skip navigation

More signal. Less noise.

Recorded Future

Get threat intelligence on hackers and vulnerabilities FREE every day with the Recorded Future Cyber Daily. Sign up today.

Daily briefing.

Proofpoint finds an active cyber espionage campaign targeting Indian diplomatic and military personnel. "Transparent Tribe," as they're calling it, seems most active against Indian missions to Saudi Arabia and Kazakhstan. Several Pakistani IP addresses are said to be involved in the campaign, which uses a mix of phishing and water hole attacks to distribute the MSIL/Crimson remote access Trojan.

Observers continue to look for the causation, if any, behind BlackEnergy's correlation with December's Ukrainian grid hack.

Trend Micro finds Pawn Storm infesting government and media targets in Turkey. They offer no attribution, but they do avert to ongoing tensions between Turkey and Russia, Pawn Storm's circumstantial connection with various Russian actors, and the current infestation's localization to sites involved with criticism of Russian intervention in Syria.

The legitimate BitTorrent application Transmission has become enmeshed in what's being called the first ransomware campaign directed against Mac users. Palo Alto Networks reported the KeRanger attacks to Apple last week, and Apple has taken steps to interdict the ransomware.

The US and South Korea increase cooperation against North Korean threats, kinetic and cyber.

Observers mull the impact of last week's open avowal, by the US, of its possession of (and intent to use, against ISIS) offensive cyber weapons.

Apple draws more industry support in its dispute with the US FBI over unlocking the San Bernardino jihadist's iPhone.

And ave atque vale, Ray Tomlinson, "godfather of email," who passed away late last week. Our thanks to him; our condolences to his family and friends.

Notes.

Today's issue includes events affecting Brazil, Chile, China, Colombia, European Union, India, Iran, Ireland, Kazakhstan, Democratic Peoples Republic of Korea, Republic of Korea, Netherlands, Pakistan, Romania, Russia, Saudi Arabia, Syria, Turkey, Ukraine, United Kingdom, United States, and Venezuela.

2016 National Conference of Minority Cybersecurity Professionals (Washington, DC, March 23 - 24, 2016) The landmark ICMCP conference will elevate the national dialogue on the necessary measures needed to attract and develop minority cybersecurity practitioners to address the cross-industry cybersecurity skills shortage.

Women in Cybersecurity (WiCYS) 2016 (Dallas, TX, March 31 - April 2, 2016) The 3rd annual conference brings together women (students, faculty, researchers, professionals) in cybersecurity from academia, research organizations and industry for the sharing of knowledge and experience, networking and mentoring.

Dateline RSA 2016

Recapping RSA Conference 2016 (Fortune) Pentagon bug bounty programs, Defense Department appointments, Apple versus FBI, and more

Fear and loathing at RSA — Hacking, security and the limits of protection (TechCrunch) There is danger everywhere you look in the cybersecurity space

At RSA Conference, Unlikely Allies Address Value of Digital Security (New York Times) To Amit Yoran, a digital security veteran, the fight between Apple and the F.B.I. over access to an iPhone can be viewed in black-and-white terms: What law enforcement authorities want is “so misguided, they simply boggle the mind”

Sparks fly over Apple v. FBI dispute at major cybersecurity gathering (+video) (Christian Science Monitor Passcode) As tens of thousands of people from all over the world convened this week in San Francisco for the RSA Conference to learn about the latest in cybersecurity innovation, the iPhone dispute between Apple and the FBI dominated the conversation

Beat the Breach: What's at stake in the encryption debate? (Christian Science Monitor Passcode) Passcode deputy editor Sara Sorcher interviews Assistant Attorney General for National Security John Carlin, RSA President Amit Yoran and Former White House Cyber Advisor Richard Clarke on the federal government's approach to cybersecurity and leading news topics at at the second annual Beat the Breach event in San Francisco, Calif. on March 1, 2016. Hosted by cybersecurity firm Invincea and the Christian Science Monitor's Passcode section, the event brings together top private sector executives with leading government officials in cybersecurity

