skip navigation

More signal. Less noise.

Daily briefing.

Officialdom may be slow to attribute recent politically-relevant hacks but Crowdstrike isn't: the company says Cozy Bear (Russia's FSB) is behind breaches at US think tanks studying Russia.

Russian intelligence services remain the leading suspects in last month's incursions into US voting databases, but Russia Today pooh-poohs evidence ThreatConnect, Fidelis, Crowdstrike, and SecureWorks offered as a whole lot of nothing. Few are convinced, but in fairness (and as usual) the evidence remains largely circumstantial. (A bonus—Foreign Policy runs the best stock picture of a hacker ever. It's got a kid's wading pool, a beach chair, a cheap tent, a huge laptop, a MiG 21, and a guy who's shirtless instead of be-hoodied. A nogoodnik if ever we've seen one.)

There is general consensus that US elections are vulnerable to disruption. The Department of Homeland Security's "critical infrastructure" designation is being understood as offering the sort of security support DHS now provides Wall Street and the power grid, but accounts are scanty with respect to details.)

The Dropbox breach is now thought to affect sixty-eight million users. OneLogin has also sustained a breach: customers' unencrypted Secure Notes are exposed.

Dr. Web warns that the Mutabaha Trojan is impersonating Chrome in the wild. ESET finds OSX/Keydnap, which steals OSX Keychain data and installs a backdoor, spreading via the Transmission BitTorrent client application.

A new ransomware strain AVG discovered—"Fantom"—infects by posing as a Windows update. Another strain—this a Locky variant—spreads as an email with the subject "Transaction Details."


Today's issue includes events affecting Belgium, Brazil, India, Kuwait, Mexico, Netherlands, Pakistan, Romania, Russia, Sri Lanka, United Kingdom, United States.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today Yisroel Mirsky from Ben-Gurion University of the Negev will introduce himself and our newest partner. Our guest, Nuix's Jim Kent, will talk about trends, particularly with respect to insider threats. If you enjoy the podcast, please consider giving it an iTunes review.

​3rd Annual Senior Executive Cyber Security Conference: Navigating Today’s Cyber Security Terrain​ (Baltimore, MD, USA, September 21, 2016) Hear from industry leaders on cyber security best practices and trends that will help you better secure your organization’s data. This year’s agenda examines the current cyber security landscape, threats, and challenges ahead for organizations and how senior leaders can work towards “shifting their data to being safe and secure.”

Cyber Attacks, Threats, and Vulnerabilities

Computer-Security Firm Says Hackers Targeting Russian-Focused Think Tanks (Wall Street Journal) Company says Russian hacking group also linked to computer intrusions at the Democratic National Convention

Kremlin-backed hackers target Russia-focused think tanks (Federal Times) Multiple think tanks in Washington, D.C, were recently breached by the Russia-backed hacker group Cozy Bear (also referred to as APT29), sources have revealed to Patrick Tucker, Defense One’s technology editor

Did Russia Really Hack U.S. Election Systems? (Foreign Policy) American e-voting is vulnerable to hacking, but that doesn’t mean Moscow’s agents hacked Illinois and Arizona voter databases — this time

Russian state media: Evidence of Kremlin-sponsored hacking 'non-existent' (International Business Times) Multiple cybersecurity firms claim evidence suggests Russian hackers involved

Hacking the Election Would be Pretty Damn Easy (Inverse) It could be done for less than $100

Could hackers tip a U.S. election? You bet. (Washington Post) Reports this week of Russian intrusions into U.S. election systems have startled many voters, but computer experts are not surprised

Kaine asks: Would Trump stand up to a Russian cyberattack on U.S. elections? (Washington Post) Democratic vice-presidential candidate Tim Kaine on Tuesday questioned whether a President Donald Trump would stand up to a Russian cyberattack aimed at destabilizing U.S. elections

Hackers Stole Account Details for Over 60 Million Dropbox Users (Motherboard) Hackers have stolen over 60 million account details for online cloud storage platform Dropbox. Although the accounts were stolen during a previously disclosed breach, and Dropbox says it has already forced password resets, it was not known how many users had been affected, and only now is the true extent of the hack coming to light

Dropbox hackers stole e-mail addresses, hashed passwords from 68M accounts (Ars Technica) "Scope of password reset completed last week protected all impacted users," says Dropbox

