skip navigation

More signal. Less noise.

Daily briefing.

German media report allegations that the country's Bundesnachrichtendienst (BND) collected information on European firms (to determine whether they were violating sanctions), the French government, and the European Commission. The collection was allegedly done in partnership with the US NSA. The Bundestag is investigating; the BND denies misleading the government about its activities.

CareerBuilder appears to have been used as a phishing platform. Employers rather than job-seekers seem to have been the target, with rootkits hidden within résumés.

High-Tech Bridge claims to have found a cross-site-scripting vulnerability in a widely used WordPress e-commerce plug-in.

Researchers find malware authors evading signature-based detection (popular in the cloud) by promulgating versions of malicious code with minor variations.

Several banks are reported still vulnerable to the long disclosed and widely discussed POODLE bug.

Human suffering — in this case that caused by earthquakes in Nepal — draws exploitation by the usual creeps, now phishing with bogus appeals for quake relief donations. Donate with caution and help the victims without enriching the crooks.

Worries about aviation cyber security and safety continue. A study of drone vulnerability to hacking holds lessons for avionics generally (as well as for the Internet-of-things), and a glitch in American Airlines pilots' iPads delayed a number of flights on Tuesday. Airlines of course also remain targets of conventional cyber crime: Ryanair's bank accounts were recently raided of some $5 million.

Denial-of-service trends show the increasing importance of networked IoT devices.

FireEye gets US SAFETY Act certification, a first for cyber products.

Egypt increases censorship.


Today's issue includes events affecting Canada, China, Czech Republic, Egypt, European Union, France, Germany, Ireland, Israel, Philippines, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

German BND spy agency 'helped US target France' (BBC) Germany's national intelligence agency, the BND, spied on top French officials and the EU's headquarters on behalf of US intelligence, German media report

German government denies misleading lawmakers in spy probe (AP via Yahoo!News) Senior German officials pledged Wednesday to cooperate with lawmakers probing claims of wrongdoing by the country's foreign intelligence agency and insisted that Parliament hadn't been misled about what the government did and didn't know of U.S. spying activity in Europe

Kaspersky Lab expert: Philippine agencies among victims of global cyberespionage groups (Tempo) The Philippine government is among the nations that have been hit by two recently discovered cyberespionage groups that target the Asian region, according to Kaspersky Lab

CareerBuilder listings used as Phishing platform (CSO) Malicious job applicants posted rootkits instead of résumés

5,000+ e-commerce sites at risk due to buggy WordPress plugin (Help Net Security) A popular WordPress e-commerce plugin that is actively used on over 5,000 websites contains high-risk vulnerabilities that can be exploited to compromise customers' data, execute arbitrary PHP code, and perform Cross-Site Scripting attacks against users of WordPress installations, claim High-Tech Bridge researchers

Malware remodeled: New tricks, new suits slamming enterprise resources (CSO) It's bad, but how bad is it?

Barclays, Halifax and Tesco banks still vulnerable to POODLE attack (Graham Cluley) Ruh roh. Remember the POODLE vulnerability (aka "the poodle bug")?

Nepal Earthquake Disaster Email Scams (US-CERT) US-CERT would like to warn users of potential email scams regarding the earthquake in Nepal. The scam emails may contain links or attachments that may direct users to phishing or malware infected websites. Phishing emails and websites requesting donations for fraudulent charitable organizations commonly appear after these types of natural disasters

Macro malware attacks on the rise, says Microsoft (We Live Security) Macro malware attacks are on the rise, particularly in the United States and the United Kingdom, Microsoft has reported in a blog post

Hackers steal $5 million from Ryanair's bank account (Hot for Security) All of us dread the prospect of having our personal bank accounts hacked

iPad crash grounds dozens of American Airlines flights (Naked Security) Dozens of American Airlines flights were grounded on Tuesday night when pilots' iPads abruptly crashed — or, in the words of one passenger who quoted a pilot, "stopped working"

Blackmail Lists? Bribery? Why Background Check Files Keep Getting Hacked (Nexgov) Newly revealed information about how hackers broke into a company conducting millions of background investigations on national security employees shows the lengths to which attackers are willing to go to steal U.S. secrets