Why the federal CISO could be cybersecurity game changer (+video) (Christian Science Monitor Passcode) Federal Chief Information Officer Tony Scott says the government's first chief information security officer will have the broadest support ever for the new role

Carter Gets Strong Marks for Innovation Push; Challenges Remain (DefenceNews) On stage at the RSA security conference here March 2, Defense Secretary Ash Carter was praised by the moderator for his “cool” ideas and his efforts to reach out to the Silicon Valley

RSA 2016: Future of cyber-espionage (SC Magazine) Security researchers laid out potential scenarios for the future of cyber-espionage on Wednesday at the RSA Conference in San Francisco. In a session titled "The Dark Web and Cyber-espionage," attendees were presented with a bleak outlook in which relatively simple attacks will increasingly be used by nation-state entities seeking to gain control of infrastructure and resources

Hackers targeting internet-connected systems to steal oil, expert warns (Guardian) The high price of oil, and an increasingly software-reliant network of sensors and monitoring tools are making the oil trade a high target for hackers

How the 'Internet of Things' could be fatal (CNBC) Researcher Marie Moe woke up after emergency surgery in 2011 with a new pacemaker to correct a heart condition. What she didn't realize at the time was that the lifesaving device in her chest exposed her to a completely different kind of threat

Act now, or live in a world with 45 trillion IoT security holes (FierceMobileIT) The security of Internet of Things devices was a popular topic here at the RSA Conference

#RSAC: Hackers Will Abuse Gov Data Access, Say Security Pros (Infosecurity Magazine) With the RSA Conference drawing to a close over in San Francisco, Tripwire took the opportunity to pick the brains of some of the security professionals at the event about the current hot topic of government access to encrypted data

Hacking back will only get you in more trouble (CSO) RSA panel warns there is no easy solution to online IP theft in response to economic espionage

Shortage of trained cybersecurity personnel has industry worried (San Jose Mercury News) After years of massive hacker attacks on industry and government, the realization that the bad guys are winning has led to a surge in cybersecurity jobs that has outpaced the supply of people to fill them

RSA: Will your next phone have quantum cryptographic 2FA? (We Live Security) Yes or no, will your next phone have quantum cryptographic 2FA?

Cyber operations platform to automate the hunt for cyber adversaries (Help Net Security) At RSA Conference Endgame announced the launch of a comprehensive cyber operations platform for organizations to detect, block, and evict advanced threats at the earliest phase of the kill chain

APCON Introduces IntellaFlex 100G Network Monitoring Solution at RSA Conference (Apcon) Service providers and enterprises gain real-time visibility of high-speed networks and extend the life of today’s security and performance monitoring tools

Tiny Firewall Tackles SOHO Security (Dark Reading) Untangle rolls out a 5-inch firewall

Bastille Wins Cyber Defense Magazine’s “Best Wireless Security Solution” Award for 2016 (BusinessWire) 4th Annual Cyber Defense Magazine Infosec Awards recognize innovation during RSA Conference 2016

CYREN WebSecurity Named Best Anti-Malware Solution by Cyber Defense Magazine (IT Business Net) Award recognizes CYREN WebSecurity for delivering fast, innovative malware defense as a SaaS service

Cyber Attacks, Threats, and Vulnerabilities

Espionage Malware, Watering Hole Attacks Target Diplomats (Threatpost) Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including phishing and watering hole sites

BlackEnergy malware activity spiked in runup to Ukraine power grid takedown (Register) But its role in the attack remains unclear

Pawn Storm Campaign Adds Turkey To Its List of Targets (TrendLabs Security Intelligence Blog) Pawn Storm, the long-running cyber espionage campaign, added to its long list of targets several government offices (including the office of the prime minister and the Turkish parliament) and one of the largest newspapers in Turkey

