skip navigation

More signal. Less noise.

Daily briefing.

ISIS increases Southeast Asia recruiting efforts as it struggles to hold core territory in the Levant. Rival al Qaeda resurfaces online as one of Bin Laden’s sons threatens vengeance for his father’s death in a 2011 US raid on his Pakistan hideout.

NATO websites suffered outages during last week’s meetings of the Atlantic Alliance. Whether they were hacked is under investigation; a priori speculation says “Russia” (but that’s speculation).

Two Anonymous operations are underway in Africa. One, #ShutDownZimbabwe, has downed government websites in Zimbabwe to protest Robert Mugabe’s regime. In the other, as part of #OpAfrica, the hacktivist collective breached Armscor, a procurement agency of South Africa’s Department of Defense. Someone claiming to represent Anonymous has said the breach was accomplished by SQL injection. Details of various arms deals have been posted online.

More is out on Eleanor, the Mac malware whose existence researchers disclosed last week. In a scare headline, Naked Security reports that Eleanor “tries to hook your webcam up to the Dark Web.”

And researchers at Kaspersky and Cymmetria continue to track the ongoing campaigns in South Asia (“Patchwork” or “Dropping Elephant”) that have repurposed old exploits to successfully attack their targets.

Some 80,000 Amazon Kindle credentials are reported to have leaked.

Pokémon Go is out and popular. It’s also being spoofed by a RAT, and the extensive permissions the game requires (geolocation, mostly) have been exploited by muggers.

Car thieves are now using laptops as well as jimmies.

Inquiries into US State Department email scandals continue.

Notes.

Today's issue includes events affecting Albania, Belgium, Bulgaria, Canada, China, Croatia, Czech Republic, Denmark, Estonia, European Union, France, Germany, Greece, Hungary, Iceland, India, Iraq, Israel, Italy, Kosovo, Latvia, Lithuania, Luxembourg, Malaysia, Malta, NATO, Netherlands, Norway, Philippines, Poland, Portugal, Romania, Russia, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Syria, Ukraine, United Kingdom, United States, and Zimbabwe.

Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at Virginia Tech's Hume Center, as Charles Clancy discusses the privacy of data. Our guest will be Chris Gerritz, Infocyte CEO, who'll discuss the timely topic of threat hunting. (And if you'd care to review the Podcast, it's easy to do so on iTunes.)

E8 Security at Cisco Live 2016 (Las Vegas, NV, USA, July 11 - 13, 2016) E8 Security - DETECT. HUNT. RESPOND. Cisco Live 2016

SINET Innovation Summit 2016 (New York, NY, USA, July 14, 2016) — Register with promo code SINECYB for $100 of the price of admission.

Cyber Attacks, Threats, and Vulnerabilities

ISIS Has Launched a Newspaper to Recruit Southeast Asian Fighters (Time) The launch underscores growing fears of ISIS encroachment in the region

Q&A: Islamic State Has 'Metastasized,' Says Pulitzer Prize-Winner Joby Warrick (Radio Free Europe | Radio Liberty) Territorial gains made by the Islamic State (IS) militant group in Iraq and Syria have come as a surprise for many observers, as has its ability to attract Muslim youths to its brand of radical Islam or drive them to perpetrate terrorist acts in its name. But some argue that, far from appearing out of nowhere, the radical group in its current form is the result of a transformation rooted in the Sunni insurgency that followed the U.S. invasion of Iraq in 2003

Bin Laden's son threatens revenge for father's assassination: monitor (Reuters) The son of slain al Qaeda leader Osama bin Laden has threatened revenge against the United States for assassinating his father, according to an audio message posted online

NATO-Linked Websites Go Down, Cyberattack Suspected (Wall Street Journal) North Atlantic Treaty Organization meeting in Warsaw to address cyberspace dangers and Russian aggression

OpAfrica: Anonymous hacks South African arms procurement agency (Hack Read) Anonymous has hacked into the servers of Armscor, a South African arms procurement agency and leaked financial data belonging to agency’s officials, clients and trade details

Anonymous DDoS Zimbabwe Government Sites for #ShutDownZimbabwe (Hack Read) Anonymous Africa is now targeting government of Zimbabwe in support of ongoing protests against President Robert Mugabe

