skip navigation

More signal. Less noise.

Daily briefing.

Fallout from, and investigation of, Friday's horror in Paris dominate the day's news.

ISIS praised the attackers' piety and so forth, but the communiqués it posted to the Internet (for the most part to its Al-Hayat media center) were thin on the sort of detail normally associated with claims of responsibility for an operation — noms de guerre, interviews, pre-attack glamor shots, etc.

ISIS sympathizers don't stint on praising the murderers in social media. Al-Hayat, the source of most ISIS commentary on the attacks, moved to a new dark web site over the weekend, but this seems more an attempt to avoid being shut down than it is an attempt to escape law enforcement attention.

The attacks are seen as mixing a high degree of coordination (more associated with Al Qaeda than its rivals in ISIS) with ISIS's characteristic decentralized inspiration — thus, regional coordination and control, international inspiration. This leads some to conclude that ISIS's followers may be running ahead of their nominal masters, and that the nominal masters may not be entirely pleased with this foreseeable development.

Belgian authorities think the attackers may have coordinated their activities using Playstation 4. Anti-ISIS hacktivists allege that the terrorists funded their operations with Bitcoins.

French police sweep up more than two hundred suspects, leading to speculation about why they weren't successful in preventing the attacks. But such speculation as always underestimates the difficulty of extracting signal from noise. Governments worldwide ramp up intelligence collection against ISIS. Anonymous promises to "hunt down" ISIS adherents.


Today's issue includes events affecting Australia, Belgium, Brazil, France, Germany, Iraq, Israel, Italy, New Zealand, Russia, Syria, United Kingdom, United States.

Cyber Attacks, Threats, and Vulnerabilities

After Paris, ISIS moves propaganda machine to Darknet (CSO) Daesh website launches with new video focusing on the Paris terror attacks, while the media pushes new fight on encryption

Islamic State Supporters 'Celebrate' Paris Attacks on Social Media (Newsweek) Supporters of the Islamic State (ISIS) militant group appear to be celebrating the ongoing attacks in Paris on Twitter

ISIL: Who's Calling the Shots? (Politico) Read the Islamic State's propaganda and you wonder if the followers might be getting ahead of their caliph

Paris attacks: Many arrested in raids across France (BBC) A total of 23 people have been arrested and dozens of weapons seized in a series of raids on suspected Islamist militants across France, officials say

What Paris Taught Us About the Islamic State (War on the Rocks) Before evening fell, last Friday seemed a good day in the fight against the Islamic State in Iraq and the Levant

Paris Attacks Show U.S., Allies Misjudged Islamic State (Wall Street Journal) No longer a regional threat, ISIS demonstrates a long and deadly reach

What We Know about the Paris Attackers (Newsweek) Updated On Friday eight attackers in different parts of Paris shot and killed 127 people in seemingly coordinated attacks. The act has since been claimed by extremist group the Islamic State, or ISIS, raising serious questions about the extent of extremist influence in France and the likelihood of further violence

Reports: Suspected mastermind of Paris attacks identified (USA Today) A French official identified the suspected mastermind of the attacks that killed 132 people in Paris on Friday as Belgian national Abdelhamid Abaaoud, according to media reports

French officials think as many as 20 plotters may be behind Paris attacks (Washington Post) European authorities staged an international manhunt Sunday for a 26-year-old "dangerous individual," one of three brothers involved in the deadly attacks on Paris, even as an image took shape of a larger network of terrorists that could involve as many as 20 plotters

Iraq warned of attacks before Paris assault (Military Times) Senior Iraqi intelligence officials warned members of the U.S.-led coalition fighting the Islamic State group of imminent assaults by the militant organization just one day before last week's deadly attacks in Paris killed 129 people

A French judge warned that France was ISIL's 'number one enemy' two months ago (Quartz) France is the number one enemy of ISIL, explained magistrate and antiterror expert Marc Trévidic to Paris-Match with chilling prescience back in September. Not the US, not the UK, not Turkey. France