Apple users targeted in first known Mac ransomware campaign (Reuters) Apple Inc (AAPL.O) customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc (PANW.N) told Reuters on Sunday

A New Type of Ransomware is Affecting Apple's OS X Devices (Capital Wired) A new type of ransomware that attacks OS X gadgets has been identified by specialists

Apple shuts down first-ever ransomware attack against Mac users (IDG via CSO) The ransomware was seeded inside a legitimate BitTorrent application called Transmission

CERBER: Crypto-ransomware that Speaks, Sold in Russian Underground (TrendLabs Security Intelligence Blog) “Attention! Attention! Attention! Your documents, photos, databases and other important files have been encrypted!”

Macro Malware Strides in New Direction, Uses Forms to Store its Code (TrendLabs Security Intelligence Blog) The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware solutions and sandboxing technologies

VulDB: IBM Business Process Manager up to 8.0.1.3/8.5.0.2/8.5.6.2 URL Handler cross site scripting (SCIP) A vulnerability, which was classified as problematic, has been found in IBM Business Process Manager up to 8.0.1.3/8.5.0.2/8.5.6.2. Affected by this issue is an unknown function of the component URL Handler. The manipulation with an unknown input leads to a cross site scripting vulnerability

Seagate Phish Exposes All Employee W-2’s (KrebsOnSecurity) Email scam artists last week tricked an employee at data storage giant Seagate Technology into giving away W-2 tax documents on all current and past employees, KrebsOnSecurity has learned

Three more firms hit by targeted Phishing attacks seeking W2 data (CSO) Simple scam has snagged seven victims in less than two-months

Hackers demand €20k as firms hit by 'ransomware' (Independent) Irish businesses also targeted by 'garda fine'

Another Malicious Document, Another Way to Deliver Malicious Code (Internet Storm Center) I’m operating several catch-all mailboxes that help me to collect interesting emails. Besides the classic spam messages which try to sell me colored pills and to promise me millions of revenue, I’m also receiving a lot of malicious documents. For a few weeks, I can see a huge peak of emails

Time Warner Cable’ Business Class Customer Support portal Hacked (Hack Read) TeaMp0ison is back — this time with a new approach and a new hack

MPD Possible Victim of Cyber Attack (Alabama News) The Montgomery Police Department is the target of a possible Cyber attack

Big increase in DDoS attacks (Mybroadband) The latest Akamai State of the Internet Security Report reveals a massive increase in the number of DDoS attacks, and shows where these attacks come from

Security Patches, Mitigations, and Software Updates

Known Bugs in Windows 10 Redstone Build 14279 - Kaspersky Software Not Working (Softpedia) Since it’s just available for fast ring users, the newly-released Windows 10 Redstone build 14279 still comes with several bugs and Microsoft has detailed all of them in an announcement today

Shamed Amazon Decides to Restore Full-Disk Encryption to Its Fire OS Devices (Softpedia) Amazon has announced it will be restoring support for full-disk encryption to its mobile devices running Fire OS after the company was criticized from all sides this past weekend

Google extends right-to-be-forgotten rules to all search sites (Ars Technica) That includes Google.com for the first time—blocked via geolocation data

Cyber Trends

We're fighting an invisible war -- in cyberspace (CNet) Destructive skirmishes are taking place in cyberspace right now, and increasingly they're spilling into people's daily lives

When Encryption Becomes The Enemy’s Best Friend (Dark Reading) The growth in SSL/TLS traffic has made it a lot easier for threat actors to slip attacks and malware past enterprise defenses

A major red flag about security could threaten the entire IoT (Business Insider) Companies are pushing ahead full force into the Internet of Things, but a new report has revealed a potentially major problem

Why Brand Reputation Management Now Includes Cyber Safety (Business2Community) As I’ve been telling anybody who will listen, cyber security is the challenge of our day and marketers who are responsible for a brand need to take it seriously