How To Hack a Military Drone (Defense One) Recent published research has given hackers a manual for breaking into unmanned systems, according to an Israeli defense company

Cybersecurity in cars: Are we at risk? (Crain's Detroit Business) Today's connected cars provide innovative technologies to interact between drivers, their devices, and their cars. While these new technologies provide convenient opportunities for car companies and their customers, they also expose them to cybersecurity breaches

Attacks on Crown Jewels: SAP Vulnerabilities and Exploits (RSA Conference 2015) SAP has released 3300+ security patches to date. In 2014 alone, 391 were released — averaging 30+/month. Over 46 percent of them were ranked as "high priority"

Alert (TA15-119A) Top 30 Targeted High Risk Vulnerabilities (US-CERT) Systems Affected: Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL. Overview: Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of targeted attacks are preventable

The NSA, Surveillance, And What CIOs Need To Know (InformationWeek) At the Interop Keynote, things get frightening as the EFF's Kurt Opsahle recounted the NSA surveillance history

Security Patches, Mitigations, and Software Updates

Swisscom CSIRT Advisory (Intelligent Exploit) A vulnerability has been discovered that affects the certificate verification functions provided by the HNDS service found on the Centro Grande (ADB version) DSL routers of Swisscom

Google unveils Password Alert Chrome extension, an early warning system against phishing attacks (Naked Security) Google has announced the release of a new browser extension designed to protect its users from phishing attacks

Lenovo banishes 'Superfish' adware for good with new backup recovery tool (TechWorld) Lenovo in February admitted to preloading Superfish on some consumer notebooks, and now the company has taken steps so the dangerous adware doesn't reappear when users reinstall Windows

Apple bans watch apps from Apple Watch (Naked Security) You've heard of Catch-22. Now meet Clause 10.7!

Cyber Trends

Warnings of hackers on planes all too familiar to airline security researchers (Christian Science Monitor Passcode) Fresh government reports and alerts about the hacking threat to airplane avionics systems underscores the challenges facing industry and government as more critical infrastructure becomes Internet connected

Secunia: Unpatched OSes on the Rise (Infosecurity Magazine) The number of users with unpatched operating systems rose in the US and UK over the past quarter, with Adobe Flash Player and Oracle Java continuing to expose PC users to security risks, according to Secunia

High volume DDoS attacks still persistent (Help Net Security) Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally

One in five DDoS attacks go on for multiple days (ITProPortal) DDoS (distributed denial-of-service) attacks can be very prolonged affairs, the latest research from security firm Kaspersky (and B2B International) points out

The Hackers' New Weapons: Routers and Printers (MIT Technology Review) Home and office routers and printers are being hijacked by criminals to help them overwhelm websites with traffic

Networked Devices Fueling Rise in DDoS Reflection Attacks (Dark Matters) Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques

Threats on government networks remain undetected for 16 days (Help Net Security) Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected — hiding in plain sight


Cyber-insurer 'disturbed' by remarks in CRN debate (CRN) CFC Underwriting hits back at claims that cyber-liability insurance 'not worth paper it's written on'

These 5 Companies Are Growing as Large as the Online Security Threat (Entrepreneur) As our society becomes more technologically advanced, so do the accompanying cyberspace security threats. Online protection is more important now than ever, especially after a year of high-profile hacks on major companies across North America. So, how can you ensure your company, and your customers, stay safe in an increasingly risky online world?

The Unfortunate Growth Sector: Cybersecurity (ICIT: Cyber War Desk) In 2012, a computer virus known as Shamoon wiped the hard drives on tens of thousands of computers belonging to Saudi Aramaco, Saudi Arabia's oil & gas behemoth, and left a burning American flag on screens of the infected devices

Government Hacks Highlight BlackBerry's Value (Seeking Alpha) BlackBerry is a buy; we believe it's in the midst of a major turnaround. This weekend's article about Russian hackers penetrating the president's e-mail is a stark highlight of BlackBerry's benefits. Using a sum-of-the-parts valuation, we believe BlackBerry is worth $16-20 today

Check Point turns to mobile following Lacoon buy (Computer Business Review) Predicted portfolio expansion comes amid new dangers in cybersecurity