If the French police are watching potential terrorists, why can't they stop them? (Quartz) A severed finger points to the difficulty that Paris faces after the terror attacks that killed more than 120 people on Friday

After Paris: More wiretaps of U.S.-based suspects (CNN) The FBI plans closer monitoring of suspected ISIS sympathizers, including more wiretaps, as a way to guard against potential threats in the U.S., after the Paris attacks, two U.S. law enforcement officials told CNN

Belgium's home affairs minister says ISIL communicates using Playstation 4 (Quartz) The day after terror attacks in Paris left at least 127 dead and some 300 wounded, attention has turned to Belgium

The media link the PlayStation 4 to terrorist attacks in Paris ( Graham Cluley) I've been reading stories all day that suggest that the terrorists who killed over 120 people in Paris and left hundreds injured might have used a PlayStation 4 gaming console to plot and plan their crime

Hacktivists claim ISIS terrorists linked to Paris attacks had bitcoin funding (Network World) Anti-ISIS hackers claimed to have detected indicators of an impending attack on Paris as well as bitcoin funding, a wallet with over $3 million, used by ISIS militants

Confessions of an ISIS Spy (Daily Beast) He joined the self-proclaimed Islamic State, trained jihadist infantry, and groomed foreign operatives — including a pair of Frenchmen. And now, Abu Khaled says he is ready to talk

Netanyahu Orders Israeli Security, Intel Agencies to Assist France in Wake of Paris Attacks (Haaretz) Israel stands 'shoulder to shoulder' with France in battle against terrorism, PM says; Israel asks French authorities to beef up security around Israeli and Jewish centers in France, will beef up security at its embassy

Paris attack: Co-ordinated nature of atrocity 'shows the fragility of free societies' (Independent) 'They are practising pure terror — I am afraid we may face something like this in the UK'

There Will Be Blood: Paris and the Future of Islamist Terrorism (Newsweek) For 14 years, Western intelligence officials have lived in fear of this moment

Countering the Terrorism Cyber-Threat (Info Security) The concept of cyber-terrorism, or extremists utilizing offensive cyber techniques, is one that gains wide publicity and grabs attention; but what is the reality of this threat?

Hacker Group Anonymous Announces 'Biggest Operation' Against ISIS After Paris Attacks (Newsweek) Hacker group Anonymous declared "total war" on the Islamic State (ISIS) extremist group on Sunday following the wave of attacks in Paris that killed at least 129 people and left dozens more in a critical condition

Facebook blocked anti-ISIS group setup by Anonymous hours before Paris attacks (Hack Read) Just hours before the Paris attacks, Facebook blocked a group "Report ISIS accounts" that was made by anonymous members for unmasking ISIS group members on Facebook.

Is cyber terrorism an imminent danger or merely Hollywood fiction? (Sydney Morning Herald) In August this year, as thousands of US punters prepared to wager their wallets on which horse would win a race called the $1 Million TVP Pacific Classic, online betting agency Xpressbet crashed and burned

US critical infrastructures are being targeted by actors in the Middle East — but attribution is difficult (Control Global: Unfettered Blog) Dewan Chowdhury of Malcrawler gave a presentation at the 15th ICS Cyber Security Conference on ICS honeypots

Brazilian Army Gets Hacked Following Cyber-Games Cheating Accusations (Softpedia) Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked the personal details of around 7,000 officers

Spring Social Library Grants Attackers Access to Your Private Accounts (Softpedia) A bug in the Spring Social Java library allows attackers to gain access to a victim's private account on websites with social sign-in (SSI) enabled, using the attacker's social account credentials

Magnitude Exploit Kit Activity Increases Via Malvertising Attacks (Malwarebytes Unpacked) During the past few days we have noticed a higher than usual number of malvertising attacks pushing the Magnitude exploit kit — which had been relatively quiet — to drop ransomware

FAKBEN Ransomware-as-a-service emerges from the underground (Security Affairs) FAKBEN is offering a professional Ransomware-as-a-service that relies on a new CryptoLocker ransomware which can be downloaded through the executable file

