skip navigation

More signal. Less noise.

Daily briefing.

Reports indicate the FBI has warned US companies privately that a "highly skilled" Chinese hacking group is targeting them. (A coalition of security companies has been responding to this threat; they promise a full report by month's end.) China's People's Liberation Army officially replies (seeming to protest too much) with a more-than-tu-quoque — the US, it says, is the real cyber villain here.

The Chinese government continues to deploy RATs against Hong Kong pro-democracy groups. The Washington Times says a US interagency security group has said Huawei attempted to penetrate NSA systems by hacking an unnamed contractor's network (which Huawei of course denies, albeit in a subjunctive mood).

Poodle is now generally regarded as a pest that must be dealt with as opposed to a catastrophic threat. Most observers think Poodle augurs the end of SSLv3; browser vendors will hasten that end.

Some familiar threats remain with us. Shellshock's effects linger in affected systems, patched or not. CryptoWall 2.0 ransomware is spotted in Tor. Java Reflection API problems have resurfaced. Cyber criminals continue to pluck low-hanging fruit from Windows XP.

The cyber criminal black market remains lucrative, with Group 1-B saying Russian hackers raked in some $2.5B over the past twelve months. Sale of card data rather than direct fraud is where the money's made, and carding shops transpose legitimate business practices into the underworld.

Threat intelligence remains a hot commodity. The cyber insurance market also expands, but value-at-risk remains hard to quantify.

South Korea will overhaul its national ID system.


Today's issue includes events affecting China, Iran, Republic of Korea, Russia, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

FBI warns industry of Chinese cyber campaign (Washington Post) The FBI on Wednesday issued a private warning to industry that a group of highly skilled Chinese government hackers was in the midst of a long-running campaign to steal valuable data from U.S. companies and government agencies

Military expert: US is top cyber thief and attacker (China Military Online) Foreign media recently reported that former U.S. National Security Agency (NSA) contractor Edward Snowden once again disclosed a top-clearance NSA "secret" action, including its espionage and cyber attacks against China. This reveals to the international community the true color of the US, which has regarded itself as the world cop in the cycler space

'Hurricane Panda' Cyberspies Used Windows Zero-Day For Months (Dark Reading) The vulnerability is one of multiple issues patched this week by Microsoft that have been targeted by attackers

Brazen Chinese company tried to beat the NSA at its own game…by hacking into the spy agency (Washington Times) Chinese telecommunications equipment giant Huawei Technologies sought to gain access to National Security Agency computer networks this year in a failed cyberespionage attack, U.S. officials said

RATs threatening democracy activists in Hong Kong (F-Secure) Hong Kong has been in the headlines lately thanks to the Occupy central campaign (#occupycentral, #OccupyHK) and the umbrella revolution (#umbrellarevolution, #UmbrellaMovement). DPHK, Democratic Party Hong Kong and Alliance for True Democracy (ATD) are central players in this movement

Windows zero-day used in targeted attacks (Virus Bulletin) Vulnerability used to download BlackEnergy trojan — as discussed during VB2014

POODLE Vulnerability Puts Online Transactions At Risk (TrendLabs Security Intelligence Blog) Earlier today, Google researchers Bodo Möller, Thai Duong, and Krzysztof Kotowicz released a paper discussing a serious bug in SSL 3.0 that allows attackers to conduct man-in-the-middle attacks and decrypt the traffic between Web servers and end users

POODLE attack takes bytes out of your encrypted data — here's what to do (Naked Security) Imagine that you're a hacker who has taken over a Wi-Fi access point at a coffee shop

Ghost in the (Bourne Again) Shell: Fallout of Shellshock far from over (Ars Technica) Patches for Shellshock alone won't fix already-compromised systems

4 million UPnP devices may be vulnerable to attack (Help Net Security) Akamai has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and office devices, including routers, media servers, web cams, smart TVs and printers

KnowBe4 Issues Alert: CryptoWall 2.0 Ransomware Moves to TOR Network (InsuranceNewsNet) KnowBe4 issued an alert to IT Managers that a new version of the world's most widespread ransomware CryptoWall has migrated to the TOR network. It has been upgraded to version 2.0, and continues to encrypt files so that a ransom can be extracted if there are no backups or if the backup process fails, often a common occurrence

