skip navigation

More signal. Less noise.

Daily briefing.

Bankers worldwide consider ways of reducing their vulnerability to large-scale fraud of the kind suffered by Bangladesh Bank, which SWIFT’s CEO calls “a big deal.” Kenya’s Central Bank is the latest to warn that it and related government organizations are receiving credible indicators and warnings of imminent cyber attack.

Kaspersky warns India that the threat actors behind the Danti campaign may have succeeded not only in spoofing senior officials’ emails, but in establishing persistent access to government networks.

Zscaler has observed a spike in Neutrino exploit kit activity. It’s being used in a malvertising campaign to drop the Gamarue/Andromeda Trojan.

Palo Alto researchers have found a campaign (“Pisloader”) using DNS as command-and-control for redirection of victims to sites whence they download the PoisonIvy Remote Access Trojan (RAT).

You may have seen messages inviting you to download “WhatsApp Gold,” allegedly an enhanced version of WhatsApp used by celebrities. Decline the invitation. There’s no such thing, warns White Hat Security, and all you’ll download is malware.

The CEO of Austrian aerospace supplier FACC is fired over the company’s business email compromise.

In other industry news, some analysts are tempted to go long Cisco and FireEye, and they’re waiting for Palo Alto’s results this evening. Votiro, Dashlane, and Demisto attract venture funding.

US Special Operations Command is looking for innovative cyber ops ideas and capabilities.

The US State Department Inspector General releases a lengthy report on email security and retention practices. It’s not exactly a letter of recommendation for some (one?) former Secretaries.


Today's issue includes events affecting Bangladesh, Belgium, Canada, China, France, Germany, India, Iraq, Ireland, Israel, Kenya, Libya, New Zealand, Switzerland, Syria, Tunisia, United Kingdom, United States, and Vietnam.

Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we follow up on ransomware with our partners at Level 3: Dale Drew tells us what negotiations are like when cyber crooks palaver with their victims. And we have as our guest Danny Rogers from Terbium labs, who talks about ways of scanning the Internet for sensitive data that don't require the scanner to be able to read those data. (We welcome reviews, by the way: you can provide an iTunes review here.)

Georgetown Cybersecurity Law Institute (Washington, DC, USA, May 25 - 26, 2016) Experienced government officials, general counsels, and cybersecurity practitioners offer insight into governance, preparedness, and resilience. Register Today, CyberWire readers receive a $100 DISCOUNT using code WIRE16.

Dateline Georgetown Cybersecurity Law Institute

Cybersecurity Law Institute (Georgetown University Law Center) It is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity. Those lawyers who ignore cyber threats are risking millions of dollars for their companies or their clients. Recent reports by Cisco and the World Economic Forum both highlight the paramount importance of cyber risk management. The Cybersecurity Law Institute will give you insights into the latest information and strategies

Cyber Attacks, Threats, and Vulnerabilities

Kenya: Central Bank Puts Firms on High Alert Over Cyber Attacks (All Africa) The Central Bank of Kenya (CBK) has received credible information that the bank and other government facilities could be the target of an imminent cyber-attack

Cyberespionage group might have “full access” to Indian govt networks: Kaspersky (Indian Express) Kaspersky claimed "the threat actors behind Danti have created emails in the names of several high-ranking Indian government officials"

CryptXXX 3.0 Beats Kaspersky Labs Decryption Tool Again (Bitcoinist) Just a few days ago, we reported how Kaspersky Labs has been able to crack the CryptXXX decryption code and create a tool which lets users restore file access without paying the Bitcoin ransom. The latest CryptXXX update nullifies this tool entirely, and security researchers are back to square one

The Day the Earth Stood Still for CryptoWall (ThreatTrack Security Labs) It’s been the norm in the cybersecurity industry to be intrigued and at the same time be infuriated by the people behind any successful large-scale malware attack. Ransomware is one such example