BadBIOS is back — this time on your TV (Naked Security) The Federal Trade Commission (FTC) is the offical consumer watchdog in the USA

Compromised Website Fools Security Vendor, Continues to Infect Users (Softpedia) Palo Alto Networks has taken a second look at an infection that affected a Chinese government website and has found out that, despite initial reports that said the malicious campaign stopped, the website managed to fool the security vendor that discovered it into thinking it was taken down

Researchers demonstrate various tricks to defeat self-encrypting drives (FireceCIO) Two researchers demonstrate how hackers can steal data from the self-encrypting drive of a running PC or one left in sleep mode

German ATM displays bank's network config data to infosec bod (Register) Not a planned hack — but still a massive fail

[Analysis] of a malicious Word document with an embedded payload (Internet Storm Center) This week, I was busy with an incident which involved an interesting malicious Word document

Global DDoS Threat Landscape Report (Information Security Buzz) Distributed denial of service (DDoS) attacks are a constantly evolving menace that threaten online businesses with downed websites

Qantas 737 "tailstrike" was caused by iPad data entry fail (Ars Technica) Copilot fat-fingered "6" instead of "7" on iPad app used to calculate takeoff speed

Failed Windows 3.1 system blamed for shutting down Paris airport (Ars Technica) And the people who understand the old operating system are all retiring

Bulletin (SB15-320) Vulnerability Summary for the Week of November 9, 2015 (US-CERT) The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week

Cyber Trends

Dissecting Data Breaches: Guard Your Devices Well (TrendLabs Security Intelligence Blog) In late September I published my research paper titled Follow the Data: Dissecting Data Breaches and Debunking the Myths that delved deep into the causes behind data breaches

Data breaches and bots are driving cybercrime surge (Help Net Security) From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter

Factors that influence breach costs (Help Net Security) A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to the SANS Institute. A lot of it depends on their preparedness, along with the types of data breached and scope of the breach

Despite Insurance, Companies Still at Risk for Financial Consequences of a Data Breach (LowCards) A recent study shows that even though many companies have purchased insurance to protect themselves from the financial consequences of a data breach, gaps remain that must be closed

Most companies 'unaware of cyber breach costs' (Voxy) Most New Zealand companies and organisations are unaware of the probability of and real cost of cyber security breaches, a New Zealand tech expert says

Email is more secure today than it was two years ago (Help Net Security) Google has partnered with University of Michigan and the University of Illinois, and they have been trying to discover, for the last couple of years, how email security has evolved

It's Way Too Easy to Hack the Hospital (Bloomberg Business) Firewalls and medical devices are extremely vulnerable, and everyone's pointing fingers

Participation low, often unhelpful in cyberthreat information-sharing (FierceHealthIT) A recent review of the HITRUST Cyber Threat XChange (CTX), set up in 2012 to speed up detection and response to cyberattacks, highlights how far the industry has to go to effectively share information on cybersecurity

Intel Security boss warns of deadly threats from the internet of things (Financial Review) As more home appliances begin syncing with smartphones and software-driven cars make their first appearances on Australia's roads, the global head of Intel's security division has warned of increased vulnerabilities that could ultimately put lives at risk


Small companies' big cyber risks highlighted at underwriting conference (Business Insurance) Small and medium-size businesses' lack of knowledge and resources to address their cyber risks can not only threaten their own existence, but also pose significant risks to the larger companies with which they deal, say experts

Opinion: For gender diversity in cybersecurity, fix the image problem (Christian Science Monitor Passcode) If we are failing to recruit women, we are failing to recruit people who could contribute to this field and help narrow the staffing gap — which is critical to stopping the onslaught of breaches

DoD Isn’t Just A Poor Buyer; It Is Also A Bad Customer (Lexington Institute) The focus of acquisition reform discussion has been on the image of the Department of Defense (DoD) as a bad buyer

Adding Some Volatility To The Cybersecurity ETF Trade (Fox Business) The PureFunds ISE Cyber Security ETF (HACK), the kingpin of cybersecurity exchange-traded funds, has, as of this writing, lost more than 5 percent since November 4

