skip navigation

More signal. Less noise.

Daily briefing.

Symantec discovers a new wave of reconnaissance malware targeting the energy sector (specifically, oil, gas, and helium). Affected firms are mainly in the Middle East, but North American and European targets are also hit. The tool used in the Trojan-based campaign is called "Laziok," and the attackers' objectives appear to be data relevant to oil and gas extraction technologies and techniques. (Attribution will probably focus on countries currently experiencing difficulties with extraction.)

Volatile Cedar, whose discovery Check Point disclosed earlier this week, is also largely active in the Middle East. Most of its targets appear to be Lebanese (not, as earlier reported, Israeli, although Israel seems to be running a close second), which suggests to observers that one of the campaign's purposes is "intrastate espionage." Security organizations have been working to sinkhole the attack.

The GitHub denial-of-service campaign looks more like a Chinese government operation. (While such may not be true of this episode, DDoS attacks are increasingly used as misdirection for theft, espionage, or malware distribution.)

A phishing campaign spoofing Virgin Media and PayPal is underway, and may have already yielded pay card information used in retail fraud. (Retailers generally face a tough dilemma. On the one hand they have a positive obligation to fight fraud. On the other, they don't want to treat customers as potential criminals.)

US President Obama declares cyber attacks a "national emergency," and signs an Executive Order imposing sanctions on those (mostly states) found responsible.

Premera faces data-breach lawsuits. Feds subpoena Reddit's darkweb data.

Notes.

Today's issue includes events affecting Canada, China, Germany, Israel, Japan, Kuwait, Lebanon, Oman, Qatar, Russia, Saudi Arabia, Turkey, United Arab Emirates, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

Reconnaissance malware wave strikes energy sector (ZDNet) Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets

New malware used to attack energy companies (IDG via Computerworld) The Trojan program is used for reconnaissance and distribution of additional malware, researchers from Symantec say

Lebanese cyberespionage campaign hits defense, telecom, media firms worldwide (CIO) For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries

Volatile Cedar: Threat Intelligence and Research (Check Point) Beginning in late 2012, a carefully orchestrated attack campaign we call Volatile Cedar has been targeting individuals, companies and institutions worldwide. This campaign, led by a persistent attacker group, has successfully penetrated a large number of targets using various attack techniques, and specifically, a custom-made malware implant codenamed Explosive

Sinkholing Volatile Cedar DGA Infrastructure (SecureList) Victim spread contained within Lebanon

Two Cyber-Spying Groups Target Middle East Governments, Energy Firms (eWeek) Separate reports reveal details of two espionage networks focused on the Middle East, one aimed at gathering intelligence and the other focused on infecting energy firms

Evidence links China to GitHub cyber-attack (BBC) Internet users outside China are unwittingly participating in a long-running cyber-attack on the coding site GitHub, security experts have said

Security issue in fitness wristband, says Kaspersky researcher (Digital News Asia) Vulnerability discovered in the authentication method used in several smart wristbands. Allows third-party to connect invisibly to device, execute commands, and extract data

Fake "Urgent billing update" email leads to Virgin Media, Paypal phishing page (Help Net Security) Customers of UK-based telecom and ISP Virgin Media are being targeted with a clever spam campaign that is after their account information, but also PayPal account login details and payment card information

KnowBe4 Alert: New Ransomware Spear-Phish Uses Dropbox Attack (Business Solutions) Highly malicious strain found only takes 1 click to infect systems using DropBox

Hack Remote Windows PC using Adobe Flash Player Byte Array Uncompress via ZlibVariant Use after Free (Hacking Articles) This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the Byte Array::Uncompress ViaZlibVariant method, when trying to uncompress () a malformed byte stream. This module has been tested successfully on Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 16.0.0.287, 16.0.0.257 and 16.0.0.235

Half of companies under DDoS attack have critical data stolen (Help Net Security) Neustar surveyed IT professionals from across EMEA to understand the impact of DDoS attacks