Java Reflection API Woes Resurface in Latest Oracle Patches (Threatpost) Problems with the maligned Java Reflection API, the molten core of far too many exploited Java vulnerabilities in 2013, have surfaced again

XXE Attacks (Infosec Institute) XXE (XML External Entity attack) is now increasingly being found and reported in major web applications such as Facebook, PayPal, etc. For instance, a quick look at the recent Bug Bounty vulnerabilities on these sites confirms this. Although XXE has been around for many years, it never really got as much attention as it deserved. Most XML parsers are vulnerable to it by default, which means it is the responsibility of a developer to make sure that the application is free from this vulnerability. In this article we will explore what XML external entities are and how they can be attacked

eBay is still feeling the effects of a damaging cyber-attack (Quartz) The numbers: eBay posted earnings of $673 million (or $0.54 per share) on revenue of $4.4 billion, which was up 12% from a year ago. But for the second straight quarter, the online auction site was forced to cut its revenue forecast. It continues to feel the effects of a huge security breach it suffered in May. The stock has fallen by about 3% in after-hours trading

Windows XP Is Still a Favorite Among Hackers (MIT Technology Review) Microsoft no longer supports Windows XP, but it remains popular, and is a juicy target for cybercriminals

Russian Hackers Made $2.5B Over The Last 12 Months (Dark Reading) The big bucks are in selling credit card data — not using it for fraud — and PoS and ATM attacks are on the rise

Security Patches, Mitigations, and Software Updates

Browser Vendors Move to Disable SSLv3 in Wake of POODLE Attack (Threatpost) With details of the new POODLE attack on SSLv3 now public, browser vendors are in the process of planning how they're going to address the issue in their products in a way that doesn't break the Internet for millions of users but still provides protection

Drupal Fixes Highly Critical SQL Injection Flaw (Threatpost) Drupal has patched a critical SQL injection vulnerability in version 7.x of the content management system that can allow arbitrary code execution

OpenSSL Patches Four Vulnerabilities (US-CERT) OpenSSL has released updates patching four vulnerabilities, some of which may allow an attacker to cause a Denial of Service (DoS) condition or execute man-in-the-middle attacks

Microsoft Extends SHA-2, TLS Support for Windows (Threatpost) One by one, tech companies have been tossing aside the SHA-1 cryptographic algorithm like the unreliable collision-prone mess that it is

Google adds security and flexibility to latest Android mobile OS (ComputerWeekly) Google is to begin rolling out the latest, most enterprise-friendly version of its Android mobile operating system from 17 October 2014

Snapchat to address sketchy third-party apps with public API…at some point (Naked Security) Oh, those darn third-party apps, their home-brewed APIs and their photo-leaking ways, Snapchat moaned on Wednesday morning, promising to cook up a public API to fix the situation…sooner or later

Cyber Trends

Hackers Shake Confidence in 1980s Free Software Idealism (Bloomberg) Hackers have shaken the free-software movement that once symbolized the Web's idealism

Cybercrime: The Next Entrepreneurial Growth Business? (Wired) Cyberspace is constantly evolving and presenting organizations with new opportunities, as the desire of businesses to quickly adopt new technologies, such as using the Internet to open new channels and adopting cloud services, provides vast opportunity. But, it also brings unanticipated risks and inadvertent consequences that can have a potentially negative impact

How Cybercrime Can Impact Medical Devices (MED Device Online) Concerns have been raised by European law enforcement about the hijacking of digital information, which could include computer-driven medical devices. The FDA also recently instituted cybersecurity guidelines in response to what is perceived as a growing threat

What Is ICS Cybersecurity — You Don't Need Digital Assets (Control) I am in Las Vegas attending the IEC TC45A Nuclear Plant Cyber Security Standards meetings as a designated US Expert. As mentioned, in my earlier blog, I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents

UK prime cyber attack target of Europe and Middle East (Financial Times) Britain suffered significantly more sophisticated cyber attacks in the first half of the year than any other state in Europe or the Middle East


Why CISOs Are Investing in Cyber Threat Intelligence (Recorded Future) Recently, we had the wonderful opportunity to host a webinar featuring Threat Intelligence Expert and Principal Analyst, Rick Holland of Forrester Research, Inc. Rick discussed why a chief information security officer (CISO) should invest in cyber threat intelligence. Here are some highlights from the webinar