Ransomware: What your clients need to know (ChannelLife) CryptoWall, Locky, TeslaCrypt. To make sense of today’s tech headlines, you have to learn an entire new vocabulary. But one word sums them all up: Ransomware

Neutrino Malvertising campaign drops Gamarue (Zscaler) Neutrino Exploit Kit (EK) has not seen as much activity this year as more popular kits like Angler and RIG. But over the last month we have seen an increase in activity from Neutrino, with multiple campaigns using both compromised sites and advertising services

Palo Alto IDs another C&C-over-DNS attack (Register) 'Pisloader' hides instructions in plain sight

When domain names attack: the WPAD name collision vulnerability (Naked Security) A combination of poorly configured networks and new rules on internet domain names are giving cybercriminals a new and easy way to attack entire organisations, according to research out of the University of Michigan

WhatsApp Gold doesn’t exist, it’s a scam that spreads malware (Help Net Security) WhatsApp users are once again targeted by malware peddlers, via messages that offer WhatsApp Gold, supposedly an enhanced version of the popular messaging app previously used only by “big celebrities”

SRC-2016-22 : Microsoft Office Component FSupportSAEXTChar() Use-After-Free Remote Code Execution Vulnerability (Source Incite) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file

Skimmers Found at Walmart: A Closer Look (KrebsOnSecurity) Recent local news stories about credit card skimmers found in self-checkout lanes at some Walmart locations reminds me of a criminal sales pitch I saw recently for overlay skimmers made specifically for the very same card terminals

LinkedIn sends email attempting to reassure users over ‘security issue’ ( LinkedIn has attempted to reassure its users after a “security issue” that involved a hacker stealing more than one hundred million identities

Phishers Creating More Noise to Fool Defenses (eWeek) The criminals behind phishing attacks are creating vast numbers of unique Web pages to host their attacks in an attempt to dodge defenses, according to an industry report

Phishing attacks rise to highest level since 2004 (Help Net Security) The Anti-Phishing Working Group (APWG) observed more phishing attacks in the first quarter of 2016 than at any other time in history

This is the Real Threat Posed by Hacked Medical Devices at the VA (Nextgov) As the departments of Defense and Veterans Affairs work to make the digital medical records that each manages for some 10 million beneficiaries compatible, they face an unassuming foe

Hackers stole health information of 80 million Indians in 2015 : Report (International Business Times) Hackers stole the public health information — such as names, addresses, birth dates, income data and "social security numbers" of 80 million internet users of India in 2015, a report released by global security software company Trend Micro said on Tuesday

Security Patches, Mitigations, and Software Updates

Visa may reduce use of one-time passwords (Straits Times) Credit card giant Visa is looking to make online transactions easier by cutting down the use of one-time passwords (OTPs) - the codes sent to customers' mobile phones when they enter their card details

Cyber Trends

Elders way better at password security than millennials (Naked Security) Stop making fun of Aunt Millie squinting at the screen: her password kicks your password’s butt, and she’s not the one reusing the same damn password for every site

UK companies have a high cyber-security rating (IT Pro Portal) The UK is among the countries with the highest business cyber-security rating among several other high-profile players, according to a new report by BitSight Technologies


Swift calls for industry-wide response to cyber-threat (Global Trade Review) Swift’s CEO, Gottfried Leibbrandt, has called for industry-wide action against cybercrime, following attacks on the Central Bank of Bangladesh and TP Bank in Vietnam

Austria's FACC, hit by cyber fraud, fires CEO (Reuters) The head of Austrian aerospace parts maker FACC has been fired after the company was hit by a cyber fraud that cost it 42 million euros ($47 million)

Dashlane Raises $22.5 Million in Series C Funding; Announces Strategic Partnership with TransUnion (PRNewswire) Dashlane, an award-winning password manager and leader in online identity management, announces the closing of $22.5 million in a Series C round of funding

Votiro Raises $4 Million in Series A Round to Neutralize Zero-Day Threats (Dark Reading) Entirely self-funded since 2010, Votiro will use the new capital to further enhance its solutions and expand its global reach

