skip navigation

More signal. Less noise.

Daily briefing.

Juniper Networks joins Cisco and Fortinet in confirming that the Shadow Brokers' leaks include zero-days for its products. NetScreen devices running ScreenOS are vulnerable.

Most observers who've expressed an opinion have concluded the leaks are genuine. There's more divergence on attribution of responsibility, although consensus continues to point to Russian intelligence. A minority argues that this couldn't be the case, because the Russian organs would have held the material quietly and exploited it for their own purposes, and that hence the leaks were the work of a rogue NSA insider. But more observers (Edward Snowden, of all people, among them) argue that disclosure is a deliberate move on the part of the Russian government to discredit NSA and place American intelligence collection in bad odor. And of course the (alleged) complicity of a compromised insider is consistent with Russian intelligence operations.

That the Shadow Brokers are private actors with a mix of hacktivist and mercenary motives seems unlikely. Their online auction of the material makes little sense: it's seen no serious bidders. And, as CIO points out, the loss leaders with which they've teased the market would have brought a great deal of money from zero-day brokers, whether white, grey, or black hat.

Speaking of Russian intelligence, Fancy Bear (of DNC hack fame) is back, and apparently behind the hack of the World Anti-Doping Agency.

Dr. Web warns that the Spy-Agent backdoor Trojan is now in active use against US targets.

Palo Alto sees a shift in Hancitor downloader tactics.


Today's issue includes events affecting Australia, Canada, Germany, India, Ireland, Israel, Japan, Netherlands, Philippines, Russia, Switzerland, Turkey, United Kingdom, United States.

A note to our readers, especially those of you interested in art and design--"STEM to STEAM," as they call it: the CyberWire is partnering with Maryland Art Place to sponsor a competition for an original work of art on the theme "creating connections." You can read about the competition in NY Arts Magazine. A full prospectus may be found here.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. In today's podcast we'll be hearing about the Shadow Brokers affair, in extended discussions with Columbia University's Jason Healey and RedSeal's Ray Rothrock (CEO) and Mike Lloyd (CTO). (As always, if you enjoy the podcast, by all means consider giving it an iTunes review.)

7th Annual Billington CyberSecurity Summit (Washington, DC, USA, Invalid Date Invalid Date, Invalid Date) Cyber attacks continue to pose high-stake threats to national security. Top government, military and private sector cybersecurity leaders will explore the threats and solutions at the leading fall cybersecurity forum.

Cyber Attacks, Threats, and Vulnerabilities

Juniper Acknowledges Equation Group Targeted ScreenOS (Threatpost) Juniper Networks on Friday acknowledged that exploits implants contained in the ShadowBrokers data dump do indeed target its products

Snowden: Leak Of NSA Hacking Tools Are Russia’s ‘Warning’ To The US Government (Mint Press News) In a recent string of tweets, the whistleblower warned that recently leaked NSA hacking tools 'could have significant foreign policy consequences. Particularly if any of those operations targeted US allies'

Expert: NSA 'hack' most likely an agency insider (Washington Examiner) The online leak of data pilfered from the National Security Agency more likely came from an agency insider than from hackers linked to Russia, according to an expert on the intelligence community

Alleged NSA hackers probably gave away a small fortune by leaking exploits (CIO) Each of the zero-day exploits could have sold for over $100,000 or more in the black market

Why Twitter Was the Platform of Choice for Ripping Apart the NSA Dump (Motherboard) Last week, “The Shadow Brokers” dumped a slew of hacking tools they claimed belonged to a group associated with the NSA

Shadow Brokers, digital attacks, and the escalation of geopolitical conflict (Help Desk Security) Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often attributed to Russia, including last year’s State Department and White House attacks, as well as this summer’s intrusions on the DNC and DCCC. However, these must not be viewed in isolation, but as part of the larger, on-going escalation of tensions between the US and Russia

Can hackers sway public opinion with DNC and NSA leaks? (Christian Science Monitor Passcode) Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations

Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say (International Business Times) Researchers believe the World Anti-Doping Agency breach was a form of retaliation against whistleblower Yuliya Stepanova

Same Russian hackers likely breached Olympic drug-testing agency and DNC (Guardian) Experts believe hacker ‘Fancy Bear’ hacked Democratic National Committee and World Anti-Doping Agency, the second in retaliation against whistleblower

Turns Out You Can’t Trust Russian Hackers Anymore (Foreign Policy) Moscow-linked cyberthieves aren’t just stealing and releasing emails anymore -- they’re altering them to smear one of Putin's most vocal opponents

Backdoor uses TeamViewer to spy on victims (Help Net Security) A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have warned

Epic Games forums hacked again, over 800,000 users affected (Help Net Security) Some of the online forums maintained by Epic Games, the video game development company behing the Unreal Engine technology and games based on it, have been hacked and their user databases compromised

Hancitor Downloader Shifts Attack Strategy (Threatpost) Researchers said a new variant of the Hancitor downloader has shifted tactics and adopted new dropper strategies and obfuscation techniques on infected PCs. Researchers at Palo Alto Networks are currently tracking the biggest push of the Hancitor family of malware since June that it says has shifted away from H1N1 downloader and now distributes the Pony and Vawtrak executables

DetoxCrypto ransomware-as-a-service rears its ugly head (Graham Cluley) Different variants. Different themes. Different emails. But similar code. Hmm

Voice Message Notifications Deliver Ransomware (SANS Internet Storm Center) Bad guys need to constantly find new ways to lure their victims. If billing notifications were very common for a while, not all people in a company are working with such kind of documents. Which types of notification do they have in common?

Hospitals More at Risk Than Ever With the New Locky Ransomware Wave (Virus Guides) A huge increase in the number of ransomware attacks against US-based hospitals was detected by the security team at FireEye

Many hospitals transmit your health records unencrypted (CSO) Healthcare IT organizations often lack budget and personnel to address security needs

Fake attacks by insiders to fool companies (CSO) Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks

Anatomy Of A Social Media Attack (Dark Reading) Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished

Cybercriminals recruiting insiders to attack telecommunication providers: Kaspersky (Canadian Underwriter) Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to an intelligence report from global cybersecurity company Kaspersky Lab

Attackers don't need vulnerabilities when the basics work just as well (CSO) Weak passwords and network access controls do more harm than malware

Malicious QuadRooter Apps Discovered in Google Play Store (Infosecurity Magazine) The recent disclosure of a set of vulnerabilities in the Android operating system that could potentially put over 900 million devices at risk may have been patched, but its threat remains

Hacktivists Take Aim At Olympics Broadcast Service (Dark Reading) Broadcasts and images of Games left intact, but employee contact information apparently breached

Imperva: Application layer DDoS attacks are on the rise (CSO) Aided by botnets and DDoS-for-hire more actors can generate longer attacks

DDoS Attacks Increase 200%; UK Now Second Most Targeted Nation (Infosecurity Magazine) DDoS attacks have increased by over 200% in the last year, according to new research from Imperva. The uptick in attacks has been attributed to DDoS-for-hire services, the company said

Workers using Pokémon Go expose corporate networks (Enterprise Innovation) An estimated 26 million users have installed the Pokémon Go app in less than a month since launch in the US, breaking all mobile gaming records with more than 75 million installs across Apple and Google platforms globally

Security Patches, Mitigations, and Software Updates

Obihai Patches Memory Corruption, DoS, CSRF Vulnerabilities in IP Phones (Threatpost) Obihai Technology recently patched vulnerabilities in its ObiPhone IP phones that could have led to memory corruption, buffer overflow, and denial of service conditions, among other outcomes

First Galaxy Note 7 update already rolling out with August security patch (Updato) While the Android fans are still soaking in the goodness of Galaxy Note 7, Samsung and supported carriers aren’t resting. Within less than a week since the launch of its latest phablet, Samsung is rolling out the very first Galaxy Note 7 update