Florida Department of State Exposes Voter Information (Softpedia) A total of 15 compact discs storing information about voters in Florida have been sent out by the Division of Elections to entities ordering them, leaving intact contact information that could be detrimental to their owners, if made public

Security Patches, Mitigations, and Software Updates

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird (US-CERT) The Mozilla Foundation has released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system

Verizon Wireless Lets Customers Opt Out of Tracking 'Perma-Cookies' (MacRumors) Last year, Verizon and AT&T made headlines when researchers discovered they had been engaging in some unsavory customer tracking techniques, using unique identifier numbers or "perma-cookies" to track the websites that customers visited on their cellular devices to deliver targeted advertisements, a practice called "Relevant Advertising"

Cyber Trends

Law Firms: Cyber Criminals' Next Top Target? (Digital Guardian) Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers

Top 6 Health Data Breaches for 2015 Involve Hacking (HealthITSecurity) We are just three months into 2015, and two large scale health data breaches have already taken place. The Anthem data breach affected approximately 78 million individuals, while Premera Blue Cross' incident could impact nearly 11 million members and applicants

Retailers' heavy handed fraud prevention leads to loss of sales (We Live Security) Online retailers battling with fraud prevention are losing out on genuine sales by treating their customers like criminals, according to a new report by ThreatMetrix

Negotiating with Cybercriminals: 30% of Security Professionals Say They Would Pay for the Return of Their Data (ThreatTrack) In weighing principle vs. negotiating with cybercriminals to recover stolen or encrypted data, 30% of U.S. security professionals have concluded that getting their data back is more important. Respondents at organizations already targeted by cyberextortionists are more than three times as likely to be willing to negotiate with cybercriminals and nearly twice as likely to recommend setting aside funds for that very purpose

Internet Security at risk as Hack Attacks on the rise: No Site Seems to be Safe Anymore (Empire State Tribune) The growing number of people capable of launching the recent spate of hacking on the IT systems of British Airways, Slack, Rutgers University and GitHub are all signs of the fast-changing nature of the Internet. Cyber security professionals fears that such occurrences may likely become more common in the coming years

Surprising Facts and Stats — Online Security (CloudTweaks) It's easy to get lulled into a false sense of security when browsing the web. As more and more devices join the internet of things, the risk of becoming a victim of a criminal cyber gang is increasing — we have more unsecured access points and offer would-be thieves more routes into our home networks

Wie sicher ist das Internet der Dinge? (PresseBox) G DATA Security-Evangelist Eddy Willems empfiehlt Herstellern engere Zusammenarbeit mit IT-Sicherheits-Branche

Securing Smart Cities a Work-in-Progress: Security Vendors (Channel World) It is important to understand and address vulnerabilities associated with IoT in its early stages as companies cannot fully rely on IoT vendors to patch vulnerabilities and protect against all attack vectors

Putting identity at the heart of security in 2015 (Information Security Buzz) Hans Zandbelt, Senior Technical Architect at Ping Identity, discusses the role identity will play in securing and enabling broader internet in 2015

RIP, "APT" (Waters Technology) Perhaps the greatest issue facing cyber security professionals in finance is cutting the wheat from the chaff when it comes to selecting providers and messaging. What happens when cyber — a real menace by all practical accounts — meets the dreaded hype cycle? Tim says it's already not pretty

Users care about privacy when they know what info is collected about them (Help Net Security) A recent study conducted by Carnegie Mellon and Notre Dame University researchers is calling attention to several interesting things

Organizations Changing Strategies and Tactics as Security Environment Gets More Complex, New CompTIA Study Finds (CompTIA) The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that's challenging for even the best prepared organizations, according to new research released today by CompTIA, the IT industry association

Marketplace

As Internal Threats Rise, Investors Back New Security Tech (TechCrunch) On February 3, 2011, a little over two years before Edward Snowden would board his plane to Hong Kong and change history, a 37-year-old man named Jason Cornish fired what may have been the first shot in one of the new fronts of the battle for enterprise security