OneLogin breached, customers’ Secure Notes compromised (Help Net Security) San Francisco-based OneLogin, which offers single sign-on and identity management for cloud-based applications and claims 1400+ enterprise customers in 44 countries, has suffered a data breach

OSX/Keydnap spreads via signed Transmission application (We Live Security) Last month ESET researchers wrote an article about a new OS X malware called OSX/Keydnap, built to steal the content of OS X’s keychain and maintain a permanent backdoor. At that time of the analysis, it was unclear how victims were exposed to OSX/Keydnap. To quote the original article: “It could be through attachments in spam messages, downloads from untrusted websites or something else”

Google Chrome impersonator Trojan doing rounds (Help Net Security) If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with the Mutabaha Trojan

New 'Fantom' Ransomware Poses As Windows Update (Dark Reading) Fantom malware comes disguised as a legitimate Microsoft Windows update to trick consumers and business users into downloading it

Today's Locky Variant Arrives as a Windows Script File (SANS Internet Storm Center) Pretty much all the Locky variants I have looked at the last couple days arrived as zipped JavaScript files. Today, I got something slightly different

New ransomware threat deletes files from Linux web servers (CSO) Attackers claim the files are first encrypted and uploaded to a server under their control

Ransomware Attacks in the U.K., Netherlands and Belgium (Duo Security) Last week it was reported that over half (56%) of the U.K.’s universities have been targeted in ransomware attacks in the past year, according to SentinelOne. They also found that two out of three targets were hit multiple times. Bournemouth University reported they suffered a total of 21 different attacks throughout the year

UK hospitals targeted by ransomware but NHS did not pay up (International Business Times) Hospitals across the globe are being increasingly targeted by ransomware attacks

Ransomware: experts divided on whether to pay up (CRN) In yet another sign that business is booming in the underworld of ransomware, Trend Micro has reported that the number of new ransomware families it observed in the first half of 2016 has already surpassed the total number observed in 2015 by 172 percent

Orgs' Security Hygiene Plummets Amid Ransomware Spikes (Infosecurity Magazine) Despite the rise of social engineering-based scourges like ransomware, just 39% of workers believe they take all appropriate steps to protect company data accessed and used in the course of their jobs

Crooks are selling a skimmer that works on all chip card readers (CSO) Think that your new EMV-compliant chip-reading point of sale terminal will keep crooks from stealing your customer credit card info?

Another IoT-Dominated Botnet Rises With Almost 1M Infected Devices (Dark Reading) BASHLITE malware fuels another DDoS botnet made up primarily of flaw-ridden internet of things devices

Nearly Half of Enterprise Networks Show Evidence of DNS Tunneling, According to Infoblox Security Assessments (Econo Times) Infoblox Inc. (NYSE:BLOX), the network control company, today announced results of the Infoblox Security Assessment Report for the second quarter of 2016, which finds that 40 percent—nearly half—of files tested by Infoblox show evidence of DNS tunneling, a significant security threat that can indicate active malware or ongoing data exfiltration within an organization’s network

Ubiquity and danger: The web scraping economy (Help Net Security) Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing content into the web scraper’s own website and business operations. In most cases, bots, which make up 46 percent of web traffic, are implemented by individuals to perform web scraping at a much faster rate than humans alone

Encryption hiding malware in half of cyber attacks (ComputerWeekly) Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed

Is Facebook’s People You May Know putting users at risk? (Naked Security) What is a friend, exactly? It’s a tricky question

Con artists use pop-ups to scam Microsoft users (KMOV) Hackers do not always have to break into your computer to rip you off, sometimes you let them in

Email Still a Magnet for Cyber Criminal Activity, Costing Victims $3 Billion (Tech Vibes) Business email compromises—when legitimate business email accounts are taken over by scammers in an effort to get their targets to send them money—have risen by 1,300 per cent since January 2015, resulting in over $3 billion in losses, according the Federal Bureau of Investigation

Sri Lankan Teenager Hacks President’s Website Twice to Demand New Date For College Exams (Foreign Policy) When high school students want to weasel their way out of an unwanted exam or homework assignment, they typically rely on time-tested excuses like faking illnesses or conjuring up paper-hungry dogs

St Neots Town Council website hit by cyber-attack (Cambridge News) St Neots town council has been forced to take down is website after it was hacked by what is claimed to be a pro-Muslim organisation

Alex Jones’ Infowars Hacked; Thousands of Accounts Sold Online (HackRead) Someone hacked Infowars website and stole thousands of accounts belonging to its registered users — the accounts were found on an underground hacking forum

