skip navigation

More signal. Less noise.

Daily briefing.

ISIS murders, done for the benefit of the camera and widely disseminated online, may be the cruelest mode of information operations going. They may also be provoking a long-delayed backlash.

Ukraine's biometrics passports were produced by a company with apparently deep connections to Russian oligarchs, and that company probably has access to Ukrainians' personally identifying information. (A Radio Liberty reporter cheekily tweets a request for comment at Mr. Snowden.)

The US State Department's email is back up, amid unofficial notice that "incidents of concern" look like Russian cyber espionage, and amid widespread journalistic eyebrow-raising over the state of .gov cyber security.

Brian Krebs maps the Russian organized cyber crime landscape.

Germany's BfV chief warns that his country is actively targeted in cyberspace by state (especially Chinese and Russian) security services.

Cisco researchers dissect some recent steganographic cloaking of malware. Seculert finds increasingly sophisticated domain-generation algorithms, and Lookout warns that mobile botnets are growing more resilient. Blue Coat points out encryption's downside: "visibility voids." Bromium looks at crypto-ransomware.

Holiday shopping is upon us, and observers expect a rising tide of retail cyber crime. Cyactive points out new variants of Backoff point-of-sale malware. TrendLabs looks at point-of-sale scammers' toolkits.

Yesterday Microsoft issued a critical out-of-band patch of a Kerberos privilege escalation vulnerability.

Boeing may be shopping some of its cyber units.

Tor convinces many that de-anonymization is harder than researchers made it seem.

The Council on Foreign Relations sees declaring zero-day policy (note — declaration of policy, not zero-days themselves) as a confidence-builder.


Today's issue includes events affecting China, Germany, India, Indonesia, Iraq, New Zealand, Russia, South Africa, Sweden, Syria, Ukraine, United Kingdom, United States, and Vietnam.

Cyber Attacks, Threats, and Vulnerabilities

Islamic State beheading videos might now be backfiring (Christian Science Monitor) The latest Islamic State video, showing beheaded American aid worker Abdul-Rahman Kassig, looked hastily done and suggests that the group has become 'carried away with its own fanaticism'

ISIS and the Intimate Kill (Atlantic) The Islamic State has made violence look easy. That's what makes the group so terrifying

Фирму, работающую с «Газпромом» и «Роснефтью», допустили к изготовлению биометрических паспортов украинцев (UAINFO) Обеспечивать выпуск биометрических паспортов для украинцев будет российская фирма, которая работает с «Газпромом», «Роснефтью» и «Федеральной таможенной службой РФ». Таким образом иностранная фирма получает доступ к базе данных миллионов граждан Украины. На этот факт в своем «Фейсбуке» Сергей Гайдай обращает внимание журналистов, продюсеров и редакторов телегрупп, прочих СМИ ищущих социально значимые и резонансные темы для расследований на фирму, которая будет обеспечивать изготовление биометрических паспортов

Top German spy says Berlin under cyber attack from other states (Reuters) German government and business computers are coming under increasing cyber attack every day from other states' spy agencies, especially those of Russia and China, Germany's domestic intelligence (BfV) chief said on Tuesday

State Dept. restores email after cyber attack (The Hill) The State Department said its external email system was back up Tuesday following a cyber breach

State Dept. Breach Heightens Concerns Over Resilience Of Government Networks (Dark Reading) The department is the fourth federal entity in recent weeks to disclose a data breach

Auditors: State Department has history of poor cybersecurity (Politico) The State Department, which shut down its unclassified email system and cut off Internet access over the weekend to deal with a suspected online attack, has a history of weak cybersecurity, and it grew worse over the last four years, according to auditors

State Department email attack 'fits pattern' of Russian hackers, says expert (Guardian) The State Department has shut down its email system after it was reportedly hacked. The department's entire unclassified email system was closed down to repair possible damage

The Spam Wars (Slate) The Russian cybercrooks behind the digital threats in your inbox

Reversing Multilayer .NET Malware (Cisco Blogs) Recently, we came across a malware sample that has been traversing the Internet disguised as an image of a woman. The malware sample uses several layers of obfuscation to hide its payload, including the use of steganography