Threat Intelligence (Accuvant) To improve detection, response, and resolution of relevant threats to their business, security leaders and their teams are turning to the promise of intelligence-driven security. An intelligence-driven approach to security is different than other methods because it seeks to provide defenders with key data and capabilities exactly when they are needed, to maximize resource effectiveness and minimize damage incurred

With data breaches part of daily life, banks seek freedom to robotext (Quartz) The daily threat of cyberattacks has prompted US banks to ask for freedom from restrictions on reaching out to consumers in the event of data breaches

U.S.-Japan Defense Industry Cyber Cooperation (The Diplomat) Both countries will need to pool resources to meet a rising threat

Does Your Cyber Risk Policy Protect You In the Event of an Insider Attack or Data Breach? (ReedSmith) Protecting a company against data breaches requires not only measures to prevent the adverse cyber event, but also adequate insurance to minimize the financial impact should such an event occur

For small biz, cybercrime can be deadly ( I trust that my readers are appropriately honoring October as National Cyber Security Awareness Month, sponsored by the U.S. Department of Homeland Security and the National Cyber Security Alliance

Security firms have created the next dot com bubble by 'scaring their customers' (Beta News) There are too many security firms offering insufficient security. At least that's what Ilia Kolochenko, CEO and founder of High-Tech Bridge thinks. He points to the splitting of Symantec as proof that security companies are struggling, and suggests that the emergence of so many firms competing for attention is the start of a new dot com bubble that could burst at any moment

Exclusive: Tech firms HP, EMC call off merger talks — sources (Reuters) Hewlett-Packard Co has ended merger talks with EMC Corp and may announce this development as soon as Wednesday, deciding to walk away after months of fruitless negotiations, people briefed on the matter told Reuters

Analysis: Symantec split was a long time coming (TechTarget) The long-anticipated Symantec split will leave one company focused entirely on security, but experts caution that it's just the first step in fix

Top 4 NASDAQ Stocks In The Security Software & Services Industry With The Highest Gross Margin (Benzinga) Below are the top security software & services stocks on the NASDAQ in terms of gross margin

Gartner Ranks Check Point the Worldwide Market Share Leader in the Firewall Equipment Market, Based on Revenue for Q2 2014 (MarketWatch) Check Point® Software Technologies Ltd. CHKP, +0.80% the worldwide leader in securing the Internet, today announced that the company leads with the top position in worldwide market share for Firewall Equipment in Q2 2014, according to research published by Gartner. Check Point led with 22% of the Firewall Equipment market, a 6.2% and 11.2% lead over the two nearest competitors

Cyber security coalition aims to change the game against malware (Help Net Security) It's good to see that "collaboration" is not just an empty word for the cyber security industry

Mobile security partnership opens between AVG and Sony (Mobile Commerce News) This recent three year deal will mean that the company will be Sony's exclusive protection provider

AVG plans acquisition of Location Labs (Financial News) AVG Technologies N.V. (NYSE: AVG) said that shareholders have approved its acquisition of privately-held Location Labs

Router that anonymises internet activity raises $300,000 on Kickstarter (Guardian) Anonabox, a device that re-routes data through the cloaking Tor network, is tool for freedom of information, developer says

The Sophia Antipolis-based start-up SecludIT raises €740K (Invest in Côte d'Azur) This investment will enable the start-up to escalate its commercial deployment and R&D

Carmel business Emerging Threats set to expand, add high-wage jobs (Current in Carmel) Emerging Threats Pro LLC, a commercial and open source threat intelligence provider, announced plans today to expand its operations here, creating up to 84 new high-wage jobs by 2019

Palantir secures 77K sf lease on West 15th Street (The Real Deal) California-based data-protection firm already occupies 47K square feet in the area

Products, Services, and Solutions

Protegrity Announces Data Protection & Monitoring in Hortonworks Data Platform (MarketWired) Optimized, license-free HDP solution for sensitive data protection using enterprise-class encryption, tokenization and key management

Sticky Password Powers VIPRE® to Enhance Online Security (MarketWired) Sticky Password, a leading password management software provider, has announced a licensing agreement to power ThreatTrack Security's new password management software, VIPRE® Password Vault