New Mac malware tries to hook your webcam up to the Dark Web (Naked Security) Mac malware is sufficiently rare, at least compared to Windows and Android, that new OS X malware strains often get a lot of attention

Pokemon Go wants to catch (almost) all your app permissions (TechCrunch) Let’s be honest, players of Pokemon Go aren’t going to care a Joltik or a Flabébé about the app permissions required to roam their neighbourhoods garnering the disproving glances of seniors as they fling invisible poke balls at the rose bushes

Android Mew-ware, I choose you: Code nasty poses as Pokemon GO (Register) DroidJack wants to peek-at-you

Fake Pokémon Go app contains RAT; takes full control of infected device (Hack Read) Alert for Pokémon Go app users on Android — cyber criminals have uploaded a fake copy of Pokémon Go gaming app which is actually infected with RAT that has a unique capability of taking over the smartphone

Gamer finds dead body while testing Pokémon Go’s GPS features (Ars Technica) App requiring users to walk to physical locations leads to disturbing discovery

Pokémon Go players robbed at gunpoint, suspects arrested (CSO) Police 'catch 'em all' shortly after receiving initial robbery reports

Amazon Suffers Security Breach; 80,000 Login Credentials Leaked (Hack Read) Hacker leaked 80,000 Amazon Kindle login credentials because the company wouldn’t respond to his security report

Cyber espionage group uses low profile tools to hunt high profile targets (Help Net Security) Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and government entities with a particular focus on China and its international affairs. This group, named Dropping Elephant (also known as “Chinastrats”), used their unsophisticated tools to attack some high profile Western targets as well

Cyber spies are still using these old Windows flaws to target their victims (ZDNet) 'Dropping Elephant' cyber-epionage group is using old and long-patched flaws as part of its campaign, but appears to be still finding some success

New APT Targets Thousands of Organizations in Southeast Asia (eWeek) Cymmetria discovered a new advanced persistent threat that it calls Patchwork. The initial infection uses the Sandworm vulnerability on unpatched systems

Thieves using laptops to hack into and steal cars (Naked Security) Say you’re planning to hot-wire a car

Hacker Finds Bug to Edit or Delete Any Medium Post (Motherboard) Medium has become the go-to home for extended blog posts from researchers, CEOs, and even the President of the United States. Now, one hacker has found a way to edit or delete any post on the publishing platform

Baton Rouge database of police details exposed over killing of Alton Sterling (Naked Security) @0x2Taylor, somebody who describes himself as a “Security Researcher,” is claiming responsibility for having published a database listing names and contact information for 50,000 police in Baton Rouge, just days after the fatal shooting of a black man in that city sparked more #BlackLivesMatter rage and a civil rights investigation from the Justice Department

Hijacked NASA Kepler Twitter feed tweets entirely new type of moon shot (Naked Security) Was that a photo of a new red ring around the planet Uranus, tweeted out by NASA’s Kepler account?

Omni Hotels was hit by point-of-sale malware (CSO) The hotel chain was hit by malware designed to collect payment card information

Poland's No.2 telecom Netia says suffered cyber attack (Reuters) Poland's No. 2 telecoms operator Netia came under attack from hackers who may have stolen the data of some of its clients, a company spokeswoman said on Friday

Guccifer Hacker aka Marcel Lazăr Lehel is NOT dead (Hack Read) Don’t fall for fake news about the death of Marcel Lazăr Lehel aka the Guccifer hacker — he is alive and awaiting sentencing in a Virginia jail cell

8 Ways Ethically Compromised Employees Compromise Security (Dark Reading) From audit cheats to bringing data to a new job, unscrupulous employees put organizations at risk

Security Patches, Mitigations, and Software Updates

Symantec says that Android Nougat prevents ransomware from resetting lockscreen passwords (Android Police) Ransomware is one of the nastier types of malicious software to emerge in the last few years. It's not exclusive to mobile, but the basic gist is that it locks down either specific files or an entire machine until the user sends money to a shady, untraceable online account to get their digital life back in order. The combination of easily-exploited security vulnerabilities, relatively small payments spread out over thousands of devices, and users reliance on their phones or computers has proven incredibly lucrative for malware developers