Has Microsoft “broken” millions of webcams? (And how to fix yours.) (Naked Security) It’s not a good /day, week, month, quarter, year/ to be working in Microsoft Support

Cyber Trends

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks (CSO) Companies on a treadmill to stay ahead of data thieves

IoT Security Predictions Are Coming True, Fortinet Finds (SDX Central) Fortinet didn’t exactly go out on a limb last year when it predicted security problems for the Internet of Things (IoT). But it’s worth noting that those predictions seem to be coming true this year

Walls: Not the Be-All and End-All of Cybersecurity (Bloomberg BNA) Walls. For years, humans have relied on walls as the first line from defense from nature and foreign threats. However, these trusted walls aren’t always sufficient to protect people from extreme natural disasters or explosive weapons. According to a recent survey of 1,100 information technology decision makers by international digital security company Gemalto, the same goes for digital defenses

Most Asia Pacific companies lack cyber-security mind-set (Manilla Bulletin) Most companies in the Asia Pacific (APAC), almost 60 per cent, the Philippines included, consider “employees’ lack of knowledge” as the main insider threat to cyber-security and less than one in ten companies in the region fully understand how cyber-attacks happen

Family Offices at Risk of Cyber Attack (Campden FB) Almost half of multi-million dollar international family offices do not have dedicated cyber security, exposing ultra-high net worth individuals to hackers, an accountancy firm warns


UBS Breaks Down The Clouding Cyber Fundamentals (Benzinga) For about three years, cybersecurity spending has been in a “super cycle,” UBS’s Brent Thill said in a report. The analyst added, however, that the 1H16 earnings and “our ongoing field work” indicate that the phase of “indiscriminate budget allocations” may be over

3 Hot Cybersecurity Stocks (Forbes) The World Economic Forum recently cited cybersecurity attacks as one of the top five global risks we face today. Think content security, network security and data protection for consumers, businesses, and governments

Microsoft: The Latest Tech Company Rushing To Acquire Machine Intelligence Startups (Stockhouse) Technology companies have been scrambling to prepare for the next generation of technology by acquiring machine intelligence startups. The most recent notable transaction occurred on Monday when Microsoft Corporation (NASDAQ: MSFT) announced it has acquired Genee

Lockheed Shrinks, and a New Cyberwar Star Is Born at Leidos (Motley Fool) The new government IT giant boasts some (classified) big-name clients

Jonathan Aberman: The one void that could slow our cybersecurity dreams (Washington Post) More and more people agree: cybersecurity is in our region’s DNA and can continue to be a boom for greater Washington

This Silicon Valley venture fund keeps betting millions on D.C.’s cyber community (Washington Post) Bessemer Venture Partners is one of California’s more successful technology investors, an early backer in the likes of Yelp, LinkedIn and Skype. Lately, the venture firm has taken a particular interest in the Washington area’s cybersecurity scene. Its fund owns stakes in at least 40 cybersecurity companies, and recently added three local companies to its portfolio

ThreatQuotient Raises $12M in Series B Funding and Appoints NEA’s Peter Barris to Board of Directors (BusinessWire) Investment supports major growth initiatives and validates company’s innovative approach to the threat intelligence platform market

Tempered Networks raises $10M for networking and security tech that helps companies prevent cyberattacks (GeekWire) Tempered Networks has raised another $10 million to help protect companies from cyberattacks while also providing networking infrastructure

How not to describe yourself if you want to get funded (TechCrunch) We are the Uber of our industry, applying curated, user-generated gamification to the sharing economy

Forget FireEye Inc: These 2 Stocks Are Better Buys (Fox Business) Threat detection firm FireEye (NASDAQ: FEYE) has lost almost 60% of its market value over the past 12 months due to concerns about its slowing sales growth, rapid cash burn rate, rising competition, and executive departures. Its dismal second quarter earnings report on Aug. 4 basically confirmed all those fears