Is FireEye's Earnings Miss Really About [Fewer] Cyber Attacks? (PYMNTS) Last week cybersecurity firm FireEye not only fell short of investor expectations when their earnings were released, but the company also laid part of the blame for its disappointing results on the fact China is now playing nice, therefore causing "a reduction in the threat landscape"

CyberArk Distances Itself From FireEye as Stock Takes a Beating (BloombergBusiness) Try telling investors a dearth of high-profile data breaches won't hurt security software companies bent on eliminating cyber threats

RedSeal Named One of North America's Fastest Growing Companies on Deloitte's 2015 Technology Fast 500™ (Marketwired) RedSeal, the cybersecurity analytics company, today announced it was named to Deloitte's Technology Fast 500™, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America. RedSeal grew 137.4 percent during this period

Products, Services, and Solutions

CloudFlare attempts to spur DNSSEC adoption by offering it for free (FierceCIO) Content distribution network provider CloudFlare has rolled out its DNS Security Extensions service to its customers for free in an attempt to spur adoption

Microsoft releases encryption tech for bioinformatics (IT News) Allows researchers to work on data securely

Sicherheit für Stromnetze (Leadersnet) Im neuen hi!tech-Magazin zeigt Siemens, wie sich Energieversorger gegen Cyber-Kriminalität zur Wehr setzen können

Israeli cyber-security firm gets GE award for Internet technology (Times of Israel) ThetaRay to help protect data being processed on General Electric's cloud platform, Predix

Telstra first on board as Wynyard seals $3.2 million cyber solution deal (Reseller News) "ACTA will provide Telstra with a powerful intelligence and analytics platform"

Technologies, Techniques, and Standards

Key Reminders For Strong HIE Security (HealthITSecurity) With the continued push for interoperability, healthcare organizations must ensure they are adhering to all HIE security needs

In Memoriam: Goodbye to RC4, an Old Crypto Favorite (SecurityWeek) Misty-eyed old-timers are mourning the passing of one of the world?s most elegant encryption algorithms

Design and Innovation

Cryptography Pioneer Nick Szabo Touts Blockchain Tech's Security (CoinDesk) Smart contracts pioneer Nick Szabo has lauded the security benefits of decentralised monetary systems built using blockchain technology

Legislation, Policy, and Regulation

Norms of Cyber War in Peacetime (Lawfare) Cyber attacks regularly make the headlines. There have been military cyber attacks, like those used by Russia during its invasion of Georgia. Political cyber espionage such as the NSA programs revealed by Edward Snowden. And there has been state-backed economic cyber espionage, which topped the agenda during Chinese President Xi Jinping's visit to the United States in September.

The Inauguration of 21st Century Political Warfare: A Strategy for Countering Russian Non-Linear Warfare Capabilities (Small Wars Journal) Since the end of the Cold War, U.S. policy towards Europe has focused on fostering a "Europe whole and free," which is taken to mean a secure, prosperous, and culturally integrated community of nations, built on shared values of free and open societies, democratic governance and respect for human rights, and market-oriented economic policies

Britain to hire 2,000 new spies at MI5, MI6 and GCHQ in wake of the Paris terror attacks (Telegraph) The number of spies will rise by 15 per cent in what is expected to be the biggest expansion of the security services since the 7/7 terror attacks in London in July 2005

Turnbull orders rewrite of draft Australian cyber strategy (IT News) Exclusive: Release of key national security document pushed back again

Stalking apps are "perfectly legal" in US, but banning them won't be easy (Naked Security) US Senator Al Franken is introducing legislation to ban so-called stalking apps, as part of broader law to protect consumers from apps and devices that secretly track users' location

Opinion: Miscalculating the risk of crypto 'backdoors' (Christian Science Monitor Passcode) British and US officials argue that risk from tech companies giving law enforcement access to encrypted data is manageable. But the dangers from any flaws in cryptography outweigh the short-term benefit for police and spy agencies

Presidential election makes cyber security legislation unlikely (Business Insurance) The 2016 presidential election makes it unlikely major cyber legislation will be approved by Congress in the next year, an attorney says