Facebook Messenger End-to-End Encryption Not On By Default (Threatpost) Facebook today began a test program rolling out opt-in end-to-end encryption for its Messenger service called Secret Conversations

Whispering Over the Internet: Facebook’s Encrypted Secret Conversations (Markets Morning) Since the founding of Facebook it has been innovative and revolutionary in the way we communicate with each other. The reigning king of social media has provided services for billions of people around the world. Where once communication was prohibited or impossible, Facebook provides the opportunity to interact and share ideas with likeminded or completely different individuals

Cyber Trends

Malware Drops Dramatically in First Half of 2016, But the Dangers of Malware are Still Very Real (Enigma Software) Tampa, St. Louis, and Orlando are on of top the list of the "most infected" cities for the first half of 2016

Insurance is ready for an upgrade (TechCrunch) Insurance may be widely perceived as a sleepy backwater when it comes to innovation in technology, but that’s about to change

What happens to consumer trust when a business is breached? (Help Net Security) In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached

You Have A Website? You Have Cybersecurity Risk (PC World) In the United States, small business is big business. Keeping the websites for those small businesses — all 28.4 million of them — safe and secure from attack, is a huge job. A job made easier with the help of a trusted partner

Cyber security will soon be the work of machines (Financial Times) Technology thinks like us — only better and faster, and it never tires, writes Anjana Ahuja

Is artificial intelligence the next frontier in security technology? (Security Info Watch) It sounds like the stuff of science-fiction; computer-based systems that can learn behavior pattern and make predictions about future incidents in both the physical and virtual world

A cyber-chasm prevents better security (ITWire) Australia is one of the faster adopters of virtualised servers, desktops, networks, and applications yet its thinking has not advanced as fast

Marketplace

Confusion over Cyber Insurance Leads to Coverage Gaps (CIO) Cyber insurance may be a booming business thanks to the high-profile breaches, but the market for such policies is a complicated, say experts from SANS Institute, Advisen and PivotPoint

Startup of the Week: Zuroovi takes the pain out of cyber insurance hunting (Washington Business Journal) It shouldn’t be so hard to get cyber insurance for a small business. At least that was Peter Madara’s thought when he tried to get cyber insurance for himself last year

Avast/AVG Deal: Why Should It Interest Intel? (Value Walk) Intel Corporation (NASDAQ:INTC) will be very interested in the details of a recent Avast/AVG deal as recently there were reports about it exploring options for selling its security unit. Following a slow start to the year, the tech M&A scene, much like the IPO market, is heating up, and security tech companies are the biggest beneficiaries of this trend

Microsoft rebrands EMS to become Enterprise Mobility + Security (Enterprise Apps Tech) It’s EMS, Jim, but not as we know it: Microsoft is rebranding its Enterprise Mobility Suite (EMS) to become Enterprise Mobility + Security, in order to “more accurately communicate its value”

Barracuda Networks Inc (CUDA) Stock Skyrockets on Blockbuster Q1 Earnings Call (Country Caller) Barracuda posted $86.7 million in total revenues, edging the Street's estimates of $83.84 million

Better Buy: FireEye Inc. or CyberArk Software Ltd? (Motley Fool) Which beaten-down cybersecurity player is a better long-term buy?

Why FireEye Is A Toxic Investment (Seeking Alpha) FireEye investors who have bought the stock in the hopes of an acquisition should consider selling their holdings as none will buy out the company at its asking valuation. FireEye has removed its CEO who used to specialize in selling several emerging companies and was spearheading companies like McAfee and Documentum when they were acquired. No buyer will pay a premium for FireEye as its expenses have been rising at a faster pace than the revenue, while the debt is also substantial. Due to a rapid growth in expenses, FireEye's operating cash flow has slipped deep into the red, which is why no buyer might pay its $30/share asking price. FireEye has made a mistake by not accepting two buyout offers this year, while the management shake-up indicates that the board does not intend to sell the company

US cyber security firm Imperva to explore strategic options (Domain-b) US cyber security firm Imperva Inc is planning to hire an investment bank in order to help it explore strategic options after coming under pressure from activist hedge fund Elliott Management, Reuters yesterday reported, citing people familiar with the matter