BAE Systems Applied Intelligence unveils IndustrialProtect in the Middle East (Zawya) Military-grade solution will protect critical industrial control systems from cyber attack

Boeing Delivers Maritime Signals Intelligence System Early (PCB Design 007) Boeing has delivered the first system in the U.S. Navy's latest order of the Ship's Signal Exploitation Equipment Increment F (SSEE-F) program ahead of schedule

Electronic Armor protects military drones in dangerous world of hacking and crashing (Washington Times) The Pentagon has begun putting an anti-hacking system known as Electronic Armor onto high-tech drones to prevent adversaries from digitally penetrating and potentially crashing the unmanned aircraft from anywhere around the world, military officials said

Kaspersky offers Webcam Protection in Internet Security suite (Infotech Lead) In the wake of recent incidents of cyber crimes through webcam, Kaspersky Lab now offers Webcam Protection module integrated it into Kaspersky Internet Security — Multi-Device

Malcovery Security Delivers Unified Threat Intelligence Services that Enable Network and Brand Protection (PRWeb) New SaaS investigation tools released to facilitate phishing and malware investigations

McAfee's Next Generation Firewall spies greatness in security integration (TechWorld) Is there a limit to what firewalls should do? McAfee wants to find out

Alert Logic Introduces ActiveWatch For Alert Logic Log Manager (Dark Reading) New managed service debuts

A10 Networks forms grand alliance to defend against cyber criminals (Business-Cloud) A10 Networks has formed a grand alliance including RSA, Arista, FireEye, FlowTraq, IBM Security, Ping Identity, Pulse Secure, Symantec, Vectra, Venafi, Webroot to defend companies from the cyber security threat

Viscount Systems awarded U.S. patent for Freedom security technology (SecurityInfoWatch) Freedom Access Control solution is fully compliant with FICAM under the program's PACS 13.02 topology

Technologies, Techniques, and Standards

No Easy Fix for Point-of-Sale Security (eSecurity Planet) Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?

Tech firms, associations lead response to cybersecurity framework (FedScoop) The nation's critical infrastructure is massive in its size, diversity and geographic spread — literally tens of thousands of financial, transportation, power, telecommunications, manufacturing, health care and government organizations from coast to coast. So it may have been a surprise to some when the National Institute of Standards and Technology posted a mere 53 responses last week to the Obama administration's voluntary framework for improving critical infrastructure cybersecurity

Manipulating Hackers as a Cyberdefense (GovInfoSecurity) Exploiting cultural values to help thwart attacks

Targeted Attack Protection via Network Topology Alteration (TrendLabs Security Intelligence Blog) When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from various sources of intelligence, like Google, Whois, Twitter, and Facebook. They may gather data such as email addresses, IP ranges, and contact lists. These will then be used as lure for phishing emails, which inevitably result in gaining access in the targeted organization's network

MindshaRE: Statically Extracting Malware C2s Using Capstone Engine (Arbor DDoS and Security Reports) It's been far too long since the last MindshaRE post, so I decided to share a technique I've been playing around with to pull C2 and other configuration information out of malware that does not store all of its configuration information in a set structure or in the resource section

Research and Development

The Big Mystery: What's Big Data Really Worth? (Wall Street Journal) A lack of standards for valuing information confounds accountants, economists


Web-Era Trade Schools, Feeding a Need for Code (New York Times) A new educational institution, the coding boot camp, is quietly emerging as the vocational school for the digital age, devoted to creating software developers

Legislation, Policy, and Regulation

South Korean ID system faces overhauls following 10 years of data thefts (Naked Security) The South Korean government is considering reissuing national identity card ID numbers for every citizen over the age of 17, at the cost of billions of US dollars

Army Eyes Coordinated Land-Cyber Missions (Defense News) Seven years ago, the Israeli military's Operation Orchard is believed to have employed an electronic warfare-delivered cyber attack to shut down Syrian anti-air defenses before its jets bombed Syria's Al Kibar nuclear reactor

Litigation, Investigation, and Law Enforcement

Internet Organised Crime Threat Assessment (iOCTA) (EC3) The Internet Organised Crime Threat Assessment (iOCTA) informs decision makers at strategic, policy and tactical levels about on-going developments and emerging threats of cybercrime affecting governments, businesses and citizens in the EU. It draws on highly valuable contributions from law enforcement authorities in the EU and from other countries. Partners in the private sector and academia also provided important input to the report

Seleznev Arrest Explains '2Pac' Downtime (KrebsOnSecurity) The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he'd been whisked away to Guam by U.S. federal agents while vacationing in the Maldives. The additional charges against Seleznev may help explain the extended downtime at an extremely popular credit card fraud shop in the cybercrime underground

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Hack-in-the-Box Malaysia (Kuala Lumpur, Malaysia, October 13 - 16, 2014) HITBSecConf or the Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world. Held annually in Kuala Lumpur, Malaysia...

