skip navigation

More signal. Less noise.

Daily briefing.

Dark Reading calls CrowdStrike's report on Putter Panda the "tip of the iceberg." Quartz draws attention to one of the alleged hackers' personal details CrowdStrike casually uncovered. One Chen Ping (is that you, Chen Ping?) leaves digital exhaust consistent with the Dunder-Mifflinesque lifestyle Shanghai intelligence officers apparently lead.

PLA officers aren't the only ones leaving their spoor on the Internet: compare today's NPR account of what it's like to be subjected to Web surveillance. There's a lot of information out there about all of us on the grid. (Which is why the UK's GCHQ has found about a quarter of the hoods it was tracking have dropped off that grid since Snowden taught them OPSEC religion.)

Apple's HealthKit raises concerns about the personal information it could expose. Comcast's ongoing conversion of home Xfinity wireless routers into public hotspots by default is coldly received (despite Comcast's protestations of public spirit and good security).

Clandestine Fox is back, still unattributed and targeting the energy sector, now with fresh social-media savvy.

Cyber criminals remain active around the World Cup. Anonymous hacktivists have subjected a São Paulo military network to denial-of-service as part of its World Cup protest.

Other denial-of-service attacks, these of conventional criminal motivation, hit Evernote and Feedly.

The financial sector remains concerned about ZeuS, particularly in its Pandemiya variant. Pandemiya is unusual in that so much of its code is new—a departure from the black market's customary repurposing tweaked variants of familiar malware.

Ransomware surges unabated, despite the recent CryptoLocker takedown.


Today's issue includes events affecting Australia, Canada, China, Italy, Republic of Korea, Russia, United Kingdom, United Nations, United States..

Dateline Cyber 5.0

Continuous monitoring key to retail cyber security, says Ponemon (ComputerWeekly) Retailers should look to continuous monitoring to tackle cyber attacks, according to a Ponemon Institute survey of almost 600 IT security professionals in the US

U.S. SEC official urges broader cyber-attack disclosure (Reuters via the Chicago Tribune) Public companies that are victims of cyber attacks should consider disclosing additional information beyond what's required to help protect customers whose private data could be at risk, a top U.S. regulator said Tuesday

BOE Mimics Cybercriminals in Testing Banks' Resilience (Bloomberg) The Bank of England is testing lenders' defenses against cyber-attacks by mimicking hackers' own techniques as online criminals grow more sophisticated

Cyber Attacks, Threats, and Vulnerabilities

Putter Panda: Tip Of The Iceberg (Dark Reading) What CrowdStrike's outing of Putter Panda — the second hacking group linked to China's spying on US defense and European satellite and aerospace industries — means for the security industry

'Clandestine Fox' hackers win over energy employee in strategy change (IDG via CSO) A hard-to-tracking hacking group, known to use zero-day attacks, changed tack to use social media in an attempt to compromise an employee of an energy company, according to new research from FireEye

Anonymous Takes Down Military Police of São Paulo Website against Football World Cup (HackRead) Football world cup in Brazil will start in couple of days but cyber attacks against the tournament are already in progress

World Cup Brazil 2014: How cybercriminals are looking to score (Help Net Security) Starting this week, 32 national teams and thousands of football fans will descend on Brazil for the 2014 FIFA World Cup. Right now the teams are fine-tuning their strategies in order to outwit their opponents — and so are the cybercriminals

New Pandemiya Banking Trojan Written from Scratch (Threatpost) Brand new, written-from-scratch malware is a relatively rare undertaking on the underground. Aside from some private endeavors, source code is available for a number of popular Trojans, including Zeus, Citadel and Carberp, making it easy for attackers to simply grab one off the shelf and get started. These three in particular have been adapted over and over, fortifying the illicit reputations of banking Trojans

Coding flaw leaves Zeus admin panels easily exploited (CSO) Blacklisting is a bad idea when designing an upload script. A flaw in the Zeus Trojan's admin panel leaves the C&C (command and control) server vulnerable to remote compromise. The flaw, which is located in an array function used by the malware's core code, fails to prevent malicious files from being uploaded

It's official: Malicious hackers have crappy password hygiene, too (Ars Technica) Analysis uncovers short, predictable words, plaintext storage