Billionaire Mike Lynch explains why he's putting his money into a Cambridge cybersecurity startup that's full of spies (Business Insider) This week, a relatively young cybersecurity company called Darktrace announced that it has raised an additional $65 million (£50 million) at a suspected valuation of over $400 million (£308 million)

HackerOne Continues to Grow Bug Bounty Business (eSecurity Planet) Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model

An Israeli startup is using the ancient art of military deception to trap hackers everywhere (Tech Insider) Israeli cybersecurity firm Cymmetria specializes in what it calls "cyber deception," and it should scare hackers everywhere

The Evolution of Deception Tech (InfoRisk Today) Smokescreen's Hidayatullah on controlling the narrative in an attack

CyberArk Named a Leader in Privileged Identity Management by Independent Research Firm (Yahoo! Finance) Report recognizes CyberArk for largest privileged identity management market presence

Citadel Security hires Microsoft’s Kevin Turner as the CEO of the company (Big News Network) Citadel Securities has announced that it has hired Microsoft COO Kevin Turner to be the new CEO of the financial company

Products, Services, and Solutions

Airbus to enhance RAF crypto (IHS Jane's 360) Airbus Defence and Space is set to provide cryptographic key management technology for the UK's F-35B Lightning II, C-130J, and MRTT Voyager aircraft, IHS Jane's has learned

The reward for mining Bitcoin was just cut in half (TechCrunch) It’s Halvening!!!

Ashley Madison admits using fembots to lure men into spending money (Ars Technica) The hookup site for cheaters admits its mistakes and tries to rebrand

Technologies, Techniques, and Standards

PCI-DSS: The Asian Journey to Compliance (InfoRisk Today) SISA founder Shanthamurthy says PCI Standards are embraced in Asia, Middle East markets

PCI: Why Indian Banks Say Compliance Remains Priority (InfoRisk Today) But will push for cardless payments make PCI-DSS obsolete 10 years from now?

Lessons Learned from Industrial Control Systems (SANS Internet Storm Center) While at SANSFire a few weeks ago, I had the good fortune to sit in on Robert M. Lee as he taught ICS515: ICS Active Defense and Incident Response. I'm not responsible for defending a power-plant's network nor do I have a manufacturing floor in my enterprise. I've also not worked with Modbus outside of CyberCity. However, like many of you, I have certain business-critical systems running on legacy hardware or requiring now-unsupported Operating Systems. These are the systems that you can't patch, or that even if they experience a compromise, you can't immediately shut them down. How to you secure networks with such constraints?

Why you shouldn't pay the ransomware fee (CSO) What enterprises need to consider in deciding whether to pay a ransomware fee

Cyber Resilience - Going Beyond Security to a New Level of Readiness (Crowe Horwath) Security, disaster recovery, and business continuity are all elements of “cyber resilience.” As attacks against data and information systems become more prevalent and malicious, it’s no longer a question of whether an attack will succeed, but when. Many leading organizations are turning to the concept to help limit the damage and speed up recovery. This article explains how cyber resilience goes beyond preventing attacks to focus on mitigating attacks’ consequences. It outlines the critical components an organization needs for a mature and effective program

Manage cybersecurity risk by restoring defense-in-depth’s promise (Help Net Security) Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how effectively are organizations investing in these tools? Not very, as 28 percent of the spending pays for security products which are either underutilized or not used at all, according to survey findings from Osterman Research

Cybersecurity firms step up intel sharing despite issues of trust (PCWorld) The collaboration has been protecting companies from the latest cyber attacks

Cyber risk management for financial institutions (Manilla Times) A study the Ponemon Institute and Hewlett Packard Enterprise conducted in 2015 found that for the average cost of cyber crime companies have suffered in any particular industry, financial services topped globally. Last year, the annualized average cost of cyber crime in the financial sector was $13.5 million, followed by the utilities and energy sector ($12.8 million)

How to set up two-step verification on Twitter (Naked Security) We’ve been reviewing why two-factor authentication (2FA) is so important, and how to set it up on various websites and services you might commonly use. When 2FA is available, it’s a great feature to enable to help secure your account, and thankfully it’s becoming more and more common on a number of popular sites