Kuwait Automotive Imports Company Hacked; 10k Accounts Leaked (HackRead) Some hack for a reason, some hack for no reason and some hack to teach others a lesson — this hack is to teach bad admins a lesson

Pokemon Go Fears with Attacks on the Rise (Infosecurity Magazine) Police in England and Wales have been inundated over the summer with incidents involving cult mobile AR game Pokemon Go, with 290 reported in July alone, a new Freedom of Information (FoI) request has revealed

Security Patches, Mitigations, and Software Updates

Turn on two-step verification for your PSN account now! (Naked Security) We knew back in April that two-step verification was coming for PlayStation Network (PSN) accounts, but we didn’t know when. We’re happy to say that “when” is “now”

Cyber Trends

What's Your Personal Data Worth? (Totally Money Personal Data) While survey finds US customers value their email address at $1,287, companies can actually buy yours for just a nickel [calculator here]

How The Cybersecurity Landscape Has Changed (DZone) More threats and more access points thanks to IoT and connections to the cloud

Known unknowns of cybersecurity talent shortfall, Part 1 (Federal Times) There is a known crisis in the cybersecurity workforce: a massive shortfall in qualified and trained security professionals. There is also an unknown solution to this crisis

Known unknowns of cybersecurity talent shortfall, Part 2 (Federal Times) We’ve heard a lot lately about attacks within the financial services and health care industries, and for good reason. These industries hold sensitive, personal data that attackers want access to

Trends in Cyber Security Threats & How to Prevent Them (B2C) In our Introduction to IT Security article, we covered a number of ways to help protect your data, systems, and customers’ information against security threats. But new types of threats are emerging that can compromise your business

Understanding Cybersecurity Status Quo: Interview with Nick FitzGerald, Senior Research Fellow, ESET Asia Pacific (Digit) To learn more about the current cybersecurity landscape we have a chat with Nick FitzGerald

Latin America braces for rise in cybersecurity threats (ZDNet) Ransomware, ATM jackpotting and advanced targeted attacks will become a norm in the region within the next few months, according to Kaspersky Lab

NZ companies facing 'very sophisticated' cyber-attacks (Radio New Zealand) New Zealand companies are being warned they are as vulnerable to cyber-ransoming as any other global company, with an "onslaught" of malicious hackers


How cyber security pros transition to board level decision makers (CSO) Tips for getting on a board of directors as the cybersecurity expert

LogRhythm’s user-friendly approach to cybersecurity attracts $50 million (Denver Post) Boulder security firm holds its ground as it competes with IBM, HPE and Intel

Herjavec Group gearing up for next acquisition (CRN) CEO Robert Herjavec tells CRN he expects takeover of an identity-based security firm to be completed in the 'the next couple of weeks'

Accenture moves to take on cyber security (Financial Review) Professional services firm Accenture is positioning to become a market leader in cyber security in the Asia-Pacific, to help companies face the constant and evolving landscape of data protection

Cisco Systems' 3 Biggest Growth Opportunities (Motley Fool) As the company transitions its business model, there are a few growth opportunities investors need to know about

Palo Alto Networks' Shares Fall 3% On Weaker-Than-Expected Forecast (Fortune) Cyber security firm Palo Alto Networks forecast current-quarter revenue and profit below analysts’ estimates, sending its shares PANW -1.05% down 3% in extended trading on Tuesday

Palo Alto Networks, CyberArk And Next Gen Computer Security Providers Compared (Seeking Alpha) Cloud Computing Requires New Security Solutions. Internet of Things Requires New Security Solutions. Several Recent IPOs Rise To The Challenge

SonicWall partner 'conflict' to lessen post-split (Channelnomics) VP says partners no longer will be 'held back'

Here's Why Symantec Corporation (SYMC) Could Rise Over 25% (Country Caller) More upside is probably in store, as the company accelerates cost-cutting and sells Blue Coat’s Web and cloud protection software to new clients

Die Hacker aus dem Hause Siemens (Oberbayerishes Volksblatt) Siemens wehrt sich gegen Cyberkriminelle mit einer eigenen Hacker-Truppe. Sie greift das eigene Netzwerk regelmäßig an, um Sicherheitslücken aufzuspüren. Ein Besuch im Hacker-Labor