After Snowden, The NSA Faces Recruitment Challenge (NPR) Not many students have the cutting-edge cybersecurity skills the NSA needs, recruiters say. And these days industry is paying top dollar for talent. Daniel Swann is exactly the type of person the National Security Agency would love to have working for it. The 22-year-old is a fourth-year concurrent bachelor's-master's student at Johns Hopkins University with a bright future in cybersecurity

The Source: Can San Antonio Do More To Entice Cyber Security Jobs? (Texas Public Radio) A mad scramble to be the nation's hub for cyber security is going on right now between cities across the country. This hundred billion dollar a year industry is only growing, so where does San Antonio stand?

Why security disruptor Tanium aligned exclusively with Andreessen Horowitz (Fortune) The profitable, eight-year-old company just closed another $52 million round with the legendary VC firm — bringing the total to $142 million

Alibaba Invests in Israeli Cyber-Security (Jewish Voice) Chinese e-commerce company Alibaba Group has announced that it is investing in Jerusalem Venture Partners to work with Israeli cyber-security startups and protect itself from hackers. The news comes as Cybertech 2015, Israel's flagship international cyber-tech conference, kicks off in Tel Aviv

SRA to Acquire Qbase Government Services Business Assets (PRNewswire) Strengthens presence in health IT, homeland security, and law enforcement markets

ESI Group to Acquire the Assets of Picviz Labs, Specialist in Big-Data-Based Predictive Analysis Through Advanced Visualization (BusinessWire) Creation of a big data visual analysis platform to detect unknown operational problems

Honeywell opens US cyber security research lab (Hydrocarbon Processing) According to the US Department of Homeland Security's ICS-CERT, reported cyber incidents on industrial targets in 2014 continue to increase and are up more than 25% since 2011

Symantec Signs Multi-Megawatt Lease at Santa Clara Data Center (Data Center Knowledge) Vantage Data Centers has won a multi-megawatt deal with security-software powerhouse Symantec for its Santa Clara data center campus. This is the company's second lab customer in recent months but its first mixed-use infrastructure deal ever. Symantec will deploy both lab space and critical IT infrastructure at the facility

Perspecsys Announces Expansion into Germany (BusinessWire) Perspecsys, the leader in enterprise cloud data protection solutions, today announced it has extended its presence in Europe to Germany. The move will enable it to meet the rapid growth it is experiencing in the region

eMazzanti to Partner with PCI Security Standards Council to Improve Payment Data Security Worldwide (PRWeb) As Council's newest Participating Organization eMazzanti Technologies to contribute to the development of PCI Security Standards

Chertoff Group Principal Jim Pflaging Joins the AdaptiveMobile Board of Directors (BusinessWire) Seasoned executive has deep expertise in the security and enterprise markets

Napatech Welcomes New SVPs to Meet Global Expansion Goals (PRNewswire) To improve its sales and marketing capabilities by creating a strong commercial focus, Napatech (OSE: NAPA) today announced the hire of two new senior vice presidents. Walther Johannessen has been selected for the role of SVP of Global Marketing, and Andrew Patterson will serve as SVP of Global Sales

Molson Coors Chief Information Security Officer (CISO) Joins Security Current's Team of Leading Industry Experts (PRNewswire) Christine Vanderpool to offer insight and guidance on today's top cyber security concerns

SANS Instructor, Ed Skoudis, Awarded the Order of Thor Medal at the Army Cyber Institute (PRNewswire) SANS Institute, the global leader in information security training, today announced SANS Instructor and NetWars CyberCity Director, Ed Skoudis, has been inducted into the Military Cyber Professionals Association's Order of Thor. This prestigious award was presented to Mr. Skoudis by Col. Gregory Conti, Army Cyber Institute director in honor of Mr. Skoudis' contributions in preparing the next generation of military cyber professionals

Products, Services, and Solutions

Resistance to DCGS-A persists (GCN) The Army's main intelligence gathering component, the Distributed Common Ground System, continues to face criticism among lawmakers and members of the military