Senators question HHS on efforts to curb medical identity theft (FierceHealthIT) Four senators are asking the Department of Health and Human Services what it's doing to prevent data breaches at provider and payer organizations

Army Puts 'Cyber Soldiers' In The Mud (Breaking Defense) Pop culture pictures hackers in clean, air-conditioned rooms, working global network magic from a desk

Litigation, Investigation, and Law Enforcement

FBI: "The allegation that we paid CMU $1M to hack into Tor is inaccurate" (Ars Technica) Revelation raises more questions than it answers, Carnegie Mellon still silent

RPT-Hired-gun hacking played key role in JPMorgan, Fidelity breaches (Reuters) Nov 13 When U.S. prosecutors this week charged two Israelis and an American fugitive with raking in hundreds of millions of dollars in one of the largest and most complex cases of cyber fraud ever exposed, they also provided an unusual look into the burgeoning industry of criminal hackers for hire

In terrorism war, as in domestic crime fight, lawful policing matters (Baltimore Sun) Americans watching the horror in Paris should thank the National Security Agency and the nation's terrorist-watch establishment for keeping us generally safe from such attacks in the 14 years since our 9/11 nightmare

IG calls OPM credit monitoring contract award process into question (FierceGovernmentIT) The procurement process that led to the Office of Personnel Management's award of a credit monitoring and identify theft services contract to Winvale Group LLC, and its subcontractor, CSIdentity, had "significant deficiencies," said OPM's internal watchdog

Opinion: Cox fine should force telecoms to get serious about data security (Christian Science Monitor Passcode) The country's third largest cable company will pay nearly $600,000 to settle the FCC's investigation into a data breach. It's the latest sign that telecoms must get serious or face the penalties

Security Breaches of Fewer Than 1,000 Records Rarely Incur Fines (Channel Partners) For companies that are exposed to breaches of fewer than 1,000 records, 94 percent don't have to deal with fines, penalties or regulatory proceedings

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Interconnect2016 (Las Vegas, Nevada, USA, February 21 - 25, 2016) IBM InterConnect 2016 is for those who are building new business models, transforming industries, and creating better outcomes. Whether you're a C-suite executive, IT leader, developer, designer, architect,...

Upcoming Events

cybergamut Technical Tuesday: Hackproof Signal Processing for Wireless Communications ("Central Maryland, " USA, November 17, 2015) Conventional computing and communications expose myriad attack surfaces because of the Turing-equivalence of the instruction set architectures and the mathematical impossibility of forming a complete set...

Cybersecurity, the SEC and Compliance (New York, New York, USA, November 18, 2015) The recent SEC CyberSecurity Examination Initiative focuses on information safeguards for financial services organizations. Are you prepared? Please join us for a panel discussion on what cybersecurity...

CyberCon 2015 (Pentagon City, Virginia, USA, November 18, 2015) CyberCon 2015 is the forum for dialogue on strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data

Internet-of-Things World Forum 2015 (London, England, UK, November 18 - 19, 2015) This conference features speakers from leading IoT companies and their customers. Learn how the Internet-of-Things is creating new markets for products, services, and solutions

2015 U.S. Cyber Crime Conference (National Harbor, Maryland, USA, November 14, 2015) The 2015 U.S. Cyber Crime Conference (Formerly the DoD Cyber Crime Conference) has brought world-class forensics and incident response training combined with outstanding community networking for over 15...

CyberPoint 2nd Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, November 19, 2015) CyberPoint International announces its 2nd Annual Women in Cyber Security Reception to be held on November 19, 2015. Bringing together women from across the region and all different points on the career...

Pen Test Hackfest Summit & Training (Alexandria, Virgina, USA, November 16 - 23, 2015) SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment.