Feedly, Evernote And Others Become Latest Victims Of DDoS Attacks (TechCrunch) Who have the DDoS attackers not hit, is the question? This morning, RSS reader and feed-syncing platform Feedly is being hit by a distributed denial-of-service attack, where again the criminals are attempting to extort money in return for returning the service to normal operations. And only yesterday, Evernote was a victim of a similar attack

Pay attention to Cryptowall! (Internet Storm Center) CryptoLocker might be pretty much off the radar. But Cryptowall is alive and kicking, and making the bad guys a ton of money. It mainly spreads by poisoned advertisements and hacked benign websites, and then sneaks its way onto the PCs of unsuspecting users by means of Silverlight, Flash and Java Exploits

CryptoLocker takedown unlikely to deter growing ransomware (TechTarget) The recent move by law enforcement agencies to take down the GameOver Zeus botnet has also dramatically reduced infection rates for the infamous CryptoLocker ransomware. However, experts caution that CryptoLocker's demise might only be temporary, and that the threat ransomware poses to enterprises may only be growing

Crypto-ransomware brings in quite a profit (Help Net Security) Crypto-ransomware is quickly becoming cybercrooks' favorite tool to extort money from computer users

Twitter co-founders', CEO's personal data leaked on 'darknet' (ZDNet) It's not uncommon for Pastebin and other sites to host stolen or hacked data on users and high-profile people. But what about on the 'hidden' Internet? Can ignorance be bliss?

Targeted Attack Methodologies for Cybercrime (TrendLabs Security Intelligence Blog) We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack's intent. With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of "tools", as these campaigns are all about who carries out the attack. Ultimately, a simple equation can be drawn from these observations, in which a highly successful attack is composed of the attack's intent and the right tools

The Bitcoin App That Could Create a Black Market for Leaked Data (Wired) Whistleblowers like Chelsea Manning and Edward Snowden exposed classified information because they believed their leaks were in the public interest. The next secret-spiller might be motivated instead by something less magnanimous: money

Bank of Montreal ATM hacked with weak password (ZDNet) After finding an operator manual online, two Winnipeg teens stumbled onto a case of unforgivably poor security operations by a bank

Retail breaches and the SQL injection threat (Help Net Security) Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon Institute and DB Networks study

Comcast Is Turning The US Into Its Own Private Hotspot (TechCrunch) On paper it looks like a win-win: in the next few days, Comcast is quietly turning on public hotspots in its customers' routers, essentially turning private homes into public hotspots. Comcast customers get free Wi-Fi wherever there is a Comcast box and the company gets to build out a private network to compete with telecoms. Win-win

Comcast is turning your Xfinity router into a public Wi-Fi hotspot [Updated] (Seattle Post Intelligencer) Some time on Tuesday afternoon, about 50,000 Comcast Internet customers in Houston will become part of a massive public Wi-Fi hotspot network, a number that will swell to 150,000 by the end of June

Apple HealthKit draws concerns about data security, privacy and medical accuracy (FierceMobileHealthcare) Apple's HealthKit debut last week ignited a flurry of feedback and concerns from healthcare experts and industry watchers regarding privacy, the sharing of confidential data and use of medical terms

Project Eavesdrop: An Experiment At Monitoring My Home Office (NPR All Tech Considered) If someone tapped your Internet connection, what would they find out about you?

The man who may be one of China's top hackers likes grain alcohol and Heineken (Quartz) It turns out Chinese military hackers are way sneakier than anyone had realized. This is evident in a new report (registration required) by a security company called CrowdStrike. Throughout the last seven years, the People's Liberation Army hackers have baited their targets—including foreign companies and governments involved in the space and satellite industry—with email attachments advertising French yoga retreats, project manager job openings and industry conferences

Security Patches, Mitigations, and Software Updates

Patch Tuesday wrap-up, June 2014 — both Adobe and Microsoft close "remotable" holes (Naked Security) Here's a quick review of what actually came down the chute on June's Patch Tuesday

Microsoft Security Bulletin Summary for June 2014 (Microsoft Security TechCenter) This bulletin summary lists security bulletins released for June 2014. With the release of the security bulletins for June 2014, this bulletin summary replaces the bulletin advance notification originally issued June 5, 2014. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification

Is Microsoft not patching Windows 7 for problems it patches in Windows 8? (ZDNet) Researchers have found that Windows 8 code contains security check code absent in Windows 7. This is not the same as not patching

Security updates available for Adobe Flash Player (Adobe Security Bulletin) Adobe has released security updates for Adobe Flash Player and earlier versions for Windows and Macintosh and Adobe Flash Player and earlier versions for Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions

Stable Channel Update for Chrome OS (Chrome Releases) The Stable channel has been updated to 35.0.1916.155 (Platform version: 5712.88.0 / 5712.89.0) for all Chrome OS devices. This build contains a flash update (, number of bug fixes, and security updates. Here is the Chromium change log. Systems will be receiving updates over the next several days

Stable Channel Update (Chrome Releases) The Stable Channel has been updated to 35.0.1916.153 for Windows, Mac and Linux

Microsoft Bulks Up Azure Web Sites Encryption (eWeek) The company makes it tougher to crack Websites and apps hosted on the Azure cloud service with Elliptic Curve Cryptography (ECC) certificate support

Cyber Trends

Repeat data breach victims highlight failure of IT security programs (FierceITSecurity) Despite all of the publicity surrounding the data breaches at companies like Target and Adobe, some firms are still not taking measures to reduce their risks, and are suffering multiple breaches as a result

Winning the war on web stealth attacks (Help Net Security) The "National Strategic Assessment of Serious and Organised Crime 2014", published in May by the UK National Crime Agency, listed DDoS as a major concern for business critical systems for the first time

Security pros need to adapt to consumerization of IT or perish (FierceITSecurity) As enterprises increasingly adopt technologies prevalent in the consumer marketplace, security pros will need to adapt along with their organizations

Data Breach Trends in the First Quarter of 2014 (Risk Based Security) There were 669 incidents reported during the first three months of 2014 exposing 176 million records

Majority UAE users hit by cyber bugs… and are happily unaware (Emirates 24/7) A majority of companies in the UAE and the Gulf are not even aware that they have been attacked by cyber criminals

How the cloud can be used and misused (Help Net Security) Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, illustrates the way cloud enables cybercriminals to expand the scope and size of their attacks, and more


Apple, Microsoft targets of Chinese media amid US spat (San Diego Daily Transcript) China's state-run media stepped up criticism of U.S. technology companies including Apple Inc. and Microsoft Corp. as tensions escalate over cyberspying and hacking allegations

The backlash over Snowden could hurt US firms (Microscope) Netscape founder Marc Andreessen has hit the headlines for his comments in a recent interview with CNBC where he labelled Edward Snowden "a traitor". He went further, adding that if someone looked up 'traitor' in the encyclopaedia, they would find a picture of Ed Snowden: "Like he's a textbook traitor. They don't get much more traitor than that"

Retailers And Resellers Collaborate To Combat Cyber Threats (Business Solutions) Cyber security is no longer a one-way street — retail solutions providers are now able to collaborate with retailers to strengthen protection against threats

Security software market grew 4.9 percent in 2013 (Help Net Security) Worldwide security software revenue totaled $19.9 billion in 2013, a 4.9 percent increase from 2012 revenue of $19.0 billion, according to Gartner, Inc. The lower-than-expected growth was due to commoditization of key subsegments and the decline in growth for two of the top five vendors

Blue Coat beats McAfee for pole position in stagnating content security gateway market (FierceITSecurity) Blue Coat beat out McAfee for the market lead in the stagnating content security gateway market, according to the latest stats from Infonetics Research

Cisco gains in security appliance market share, Juniper slips (infotech Lead) Enterprise networking vendor Cisco has increased its security appliance market share to 17.5 percent in Q1 2014 from 16.9 percent in Q1 2013, said IDC. Juniper slipped to fifth position. Fortinet and Palo Alto Networks improved their market share, while Check Point slipped marginally

IBM overtakes Trend Micro as No. 3 security software maker (Reuters) IBM overtook Japan's Trend Micro Inc to become the world's No. 3 provider of security software last year, after acquiring cybersecurity firm Trusteer, according to market share data released on Tuesday by Gartner