Marketplace

Rise of the CISO: Why the C suite needs a security chief (Tech Republic) The CISO role is growing in popularity, but what does it actually mean for your business? Here's what the role is responsible for and why CISOs are multiplying in the enterprise

Symantec And Check Point: Finding Value In A Highly Valued Space (Seeing Alpha) Symantec and Check Point have far more modest valuations than their faster-growing rivals in the enterprise security space. Check Point achieves remarkable margins, and as such, is one of the better GARP stories in the IT universe. Symantec: Now that the Veritas divestiture is complete, is a bet on a turnaround. But valuation provides a support for the bet

SIM card maker Gemalto's margin forecast lifts shares (Reuters) French SIM card maker Gemalto on Friday said it expected its gross margin to improve significantly this year after posting forecast-beating results, driving its shares more than 10 percent higher

Cisco buying cloud startup CliQr for $260 million (Silicon Beat) Cisco is buying San Jose startup CliQr Technologies for $260 million as it continues to boost its cloud offerings, the San Jose networking company said Tuesday

Samsung, Qualcomm Under Pressure to Enter Chipmaker Deal Frenzy (Bloomberg) Chipmakers will continue gobbling up one another this year, and deep-pocketed giants like Qualcomm Inc. and Samsung Electronics Co. are under pressure to enter the fray

Ex-GCHQ-run Darktrace 'diagnoses' sick computers and cures them (Telegraph) Cyber defence startup Darktrace diagnoses threats to a company's computer systems, just like a developing cold

Armadillo makes loud noise over new vendor Cylance (CRN) Security VAR predicts latest vendor signing could make waves in end-point security space

TalkTalk chief signals change after cyber attack (FInancial Times) The damaging cyber attack on TalkTalk’s website last year will lead to a fundamental change in how the company operates, says chief executive Dido Harding, who signalled that chasing customers with low-cost offers would be tempered with greater responsibility

IBM Cuts Jobs In 'Workforce Rebalancing' (InformationWeek) IBM has reportedly begun a wave of layoffs that are initially targeting the Global Technology Services and Global Business Services groups. Here's what we know so far

Booz Allen Hamilton to support cyber security services for US DoD (Army Technology) Booz Allen Hamilton (BAH) has secured a $5bn contract to provide cybersecurity and information systems support services for the US Department of Defence (DoD)

Ex-Hackers On List Of Billionaires (Forbes) The World’s Billionaires List for 2016 was announced by Forbes today — and reformed hacker Bill Gates is number one, with a net worth of $75 billion

Products, Services, and Solutions

Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials (Dark Reading) SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source

Dell delivers Red Cloak security service to spot network attacks by analysing activity (V3) Dell's SecureWorks subsidiary has unveiled a cloud-based service that identifies threats through malicious behaviour, enabling it to pick up on attacks that may otherwise go undetected because they involve little or no malware code

Unisys Stealth coming to classified programs (GCN) Unisys’s Stealth security software solution, which provides identity-based micro-segmentation across a range of environments, received word from the National Security Agency that the platform is close to approval for NSA’s Commercial Solutions for Classified Program Components List

Technologies, Techniques, and Standards

Data watchdog encourages companies to get encryption software independently assessed (Out-Law) Organisations should get the encryption software they intend to use independently assessed where it is "of critical importance" that they can be sure the personal data they are responsible for cannot be accessed via built-in vulnerabilities in the software, the UK's data protection authority has said

Data breach laws to create compliance confusion: IT security expert (CIO) Detailed guidance and consultation needs to be introduced, says Protiviti's Ewen Ferguson

Ransomware Rules for Payment: Do Extortionists Have the Advantage? (RSA Blogs) When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin. And in that single moment, one hospital became the obligatory canary in a coal mine

Why Marrying Infosec & Info Governance Boosts Security Capabilities (Dark Reading) In today's data centric world, security pros need to know where sensitive data is supposed to be, not just where it actually is now

7 tips for securing the Internet of Things (Naked Security) I’ve recently had the opportunity to purchase some “smart” devices that everyone seems to be referring to as the Internet of Things (IoT)

Let your uSeRS chOOse wACKy passWords, US banks! (Naked Security) With many US banks, what you see in your password field may not be what you get

Selecting the Right Sized Integrator for your Enterprise (Security Magazine) Smaller integration firms are quickly filling the gaps left by national integration giants, often with custom-tailored and flexible security systems. Which one is right for your enterprise?