Malware Domain Generating Algorithms are becoming more sophisticated (Help Net Security) Malware cut off from its C&C servers is effectively useless to its masters, so they are continually trying to find new ways of maintaining that connection at all times

The Rise Of The Resilient Mobile Botnet (Dark Reading) New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become

Blue Coat Reveals Security Risks Hiding in Encrypted Traffic (MarketWired) Research study finds growing 'visibility void' represents potential threat to enterprises

Understanding Crypto-Ransomware: In-Depth Analysis of the Most Popular Malware Families (Bromium) A bully stuffing a student into a locker is apocryphal, but on the Internet the reality is far worse. An emerging cybersecurity threat can encrypt files, locking them from user access, until a ransom is paid

Trojanized Android firmware found on inexpensive handhelds (Help Net Security) It's unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it's no guarantee that it's malware-free

The Dridex Threat: How to Block the Latest Malware Aimed at Banks (American Banker) It sounds innocuous, like the name of a household cleaning product, but Dridex is the latest in a string of online banking malware programs with devastating capabilities

'Misdial Trap' Phone Scam Hits Financial Services (Dark Reading) One in six financial institutions victimized by this new scam

Backoff: It's Back. And It's Bad (Cyactive) The Backoff PoS malware is back with a new variant, unsurprisingly, the new variant once again uses old techniques

A Peek Inside a PoS Scammer's Toolbox (TrendLabs Security Intelligence Blog) PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive "Black Friday" shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior patterns to better protect our customers and users

Staples Confirms Breach but Questions Still Remain (HackSurfer) The office supply company Staples confirmed what many of us already believed; Staples was in fact a victim of POS malware compromising 100 stores

Stuxnet: Victims Zero (Kaspersky Lab Daily) The story of the Stuxnet worm made a lot of headlines a year ago and gave information security folks chills. Who created it, and why, is still a mystery. However, rumor has it that American and Israeli Intelligence wanted to use it to sabotage the Iranian nuclear program. The story is very feasible as malware indeed made the uranium enrichment centrifuges inoperable, throwing the Iranian nuclear program years behind

Hacker Lexicon: What Is the Dark Web? (Wired) With the rise and fall of the Silk Road — and then its rise again and fall again — the last couple of years have cast new light on the Dark Web. But when a news organization as reputable as 60 Minutes describes the Dark Web as "a vast, secret, cyber underworld" that accounts for "90% of the Internet," it's time for a refresher

87 percent of the top 100 paid iOS apps available as hacked versions (Beta News) According to the third annual State of Mobile App Security report from application protection company Arxan Technologies, 87 percent of the top 100 paid iOS apps have been hacked

Whose Privacy Will Uber Violate Next? Why Its Latest Bad Behavior Matters (Wired) Passengers in the sharing economy need to know what kind of ride they're buying

Security Expert Warns Cars Will Always Be Vulnerable to Cyber Attack (Hollywood Reporter) The possibility of hackers taking control of steering or other critical functions will persist as cars increasingly communicate with the cloud

Criminals Post Fraudulent Online Advertisements for Automobiles, Recreational Vehicles, Boats, And Other Outdoor Equipment Leading to Financial Losses in Excess Of $20 Million (IC3) From June 2009 to June 2014 the Internet Crime Complaint Center (IC3) received over 6800 complaints regarding criminals targeting online consumers by posting false advertisements for high priced items such as automobiles, boats, heavy equipment, recreational vehicles, lawn mowers, tractors, and other similar items. These complaints total more than $20 million in reported losses

BitTorrent reply to Hackito report on BitTorrent Sync's bad crypto: No cause for concern (Network World) BitTorrent replied to the unfavorable Hackito report claiming BitTorrent Sync should not be trusted for sensitive data. The response referenced a favorable security assessment by iSEC Partners

Bulletin (SB14-322) Vulnerability Summary for the Week of November 10, 2014 (US-CERT) The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week