AVG dominates Aussie consumer security market: Telsyte (CFO World) AVG is now the dominant PC and mobile security app in the Australian market, according to the latest Telsyte Australian Digital Consumer study

Shape Security Named a 2014 Cool Vendor by Gartner (IT Business Net) Gartner designates shape amongst new and innovative vendors in the application and endpoint security space

Microsoft powers cyber arm of the law in Cambridgeshire (Computing) Ian Bell has some pretty ambitious IT plans for the Cambridgeshire Constabulary, which are something of a coup for Microsoft

Brad Medairy: Booz Allen Receives NSA Recognition for Cyber Response Service (ExecutiveBiz) Booz Allen Hamilton has received a cyber incident response certification from the National Security Agency for the firm's work to provide cyber response aid to national security systems customers

Selex ES, IMPACT in cyber-security collaboration (UPI) Finmeccanica and its Selex ES subsidiary are to collaborate with a United Nations-backed organization to enhance cyber-security measures

SourceClear Raises $1.5M Seed Round For Its Software Security Platform (TechCrunch) Modern development frameworks and libraries can make writing software quite a bit easier, but at the same time, hackers are also aware of this and they specifically target popular frameworks to find potential exploits. Unless you constantly track alerts and update your frameworks religiously, there is a good chance you end up vulnerable sooner or later. SourceClear believes that the best approach to tackle this problem is to build security tools right into the development tools that developers are already using

Products, Services, and Solutions

FireHost Takes Intelligent Approach to Protecting Applications in the Cloud (Broadway World) FireHost, the secure cloud provider, is delivering a unique new service that creatively combines the strengths of an application delivery controller (ADC) and a web application firewall (WAF) technology as one offering to enrich both the security and performance of critical customer applications operating within the company's secure cloud infrastructure

CSSIA Provides Businesses with Opportunity to Recruit Cybersecurity Professionals (PRWeb) The National Center for Systems Security and Information Assurance (CSSIA) is offering a Premier Sponsorship Package to give businesses a competitive advantage to recruit from the next generation of cybersecurity specialists while supporting academia's efforts in preparing students for the workforce

Fidelis XPS Extends YARA-powered Capabilities to Enhance Real-time Malware Command and Control Prevention (MarketWatch) General Dynamics Fidelis Cybersecurity Solutions' industry-leading implementation of technology enables organizations to quickly prevent and detect advanced threats across the entire threat lifecycle

AVG becomes a Cloud company with CloudCare (PC Advisor) AVG Technologies is moving away from being a traditional antivirus company to a provider of Cloud services

Tenable Network Security Validated for PCI DSS 3.0 for VMware (MarketWatch) Company's real-time vulnerability, threat and compliance management solutions validated by Coalfire for maintaining compliance for VMware infrastructure

Technologies, Techniques, and Standards

Catching Criminal Behavior on Cutting-Edge Devices (SIGNAL) The National Institute of Standards and Technology has revised its mobile device forensics guidance

Businesses are not ready for PCI DSS 3.0 (Help Net Security) Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards Council, according to NTT Com Security

Defense best practices for a man-in-the-middle attack (TechTarget) If a company has its own certificate authority (CA) and only signs user certificates if they use a one-time password (OTP) with a short time before expiration, can it be assumed that there is little chance (if any at all) for a man-in-the-middle attack?

PEStudio v8.29 — Static Investigation of Executables Released (ToolsWatch) PEStudio is a unique tool that performs the static investigation of 32-bit and 64-bit executable. PEStudio is free for private non-commercial use only

EBay breach response missteps: What other organizations can learn (TechTarget) As eBay Inc. faces criticism for its response to a recent data breach, experts say that other companies should learn from the online auction giant's missteps

Research and Development

Google Imagines People As Applications (InformationWeek) Google patent application describes a way to reduce the friction of online social interaction

Is the Turing Test milestone all it's cracked up to be? (Oxford Press) One supercomputer achieved a milestone in artificial intelligence — tricking judges into believing it was human and allegedly becoming the first computer to pass the Turing Test


UNH Cyber Forensics Unit Signs Educational Partnership Agreement with the Defense Cyber Crime Center (University of New Haven) University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3), under an agreement announced this week