Tech Innovator of the Week: Julian Waits, President and CEO, PivotPoint Risk Analytics (Black Enterprise) Our Tech Innovator of the Week highlights an African American tech startup or innovator as part of Black Enterprise's lead-up coverage to the TechConneXt Technology Summit in Silicon Valley this October. This week's innovator: Julian Waits, President and CEO, PivotPoint Risk Analytics

KnowBe4 Expands Team to Include Security Awareness Advocate (Benzinga) KnowBe4 hires Security Awareness Advocate in answer to growing demand and explosive growth

InfoGPS Adds Telecom, IT Industry Veteran Greg McCray to Board of Directors (BusinessWire) Leader and consultant brings more than 30 years of industry expertise

Google-Backed Phone Start Up Announces GC (Updated) (Bloomberg Law) Pindrop Security, the start up that blocks phone fraud and has raised more than $100 million, announced Monday it hired Clarissa Cerda as its general counsel

Products, Services, and Solutions

OptioLabs and Cat Phones Partner to Provide Enterprise-Grade Security to the Flagship Cat S60 (OptioLabs) OptioCore fortifies Cat® S60 to resolve sophisticated mobile security threats for Android 6.0 Marshmallow

AEROMEXICO Flies High With New eCommerce Platform (News Channel 10) Akana, a leading provider of API Management, API Security and Microservices solutions, announced today that Aeromexico, Mexico’s global airline, has launched a new eCommerce platform that includes Akana’s API management platform as a core component

IBM Security and Capgemini: Teaming for New Security Operations Center Technology (IBM Security Intelligence) While technology’s increasing sophistication brings opportunity to unlock business value, it also creates opportunity for more advanced cyberthreats

ReSec's ReSecure Platform Installed in Barclays Rise Lab in Tel Aviv (PRNewswire) Advanced malware prevention system being tested by leading international banking and financial services provider in its network environment

Say Hello to Virtustream, EMC's Other Cloud (Fortune) VMware, the tech company majority owned by EMC, outlined its latest cloud computing strategy on Monday. Lost in the hubbub was the fact that Virtustream, EMC’s “other” cloud company, had its own news

Okta Expands Into Application Security With New API Access Management Product (CRN) Okta launced a new API Access Management solution Tuesday at its Oktane 16 event in Las Vegas, a move partners said would help them add more security features to their application and development portfolios

Keeper Launches Family Plan to Protect and Preserve Digital Lives (PRNewswire) Leading password manager helps families establish a strong cybersecurity defense

SimpleRisk: Enterprise risk management simplified (Help Net Security) SimpleRiskIn this podcast recorded at Black Hat USA 2016, Josh Sokol, creator of SimpleRisk, talks about his risk management tool, which he presented at the Black Hat Arsenal

L0phtCrack 7 audits passwords up to 500 times faster (Help Net Security) L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs

Logikcull’s ‘Sub Accounts’ Unlocks Versatile Power of Global Legal Intelligence Solution (BusinessWire) On the heels of news that it has raised $10 million from top-tier investors OpenView and Storm Ventures, Logikcull, the San Francisco-based technology company, has announced a new feature that empowers organizations to run multiple versions of its Legal Intelligence platform simultaneously to tackle a wide range of data challenges

Technologies, Techniques, and Standards

The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For (Infosecurity Magazine) In July, a Texas court sentenced a former Citibank technology executive to 21 months in prison for uploading malicious commands to the bank’s Global Control Center routers

For feds, DevOps raises cyber questions (FedScoop) DevOps breaks down traditional management silos, but cross-departmental teaming, in government, raises important questions about lines of authority, two officials said

Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing (Dark Reading) By increasing our cybersecurity self-esteem, we can truly make a difference in raising our collective cybersecurity resiliency


AFA's CyberPatriot Elementary School Cyber Education Initiative (ESCEI) Now Mac/OS X Compatible (Yahoo! Tech) The Air Force Association's (AFA) CyberPatriot Program Office announced today launch of an updated version of its Elementary School Cyber Education Initiative (ESCEI)

Legislation, Policy, and Regulation

London Tories Call for Data Security ‘Mayoral Standard’ (Infosecurity Magazine) The Conservative members of the London Assembly have called for the introduction of a “Mayoral Standard” for data security to help businesses in the capital improve their baseline information security and demonstrate this to customers

Homeland eyes special declaration to take charge of elections (Washington Examiner) Even before the FBI identified new cyber attacks on two separate state election boards, the Department of Homeland Security began considering declaring the election a "critical infrastructure," giving it the same control over security it has over Wall Street and and the electric power grid