Security ChatOps Innovator Demisto Exits from 'Stealth Mode' (Newsfactor) Demisto exits stealth mode with industry’s first chatbot to improve security operations center productivity and reduce incident response time -- company secures Series A funding from Accel and security industry experts to back go-to-market efforts for just-launched product

Courion, Core Security, SecureReset and Bay 31 Come Together To Form The New Core Security (PRNewsire) Courion, the market leader in Vulnerability and Access Risk Management solutions, today announced the company has changed its name to Core Security. The name change reflects the company's strategic vision following the recent acquisitions of Core Security and SecureReset

Cisco Systems Is a Terrific Buy (Investors Guide) Cisco Systems (CSCO) announced third quarter ended April 30, 2016 total non-GAAP revenue of $12.0 billion, up 3 percent year-over-year from $11.6 billion during the same period last year. Going forward, Cisco’s year-over-year revenue growth for fourth quarter of 2016 is estimated to be in the range of 0% to 3%

Cybersecurity Firm FireEye's Stock Should Continue Gains (The Street) There seems to be no stopping this growth company as it taps the booming network security niche for multi-year capital appreciation

Jim Cramer Is Watching Palo Alto Networks’ Earnings on Thursday (The Street) Jim Cramer is keeping an eye on Palo Alto Networks' quarterly results, due out on Thursday, after the markets close

Telstra: Multi-cloud security is 'critical' for our strategy (ZDNet) A new strategic partnership with a hybrid cloud security company is 'fundamental' to Telstra's overarching cloud plans

IDC: Mobile security products market ruled by three innovators (Mobile Business Insights) According to the International Data Corporation (IDC), three vendors of mobile security products — Skycure, Wandera and Zimperium — are leading the charge when it comes to keeping enterprises ahead of the latest security threats

SAIC sees opportunity in feds' 'offensive cyber' efforts (Washington Business Journal) Science Applications International Corp. (NYSE: SAIC) sees the White House’s increased willingness to embrace “offensive cyber" tactics as good for business

The White Knights of Hacking to the Cyber-rescue (Haaretz) Facebook, Google and other tech heavyweights are increasingly compensating those benevolent geeks who report their security breaches. Not surprisingly, the ‘good guys’ include quite a few Israelis

How the Constant Threat of War Shaped Israel’s Tech Industry (Bloomberg) Unit 8200 is Israel’s most mysterious agency. No one outside knows exactly how it operates, who works there, or how they learn. All the public knows for certain is that Unit 8200 has been the beating heart of Israel’s spectacular—and in many ways unmatched—technology boom

LightCyber plots European takeover (Channel Web) Vendor aims to fight dark side of security as it launches sales teams in UK and Germany

Products, Services, and Solutions

Procera Networks makes FCC's broadband labeling initiative a reality for US ISP (PRNewswire) Procera's technology chosen by North American ISP to improve overall network quality and give subscribers better access to performance information for broadband services

CRN Exclusive: Malwarebytes Extends Endpoint Detection And Response Capabilities To Mac (CRN) Malwarebytes is expanding its endpoint detection and remediation capabilities to Mac environments in a move executives said will help partners increase sales and services opportunities

Startup Tempered Networks Takes Aim at IoT Security (No Jitter) New products give IT a way to create a zero-trust model of security -- that is, trust nothing and build the trust relationships as needed

Proactive Cybersecurity: Defending Industrial Control Systems From Attacks (IBM Security Intelligence) Cyberattacks on industrial control systems (ICS) are on the increase due to the Internet of Things (IoT) revolution. With more and more connected endpoints, the increased volume of sensitive data only serves to increase the viable attack surface

Technologies, Techniques, and Standards

PCI Standard's Multi-factor Authentication Mandate Delayed 'Til 2018 (Infosecurity Magazine) Deadlines for compliance for two of the most important mandates in PCI DSS version 3.2 have been delayed to 2018