Design and Innovation

Ray Tomlinson, godfather of @ email, dies at age 74 (Reuters) Ray Tomlinson, considered to be the godfather of email, has died, according to his employer, Raytheon Company. He was 74

Can you take the Internet out of the Internet of Things? (TechCrunch) The Internet of Things and the Internet might seem inextricably linked, but, increasingly, there are questions centered around how IoT devices should work with one another — and what happens when the Internet connection goes down?

Half of inventions “arise unexpectedly” from serendipity—not direct research (Ars Technica) Research institutions are the least likely inspirations for that spark of creativity

Research and Development

SK launches quantum cryptography communication network (Telecompaper) A consortium led by SK Telecom has completed the rollout of five different national test networks for national quantum cryptography communication that cover a combined total of 256 kilometers. The test networks cover five different areas in Korea

Academia

Teams face off in Rocky Mountain Collegiate Cyber Defense Competition (Denver Post) Regional winner Brigham Young University advances to national competition in San Antonio

Legislation, Policy, and Regulation

Cyber campaign against Islamic State marks beginning of a new secret war (Baltimore Sun) Days after the United States acknowledged conducting warfare over computer networks for the first time, Defense Secretary Ashton B. Carter took the stage at a major information security conference in San Francisco

Why the Pentagon is finally acknowledging the U.S.'s 'offensive cyber' efforts (Jacksonville Business Journal) U.S. Secretary of Defense Ashton Carter was in Washington this past week testifying on the Pentagon’s budget before jetting off to Silicon Valley to talk innovation with tech business leaders, but whether he’s on the East Coast or the West Coast there’s one issue that every audience is asking about: offensive cyber

South Korea, U.S. begin exercises as North Korea threatens attack (Reuters) South Korean and U.S. troops began large-scale military exercises on Monday in an annual test of their defenses against North Korea, which called the drills "nuclear war moves" and threatened to respond with an all-out offensive

US and South Korea to work more closely on cyber security enhancements 0 (StreetWise Journal) South Korea’s Ministry of Science, ICT and Future Planning announced at the weekend that vice minister Choi Jae-Yu had met with Dr. Reginald Brothers, the under-secretary of the US Department of Homeland Security recently to forge closer cooperation in the field of cyber security

The Crypto Wars Are Global (Motherboard) American politicians, media, and the public may be focused on the ongoing battle between Apple and the FBI over encryption in the iPhone, but the so-called Crypto Wars are far from just a national issue

Apple Vs National Security (Indian Express) There is an opportunity for a global treaty to balance security concerns and privacy

UK government's response to cyber attack info sharing negligible, says Mitsubishi-Tokyo Bank (ComputerWorld) While Lloyds says frontline businesses often unaware of cyber risk realities

Apple case exposes ongoing government rift over encryption policy (Reuters) Even as the Department of Justice battles Apple in court over access to encrypted data, the Obama administration remains split over backing requirements that tech manufacturers provide law enforcement with a "back door" into their products, according to a dozen people familiar with the internal debate

Executive branch concedes Wassenaar Arrangement must be renegotiated, not revised (SC Magazine) The U.S. executive branch this week changed its stance on the controversial 2013 amendment to the Wassenaar Arrangement that closely regulates the international export of cyber hacking and surveillance technologies

Microsoft and Google employees on US national guard may join cyber was against Islamic State (Tech 2) U.S. Defense Secretary Ash Carter said the National Guard’s cyber squadrons will play an increasingly important role in assessing the vulnerabilities of U.S. industrial infrastructure and could be asked to join the fight against Islamic State