Design and Innovation

How artificial intelligence could help warn us of another Dallas (Washington Post) As the country reels from the spasm of gun violence that killed two black men and five police officers this week, a prominent digital vigilante is using an online tool he hacked together to keep an eye on hot spots that seem at risk of boiling over into bloodshed

Eyefluence shows us how we’ll be able to navigate screens with our eyes (TechCrunch) What if you could control a computer screen with just your eyes? Well that’s the vision of Eyefluence, a Silicon Valley-based startup that is working on technology for hands-free navigation

Academia

NSF awards Norwich grant for free teen summer cyber camp for second year (VermontBiz) Norwich University has received a grant for more than $72,000 from the National Science Foundation, with support from the National Security Agency, to lead a weeklong summer camp on cybersecurity for rising high school juniors and seniors. Dubbed GenCyber@NU (link sends e-mail), the comprehensive program is free to all participants and will be taught by standout Norwich faculty and alumni

Paladion Networks partners with M. S. Ramaiah University of Applied Sciences (Indian Education Diary) Paladion Networks, a globally acclaimed cyber security provider, is partnering with Karnataka's leading engineering college MS Ramaiah University of Applied Sciences to launch an M Tech program in Cyber security and Information Assurance. The course is a first-of-its-kind in India and aims to fill the talent crunch in the information security space

Legislation, Policy, and Regulation

The Nato summit might just make Vladimir Putin think again (Telegraph) hese days international summits come and go, a wearying merry-go-round of oppressive security, unreadable declarations and mutual self-congratulation. But this 2016 Nato summit in Warsaw is fraught with both human and strategic interest

Putin Haunts NATO Summit as Leaders See Threat on All Fronts (Bloomberg) NATO leaders pledged to bolster Europe’s defenses in the face of what they called an “arc of insecurity and instability” from Moscow to North Africa

India may amend law to step up cyber security: RK Sudhanshu (Economic Times) The Department of Electronics and Information Technology (DeitY) is gearing up to bring in new encryption and privacy policies to cater to evolving cyberspace, RK Sudhanshu, joint secretary cyber laws and e-security said on Friday

White House and Congress clash over Cyber Command (Washington Examiner) Lawmakers have largely expressed what they see as a need to restructure national cyberdefense by more clearly delineating lines of authority and elevating the status of Cyber Command in the Pentagon. However, pushback from the White House is casting doubt on whether such a move would be viable this year, much to the frustration of Congress

Obama says U.S. government must improve cyber security (Reuters) U.S. President Barack Obama said on Sunday that the U.S. government has to improve its cyber security practices for the modern age of smart phones and other technology, saying that hackers had targeted the White House

N.J. lawmakers urge DHS to send more money for cyberattack prevention efforts (StateScoop) Members of the state's congressional delegation think some key grant changes could help New Jersey better fend off cyberthreats

Going Dark Going Forward: A Primer on the Encryption Debate (House Homeland Security Committee Majority Staff Report) Public engagement on encryption issues surged following the 2015 terrorist attacks in Paris and San Bernardino, particularly when it became clear that the attackers used encrypted communications to evade detection—a phenomenon known as “going dark.” While encryption provides important benefits to society and the individual, it also makes it more difficult for law enforcement and intelligence professionals to keep us safe

Homeland Security's big encryption report wasn't fact-checked (Engadget) In attempting to shine a light on 'going dark,' the Homeland Security Committee reveals just how in the dark lawmakers are on encryption

Litigation, Investigation, and Law Enforcement

Does Hacktivism Really Equal Terrorism? (Hack Read) An act involving hacking of a computer or a website to deliver a religious, political or social message is known as hacktivism but is it an act of terrorism as well?