Cyber Defense Research Receives National Designation, Again (Insurance News Net) The National Security Agency (NSA) and the U.S. Department of Homeland Security (DHS) have re-designated UNC Charlotte as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. In 2008, the University was one of the first in the country to receive this designation

UNO earns Nat'l Security Agency tech designation (New Orleans City Business) The University of New Orleans has been designated a National Center of Academic Excellence in Cyber Operations by the National Security Agency for a period of five years. UNO is the first university in Louisiana to achieve the designation

Mikulski: Bill with $120 million for Naval Academy cyber center could get vote soon (Capital Gazette) Legislation with $120 million for a planned Center for Cyber Security Studies at the Naval Academy could reach the U.S. Senate floor for a vote within the next month, U.S. Sen. Barbara Mikulski, D-Md., told the Naval Academy Board of Visitors on Monday

Poolesville High School students crack codes in international cybersecurity competition (Maryland Community News) Team placed first among high schools internationally

SANS Announces Results of its Survey of Security at Higher Education Institutions (MarketWatch) Lack of risk assessment practices; unclassified and unmanaged data; understaffed and underfunded

Black Hat Student Scholarship Program (Black Hat) This year, we are pleased to announce the launch of the Black Hat Student Scholarship Program. As a way to introduce the next generation of security professionals to the Black Hat community, we will be awarding a limited number of complimentary Academic Passes for Black Hat USA 2014. Each pass allows full access to all Black Hat Briefings, Arsenal, the Business Hall, and Sponsored Sessions & Workshops

Legislation, Policy, and Regulation

China responds to the latest hacking accusations by calling America "The Matrix" (Quartz) Following a report (registration required) that a new hacker unit in Shanghai with ties to China's People's Liberation Army has been targeting American, European, and Japanese networks, China's foreign ministry hit back with a pop culture reference meant to highlight America's hypocrisy

What NATO Is Doing To Improve Cyber Defence (Forbes) Cyberspace is increasingly becoming a battlefield where hackers from different nations fight in order to gain geopolitical advantages. The kind of menace might vary, from direct attacks on critical infrastructures, to more subtle operations to steal industrial and military secrets, but there's no doubt that the phenomenon is bound to grow, as modern societies become more and more dependent on Internet connectivity for their existence

Maj. Gen. William Bender Appointed to Air Force CIO Role (ExecutiveGov) Air Force Maj. Gen. William Bender, deputy chief of the Office of Security Cooperation-Iraq, has been appointed to the roles of information dominance chief and chief information officer

South Korean National Police Agency Sets Up Cyber Bureau (Bernama) South Korea's national police agency on Wednesday established a cyber bureau to strengthen national cyber security, Xinhua news agency reported

Litigation, Investigation, and Law Enforcement

Moscow Hacking Duo Confess to Hijacking and Locking Apple Devices (Intego) UPDATED: This article has been updated to reflect that those arrested in Moscow may not be connected with the "Oleg Pliss" attack. Russian authorities appear to have scored a victory against cybercrime, extracting a confession from a Moscow duo in connection with a mysterious "ransomware"-style attack that hit owners of iPhones, iPads and Macs

Hackers suspected of holding Apple devices to ransom detained in Russia (Sydney Morning Herald) Russian authorities say they have detained two young hackers who are alleged to have hijacked Apple devices and digitally held them ransom

Russians Tricked Snowden Into Going To Moscow: Ex-KGB Major (HackRead) Spies from the Russian SVR intelligence convinced Snowden in Hong Kong to fly to Moscow last June, according to a senior ex-KGB personnel

UK: 25% Of Criminals Watched By GCHQ Have Dropped Off The Grid Post-Snowden (The Telegraph via Business Insider) Security services have lost the ability to track a quarter of the criminals previously being monitored in the wake of the Edward Snowden revelations

Al Gore finds spot defending Snowden (Politico) Al Gore isn't just the Democratic party's conscience on climate change. He's also become its inner voice in defending Edward Snowden in the debate over government surveillance overreach

Who is Snowden? (The International News) It is hard to imagine that just one year ago, Edward Snowden famously walked away. He was a low-level employee of Dell contractor at a nondescript National Security Agency site. A non-entity by design. Just one of hundreds of thousands of people working in the burgeoning national security complex in the United States — the ultimate faceless cog