Trust exercise: Symantec's new website security expert is reaching out to hacker community (SC Magazine) Tarah Wheeler Van Vlack, whom Symantec recently hired as principal security advocate and senior director of engineering for its Website Security team, is already making her presence felt, reportedly pledging to foster ties with the independent hacker community for inspiration and ideas

BAE Systems to host live simulated cyber-attack competition in London (Army Technology) British defence company BAE Systems and Her Majesty’s Government’s Communications Centre (HMGCC) are set to host a live simulated cyber-attack at the Blue Fin building in London, UK, on 3 September

U.S. Bank and Akana Prepare for a Small Business Banking Hackathon in Silicon Valley (Yahoo! Finance) Akana, a leading provider of API Management, API security and Microservices solutions for Digital Businesses, announced today that its Akana Platform will power the app development efforts at the upcoming external U.S. Bank Hackathon being held in San Jose, California. By joining forces with U.S. Bank to sponsor the Aug. 27 and 28 Hackathon, Akana and U.S. Bank will externalize APIs that the developer teams will leverage alongside MasterCard’s APIs to create innovative solutions that improve productivity, financial stability and customer experiences for all small businesses

Generali Global Assistance Bolsters Identity and Digital Protection Services Global Unit With New Appointment (MarketWired) Generali Global Assistance ("GGA" or "the Company"), a leader in the assistance industry since its founding in 1963 and part of the multinational Generali Group, today announced the appointment of Julie Jamsa as Vice President, Service Delivery for the Company's Identity and Digital Protection Services Global Unit, effective immediately

Palo Alto Networks Announces Executive Appointments (PRNewswire) Dave Peranich joins as Executive Vice President, Worldwide Sales; Mark Anderson promoted to President

Cylance Appoints Felix Marquardt President of Cylance International (BusinessWire) Marquardt will report to Cylance President and CEO Stuart McClure and work closely with Chief Security and Trust Officer Malcolm Harkins, SVP Worldwide Sales Nicholas Warner, and the rest of the Cylance executive team

Products, Services, and Solutions

Siemplify Launches Security Channel Partner Program (Digital Journal) Siemplify™ today announced the launch of its Nucleus Channel Partner Program, which extends the reach of the company’s ThreatNexus™ security operations platform by making it available to partners and their customers on a national basis. As part of the launch, Siemplify also announced multiple partnerships with leading security channel partners including INNO4, SeeGee Technologies, RKON, and Gotham

Anti-phishing firm KnowBe4 looks to gear up channel (Channel Buzz) About five per cent of the company’s partner business is in Canada today, but they have a push panned in the Canadian market in 2017

Raytheon debuts Cyber and Electromagnetic Battle Management system (UPI) System unveiled at U.S. Army's Cyber Quest event

Dell SonicWall’s multi-engine sandbox approach to capturing evasive malware (Security Asia) As businesses in Asia Pacific become more digitized, enterprises and governments in this region have to ensure that their security programs are updated and future-proof to prevent imminent breaches from constantly evolving threats

Cyber security stretches across the spectrum (Automotive World) Thales e-Security speaks to Megan Lampinen about its pioneering data protection and cyber security efforts

10 best anti-hacking software to protect your Windows 10 run PC from hackers 0 (TechWorm) Protect your PC/laptops with these 10 best anti-hacking software for Windows 10

Threat intelligence has a shelf life says security exec (Security Brief) The security division of EMC, the RSA, has new integrated threat intelligence partners for the RSA NetWitness Suite

Technologies, Techniques, and Standards

Threat Intelligence Starter Resources (Recorded Future) Creating a threat intelligence capability can be a challenging undertaking, and not all companies are ready for it. Businesses that run successful threat intelligence teams generally

Can endpoint security stop ransomware attacks? (GCN) In the realm of malware, ransomware is reaching plague-like proportions. And just like any infectious disease, the No. 1 cause of transmission is the one thing no one can avoid: human beings