FS-ISAC Fall Summit 2014 (Washington, DC, USA, October 13 - 16, 2014) The Financial Services Information Sharing and Analysis Center (FS-ISAC), is a non-profit association comprised of financial institution members, that is dedicated to protecting the global financial services...

CYBERSEC 2014 (, January 1, 1970) CYBERSEC is a 4-day event geared toward helping you achieve your cybersecurity goals. Whether your focus is on cybersecurity management, investigation, defense, or offense we are offering specialty cybersecurity...

Black Hat Europe 2014 (, January 1, 1970) The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in October, 2014. Professionals from all over the world gather for two days of intense Trainings and...

Denver SecureWorld (Denver, Colorado, USA, October 16, 2014) A day of cyber security education. Earn 6-8 CPE credits, network with industry peers, and take advantage of more than thirty educational events. Over the past decade SecureWorld has emerged as one of North...

TechCrunch Disrupt Europe Hackathon (London, England, UK, October 18 - 19, 2014) For the second year in a row, TechCrunch is jumping across the pond and bringing the iconic Disrupt and our Hackathon to Europe. We're heading your way, London

U.S. Army ITA Security Forum (Fort Belvoir, Virginia, USA, October 20, 2014) The U.S. Army Information Technology Agency Security Forum is taking place at the Ft. Belvoir site and will be a one day event focusing on cyber security education and training for the workforce. The...

CSEC 2014 Cyber Security Summit (Kingdom of Bahrain, October 20 - 22, 2014) At the Inaugural Cyber Security Summit 2014, you will have the opportunity to seek ways to reset your IT security and risk strategy for success; stay relevant as IT security and risk are redefined; implement...

2014 ICS Cyber Security Conference (, January 1, 1970) The 14th ICS Cyber Security Conference (sometimes known as "Weisscon") will be held October 20-23, 2014 at Georgia Tech in Atlanta, GA. Cyber Security is becoming a critical infrastructure issue with implications...

National Archives and Records Administration (NARA) IT Security Day (College Park, Maryland, USA, October 21, 2014) FBC and NARA are working together to coordinate the 6th Annual National Archives and Records Administration (NARA) Information Technology Day. Exhibitors will be on-site to share information and demonstrate...

Cyber Security Summit 2014 (, January 1, 1970) Cyber security breaches have a profound impact on all areas of society. Join the discussion at Cyber Security Summit 2014. For two days, leaders from the public and private sectors meet to identify cyber...

Collaborative Approaches for Medical Device and Healthcare Cybersecurity; Public Workshop (Arlington, Virginia, USA, October 21 - 22, 2014) The Food and Drug Administration (FDA) is announcing the following public workshop entitled "Collaborative Approaches for Medical Device and Healthcare Cybersecurity." FDA, in collaboration with other...

Secure 2014 (Warsaw, Poland, October 21 - 23, 2014) NASK and CERT-Polska offer this conference on telecommunications and IT security. Speakers from government, industry, and universities around the world will offer insights into research, policy, and security... 2014 (Dommeldange, Luxembourg, October 21 - 24, 2014) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society

ISSA International Conference (Orlando, Florida, USA, October 22 - 23, 2014) Join us for solution oriented, proactive and innovative sessions focused on security as a vital part of the business.

ToorCon San Diego (San Diego, California, USA, October 22 - 26, 2014) For hackers like you, because what could possibly go wrong?

DOE Germantown Cybersecurity Awareness Day (Germantown, Maryland, USA, October 23, 2014) The Department of Energy Germantown Building will be hosting a Cyber Security Awareness Day featuring a technology expo. DoE will be looking for a wide range of cyber security industry experts to showcase...