Security Patches, Mitigations, and Software Updates

Microsoft patches Kerberos vulnerability with emergency update (CSO) Redmond says vulnerability is being exploited in the wild

Microsoft Security Bulletin MS14-068 — Critical: Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780) (Microsoft Security TechCenter) This security update resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability

WhatsApp for Android introduces end-to-end encryption (TweakTown) The latest update to WhatsApp for Android provides end-to-end encryption

Stable Channel Update (Chrome Releases) The Chrome team is delighted to announce the promotion of Chrome 39 to the stable channel for Windows, Mac and Linux. Chrome 39.0.2171.65 contains a number of fixes and improvements, including

Cyber Trends

Expect More Data Breaches In Stores This Season, Experts Say (International Business Times) Nearly a year after Target Corp.'s massive and costly data breach, the company is expected Wednesday to finally show an uptick in store traffic. But as Target tries to get past 2013's hacking while heading into the all-important holiday shopping season, analysts warn that cybercrime is heating up and that some retailers will inevitably fall victim to breaches of payment data

Retail sector still at risk, but breach survivors grow stronger: BitSight (ZDNet) BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness

Cyber criminals to eye high-value targets: Trend Micro (The Hindu) Here's some good news. Prices of malicious wares in the cyber underground have drastically come down. The average price of credit card credentials has reduced to $1 from $3 in 2014, Facebook credentials to $100 from $200 and that of Gmail credentials to $100 from $217. This, experts say, is because of the tremendous increase in supply. This happiness, however, is short lived. Cybercriminals will set their sights on bigger targets rather than on individuals, as this translates to bigger gains

Cyber security awareness still in its infancy, says Sans Institute (ComputerWeekly) Cyber security awareness is still in its infancy in most organisations despite the quick returns it can deliver, says security training and certification body the Sans Institute

One billion attacks were blocked during the third quarter (Help Net Security) Over a billion malicious attacks were detected and blocked during the third quarter, according to Kaspersky Lab. One third of Web attacks were carried out using malicious Web resources hosted in the United States

Hackers attacked the U.S. energy grid 79 times this year (CNN Money) In fiscal year 2014, there were 79 hacking incidents at energy companies that were investigated by the Computer Emergency Readiness Team, a division of the Department of Homeland Security. There were 145 incidents the previous year

Gigaom Research And CipherCloud Release "Shadow IT: Data Protection And Cloud Security" Findings (HostReview) Gigaom Research and CipherCloud, the leader in cloud visibility and data protection, today announced the results of their "Shadow IT: Data Protection and Cloud Security" study. The research examined the extent of enterprises' cloud adoption, their challenges and security concerns and growing prevalence of shadow IT

One-in-four have been victims of identity theft (Help Net Security) Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that 81% of respondents cited that they were concerned, or very concerned about the prospect of having their identity stolen

Black Lotus Threat Report Reveals Vietnam, India, Indonesia will Grow Mobile DDoS Attacks in 2015 (Herald Online) Peak bit volume drops 96 percent in Q3 2014, coinciding with departure from amplification attacks


Cloud security grows up (Network World) Comprehensive cloud security services are taking over the market

Breach-detection systems growing more popular despite high costs (TechTarget) Research from NSS Labs shows that despite carrying robust price tags, breach-detection systems are commanding intense interest from large enterprises

Cyber acquisition vexes industry, government (Washington Technology) Emerging technologies that help increase cybersecurity for the United States are hard to buy since these technologies change so quickly, says the head of the U.S. Army Cyber Command

Boeing eyes revamp of cyber business to focus on key areas (Reuters) Boeing Co said this week it is reevaluating its cybersecurity business and could divest or reassign some units as it focuses more on a few critical areas, including classified work it is doing for some U.S. government agencies

Garnero Group Acquisition Company and WISeKey SA Announce Updated Terms for Combination (PRNewswire) Garnero Group Acquisition Company ("GGAC") (NASDAQ: GGACU, GGAC, GGACR, GGACW), a blank check company, and WISeKey SA ("WISeKey"), a global provider of cyber security solutions, announced today that holders of approximately 93.4% of WISeKey's fully diluted common shares have accepted GGAC's offer to exchange their WISeKey shares for GGAC ordinary shares in connection with the previously announced transaction between GGAC and WISeKey