Verizon, Deloitte Team on CyberSecurity (Light Reading) With data breaches and other cyber incidents becoming more frequent, costly and destructive, Deloitte and Verizon Enterprise Solutions today announced a strategic alliance to deliver a comprehensive set of security and risk-management solutions to help businesses prepare, respond and recover more efficiently, effectively and thoroughly when a cyberattack occurs

Palo Alto expands VMware alliance, launches new service (Seeking Alpha) In the wake of yesterday's analyst day, Palo Alto Networks (NYSE:PANW) has announced it's expanding its partnership with server virtualization kingpin VMware (NYSE:VMW) to cover mobile security

CipherCloud Acquires Cloud Security Analytics Technology (PRNewswire) Incorporates advanced cloud risk rating and real-time detection capabilities to enhance its cloud security platform

Thales launches BYOK Deployment Service for Microsoft Azure Cloud Applications (Realwire) Unique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud

Security Mentor and Center for Internet Security Partner to Satisfy State and Local Government Security Awareness Training Requirements (Midland Daily News) Security Mentor makes its award-winning security awareness training program affordable for SLTT government entities through Center for Internet Security's purchasing alliance program

Securing Portable Devices and Sensitive Data in Healthcare (Tenable) The high-profile healthcare breaches this year alone, as well as the growth of the lucrative market for healthcare information ("over $500 for a complete dossier"), are a testament that current security processes and solutions require a re-evaluation

Sophos uncovers sophisticated approach to business security (Reseller News) Operating at the heart of the complicated world of security, one overriding philosophy reins supreme — "You don't fix complexity with more complexity"

Amid growing SSL concerns, Qualys expands free public SSL tester (TechTarget) Qualys has added a free, public API to its SSL testing services, which will enable an enterprise to test any website or server for SSL vulnerabilities

Palo Alto Networks Unveils AutoFocus Cyber Threat Intelligence Service (MarketWatch) Delivers actionable intelligence to help customers take quick, definitive and preventive action against targeted cyber threats

Wombat Security Technologies Unveils New Security Awareness and Training Modules to Help Protect Companies Against Advanced Cyber Threats (MarketWired) Wombat's new Security Essentials and Mobile Device Training Modules as well as all training modules are now available in Russian and Dutch

Bitdefender Wins Perfect Score from AV-TEST for Both Consumer and Business Solutions (BusinessWire) Bitdefender Internet Security, Bitdefender Endpoint Security excel in performance, protection and usability

Bitdefender Antivirus mobile security for android phones download (The REM) Mobile phone users always have this fear in their minds that their data might be at risk

SAFE Block Win8 (Forensic Magazine) Today, ForensicSoft releases its latest versions of its write-blocking product SAFE Block, now available for Microsoft's Windows 8 operating system

Pentagon Personnel Now Talking on 'Nsa-Proof' Smartphones (Nextgov) The Defense Department has rolled out supersecret smartphones for work and maybe play, made by anti-government-surveillance firm Silent Circle, according to company officials

Technologies, Techniques, and Standards

Ponemon security survey finds threat intelligence is woefully underused (Silicon Angle) Knowing the enemy has always been important to winning battles, but gaining the right insight at the right time is much easier said than done in the fight against hackers. A new survey of the organizations on the front lines by the Ponemon Institute reveals that there is still a lot of room for improvement

The Importance of Cyber Threat Intelligence to a Strong Security Posture (Ponemon Institute) Does access to timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks? Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard?