Library of Congress Cybersecurity Awareness Expo (Washington, DC, USA, October 23, 2014) The Library of Congress (LOC)is hosting its annual cyber security awareness days during October and the exposition is an important part of their education and outreach effort to industry

NASA Glenn Research Center Cyber Security Expo (Cleveland, Ohio, USA, October 23, 2014) In recognition of National Cyber Security Awareness Month, an Awareness Day event will be held at Glenn Research Center in Cleveland, Ohio. This event will provide participants with information and resources...

2014 Omaha Cyber Security Event (Omaha, Nebraska, USA, October 23, 2014) Better Business Bureau and its partners present a panel discussion on how to stay safe online — it's our shared responsibility! Learn the risks, how to spot potential problems and how our online...

FOCUS 14: Empowering the Connected World (Las Vegas, Nevada, USA, October 26 - 27, 2014) FOCUS will offer you a unique opportunity to learn directly from other McAfee users. Hear real-world scenarios from McAfee customers and learn how they maintain the highest standards of security while...

Cybergamut Tech Tuesday: Software-Defined Networking Security (Columbia, Maryland, USA, October 28, 2014) Security-Defined Routing combines cyber analytics and SDN to protect the network: SDR technology assists organizations in scaling the delivery of network traffic to analytic security applications. When...

USDA Cyber Security Symposium and Expo 2014 (Washington, DC, USA, October 28 - 29, 2014) The Summit will provide participants with information and resources on today's vulnerabilities, incidents, security lifecycle, risks and mitigations; it will also identify ways to work together and build...

Cyber Security and IT Day at Fort Carson (Colorado Springs, Colorado, USA, October 28, 2014) The Information Systems Security Association (ISSA) Colorado Springs Chapter ill once again host the 5th Annual Cyber Security & Information Technology Days set to take place at Fort Carson on Tuesday,...

Cyber Security and IT Days at Peterson AFB (Colorado Springs, Colorado, USA, October 29, 2014) The Information Systems Security Association (ISSA) Colorado Springs Chapter will once again host the 5th Annual Cyber Security & Information Technology Days. Government and Industry experts will be on...

Dallas SecureWorld (Dallas, Texas, USA, October 29 - 30, 2014) Offering two days of cyber security education. Earn 12-16 CPE credits, network with industry peers, and take advantage of more than sixty educational events. Over the past decade SecureWorld has emerged...

Cyber Job Fair (Baltimore, Maryland, USA, October 29, 2014) ClearedJobs.Net is partnering with CyberMaryland to present the Cyber Job Fair at the CyberMaryland 2014 conference. The Cyber Job Fair is a hiring event for cleared and non-cleared cybersecurity professionals...

CyberMaryland 2014 (Baltimore, Maryland, USA, October 29 - 30, 2014) Entrepreneurs, investors, academia and government will convene in Maryland — the nation's epicenter for cybersecurity for the fourth annual CyberMaryland Conference.

ekoparty Security Conference 10th edition (Buenos Aires, Argentina, October 29 - 31, 2014) ekoparty — Electronic Knock Out Party — Security Conference, is a one of a kind event in South America; an annual security conference held in Buenos Aires, where security specialists from all over Latin...

Cyber Risk Summit (Washington, DC, USA, May 22, 2014) This one-day leadership conference will provide a discussion forum for business executives, insurance companies and policymakers on more effective private and public responses to cyber risk management.

Senior Executive Cyber Security Conference (Baltimore, Maryland, USA, October 30 - November 1, 2014) North Star Group, LLC and the Johns Hopkins University's Whiting School of Engineering and Information Security Institute sponsor this senior executive focused cyber security conference.This event is designed...

FS-ISAC EU Summit 2014 (London, England, UK, November 3 - 5, 2014) The Financial Services Information Sharing and Analysis Center (FS-ISAC), is a non-profit association comprised of financial institution members, that is dedicated to protecting the global financial services...

POC2014 (Seoul, Republic of Korea, November 4 - 7, 2014) POC (Power of Community) started in 2006 and has been organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC doesn't pursue money. POC concentrates...

Open Source Digital Forensics Conference 2014 (Herndon, Virginia, USA, November 5, 2014) This conference focuses on tools and techniques that are open source and (typically) free to use. It is a one day event with short talks packed with information. There are both tool developers and users...