CipherCloud Scores $50M As Cloud Security Comes To Forefront (TechCrunch) CipherCloud landed a bushel of cash today as it announced $50M in Series B funding to continue building its cloud security business

Cybercom provides digital signature services to Swedish Tax Agency (BusinessWire) The Swedish Tax Agency has chosen Cybercom (STO:CYBE) as its supplier of digital signature services. The agreement runs for two years, with an option for an additional two years. The value of the contract is estimated to be SEK 30 million for the first two years

Sutton and East Surrey Water Deploys ForeScout CounterACT for Real-time Network Visibility, Security Compliance and Control Automation (Nasdaq) ForeScout Technologies, Inc., the leading provider of pervasive network security solutions for Global 2000 enterprises and government organizations, today announced that Sutton and East Surrey Water (SESW) has successfully deployed ForeScout CounterACT™

MacAulay-Brown, Inc. Named to Department of Homeland Security EAGLE II Contract (Globe NewsWire) MacAulay-Brown, Inc. (MacB), a leading National Security company delivering advanced engineering services and product solutions to Defense, Intelligence, Special Operations Forces, Homeland Security and Federal agencies, announced today that it has been awarded a multiple award Indefinite-delivery/Indefinite-quantity (IDIQ) contract by the Department of Homeland Security (DHS)

NBK receives FireEye's Excellence Award for protection against Advanced Cyber Attacks (Zawya) National Bank of Kuwait (NBK) received the Excellence Award from FireEye, the leader in stopping todays advanced cyber attacks, for its commitment and achievements in protecting its customers against advanced cyber-attacks. This award is the first of its kind in the region

Cyphort names chief strategy officer and expands leadership bench (GSN) Santa Clara, CA-based Cyphort, a pioneer of Advanced Threat Defense solutions, has announced the appointment of co-founder Dr. Fengmin Gong as chief strategy officer

Digital Forensics Expert Jim Kent’s Leadership in Investigations and Cybersecurity and Government Gives Nuix Edge in North America Market (Nuix) Nuix, a technology company that enables people to make fact-based decisions from unstructured data, has promoted Dr. James Kent to a leadership role in the North America market focusing on investigations, cybersecurity and the government sector

Ex-NZ Tech CEO Candace Kinser becomes NZ lead of analytics company Palantir (ComputerWorld) Silicon Valley company is named for the magical seeing stone in the Lord of the Rings

Haystax appoints General Peter Pace as board chairman (GSN) McLean, VA-based Haystax Technology, a provider of advanced analytics and cybersecurity solutions, has announced that retired U.S. Marine General Peter Pace has been named chairman of the company's board of directors

From cons to coders: Calif. inmates learn programming (USA Today via 13 WMAZ) The men in prison-issued blues sit side by side at long wood tables, learning to write software code on refurbished computers in a bare-bones lab inside San Quentin State Prison

Products, Services, and Solutions

New, Free Certificate Authority to Dramatically Increase Encrypted Internet Traffic (Electronic Frontier Foundation) Non-profit to offer one-click process to implement secure web browsing

A New Free CA (Schneier on Security) Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan

Agari and Palo Alto Networks Agree to Exchange Threat Intelligence Data (MarketWatch) Unique dataset will enhance targeted attack prevention capabilities

LockPath and iSIGHT Partners Bring Real Time Cyber Intelligence to Keylight Customers (Marketwired) LockPath, a leader in innovative governance, risk, compliance (GRC) and information security (InfoSec) solutions, today announced a new integration between LockPath's Keylight™ platform and iSIGHT Partners ThreatScape® advanced cyber threat intelligence. The collaboration aligns joint customers' security programs with business risk management goals to proactively defend against new and emerging cyber threats

Intego Updates Award-Winning Virus and Malware Protection to iOS Devices With VirusBarrier for iOS 8 (Marketwired) Intego, the leading provider of security and utility programs built exclusively for Mac users, today introduced its newly updated App Store application for stopping viruses and malware on iOS devices, VirusBarrier for iOS 8