US Army awards global intelligence support services contract to CACI (Army Technology) CACI International has been selected as a prime contractor to provide intelligence support to the US Army Intelligence and Security Command (INSCOM)

Bank of England approves BAE Systems for financial sector cyber security testing (V3) BAE Systems has been awarded official approval under the Bank of England's CBEST security testing framework for helping banks to boost cyber defences

UBS Exec Tweets Cryptic Crypto Job Ad (Wall Street Journal) The head of UBS UBSN.EB -0.53%'s new financial technology lab is employing the same approach used by the NSA to recruit bright, tech-literate minds

FireEye First Cyber Security Company Awarded SAFETY Act Certifications by Department of Homeland Security (MarketWatch) Company's MVX and DTI technologies are the only cyber security products, technologies or services to ever earn certification under DHS program

Why the challenge of protecting ourselves online can be a huge opportunity for Wales (Wales Online) One of Wales top computer scientists, Professor Khalid Al Begain, writes for WalesOnline to coincide with the first cyber-security summit being held at the Celtic Manor

Kirk Borne Joins Booz Allen as Principal Data Scientist (GovConWire) Kirk Borne, a tenured professor of astrophysics and computational science at George Mason University, has joined Booz Allen Hamilton (NYSE: BAH) as a principal data scientist with the company's strategic innovation group

Products, Services, and Solutions

How the top social networks compare on privacy — in one handy chart (ITworld via CSO) Not all privacy settings are created equal. Here's an in-depth look at what Facebook, Twitter, LinkedIn and Google+ offer users

Report: 15 solutions achieve VBSpam award (Virus Bulletin) Test process also uncovers job spam illustrative of trend. Last week, we published our 36th comparative anti-spam test. All but one of the 16 participating full solutions achieved a VBSpam award, all blocking a large percentage of spam, while blocking very few legitimate emails

Cisco adds policy-based security to ACI platform (TechTarget) Cisco blends threat protection to its ACI portfolio to enable security policies

Technologies, Techniques, and Standards

Why you should steer users towards less predictable passwords (Help Net Security) As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, password crackers (and penetration testers) must wisely choose which type of password attack to try first, second, and so on

Interviews 2015: Mattia Epifani, CEO, Reality Net (Forensic Focus) At DFRWS yesterday you gave a talk about Tor forensics on Windows. Could you briefly outline some of the main challenges associated with Tor forensics for our readers?

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics (Forensic Focus) Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person's voice, a so-called "voiceprint." Sometimes, a person's voice is the only clue that police and forensic teams have to go on

Design and Innovation

Microsoft Awarded Patent for Emotion Detecting Eyeglasses (Wall Street Journal) The artificial-intelligence race could be heading back to the eyeglass shop

Research and Development

For Today's Cybersecurity Woes, Let’s Look Back to the R&D of Yesteryear (FedBizBeat) When President Kennedy said the United States was going to put a man on the moon, nothing was impossible. He was able to state that because the R&D community in the 1960s — government, academia and industry — was a tenacious bunch, dedicated to problem solving, unafraid of the risks they faced in figuring out how to make things work. They understood that experimentation does not have a guaranteed outcome and that the risk of a failed experiment was not a bad outcome, but an indicator of a new direction for the next round of experimentation

New Chips Could Patch the Military's GPS Vulnerability (Defense One) The Pentagon hopes that new location technology can ward off jammers and spoofers without breaking the bank


Brno university opens centre for cyber attack defence training (ČTK) Brno's Masaryk University (MU) has launched a training centre for experts to simulate serious cyber attacks and train defence against them, MU representatives told media Wednesday

ISU rolls out cybersecurity curriculum for Iowa schools (Des Moines Register) As major data breaches at companies like Target and Anthem take center stage, Iowa State researchers are rolling out lesson plans and materials for Iowa teachers to educate their students about computer security

Kelowna Student Chosen Out of Hundreds to Attend Unique Program (KelownaNow) A Kelowna student has been selected out of hundreds of applicants to attend a prestigious event at the University of Waterloo