Secretary of State: Pennsylvania using all available resources to safeguard cyber security of election (PRNewswire) Secretary of State Pedro A. Cortés said today the Commonwealth is taking advantage of all available resources in working to ensure the security and integrity of the November election

Retaliatory cyber strikes (C4ISRNET) It seems that the debate over retaliatory cyber strikes is increasing in intensity and occurring more often than it did just a few short years ago

How the NSA Prizes Online Surveillance Over Online Security: New at Reason (Reason Hit & Run) The NSA appears to be stockpiling a secret cache of powerful computer bugs to exploit for cyber-snooping

The NSA Research Director Wants Hackers to Know Who She Is (Washingtonian) Deborah Frincke disarms NSA’s doubters with transparency

FBI wants 'adult conversation' on encryption (Federal Times) FBI Director James Comey warned again Tuesday about the bureau's inability to access digital devices because of encryption and said investigators were collecting information about the challenge in preparation for an "adult conversation" next year

Industry, Government Differ on Where Encryption Leads (MeriTalk) Industry leaders and government officials disagree about whether encryption is causing the digital space to “go dark” or make Internet users safer

DHS’s Modest Social Media Proposal Deserves Support (Lawfare) According to a coalition of advocacy groups, a new proposal by DHS to seek information about the online presence of individuals trying to enter the United States from Visa Waiver countries—directly and voluntarily from those individuals—would “invade individual privacy and imperil freedom of expression”

U.S. Cyber Command Director: We want 'loud,' offensive cyber tools (FedScoop) “As the United States Cyber Command, we need totally separate tools and infrastructure [from the intelligence community] to conduct our operations,” said Shawn Tursky

What is the Cybersecurity Act? (Cybersecurity Investing News) With over $1 trillion to be spent globally on cybersecurity from 2017 to 2021, here’s a closer look at the Cybersecurity Act

Litigation, Investigation, and Law Enforcement

FBI recovered 30 potentially new Clinton emails related to 2012 Benghazi attacks (Washington Post) Democratic presidential nominee Hillary Clinton may have sent or received as many as 30 previously undisclosed emails while secretary of state about the 2012 Benghazi attack, government lawyers said Tuesday in asking a federal judge for a month to turn over potentially public records to a conservative legal group

NYT reporter: Fear of prosecution may have driven Hillary to blame Powell on emails (Washington Examiner) A New York Times reporter who has covered Hillary Rodham Clinton said he is "baffled" why she initially set up a secret email server, and blamed the fear of prosecution on her wrong-headed bid to blame former Secretary of State Colin Powell for suggesting a second system

Rep. Elijah Cummings calls on FBI to investigate Trump, cyber attacks (Baltimore Sun) Rep. Elijah E. Cummings and other House Democrats called Tuesday for the FBI to investigate whether Donald Trump's presidential campaign has any connection with cyber attacks on political entities in the United States

The most absurd Internet privacy class-action settlement ever (Ars Technica) Lawyers get millions. Consumers get nothing. E-mail snooping continues unabated

Case study: Lurk group’s Angler exploit (IT Security Guru) At the beginning of the summer, Kaspersky Lab assisted in the arrest of suspects that were part of the Lurk gang, which allegedly stole more than 45 million dollars from a number of companies and banks in Russia

Inside the Demise of the Angler Exploit Kit (Threatpost) The June arrest of a Russian cybercrime gang responsible for the Lurk Trojan also put to rest the infamous Angler Exploit Kit

Pakistani man to be expelled from Romania over terrorism (AP) A court has ruled that a Pakistani citizen should be expelled from Romania on charges of promoting "extremist Islamism" online, causing a threat to national security

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

HTCIA International Conference and Training Expo (Summerlin, Nevada, USA, August 28 - 31, 2016) The High Technology Crime Investigation Association (HTCIA) sponsors this conference for professionals in law enforcement cyber security and cyber forensic investigations. College and university faculty...

Air Force Information Technology and Cyberpower Conference 2016 (Montgomery, Alabama, USA, August 29 - 31, 2016) America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy are being eroded. Increasingly prevalent and severe malicious cyber...

2016 Government Cyber Security SBIR Workshop (Washington, DC, USA, August 30 - September 1, 2016) The 2016 Government Cyber Security SBIR Workshop affords Small Business Innovation Research (SBIR) awardees in the completed Phase II or Phase III processes the opportunity to collaborate and present their...