How to Digitally Erase All Your Stuff When You Quit Your Job (Wired) It's your last day at your job. There will be tears! Between the cheesy sendoff at the morning meeting and the after-work happy hour, you have to do something very important: back up all your stuff and securely clear your computer. Be smart about it with these steps

5 back-to-school tips to help kids stay safe online (Naked Security) As children around the world (in the northern hemisphere, anyway) end their summer breaks and start to head back to school, they’ll be using the internet and their phones for schoolwork and socializing. Of course, we want to make sure kids are safe and smart online, so we’re sharing these 5 back-to-school tips to help

Research and Development

NIST scientists 'nervous' about lightweight crypto for IoT (FedScoop) The Internet of Things presents a unique challenge for cryptographers: How long should a key be?

World's most efficient AES crypto processing technology for IoT devices developed (Science Daily) Our research group has discovered a new technique for compressing the computations of encryption and decryption operations known as Galois field arithmetic operations, and has succeeded in developing the world's most efficient Advanced Encryption Standard (AES) cryptographic processing circuit, whose energy consumption is reduced by more than 50% of the current level

Air Force wants a cyber disconnect (C4ISRNET) BAE Systems Information and Electronic Systems Integration has been awarded an $8.7 million Air Force contract for software that will disconnect and reconnect users to a network


American Military University Becomes Newest CyberPatriot Sponsor (PRNewswire) The Air Force Association today announced American Military University (AMU) as the newest Cyber Silver sponsor of its flagship STEM program, CyberPatriot

All Hail the College Cyberdefense Champions (New America) Heather Lawrence is the president of Hack@UCF, the team of college students from the University of Central Florida that won this summer's National Collegiate Cyber Defense Competition. She and her teammate, Alex Davis, are part of a 180-student club that has taken three consecutive championships in the country’s largest cyberdefense competition of its kind. On this episode of the Cybersecurity Podcast, these student champions discuss what it's like to be part of such a high-stakes competition, what young people can do to make sure they remain ethical hackers, and how they plan to adapt to the quick-changing nature of technology

Legislation, Policy, and Regulation

Israel’s New Counter-Terrorism Law and Terrorism in Cyberspace (Council on Foreign Relations) The Israeli parliament adopted a new counter-terrorism law on June 15, 2016. According to the Ministry of Justice’s summary, the legislation will provide “law enforcement authorities with more effective tools to combat modern terrorist threats while incorporating additional checks and balances necessary to safeguard against unreasonable violations of individual human rights.” The legislation revises and expands Israeli law in many areas, as Elena Chacko discusses at Lawfare. The changes include provisions addressing use of the internet and social media for terrorist purposes. With terrorist activities online under scrutiny, the new Israeli law is important to efforts underway to reduce the threat of terrorism in cyberspace

CCS sets up framework for cyber security pros (UK Authority) Contingent LabourONE framework provides new route for contracting CESG certified specialists

Groups oppose US plan to collect social media info from visitors (CSO) The groups say a Department of Homeland Security proposal will be ineffective and impinge on privacy

Elections Shouldn’t Be Deemed Critical Infrastructure (Security Debrief) The recent cyberattack on the Democratic National Committee and the Democratic Congressional Campaign Committee has led to confusion on how to protect against potential future hacks. In the wake of these attacks, Homeland Security Secretary Jeh Johnson said the Department was looking at designating elections as critical infrastructure. This move would put elections on par with the electricity grid and the banking system. It’s a subject the Obama administration is exploring

NASA’s ‘act of desperation’ demonstrates continued cyber deficiencies (Federal News Radio) One of NASA’s main networks used by almost every employee and contractor and managed by Hewlett Packard Enterprise is in such bad shape, the agency’s chief information officer could no longer accept the risk and let the cybersecurity authorization expire

New cyberspace operations group & intelligence squadron activated at National Guard Base (WBFF Fox 45 News) A new cyberspace operations group and intelligence squadron have been formally activated at Warfield Air National Guard Base in Middle River