Navy workforce memo separates cyber from IT (FCW) The Defense Department has been restructuring its workforce in recent years to adapt to the challenges of its heavy reliance on cyberspace for missions

Litigation, Investigation, and Law Enforcement

Apple exec argues against turning back the clock to 'less-secure time' (Computerworld) Reprises arguments made by Apple and a slew of supporters in page of The Washington Post

Why Apple should hold firm against FBI (San Francisco Chronicle) Since a pitched legal battle between the FBI and Apple began last month, the arguments over encryption and national security are deepening

Tech Companies Hesitated Before Supporting Apple (New York) Tech companies — including Alphabet, Microsoft, Facebook, Snapchat, and Yahoo — are signing amicus briefs in support of Apple in its case against the federal government, which has asked Apple to unlock the phone of one of the San Bernardino terrorists

Amicus Briefs in Support of Apple (Apple Press Info) [Amicus briefs and letters to the court, with links]

Apple vs FBI: Lavabit warns FBI’s “extraordinary” action may drive US businesses offshore (TechCrunch) Another amicus brief has been filed in support of Apple in its legal battle with the FBI over the measures it is being ordered, by a court writ, to take to help the agency break into a locked iPhone used by one of the San Bernardino terrorists

Top iPhone Hackers Ask Court to Protect Apple From the FBI (Wired) Since Charlie Miller became the first hacker to demonstrate how to take over an iPhone in 2007, he’s had a complicated relationship with Apple

FBI v Apple: Is medical records privacy at risk? (HealthcareDIVE) The debate over whether tech giant Apple should help the Federal Bureau of Investigation unlock an iPhone used by one of the San Bernardino terrorists moved to Congress Tuesday, where lawmakers pressed both sides on how best to balance physical security and information security

What is a “lying-dormant cyber pathogen?” San Bernardino DA says it’s made up [Updated] (Ars Technica) He now says there's no evidence of cyber doom, wants iPhone unlocked to be sure

Brazil Arrests Senior Facebook Exec Over WhatsApp Aid In Drug Case (Fortune) Not the first time Brazil has clashed with WhatsApp over lack of cooperation

U.S. Commerce Department to Place Restrictions on ZTE Corp (Fortune) The problem is ZTE’s alleged dealings with Iran

Suspected Bush family hacker Guccifer to be extradited to US (IDG via CSO) The hacker will be sent to the U.S. for 18 months in order to face multiple charges there

Central Bank of Venezuela doubles down in “cyber-terrorism” website lawsuit (Ars Technica) DolarToday wins motion to dismiss, but Caracas fires back with a new filing

New Name Surfaces In Clinton's Email Scandal (Forbes) A new name has surfaced in connection to Hillary Clinton’s private email server – Ronald S. Posner, Chairman and CEO at eChinaCash

Cumbrian hacker's cyber attack forced Moonpig to close website on three continents (Carlisle News and Star) A computer hacker launched a cyber attack on the firm Moonpig[dot]com, forcing it to shut down its operations in three different continents.

16-year-old who distributed his teacher’s nude pics faces felony charges (Ars Technica) "When you’re 16, just being sorry... is not enough anymore"

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

CSO 50 Conference and Awards (Litchfield Park, Arizona, USA, April 18 - 20, 2016) We at CSO, the award-winning media brand, will bring you speakers from up to 50 organizations with outstanding security prowess. Over 2 ½ days, these distinguished executives and technologists will share...

Upcoming Events

International Academic Business Conference (New Orleans, Louisiana, USA, March 6 - 10, 2016) The Clute Institute of Littleton Colorado sponsors six academic conferences annually that include sessions on all aspects of cybersecurity. Cybersecurity professionals from industry and academics are...

CISO Chicago Summit (Chicago, Illinois, USA, March 8, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

Navigating Summit 2016 (Canberra, Australia, March 8, 2016) The Australian government has pledged to create a future-proofed nation, one that is fit to drive higher economic growth and improved standards of living using information technology innovatively. Privacy...