ISAO SO Public Forum (Tysons, Virginia, USA, August 31 - September 1, 2016) This public forum is the last opportunity to meet face-to-face and participate in conversations that will shape the first set of standards and guidelines to be published in September! Speakers will include ...

cybergamut Technical Tuesday: Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies (Elkridge, Maryland, USA, September 6, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 6 September 2016 (1600 – 1730...

2016 Intelligence & National Security Summit (Washington, DC, USA, September 7 - 8, 2016) Third annual unclassified summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). There are five plenary sessions and nine breakout sessions related to cybersecurity,...

Annual Privacy Forum 2016 (Frankfurt, Hesse, Germany, September 7 - 8, 2016) In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016. In the light of the upcoming data protection...

Innoexcell Annual Symposium 2016 (Singapore, September 8, 2016) The Innoxcell Annual Symposium (IAS) is largest and most comprehensive international legal and regulatory compliance conference in Hong Kong, Beijing, Shanghai, Singapore, Australia and United States.This...

SecureWorld Cincinnati (Sharonville, Ohio, USA, September 8, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Borderless Cyber Europe (Brussels, Belgium, September 8 - 9, 2016) Join CIOs, CISOs and cyber threat intelligence experts from industry, government and CSIRTs worldwide to share experiences, strategies, tactics and practices that will improve your state of preparedness...

SANS Network Security 2016 (Las Vegas, Nevada, USA , September 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity!...

Business Insurance Cyber Risk Summit 2016 (San Francisco, California, USA, September 11 - 12, 2016) The Business Insurance Cyber Risk Summit provides risk management professionals and chief information security officers with the practical information and tools needed to combat the latest cyber risks...

Hacker Halted 2016 (Atlanta, Georgia, USA, September 11 - 16, 2016) This ​year, ​Hacker ​H​alted’s theme​ is​ the Cyber Butterfl​​y Effect​:​ When ​S​mall ​M​istakes ​L​ead to ​B​ig ​D​isasters​. The goal of the conference is to bring the IT security community together...

(ISC)² Security Congress (Orlando, Florida, USA, September 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity...

7th Annual Billington Cybersecurity Summit (Washington, DC, USA, September 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity...

Privacy. Security. Risk. 2016 (San Jose, California, USA, September 13 - 16, 2016) Innovative since Day 1, P.S.R. brings together two related fields—privacy and security—helping you see beyond your role in order to excel in your role. Because perspective is everything. Delivering the...

CISO GAS (Frankfurt, Hessen, Germany, September 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives...

ISS World Americas (Washington, DC, USA, September 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech...

Tarleton State University Cyber Security Summit 2016 (Dallas, Texas, USA, September 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply...

Insider Threat Program Development Training For NISPOM CC 2 with Legal Guidance (Germantown, Maryland, USA, September 14 - 15, 2016) Insider Threat Program Development Training for NISPOM CC 2 (Germantown, Maryland, September 14 - 15, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development...

SecureWorld Detroit (Dearborn, Michigan, USA , September 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Insider Threat Program Development Training for NISPOM CC 2 (Milwaukee, Wisconsin, USA, September 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795...

4th ETSI/IQC Workshop on Quantum-Safe Cryptography (Toronto, Ontario, Canada, September 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and...

Cyber Physical Systems Summit (Newport News, Virginia, USA, September 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection... Security Conference (The Hague, the Netherlands, September 20 - 23, 2016) Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of...

3rd Annual Senior Executive Cyber Security Conference: Navigating Today's Cyber Security Terrain (Baltimore, Maryland, USA, September 21, 2016) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 3rd Annual Senior Executive Cyber Security Conference on Wednesday, September 21, from 8:30 a.m. –...

New York Cyber Security Summit (New York, New York, USA, September 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, September 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential...

NYIT Annual Cybersecurity Conference (New York, New York, USA, September 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry...

GDPR Comprehensive 2016 (London, England, UK, September 22 - 23, 2016) The GDPR is now a reality. Are you prepared? We had an incredible response to the IAPP GDPR Comprehensive in Brussels and New York, where we prepared hundreds of privacy and data protection professionals...

Cyber Security: How to Identify Risk and Act (Frankenmuth, Michigan, USA, September 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information ...

CYBERSEC (Kraków, Poland, September 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC...

Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, September 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in...

IP EXPO Nordic 2016 (Stockholm, Sweden, September 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases...

SecureWorld Dallas (Plano, Texas, USA , September 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.