Radware Introduces Cyber Attack Mitigation Service for Enterprise Customers (Nasdaq) Radware offers an "always-on" hybrid DDoS attack mitigation service to help protect enterprises

Tenable Network Security's Nessus v6 Enhances Advanced System Hardening, Malware Detection and Mobility Support to Reduce the Attack Surface (Tenable) Industry's most powerful vulnerability management platform simplifies, automates and extends active scanning capabilities to eliminate cybersecurity blind spots

AVG Extends Global Partnership with ALCATEL ONETOUCH (CNN Money) Providing security across emerging markets on the latest Android devices

ReadyNAS OS offers 5 levels of data protection (Help Net Security) NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices

Test Tool for Web App Security Scanners Released by Google (Softpedia) A new tool was open-sourced by Google on Tuesday, aiming at improving the efficiency of automated web security scanners by evaluating them with patterns of vulnerabilities already seen in the wild

Technologies, Techniques, and Standards

Deconstructing the Cyber Kill Chain (Dark Reading) As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking

Beheading Hydras: Performing Effective Botnet Takedowns (Association for Computing Machinery) Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers

Stop More than the Usual Suspects (McAfee Blog Central) If signature-based security can't be trusted to catch and avenge zero-day attacks and other emerging malware threats, what will it take to plug the holes in our defenses? Most of us know something about inspection techniques that don't rely on signatures, but what does the whole solution space look like? How do the available technologies relate to each other and to the set of inspection platforms that make up a typical network security environment?

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST) Executive Order 13556, Controlled Unclassified Information, November 4, 2010, establishes that the Controlled Unclassified Information (CUI) Executive Agent designated as the National Archives and Records Administration (NARA), "shall develop and issue such directives as are necessary" to implement the CUI Program

Threat intelligence — the best form of defence? (Computing) Security guru Bruce Schneier was probably not the first person to observe that, whether in the virtual or the physical world, the challenge for defenders is always that much greater than for attackers

Must-knows about cloud computing in healthcare (TechTarget) Healthcare organizations of all sizes can benefit from cloud services, but only if they lock down possible security leaks

IT needs to stop pretending it's not responsible for cloud security (ComputerWorld) Public cloud apps are the new mainstream; IT can't keep pointing fingers or closing its eyes to avoid responsibility for securing them

5 ways to minimize risk in the cloud (Federal Times) The migration of information to the cloud is largely regarded as a next major step in enabling organizations to work faster, cheaper and more efficiently. According to the Office of Management and Budget, an estimated $20 billion of the federal government's $80 billion in IT spending is a potential target for cloud-based solutions

Hybrid Cloud is the New Normal: 4 Key Security Steps you Need to Get it Right (IBM SecurityIntelligence) As the perimeter of your organization's network becomes less defined, and you read everyday in the media that cyberattackers are becoming more and more advanced, there is a temptation for security teams to limit use of the cloud. However, the advantages of clouds — especially Hybrid clouds that include a mix of privately and publicly hosted IaaS, PaaS and SaaS services — are too compelling to avoid. The good news is that all cloud models can be secured, opening the way for controlled and secure business use

Risk assessment benefits, best practices and pitfalls (Help Net Security) Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, outlines the pre-requisites for becoming a risk assessment professional, and more

The Enemy Within: How To Better Protect Yourself From Technological Evils (JDSupra) Trekkies and modest Star Trek fans may recall the plot in an episode known as "The Enemy Within" where a malfunction in a transporter causes Captain Kirk to be split into two — a good Captain Kirk and an evil Captain Kirk

Research and Development

Tor Reins in Concerns After Academic Paper on De-Anonymization (Threatpost) Tor Project leaders are trying to rein in concerns about an academic paper describing an end-to-end traffic correlation attack that could be used by a well-funded attacker such as a nation state to de-anonymize traffic on Tor