Incident Response: Failure to Plan is a Plan to Fail (Dark Matters) I've been thinking a lot about the last several "panic patch" cycles. You know, Heartbleed, Bash bug and others which became nightmares for security organizations due to the pervasiveness of the issues and the fact that security teams simply didn't know the extend of the potential damage

Cyber-Security Teams: No Rest for the Wary (Baseline) Today's IT security teams face a constant and evolving barrage of threats that force them to assess their security policies and procedures on an ongoing basis

The Clinton email brouhaha and information governance (TechTarget) Hillary Clinton's use of a personal email account raises information governance issues that need to be addressed

How hard is it to permanently delete data? (GCN via Forensics Magazine) The controversy surrounding former Secretary of State Hillary Clinton's email has brought data destruction to the forefront of the national conversation. Clinton used a server housed at her New York residence for her personal and official emails and online communications while she was at Foggy Bottom Lawmakers investigating the 2012 death of an ambassador in Libya have been concerned that official government emails from Clinton that might assist in the investigation were deleted despite assurances from Clinton that she turned over all emails pertaining to government work to the State Department

PCI Compliance: What It Means to Your Digital Security (Business.com) Given the internet data breach culture we've been indoctrinated into over the past few years, I need not tell you that PCI compliance is a hot issue in the world of credit card processing

Corporate Security Checklist — a CEO's Guide to Cyber Security (Heimdal Blog) Have you ever wondered if you, as a manager, CEO or investor are prepared to deal with a cyber security failure in your organization? Are there all the necessary systems in place? Do you have enough resources and is there enough careful planning to keep any attack from interrupting your company's activity and causing it financial or reputation damage?

Six ways to backup your data (We Live Security) Today is World Backup Day, and it goes without saying that backing up data is a thoroughly sensible thing to routinely get into the habit of doing

Design and Innovation

Deconstruct websites, get hired: hiding recruitment messages in source code (Troy Hunt) The other day I did a security workshop at a firm here in Sydney and one of the things we did was a proxy a bunch of traffic and inspect what was going on behind the scenes. Among the expected hilarity that always ensues from these sorts of exercises (you can find heaps more of this in my Hack Your API First course), one of the guys at the event found this in the response headers of Airbnb

Research and Development

Quantum-Safe Cryptography. What is it and why should you care? (ID Quantique) Mankind's demand for faster, more powerful computers shows no signs of abating. The rise and rise of big data applications begets faster computers and Moore's Law seems as valid an observation now as it was fifty years ago

Legislation, Policy, and Regulation

S. Korea creates cyber-security post to counter North's threat (Agence France-Presse via the Jakarta Post) Concerned by the growing threat of cyber-attacks from North Korea, South Korea's cabinet on Tuesday approved the creation of a new presidential post handling cyber-security

Taiwan: Reinforcement of Cyber Security New Priority (Unrepresented Nations and Peoples Organization) Taiwan has expressed willingness to strengthen its cyber security ties with the United States. On 30 March 2015 Vice Premier Simon Chang mentioned Taiwan's desire to be included in the biennial US Cyber Storm drill, as Taiwanese systems are constantly being targeted by Chinese hackers accused of committing cyber theft

Obama declares cyberattacks a 'national emergency' (The Hill) President Obama declared Wednesday that the rising number of cyberattacks against the United States is a national emergency, and issued an executive order that would sanction those behind the attacks

U.S. establishes sanctions program to combat cyberattacks, cyberspying (Washington Post) President Obama on Wednesday signed an executive order establishing the first sanctions program to allow the administration to impose penalties on individuals overseas who engage in destructive attacks or commercial espionage in cyberspace

"We can't address cyber threats in isolation", chief lawyers of top companies agree (Forbes) As the frequency and severity of cyber attacks accelerate, both the government and the business community are increasingly willing to acknowledge that they are not in a position to tackle these threats alone. The need for collaboration between government and industry to enhance cyber resilience was emphasized by President Obama at a recent cybersecurity summit and echoed by leaders in the business and non-profit sectors

Air Force stands up Task Force Cyber Secure (AFNS) Chief of Staff of the Air Force General Mark A. Welsh III signed a memorandum on March 20, establishing Task Force Cyber Secure, to address challenges of the cyberspace domain in synchronization, operations and governance within the Air Force and with those organizations it supports

Rapid-Equipping, Asymmetric Groups To Remain (Defense News) Two organizations built for the wars in Iraq and Afghanistan — the Rapid Equipping Force (REF) and the Asymmetric Warfare Group (AWG) — will not fold, but instead endure as part of the Army's Training and Doctrine Command (TRADOC)