CISO Atlanta Summit (Atlanta, Georgia, USA, March 10, 2016) Tactics and Best Practices for Taking on Enterprise IT Security Threats. With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing...

The Atlantic Council's Cyber 9/12 Student Challenge (Washington, D.C. USA, March 11 - 12, 2016) Now entering its fourth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

SANS 2016 (Orlando, Florida, USA, March 12 - 19, 2016) It is time we unite, join forces, and show that if we work together, we can make a measurable difference in security. It is our pleasure to announce that SANS 2016 is back in Orlando, Florida March 12-21 ...

CONAUTH/EKMS/COMSEC Information Sharing and Key Management Infrastructure (ISKMI) 2016 (Waikiki, Hawaii, USA, March 14 - 18, 2016) The ISKMI will draw global-wide participation and Allied (Five Eyes and NATO) attendees. Information sharing will be centralized to Key Management Infrastructure (KMI), Cryptographic Modernization (CM),...

Pwn2Own 2016 (Vancouver, British Columbia, Canada, March 16 - 17, 2016) Since its inception in 2007, Pwn2Own has increased the challenge level at each new competition, and this year is no different. While the latest browsers from Google, Microsoft, and Apple are still targets,...

Insider Threat Symposium & Expo™ (San Antonio, Texas, USA, March 17, 2016) The Insider Threat Symposium & Expo was created in the wake of the recent data breaches affecting the U.S. Government (WikiLeaks, NSA Breach), and the continued damaging and costly insider threat incidents...

ICCWS 2016 (Boston, Massachusetts, USA, March 17 - 18, 2016) ICCWS 2016 will cover the complex but exciting aspects of international cyber warfare and security

CISO Summit France (Paris, France, March 22, 2016) A forum for innovative IT thought leaders across France. Despite economic instability in the euro zone amid an on-going global financial crisis, IT spending worldwide is expected to increase in the coming...

Risk Management Summit (New York, New York, USA, March 22 - 23, 2016) The Business Insurance Risk Management Summit is a unique two-day conference serving the information and networking needs of senior risk managers, benefits managers and related decision makers from the...

Artificial Intelligence and Autonomous Robotics (Clingendael, the Netherlands, March 23 - 24, 2016) Artificial Intelligence (AI) has been a feature of science fiction writing for almost a century, but it is only in more recent years that the prospect of truly autonomous robotics — even those that...

International Consortium of Minority Cybersecurity Professionals (ICMCP) Inaugural National Conference (Washington, DC, USA, March 23 - 24, 2016) The conference will focus on the public, private and academic imperatives necessary to closing the growing underrepresentation of women and minorities in cybersecurity through diversification of the workforce.

Commonwealth Cybersecurity Forum 2016 (London, England, UK, March 23 - 24, 2016) The Commonwealth, built on consensus and mutual support, is an ideal platform to build international cooperation on various aspects of cybersecurity. CTO's Commonwealth Cybersecurity Forum brings together...

Black Hat Asia 2016 (Singapore, March 29, 2016) Black Hat is returning to Asia again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days — two...

SecureWorld Boston (Boston, Massachussetts, USA, March 29 - 30, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Insider Threat Summit (Monterey, California, USA, March 29 - 30, 2016) The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and ethical physical...

TU-Automotive Cybersecurity USA 2016 (Novi, Michigan, USA, March 29 - 30, 2016) TU-Automotive Cybersecurity dissects the real issues behind the headlines, helping you to apply technology and best practices to deliver robust security defenses and processes within a more secure ecosystem.

Women in Cyber Security 2016 (Dallas, Texas, USA, March 31 - April 2, 2016) With support from National Science Foundation, Award #1303441 (Capacity Building in Cybersecurity: Broadening Participation of Women In Cybersecurity through the Women in Cybersecurity Conference and Professional...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.