Cybercrime Now Surpasses Traditional Crime In UK (Dark Reading) The US could be on an even worse trajectory, according to one security expert

Global Cybergangs Take The ‘Cyber Arms Race’ Lead (PYMNTS) It looks like the use of profitable malware fraud attacks is helping cybercriminals to remain one step ahead of authorities

Security industry largely welcomes NCA cyber crime report (ComputerWeekly) Most information security professionals support the National Crime Agency's call for help from businesses in pursuing cyber criminals

Inside the Global Banking E-Heist (Epoch Times) Cybercriminals infiltrate financial networks, putting U.S. banks at risk

Email controversy not over for Clinton, Republicans warn (Washington Post) Hillary Clinton and her allies think that the political and legal cloud that hovered over her presidential prospects for more than a year blew away last week with news that the Justice Department would not pursue criminal charges in her handling of sensitive emails

Congressman wants answers on State's security culture (FCW) FBI Director Jim Comey may have closed his case on presidential candidate Hillary Clinton and her private email server, but many in Congress still have questions

FBI Pros Question Decision Not to Charge Hillary Clinton (Sharyl Attkisson) If some in the general public were outraged, so were some in the FBI

J. Edgar Hoover’s FBI Wouldn’t Have Punted EmailGate (Observer) Obama and Clinton don’t fear Comey—and that’s a problem

Police Cybercrime Unit using old and obsolete equipment, EU assessment finds (Independent) Despite the fact that the amount of cases being handled by the Police Force’s Cybercrimes Unit has surged by over 1,000 per cent in just over a decade, an EU evaluation report has indicated that the Maltese cybercrime unit is using old as well as obsolete equipment

When Will Cyber Appellate Tribunal Chair be Named? (InfoRisk Today) Post remains vacant; fraud cases pending

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

SANS San Diego 2016 (San Diego, California, USA , October 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals...

SANS Miami 2016 (Coconut Grove, Florida, USA, November 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing...

SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, November 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the...

SANS Cyber Defense Initiative 2016 (Washington, DC, USA , December 10 - 17, 2016) Make plans to attend SANS Cyber Defense Initiative 2016 (CDI). SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative...

SANS Cyber Threat Intelligence Summit & Training 2017 (Arlington, Virginia, USA, January 25 - February 1, 2017) Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Most organizations are familiar with threat intelligence, but...

Upcoming Events

ISS World South Africa (Johannesburg, South Africa, July 10 - 12, 2016) ISS World South Africa is the world's largest gathering of Southern Africa Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception,...

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

SINET Innovation Summit 2016 (New York, New York, USA, July 14, 2016) “Connecting Wall Street, Silicon Valley and the Beltway.“ SINET Innovation Summit connects America’s three most powerful epicenters and evangelizes the importance of industry, government and academic collaboration...

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

cybergamut Technical Tuesday: The Importance of Managing Attribution Online by Dani Charles of Ntrepid Corporation (Elkridge and Calverton, Maryland, USA, July 19, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 19 July 2016 (1600 – 1730 East...

CyberSec 2016 (New York, New York, USA, July 19, 2016) Ask any bank CEO in the U.S. what keeps them up at night and cybersecurity is bound to be in the top five. Maybe even no. 1. And while the threat matrix is evolving rapidly, along with the regulatory demands,...

Nominations are now open: National Cyber Security Hall of Fame (Baltimore, Maryland, USA (nominations submitted online), July 20, 2016) The Cyber Security Hall of Fame "Respect the Past - Protect the Future" accepts nominations from companies and organizations that are engaged in, and committed to, the growth of the cyber security industry.

Insider Threat Program Development Training (Washington, DC, USA, March 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC.

Billington Global Automotive Cybersecurity Summit (Detroit, Michigan, USA, July 22, 2016) Billington Cybersecurity, an independent conference company focused exclusively on cybersecurity seminars, announces the first global summit that brings together the most senior government and industry...

Community College Cyber Summit (3CS) (Pittsburgh, Pennsylvania, USA, July 22 - 24, 2016) The third annual Community College Cyber Summit (3CS) is organized and produced by six Advanced Technological Education (ATE) centers funded by the National Science Foundation (NSF) and involved in cybersecurity.

SANS ICS Security Summit & Training — Houston 2016 (Houston, Texas, USA, July 25 - 30, 2016) SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security...

SANS San Jose 2016 (San Jose, California, USA , July 25 - 30, 2016) Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style...

AfricaHackOn (Nairobi, Kenya, July 28 - 29, 2016) What began as a casual meet up for information security professionals has become one of the formidable forces in the profession. That group is the AfricaHackOn. Housed under its parent umbrella, Euclid...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.