Automated coffee roaster heats up Cyber Junkyard 2014 (BizCommunity) The annual Siemens Cyber Junkyard competition, sponsored and arranged by Siemens, took place in Johannesburg on 27 October 2014. After a hectic day of interviews, presentations, physical demonstrations and testing of the competition entries, College of Cape Town took first prize in the 2014 competition

Legislation, Policy, and Regulation

Disclosing Policies on Zero-Days as a Confidence-Building Measure (Council on Foreign Relations) Yesterday, Kim Zetter of Wired published an interview with Michael Daniel, special assistant to the president and cybersecurity coordinator, in which Daniel provides more information about the U.S. government's policy on disclosing zero-day vulnerabilities

US Senate Blocks Government Surveillance Reform Bill (Security Week) US Senate Republicans on Tuesday blocked a sweeping overhaul of a National Security Agency program that would have ended the government's controversial bulk collection of data about Americans

The Real Lesson From Recent Cyberattacks: Let's Break Up The NSA (ReadWrite) It's supposed to guard against cyberintrusion. Remember?

U.S. SEC to enact rules to protect exchanges, dark pools from glitches (Reuters) U.S. regulators are poised to adopt new rules that would require stock exchanges and some larger trading platforms to take steps to protect against market disruptions such as technology glitches or natural disasters

7 Important Tech Regulatory Issues In 2015 (InformationWeek) From net neutrality to patent reform and drones, these regulations will be in the spotlight. See what's at stake

A Super-Wrong Way To Understand Net Neutrality (InformationWeek) Comparisons to electricity and cable TV are off base. Time for an honest discussion

Litigation, Investigation, and Law Enforcement

Release of Oral Argument Transcript from the Protect America Act Litigation by the Office of the Director of National Intelligence and the U.S. Department of Justice (IC on the Record) On January 15, 2009, the U.S. Foreign Intelligence Surveillance Court of Review published an unclassified version of its opinion in In Re: Directives Pursuant to Section 105B of the Foreign Intelligence Surveillance Act, 551 F.3d 1004 (Foreign Intel. Surv. Ct. Rev. 2008). The classified version of the opinion was issued on August 22, 2008, following a challenge by Yahoo! Inc. to directives issued under the Protect America Act of 2007

The State Secrets Senator Mark Udall Should Reveal (Atlantic) Establishment voices believe Udall should wait for the CIA and the Senate to finish their negotiations about what parts of the report ought to be released to the public. Nonsense. The fact that the CIA is a party to negotiations about what parts of a report into its own criminal misconduct will be suppressed is itself an absurdity, and suggests that the CIA already has undue influence over U.S. politics

London police chief warns banks of impending cyber attack (V3) City of London police commissioner Adrian Leppard has warned of the implications of a cyber attack on global financial institutions

Google fined for not taking down "right to be forgotten" links worldwide (Naked Security) A French court has convicted Google of failing to comply with a right to be forgotten case after it took down links on its French subsidiary but failed to do so globally

Prosecutors drop key evidence at trial to avoid explaining "stingray" use (Ars Technica) Baltimore Police detective refused to tell court how suspect's phone was found

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Deepsec 2014 (Vienna, Austria, November 18 - 21, 2014) DeepSec is an annual European two-day in-depth conference on computer, network, and application security. This is a non-product, non-vendor-biased conference event. Our aim is to present the best research...

BugCON (Mexico City, Mexico, November 19, 2014) BugCON Security Conference is hardcore technical conference focused on the technical side of the security. Running since 2008 BugCON is the oldest forum where researchers, students and professionals shows...

Navy Now Forum: Admiral Rogers (Washington, DC, USA, November 19, 2014) Leaders from the Navy will present new initiatives in-depth, providing the audience with a thorough knowledge of the Navy's future plans. During the luncheon, military personnel and industry leadership...

International Cyber Warfare and Security Conference (Ankara, Turkey, November 19 - 20, 2014) In-depth discussions will cover: new emerging threats and challenges on cyber warfare, the policy of leading cyber nations in cyber warfare and security, legal aspects of cyber warfare, industrial perspective...