Litigation, Investigation, and Law Enforcement

5 Breach Lawsuits Filed Against Premera (HealthcareInfoSecurity) Meanwhile, health insurer provides answers to Congress

Premera lawsuits prolong cybersecurity nightmare (FierceHealthIT) Premera CEO Jeffery Roe: 'Exfiltration of information from systems' has not been found

MasterCard Says Nike Reconfigured Its Network Using 'Confidential Information' (Wall Street Journal) MasterCard International Inc.MA -1.46% filed new charges in its breach of contract lawsuit against Nike Inc.NKE -0.56% and two former information security employees, claiming ongoing IT damage at the credit card company

Feds subpoena Reddit for personal info of dark web forum members (Naked Security) US federal agents want Reddit to rat out five prominent Redditors active in the 'Darknet Markets' subreddit

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Michgan InfraGard 2015 Great Lakes Regional Conference: Securing Our Critical Infrastructures (Novi, Michigan, USA, May 14, 2015) Learn all about the risks to critical infrastructures and key resources and the efforts underway to protect them. Private and public sectors will be represented. The conference will include four breakout...

VB2015 (Prague, Czech Republic, September 30 - October 2, 2015) The VB2015 programme includes 38 papers on a wide range of security topics. As in previous years, the presentations will run in two parallel streams and the programme includes both technical and less technical...

Upcoming Events

Automotive Cyber Security Summit (Detroit, Michigan, USA, March 30 - April 1, 2015) The debut Automotive Cyber Security Summit will bring together CTOs, CSOs, Engineers and IT professionals from GM, KIA, Nissan, Bosch, Qualcomm and more for three days of case studies, workshops, panel...

Kansas City Secure World (Kansas City, Missouri, USA, April 1, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Cyber Insurance and Corporate Governance: Facing New Threats (Brooklyn, New York, USA, April 2, 2015) Peter D. Hancock, president and CEO of AIG, will lead a discussion of the ways in which the insurance industry is adapting to account for threats to the most valuable — and vulnerable — assets...

Coast Guard Intelligence Industry Day (Chantilly, Virginia, USA, April 2, 2015) With a blended focus of defense, homeland security, law enforcement, criminal investigations, intelligence and cyber issues, Coast Guard Intelligence is aggressively looking to collaborate with partners...

Centers for Medicare and Medicaid Services (CMS) CISO Security & Privacy Forum (Woodlawn, Maryland, USA, April 7, 2015) The CISO Security & Privacy Forum is hosted by the Information Security Privacy Group (ISPG) at CMS. The Vision for ISPG is to provide leadership to CMS in managing information security and privacy risks...

10th Annual Cyber and Information Security Research Conference (Oak Ridge, Tennessee, USA, April 7 - 9, 2015) Cyberspace is fundamental to our national prosperity, as it has become critical to commerce, research, education, and government. Realizing the benefits of this shared environment requires that we are...

Cyber Risk Wednesday: The future of Iranian cyber threat (Washington, DC, USA, April 8, 2015) Join the Atlantic Council's Cyber Statecraft Initiative on April 8, from 4:00 p.m. to 5:30 p.m. for a panel discussion on the Iranian cyber threat and the potential for a drastic escalation of cyber conflicts...

Cyber Threats Masterclass (Turin, Italy, April 9 - 11, 2015) The United Nations Interregional Crime and Justice Research Institute (UNICRI) is organizing two new courses on emerging threats towards states and citizens with the aim of promoting an in-depth knowledge...

InfoSec Southwest 2015 (Austin, Texas, USA, April 10 - 12, 2015) InfoSec Southwest is an annual information security and hacking conference held in Austin, Texas, one of the most interesting and beautiful cities in the United States. By addressing a broad scope of subject-matter,...