Legislation, Policy, and Regulation

Opinion: Egypt's cybercrime bill poses threat to freedom of expression (Christian Science Monitor Passcode) The draft law gives Egyptian authorities more power to control the Internet under the pretext of national security, leading the way to censorship of online news, cultural and political sites, and controversial views on the Web

Amos Yadlin: Cyber-defense includes cyber attack (Globes) The former IDF Intelligence Chief said that the US and Israel must increase collaboration on cyber-defense strategies

OVERNIGHT CYBERSECURITY: Congress unmoved on encryption (The Hill) TELL IT TO THE NSA: Lawmakers seemed unmoved Wednesday by a law enforcement plea for help accessing encrypted devices

The good, bad, and the ugly of pending congressional surveillance bills (Ars Technica) Heat is on: Bulk phone metadata collection program Snowden exposed expires June 1

Litigation, Investigation, and Law Enforcement

OFAC! An acronym that cybersecurity professionals need to know (We Live Security) Calling all CISOs and CISSPs, all of you CCNAs, GIACs and CEHs: do you need another acronym to remember, along with HIPAA, FISMA, COBIT, GLBA, FERPA and PCI? Probably not! But try this one on for size: OFAC, as in Office of Foreign Assets Control. Let's allow their website to describe what this office does and then I will explain how it relates to cybersecurity

No Mistake About it: The Important Role of Antitrust in the Era of Big Data (Antitrust Source) Competition authorities in Europe (and to a lesser extent in other jurisdictions) are beginning to make data, its uses, and its implications for competition law, a key focus. Some, however, argue that competition law has a limited role to play in the era of big data. We respectfully disagree. Competition law will play an integral role to ensure that we capture the benefits of a data-driven economy while mitigating its associated risks

Preet Bharara: 'No one is safe from cyber threats' (SI Live) According to Preet Bharara, U.S. attorney for the Southern District of New York, no business is safe from cyber threats

FBI helping Rutgers investigate disruptive cyber attack ( Federal authorities are assisting Rutgers University in its search of the source of the cyber attacks that have disrupted campus internet services since Monday

Hollywood gets Piracy app Popcorn Time blocked in the UK (Naked Security) The UK High Court has ordered internet service providers (ISPs) to block Popcorn Time, a piracy app that's as easy to use as Netflix

Visa won't budge on fraud liability shift deadline (FierceRetailIT) Visa has no intention of extending the October fraud liability shift deadline for EMV chip cards

Bankruptcy judge approves RadioShack data auction, but not sale (FierceRetailIT) A Delaware bankrutpcy judge has agreed to approve bidding procedures for the sale of RadioShack's intellectual property, which includes millions of customers' data. He has not promised to approve the sale itself, should a bid be accepted

Interview with Francesca Bosco, UNICRI Project Officer and speaker at the Honeynet Workshop 2015 (Honeynet Project) Francesca Bosco earned a law degree in International Law and joined UNICRI in 2006 as a member of the Emerging Crimes Unit. She is responsible for cybercrime prevention projects, and in conjunction with key strategic partners, has developed new methodologies and strategies for researching and countering computer related crimes

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

ACM-CCS (Conferences on Computer and Communications Security) (Denver, Colorado, USA, October 12 - 16, 2015) ACM-CCS is one of the longest running cyber security conferences in the world. It's been going on since 1993, and this year it will celebrate its 22nd edition. This flagship conference brings together...

Swiss Cyber Storm (KKL Lucerne, Switzerland, October 21, 2015) Swiss Cyber Storm 2015 is an international IT security conference that provides essential information about national cyber security issues, critical for both government and private infrastructures. The...

ICS Cyber Security Week (Atlanta, Georgia, USA, October 26 - 29, 2015) ICS Cyber Security Week is the longest-running cyber security-focused conference dedicated to the industrial control systems sector. The event caters to critical infrastructure organizations in the following...

Upcoming Events

INTEROP Las Vegas (Las Vegas, Nevada, USA, April 27 - May 1, 2015) Attend Interop Las Vegas, the leading independent technology conference and expo designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities,...

INFWARCON (Nashville, Tennessee, USA, April 28 - 30, 2015) INFWARCON takes a look at how the balance has flipped in the past 20 years in the cyber security industry. Back then, governments had the upper hand, and could not imagine that cyber criminals could ever...