Bay Area SecureWorld (Santa Clara, California, November 5, 2014) A day of cyber security education. Earn 6-8 CPE credits, network with industry peers, and take advantage of more than thirty educational events. Over the past decade SecureWorld has emerged as one of North...

Managing BYOD & Enterprise Mobility USA 2014 (San Francisco, California, USA, November 5 - 6, 2014) The Managing BYOD & Mobility USA 2014 conference will provide a unique networking platform, bringing together top executives from USA and beyond. They come together not only to address mobility challenges...

Journal of Law and Cyber Warfare First Annual Cyber Warfare One Day Symposium (New York, New York, USA, November 6, 2014) The Journal of Law and Cyber Warfare is proud to present the First Annual Cyber Warfare One Day Symposium. Join us as senior lawyers, technology chiefs, government officials, and academics discuss the...

RiseCON 2014 (Rosario, Santa Fe, Argentina, November 6 - 7, 2014) Rosario Information Security Conference: es el primer y mayor evento de seguridad informática y hacking realizado en la ciudad de Rosario, con nivel y trascendencia internacional

Israel HLS 2014 (Tel Aviv, Israel, November 9 - 12, 2014) The third International Conference on Homeland Security will bring together government officials, public authorities, and HLS industry leaders from around the world to share their knowledge and experience.

Critical Infrastructure Cyber Community (C3) Voluntary Program Meeting (San Diego, California, USA, October 13, 2014) Join stakeholders from across the cyber community to discuss building a cyber risk management program, using DHS resources, and to learn how organizations of all sizes are using the Cybersecurity Framework...

i-Society 2014 (London, England, UK, November 10 - 12, 2014) i-Society 2014 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society,...

Seattle SecureWorld (Seattle, Washington, USA, November 12 - 13, 2014) Offering two days of cyber security education. Earn 12-16 CPE credits, network with industry peers, and take advantage of more than sixty educational events. Over the past decade SecureWorld has emerged...

AVAR 2014 (, January 1, 1970) The 17th Association of anti-Virus Asia Researchers International Conference: Security Down Under. Topics will include case studies of targeted attacks, real-life attack demonstrations, web-inject attacks/code...

ZeroNights 2014 (Moscow, Russia, November 13 - 14, 2014) ZeroNights is an international conference dedicated to the practical side of information security. It will show new attack methods and threats, showcase new possibilities of attack and defense, and suggest...

Cyber Security Awareness Week Conference (New York, New York, USA, November 13 - 15, 2014) Get ready for CSAW: the largest student-run cyber security event in the nation, with a research conference that attracts some of the biggest names in the industry, and a career fair with an impressive...

Ground Zero Summit, India (New Dehli, India, November 13 - 16, 2014) Ground Zero Summit (GOS) 2014 in its second year promises to be Asia's largest Information Security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in...

Deepsec 2014 (Vienna, Austria, November 18 - 21, 2014) DeepSec is an annual European two-day in-depth conference on computer, network, and application security. This is a non-product, non-vendor-biased conference event. Our aim is to present the best research...

BugCON (Mexico City, Mexico, November 19, 2014) BugCON Security Conference is hardcore technical conference focused on the technical side of the security. Running since 2008 BugCON is the oldest forum where researchers, students and professionals shows...

International Cyber Warfare and Security Conference (Ankara, Turkey, November 19 - 20, 2014) In-depth discussions will cover: new emerging threats and challenges on cyber warfare, the policy of leading cyber nations in cyber warfare and security, legal aspects of cyber warfare, industrial perspective...

EDSC 2014 (Seattle, Washington, USA, November 20 - 21, 2014) EDSC is a security conference focusing on embedded systems, hardware, and anything behind the silicon curtain. Embedded testing is a rapidly expanding area of the security industry staying current is important...

Ethiopia Banking and ICT Summit (Addis Ababa, Ethiopia, November 21, 2014) he one day summit is designed to highlight the key Investment opportunities especially in the Banking & ICT Sectors. As an emerging economic capital for the region, Ethiopia is leading the way in industrial...

BSidesVienna (Vienna, Austria, November 22, 2014) BSidesVienna will open it's doors again in 2014. Be part of it and stay tuned

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.