Cybergamut Tech Tuesday: Tor and the Deep Dark Web (Elkridge, Maryland, USA, April 14, 2015) This talk will explore the use of Tor and how it relates to garnering useful intelligence. Distinguishing attribution or valuable intelligence from limited event data is difficult. Leveraging external...

NIST IT Security Day (Gaithersburg, Maryland, USA, April 8, 2014) The Office of the Chief Information Officer, OCIO, is hosting NIST IT Security Day as a means to heighten awareness for all NIST users on the many aspects of operational information technology security...

Cyber Security Summit: Industrial Sector & Governments (Prague, Czech Republic, April 14 - 15, 2015) Cyber Security Summit Europe — Industrial Sector & Governments brings together cyber security experts who will share their skills and know-how needed to address highly topical issues such as state-sponsored...

Cyber Security Summit: Financial Services (Prague, Czech Republic, April 14 - 15, 2015) Cyber Security Summit Europe — Financial Services brings together cyber security experts across the financial sector to discuss topical security vulnerabilities as well as bring forward effective...

INTERPOL World 2015 (Singapore, April 14 - 16, 2015) INTERPOL World is a new biennial international security trade event which will bring police and other law enforcement agencies together with security solution providers and security professionals from...

Mid-Atlantic ISSA Security Conference 2015 (Gaithersburg, Maryland, USA, April 15, 2015) Meeting at the NIST campus, this all-day event, jointly hosted by the ISSA Baltimore, DC, and Northern Virginia chapters, will have 3 concurrent tracks of security professionals discussing the current...

Symantec Government Symposium: Secure Government: Manage, Mitigate, Mobilize (Washington, DC, USA, April 15, 2015) The annual Symantec Government Symposium is a one-day event attracting 1,500 government IT security and management professionals. The event is designed to facilitate peer-to-peer dialogue on the challenges...

Proposer's Day Conference for the Scientific advances to Continuous Insider Threat Evaluation (SCITE) program (Washington, DC, area, April 16, 2015) The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers' Day conference for the Scientific advances to Continuous Insider Threat Evaluation (SCITE) program, in anticipation of...

IIT Cyber Forensics and Security Conference and Expo (Wheaton, Illinois, USA, April 17, 2015) All are invited to participate in this multi-track, technical conference that attracts more than 200 professionals, 50 speakers, 20 sponsors, for an intensive one and a half day schedule that includes...

RSA Conference 2015 (San Francisco, California, USA, April 20 - 24, 2015) Don't miss this opportunity to join thousands of industry professionals at the premier information security event of 2015

Australian Cyber Security Centre Conference (Canberra, Australia, April 22 - 23, 2015) The Australian Cyber Security Centre (ACSC) will be hosting its first cyber security conference in 2015. We are bringing leading cyber security experts from Australia and abroad to share their expertise.

Security Forum 2015 (Hagenberg im Mühlkreis, Austria, April 22 - 23, 2015) The Security Forum is the annual IT security conference in Hagenberg that addresses current issues in this domain. Visitors are offered technical as well as management-oriented talks by representatives...

CyberTexas / CyberIOT (San Antonio, Texas, USA, April 23 - 24, 2015) CyberIOT — Securing the Internet of Things. As more everyday devices become connected to the internet, the need for securing those items becomes critical. CyberTexas will explore the intersection...

Defensive Cyberspace Operations & Intelligence Conference & Exhibition (Washington, DC, USA, April 27 - 28, 2015) The 5th Annual Defensive Cyberspace Operations & Intelligence (DCOI) conference & exhibition is an Israeli-American partnership promoting the extraordinary developments in the technological, intelligence...

INTEROP Las Vegas (Las Vegas, Nevada, USA, April 27 - May 1, 2015) Attend Interop Las Vegas, the leading independent technology conference and expo designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities,...

2015 Synergy Forum (Tysons Corner, Virginia, USA, April 30, 2015) The 2015 Synergy Forum brings together government and industry practitioners driving our collective technology futures. This event is multi-disciplinary, examining the emerging fusion of physical and digital...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.