Southern Africa Banking and ICT Summit (Lusaka, Zambia, April 30, 2015) The South Africa Banking and ICT Summit is the exclusive platform to meet industry thought leaders and decision makers, discover leading edge products and services and discuss innovative strategies to...

2015 Synergy Forum (Tysons Corner, Virginia, USA, April 30, 2015) The 2015 Synergy Forum brings together government and industry practitioners driving our collective technology futures. This event is multi-disciplinary, examining the emerging fusion of physical and digital...

WAHCKon Perth 2015 (Perth, Western Australia, Australia, May 2 - 3, 2015) WAHCKon is a Perth based hacker conference that launched in 2013. We cover a wide range of topics focusing on Information security and Hacker subculture as well as locksports, activism and related areas...

Cloud Security Alliance Federal Summit (Washington, DC, USA, May 5, 2015) The Cloud Security Alliance Federal Summit, is a one day free-for-government event taking place at the Ronald Reagan Building and International Trade Center and is expected to draw 250 information security...

Amsterdam 2015 FIRST Technical Colloquium (Amsterdam, the Netherlands, May 5 - 6, 2015) FIRST Technical Colloquia & Symposia provide a discussion forum for FIRST member teams and invited guests to share information about vulnerabilities, incidents, tools and all other issues that affect the...

AFCEA Defensive Cyber Operations Symposium (Baltimore, Maryland, USA, May 5 - 7, 2015) The U.S. Defense Information Systems Agency's new operational role in the cyber domain as network defender creates a formal relationship between DISA, U.S. Cyber Command and the command's military service...

California Cybersecurity Task Force Quarterly Meeting (Walnut Creek, California, USA, January 20, 2015) The California Cyber Security Task Force serves as an advisory body to California's senior government administration in matters pertaining to Cyber Security. Quarterly Cybersecurity Task Force meetings...

DaytonDefense Ohio Cyber Dialogue with Industry Conference (Dayton, Ohio, USA, May 6 - 7, 2015) Our Cyber Security conference presents how Cyber Security affects you as an individual, your company, and your nation, along with business opportunities in this growing area. You will walk away with an...

Suits and Spooks London (London, England, UK, September 12, 2014) On September 12th, in London's South bank neighborhood of Southwork, approximately 50 former intelligence officials, corporate executives, and security practitioners from the U.S. and the EU will gather...

Fraud Summit London (London, England, UK, May 7, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the London event include...

Apple Security Talks & Craft Beer (Laurel, Maryland, USA, May 8, 2015) The world's first security summit held at a production brewery. Join some of the world's best Apple security researchers as they talk about iOS, OS X, Apple hardware and other Apple-related security topics...

DzHack Event 2015 (Ben Aknoun, Algiers, Algeria, May 9, 2015) DzHackEvent is a security event will contain conferences, workshops, and a challenge (CTF). Aiming to bring together security professionals, students, searcher, ethical hacker enthusiasts or simply technology...

12th CISO Summit & Roundtable Geneva 2015 (Geneva, Switzerland, May 11 - 13, 2015) The 12th CISO Summit will give you direct insights from Europe's most experienced CISOs, you will get the latest top hot buttons and focuses from other CISOs for the coming 5 years — shared predictions...

NG Security Summit (San Antoino, Texas, USA, May 11 - 13, 2015) The NG Security Summit bringx together more than sixty-five relevant CISOs from the private and public sector for a high level summit where they will workshop to benchmark, identify, and tackle key challenges.

Cybergamut Tech Tuesday: An Hour in the Life of a Cyber Analyst (Hanover, Maryland, USA, May 12, 2015) This hands-on workshop will demonstrate how easy it is for a breach to occur by analyzing a virtualized web server environment. Participants will use open source tools such as port scanners and protocol...

MCRCon (Ypsilanti, Michigan, USA, May 12, 2015) Please join the Michigan Cyber Range for the third annual MCRCon cybersecurity conference. MCRCon 2015 will focus on hacking prevention, incident handling, forensics and post-event public relations. MCRCon...