Marines with I MEF strengthen cyber defensive capabilities (DVIDS) The Corps’ ability to win on the battlefield remains strong; however, its post-9/11 enemies in operational environments like in Iraq and Afghanistan have been, by and large, a technologically inferior force. And while the Corps may need to only refine its maneuver warfare skills, there is a new battle space that is sure to dominate the next major armed conflict: cyberspace

Litigation, Investigation, and Law Enforcement

FBI uncovers 14,900 more documents in Clinton email probe (Washington Post) The FBI’s year-long investigation of Hillary Clinton’s private email server uncovered 14,900 emails and documents from her time as secretary of state that had not been disclosed by her attorneys, and a federal judge on Monday pressed the State Department to begin releasing emails sooner than mid-October as it planned

Bahraini Prince Sought Access to Clinton Through Foundation After Trying ‘Normal Channels’ (Foreign Policy) Newly-released emails from Hillary Clinton’s tenure as secretary of state raise fresh questions about whether the Clinton Foundation helped its donors gain access and special treatment from the State Department during her time in office

Republicans subpoena three tech companies over Clinton emails (CSO) The subpoenas were sent to Datto, SECNAP Network Security and Platte River Networks

Indians could face jail time for torrenting and file sharing (HackRead) India is waging a war of torrents and file sharing sites

Turkish Journalist Jailed for Terrorism Was Framed, Forensics Report Shows (Motherboard) Turkish investigative journalist Barış Pehlivan spent 19 months in jail, accused of terrorism based on documents found on his work computer. But when digital forensics experts examined his PC, they discovered that those files were put there by someone who removed the hard drive from the case, copied the documents, and then reinstalled the hard drive

Irish man said to be Silk Road’s “Libertas” fights to stay out of US prison (Ars Technica) Gary Davis is free, for now, on €15,000 bail

Snooped-on man free to sue spyware maker (Naked Security) A US court has said that a man can sue a spyware company whose software was used unlawfully by a jealous spouse to intercept his messages

Lawyer: Dark Web Child Porn Site Ran Better When It Was Taken Over by the FBI (Motherboard) In February 2015, the FBI took control of Playpen, the largest dark web child pornography site at the time. But instead of shutting the site down, the agency kept it going for just under two weeks, in order to deliver malware to its visitors in the hope of identifying suspects in its investigation

Release of FISC Question of Law & FISCR Opinion (IC on the Record) Today the Office of the Director of National Intelligence, in consultation with the Department of Justice, is releasing in redacted form a Certification of Question of Law to the Foreign Intelligence Surveillance Court of Review submitted by the Foreign Intelligence Surveillance Court on February 12, 2016, and the FISCR’s April 14, 2016 Opinion in response to the FISC’s Certification of Question of Law

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

AppSecUSA 2016 (Washington, DC, USA, October 11 - 14, 2016) OWASP’s 13th Annual AppSecUSA Security Conference is the premier application security conference for developers and security experts. Come hear an amazing group of inspirational speakers—including YouTube’s...

Upcoming Events

SANS Alaska 2016 (Anchorage, Alaska, USA, August 22 - 27, 2016) SANS is bringing our renowned security training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great...

CISO New Jersey (Hoboken, New Jersey, USA, August 23, 2016) With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility...

Cyber Jobs Fair (San Antonio, Texas, USA, August 23, 2016) Held in conjunction with the Second Annual CyberTexas Conference, the Cyber Jobs Fair is open to anyone with cyber security education or experience. A security clearance is not required. Booz Allen Hamilton,...

CyberTexas (San Antonio, Texas, USA, August 23 - 24, 2016) CyberTexas was established to provide expanded access to security developments and resources located in Texas; provide an ongoing platform for the education and skill development of cyber professionals...