Energy Tech 2015 (Cleveland, Ohio, USA, November 30 - December 2, 2015) Now in its 5th year, EnergyTech 2015 seeks the convergence of the best minds in policy, systems engineering and applied technology to address some of the critical issues of our time. In addition to its...

cybergamut Technical Tuesday: It's a Target Rich Environment: Understanding the IIoT Attack Surface (Elkridge, Maryland, USA, December 1, 2015) The Internet of Things (IoT) has received an incredible amount of press as of late. But, most of that has been associated with consumer electronics in the form of wearables and home monitoring devices...

IoT Security Foundation Conference (London, England, UK, December 1, 2015) The is the first official conference of IoTSF. It follows on from the IoT Security Summit earlier in the year, maintaining the momentum of the theme. Delegates can expect a similar level of quality of...

Public Sector Cybersecurity Summit 2015 (Reston, Virginia, USA, December 1 - 2, 2015) The Raytheon|Websense 6th Annual Public Sector Cybersecurity Summit is a unique opportunity to learn about the state of cybersecurity and how to prepare for future threats from many thought provoking government...

Enterprise Security and Risk Management (London, England, UK, December 2, 2015) Whitehall Media's 4th ESRM conference will bring together hundreds of leading InfoSec, cyber security and risk management professionals to discuss the latest industry developments and identify the most...

Cargo Logistics America (San Diego, California, USA, December 2 - 3, 2015) Cargo Logistics America (CLA) connects freight owners with freight movers, fostering multimodal synergy between diverse stakeholders in import, export and domestic supply chains. This year's conference...

NG Security Summit US (Austin, Texas, USA, December 2 - 4, 2015) The NG Security Summit US will bring together 65 senior decision makers and business leaders from across the region. The event aims to solve key business challenges. In particular, the ability to network...

Cyber Security Opportunities for U.S. Firms in Japan, S. Korea, and Taiwan (Online, December 2, 2015) Listen to experts from Japan, S. Korea and Taiwan and learn how to position your company for success in these countries. Sponsored by the US Department of Commerce

Program on Cyber Security Studies (PCSS) (Garmisch-Partenkirchen, Germany, December 2 - 17, 2015) The Marshall Center has developed a comprehensive program to explore the increasing domestic, international and transnational challenges in cyber security. Our goal is to provide a comprehensive, policy-focused,...

Cloud Security Alliance Summit Los Angeles 2015 (Los Angeles, California, USA, December 3, 2015) The full day Cloud Security Alliance LA Summit is a standalone event in the greater Los Angeles area. Hosted by the CSA LA/SoCal chapter, some 200 well-qualified attendees are expected. The theme is "Enterprise...

2015 Cyber Security Exchange (Orlando, Florida, USA, December 6 - 8, 2015) This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, heightened data privacy concerns,...

Disrupt London 2015 (London, England, UK, December 7 - 8, 2015) TechCrunch Disrupt is one of the most anticipated technology conferences of the year. Join us at this iconic startup and thought leadership event in London on December 7 and 8. What happens at Disrupt?...

Passwords 2015 (University of Cambridge, England, UK, December 7 - 9, 2015) More than half a billion user passwords have been compromised over the last five years, including breaches at internet companies such as Target, Adobe, Heartland, Forbes, LinkedIn, Yahoo, and LivingSocial.

ACSAC (Annual Computer Security Applications Conference) (Los Angeles, California, USA, December 7 - 11, 2015) ACSAC is one of the most important cyber security conferences in the world, and the oldest information security conference held annually. Researchers, government representatives, academia and security...

NSA RCTCON (Fort Meade, Maryland, USA, December 9, 2015) The NSA RCTCON industry exposition will be attended by 250-300 IC (Intelligence Community) cyber personnel working on solutions to the current cyber threats that face the U.S

SANS Institute: Information Security Training (Las Vegas, Nevada, USA, September 12 - 21, 2015) Information security training in Las Vegas from SANS Institute, the global leader in information security training. At SANS Network Security 2015, SANS offers more than 40 hands-on, immersion-style security...

cyberSecure (New York, New York, USA, December 15 - 16, 2015) Today's business leaders recognize that a multi-disciplinary approach is critical to protecting the bottom line. What's too often missed is a vision that incorporates best practices that allow you add...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.