Maintaining Robust Grid Cybersecurity in Expanding Smart Grid Markets (Washington, DC, USA, November 20, 2014) This roundtable will explore how cybersecurity has become an integral component, not just an afterthought, of the critical infrastructure and the energy industry

EDSC 2014 (Seattle, Washington, USA, November 20 - 21, 2014) EDSC is a security conference focusing on embedded systems, hardware, and anything behind the silicon curtain. Embedded testing is a rapidly expanding area of the security industry staying current is important...

Cyber Security World Conference 2014 (New York, New York, USA, November 21, 2014) Welcome to Cyber Security World Conference 2014 where renowned information security authorities and innovative service providers will bring their latest thinking to hundreds of senior executives focused...

Ethiopia Banking and ICT Summit (Addis Ababa, Ethiopia, November 21, 2014) he one day summit is designed to highlight the key Investment opportunities especially in the Banking & ICT Sectors. As an emerging economic capital for the region, Ethiopia is leading the way in industrial...

BSidesVienna (Vienna, Austria, November 22, 2014) BSidesVienna will open it's doors again in 2014. Be part of it and stay tuned

BSidesToronto (Toronto, Ontario, Canada, November 22, 2014) This year the conference is bigger, better, faster and…well, still one day in length but, we have an awesome line up. And no I'm not just paying "lip service"

DefCamp5 (Bucharest, Romania, November 25 - 29, 2014) DefCamp is the most important conference on Hacking & Information Security in Central Eastern Europe. The goal is bringing hands-on talks about latest research and practices from the INFOSEC field, gathering...

Cybergamut Tech Tuesday: Receiver Operating Characteristic (ROC) statistics and their successful use in medical studies, Nigerian scams, and APT detection (Columbia, Maryland, USA, December 2, 2014) Receiver Operating Characteristic (ROC) statistics have been a practical tool in the field of clinical medicine for more than 50 years, an area where stakes can be very high and test results are understood...

5th Annual Raytheon Cyber Security Summit: "The Unassailable Enterprise" (Reston, Virginia, USA, December 2 - 3, 2014) We invite commercial and government entities to attend the 5th Annual Cyber Security Summit where we will explore the "unassailable enterprise" in 2014 and beyond. We bring together some of the most acclaimed...

Healthcare Cyber Security Summit 2014 (San Francisco, California, USA, December 3 - 10, 2014) SANS is teaming up with the National Health Information Sharing & Analysis Center (NH-ISAC) to offer the 2nd Annual Healthcare Cyber Security Summit

SINET 16 (Washington, DC, USA, December 3 - 4, 2014) Innovative solutions frequently come from new and emerging companies. Each year, SINET invites sixteen innovative Cybersecurity companies to present their technology solutions to a select audience of prominent...

SINET Showcase (, January 1, 1970) "Highlighting and Advancing Innovation." Showcase provides a platform to identify and highlight "best-of-class" security companies that are addressing industry and government's most pressing needs and...

Tax Incentives for Cybersecurity Businesses (Elkridge, Maryland, USA, December 9, 2014) Learn the details and take the opportunity to ask questions of leading experts on how to apply for tax credits (including cyber, research, security clearance, and secured space tax credits) and get the...

International Conference for Internet Technology and Secured Transactions 2014 (London, England, UK, December 8 - 10, 2014) The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology...

(ISC)² Security Congress EMEA (London, England, UK, December 8 - 10, 2014) Building on the experience of the US-based (ISC)² Security Congress, now in its fourth year, (ISC)² Security Congress EMEA will offer a complementary and unique opportunity within the Europe...

ACSAC 30: Annual Computer Security Applications Conference (New Orleans, Louisiana, USA, December 8 - 12, 2014) ACSAC is more than just high quality, peer-reviewed research (though our 2013 acceptance rate was barely 19%). Our comprehensive program also includes training, case studies, panels, workshops, posters,...

ICFPT 2014 (Shanghai, China, December 10 - 12, 2014) ICFPT is the premier conference in the Asia-Pacific region on field-programmable technologies including reconfigurable computing devices and systems containing such components. Field-programmable devices...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.