Why It Shouldn't Be Criminal to Report Government Secrets (The Atlantic) Prosecuting journalists imposes huge costs, yields scant benefits, and is mostly pointless in an era when anyone can reach a mass audience

NSF researcher caught using supercomputer to mine thousands of dollars in bitcoin (FierceITSecurity) The Office of the Inspector General at the National Science Foundation suspended a researcher following the discovery that he had commandeered supercomputers at two universities to mine for bitcoins, according to the agency's semi-annual report for Congress

Scots businesses targeted by cyber crime gangs (BBC) A BBC investigation has discovered that Russian crime gangs have been targeting Scotland in a series of cyber attacks

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

What to Consider when Preparing to Purchase Cyber Insurance Webinar (Webinar, June 11, 2014) With the many cyber/data breach insurance policies that are available today, there are important considerations that organizations need to know before purchasing cyber/data breach insurance coverage. Join...

NRC Cyber Security Seminar/ISSO Security Workshop (Bethesda, Maryland, USA, June 16, 2014) NRC will be hosting its second NRC Semi-Annual All-Hands ISSO Workshop. This workshop will consist of computer security policy, standards, cybersecurity, guidance, FISMA compliance, and training updates.

SC Congress Toronto (Toronto, Ontario, Canada, June 17 - 18, 2014) SC Congress Toronto is Canada's premier information security conference and expo experience. Join us for this year's SC Congress Toronto on June 17-18, 2014! The two-day gathering brings industry thought...

MeriTalk's Cyber Security Brainstorm (Washington, DC, USA, June 18, 2014) This second annual event will take place on Wednesday, June 18 2014 at the Newseum in Washington D.C. The event will bring together Federal cyber security experts to share best practices, collaborate on...

MeriTalk's Cyber Security Brainstorm (Washington, DC, USA, June 18, 2014) This second annual event will take place on Wednesday, June 18 2014 at the Newseum in Washington D.C. The event will bring together Federal cyber security experts to share best practices, collaborate on...

SANSFIRE (Baltimore, Maryland, USA, June 21 - 30, 2014) For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2014 is not just another training event. It is our annual "ISC Powered" event.

26th Annual FIRST Conference (Boston, Massachusetts, USA, June 22 - 27, 2014) The Forum of Incident Response and Security Teams (FIRST) is a global non-profit organization dedicated to bringing together computer security incident response teams (CSIRTs) and includes response teams...

Gartner Security & Risk Management Summit 2014 (National Harbor, Maryland, US, June 23 - 26, 2014) The Gartner Security & Risk Management Summit is the only time when the entire Gartner analyst and security and risk management community come together in one location to bring the latest research, insights...

AFCEA International Cyber Symposium (Baltimore, Maryland, USA, June 24 - 25, 2014) National security is continuously being redefined as awareness of the cyberspace domain evolves. Cyber threats and challenges grow every day. Successfully defending our networks requires a team approach.

United Nations Interregional Crime and Justice Research Institute Cyber Threats Workshop (Turin, Italy, June 27 - 29, 2014) The United Nations Interregional Crime and Justice Research Institute (UNICRI) is organizing a series of workshops and short courses within the framework of the UNICRI Journalism and Public Information...

INSCOM Cyber Day (Fort Belvoir, Virginia, USA, July 9, 2014) Cyber-industry vendors are invited to participate in the upcoming Cyber Day hosted by the United States Army Intelligence and Security Command (INSCOM), located at Ft. Belvoir. U.S. Army Cyber (AR Cyber)...

SiliconExpert Counterfeit Electronic Component Detection & Avoidance (Webinar, July 10, 2014) Join us for a free 60 minute webinar with Dr. Diganta Das from the University of Maryland's Center for Advanced Life Cycle Engineering (CALCE), which is a research leader in the area of counterfeit electronics...

2nd Annual Oil & Gas Cyber Security Conference (Houston, Texas, USA, July 15 - 17, 2014) This highly interactive, hands-on forum will break down each potential cyber threat specific to the oil and gas industry, as well as tackle key issues including managing communication between OT and IT...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.