Chicago Cyber Security Summit (Chicago, Illinois, USA, August 25, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Air Force Information Technology and Cyberpower Conference 2016 (Montgomery, Alabama, USA, August 29 - 31, 2016) America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy are being eroded. Increasingly prevalent and severe malicious cyber...

CISO Toronto (Toronto, Ontario, Canada, August 30, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

ISAO SO Public Forum (Tysons, Virginia, USA, August 31 - September 1, 2016) This public forum is the last opportunity to meet face-to-face and participate in conversations that will shape the first set of standards and guidelines to be published in September! Speakers will include ...

cybergamut Technical Tuesday: Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies (Elkridge, Maryland, USA, September 6, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 6 September 2016 (1600 – 1730...

2016 Intelligence & National Security Summit (Washington, DC, USA, September 7 - 8, 2016) Third annual unclassified summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). There are five plenary sessions and nine breakout sessions related to cybersecurity,...

Annual Privacy Forum 2016 (Frankfurt, Hesse, Germany, September 7 - 8, 2016) In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016. In the light of the upcoming data protection...

SecureWorld Cincinnati (Sharonville, Ohio, USA, September 8, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Borderless Cyber Europe (Brussels, Belgium, September 8 - 9, 2016) Join CIOs, CISOs and cyber threat intelligence experts from industry, government and CSIRTs worldwide to share experiences, strategies, tactics and practices that will improve your state of preparedness...

SANS Network Security 2016 (Las Vegas, Nevada, USA , September 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity!...

Business Insurance Cyber Risk Summit 2016 (San Francisco, California, USA, September 11 - 12, 2016) The Business Insurance Cyber Risk Summit provides risk management professionals and chief information security officers with the practical information and tools needed to combat the latest cyber risks...

Hacker Halted 2016 (Atlanta, Georgia, USA, September 11 - 16, 2016) This ​year, ​Hacker ​H​alted’s theme​ is​ the Cyber Butterfl​​y Effect​:​ When ​S​mall ​M​istakes ​L​ead to ​B​ig ​D​isasters​. The goal of the conference is to bring the IT security community together...

(ISC)² Security Congress (Orlando, Florida, USA, September 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity...

7th Annual Billington Cybersecurity Summit (Washington, DC, USA, September 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity...

CISO GAS (Frankfurt, Hessen, Germany, September 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives...

ISS World Americas (Washington, DC, USA, September 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech...

Tarleton State University Cyber Security Summit 2016 (Dallas, Texas, USA, September 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply...

Insider Threat Program Development Training For NISPOM CC 2 with Legal Guidance (Germantown, Maryland, USA, September 14 - 15, 2016) Insider Threat Program Development Training for NISPOM CC 2 (Germantown, Maryland, September 14 - 15, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development...

SecureWorld Detroit (Dearborn, Michigan, USA , September 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Insider Threat Program Development Training for NISPOM CC 2 (Milwaukee, Wisconsin, USA, September 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795...

4th ETSI/IQC Workshop on Quantum-Safe Cryptography (Toronto, Ontario, Canada, September 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and...

Cyber Physical Systems Summit (Newport News, Virginia, USA, September 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection... Security Conference (The Hague, the Netherlands, September 20 - 23, 2016) Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of...

3rd Annual Senior Executive Cyber Security Conference: Navigating Today's Cyber Security Terrain (Baltimore, Maryland, USA, September 21, 2016) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 3rd Annual Senior Executive Cyber Security Conference on Wednesday, September 21, from 8:30 a.m. –...

New York Cyber Security Summit (New York, New York, USA, September 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, September 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential...

NYIT Annual Cybersecurity Conference (New York, New York, USA, September 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry...

Cyber Security: How to Identify Risk and Act (Frankenmuth, Michigan, USA, September 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information ...

CYBERSEC (Kraków, Poland, September 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC...

Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, September 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in...

IP EXPO Nordic 2016 (Stockholm, Sweden, September 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases...

SecureWorld Dallas (Plano, Texas, USA , September 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.