, Virginia, USA, November 19 - 20, 2013) Both the public and the private sectors suffer from a lack of highly trained and effective cyber security leaders. In response, the government, businesses, and academic institutions are all exploring ways...
APPSEC USA(New York, New York, USA, November 18 - 21, 2013) Welcome to Appsec USA 2013, New York - a world class software security conference for developers, auditors, risk managers, and entrepreneurs, bringing you the world's top speakers, the most relevant security...
IT Forum Expo/Black Hat Regional Summit(, January 1, 1970) Black Hat Regional Summit will introduce a mix of local in-region experts and researchers from around the globe, discussing the latest trends in information security with an audience of peers. The sessions...
2nd Annual East Africa IT and Cyber Security Convention 2013(Nairobi, Kenya, November 28 - 29, 2013) The 2nd Annual East Africa IT and Cyber Security Convention 2013 will bring together leading Cyber and IT Security experts who will provide key insights into critical cybersecurity issues surrounding cyber...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.