Houston Secure World (Houston, Texas, USA, May 13, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

QuBit 2015 Cybersecurity Conference (Prague, Czech Republic, May 13 - 15, 2015) QuBit brings together top experts and leaders in the field, from the private sector, to academia, to government. The main topics this year are APTs, the Internet of Things, and Digital Forensics, which...

Michgan InfraGard 2015 Great Lakes Regional Conference: Securing Our Critical Infrastructures (Novi, Michigan, USA, May 14, 2015) Learn all about the risks to critical infrastructures and key resources and the efforts underway to protect them. Private and public sectors will be represented. The conference will include four breakout...

THOTCON 0x6 (Chicago, Illinois, USA, May 14 - 15, 2015) THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a hacking conference based in Chicago IL, USA. This is a non profit non-commercial event looking to provide the best conference possible...

International Conference on Cyber Security (ICCS) 2015 (Redlands, California, USA, May 16 - 17, 2015) The ICCS 2015 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with CYBER SECURITY.

FS-ISAC & BITS Annual Summit (Miami Beach, Florida, USA, May 17 - 20, 2015) The Financial Services Information Sharing and Analysis Center (FS-ISAC), is a non-profit association comprised of financial institution members, that is dedicated to protecting the global financial services...

2015 Cyber Risk Insights Conference — Chicago (Chicago, Illinois, USA, May 18, 2015) Advisen again brings its acclaimed Cyber Risk Insights Conference series to Chicago with a full-day event addressing the critical privacy, network security and cyber insurance issues confronting risk professionals...

IEEE Symposium on Security and Privacy (San Francisco, California, USA, May 19 - 22, 2013) Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers...

Fraud Summit Chicago (Chicago, Illinois, USA, May 19, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the Chicago event include...

NCCOE Speaker Series: The Cyber Danger: Problems of Strategic Adaptation (Rockville, Maryland, USA, May 20, 2015) Lucas Kello (Senior Lecturer in International Relations / Director of Cyber Studies Program, Oxford University, and Associate of the Science, Technology & Public Policy Program, Belfer Center for Science...

3rd Annual Georgetown Cybersecurity Law Institute (Washington, DC, USA, May 20 - 21, 2015) In 2015, it is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity. Those lawyers who ignore cyber threats are risking...

AFCEA Spring Intelligence Symposium 2015 (Springfield, Virginia, USA, May 20 - 21, 2015) The Symposium will be a one-of-a-kind event designed to set the tone and agenda for billions of dollars in IC investment. Leaders from all major IC agencies, from the ODNI, IARPA, and the National Intelligence...

SOURCE Conference (Boston, Massachusetts, USA, May 25 - 28, 2015) SOURCE is a computer security conference happening in Boston, Seattle, and Dublin that is focused on offering education in both the business and technical aspects of the security industry. The event's...

7th International Conference on Cyber Conflict (Tallinn, Estonia, May 26 - 29, 2015) CyCon is the annual NATO Cooperative Cyber Defence Centre of Excellence conference where topics vary from technical to legal, strategy and policy. The pre-conference workshop day, 26 May, features a variety...

HITBSecConf2015 Amsterdam (De Beurs van Berlage, Amsterdam, The Netherlands, May 26 - 29, 2015) This year's event will feature a new training courses. Keynote speakers include Marcia Hofmann and John Matherly. To encourage the spirit of inquisitiveness and innovation, Haxpo will showcase cutting...

1st Annual Billington Corporate Cybersecurity Summit (New York, New York, USA, May 27, 2015) Join Billington CyberSecurity's unparalleled network of cybersecurity professionals as they provide hard-earned insights and education to a high level and exclusive group of attendees from the corporate...

Atlanta Secure World (Atlanta, Georgia, USA, May 27 - 28, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry...

Techno Security & Forensics Investigations Conference (Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Seventeenth Annual International Techno Security & Forensics Investigations Conference will be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises...

Mobile Forensics World (Myrtle Beach, South Carolina, USA, May 31 - June 3, 2015) The Eighth Annual Mobile Forensics World will also be held May 31 ? June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. The Mobile Forensics World is specifically dedicated to Federal, State...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.