Security delays digital adoption in banks, billions at stake (Help Net Security) $405.3 billion, that’s the Digital Value at Stake (VaS) retail banks have the potential to realize from 2015 to 2017. Yet, in 2015, financial services as a whole captured just 29 percent of that opportunity, according to Cisco

After LinkedIn heist, here's how Microsoft is tightening password security (ZDNet) LinkedIn's latest list of leaked credentials is helping Microsoft refine its list of banned passwords as it also issues new best-practice guidelines

Microsoft highlights email security following Panama Papers fiasco (WinBeta) Last month one of the largest data leaks in history occurred when 2.6 TBs of emails and data from law firm Mossack Fonseca made the headlines

Why Companies Must Share Cyber-Threat Intelligence (Baseline) If it seems as if the cyber-security landscape just keeps getting more threatening, you're not imagining things

Design and Innovation

Social Media, Electronic Warfare Tools Among SOCOM's Technology Gaps (National Defense) Special Operations Command is looking for a few good ideas to help it fight the Islamic State and other adversaries, a top acquisition official said on May 25

Why the U.S. military turned a hipster tattoo parlor into a Special Operations lab (Washington Post) From the outside, U.S. Special Operations Command’s latest attempt to find and test the best technology for its operators looks like one more downtown storefront here

How do you outsmart malware? (TechCrunch) The growth of data breaches in recent months and years is in large part because of the new generation of smart malware being developed on a daily basis

Research and Development

DARPA Awards Galois $10 Million Contract To Secure Legacy Cyber Systems (Defense News) The Defense Advanced Research projects Agency (DARPA) awarded Galois a $10 million contract under its Cyber Fault-tolerant Attack Recovery (CFAR) program to secure cyber vulnerabilities in military and commercial legacy systems, the company said today

Deloitte to open blockchain development lab in Ireland (IBS Intelligence) Deloitte has announced its plans to open a new development centre in Dublin, Ireland, to work on the possibilities of blockchain technology

DHS Navigates the World of Vehicular Digital Forensics (SIGNAL) Cars used by terrorists and other criminals yield information about their drivers


Polytechnique and Deloitte partner to fight cybercrime (CNW) Two key players join forces to train next generation of cybersecurity specialists

Legislation, Policy, and Regulation

Cybersecurity a platform for business growth and innovation (Scoop NZ) Budget 2016 has allocated $22.2 million to establish a national Computer Emergency Response Team (CERT) to help business understand and respond to cyber threats. But more than just a response to risk, cybersecurity should be seen as a platform for business growth and innovation in New Zealand, according to Deloitte

China’s Emerging Cyberspace Strategy (Diplomat) A closer look at China’s cyber strategy, and what it means for the world

Senators ask what OPM hack means for global cyber relations (FCW) Lawmakers want more clarity from the State Department on how breaches, including the Office of Personnel Management hack, affect the push to establish cybersecurity norms with countries such as Russia and China

Rounds Proposes Cyber War Act (SDPB Radio) Federal officials warn that cyber-attacks are becoming greater threats to American security. U.S. Senator Mike Rounds is sponsoring an act that defines cyber war. Proponents say it helps America defend itself, some opponents say there is no one size fits all strategy for war

State CIOs Urge Feds to Finalize Cyberattack Response Plan (Wall Street Journal) State chief information officers and cybersecurity officials are calling on the federal government to finalize a plan of action for responding to major cyberattacks, which the U.S. Department of Homeland Security drafted over six years ago

Maryland senators introduce measure to elevate status of Cyber Command (Baltimore Sun) Maryland's U.S. Senators filed a measure on Wednesday to amend an annual Defense Department funding bill to create the 10th top-level American military command at Fort Meade

Bill Would Put Maryland at Forefront of War on Cyber Terrorism (WJZ CBS News) Terrorist groups trying to attack critical computer systems in the U.S. remain a top security threat. Now one Maryland congressman is pushing hard for changes that would keep us safe, and keep military secrets out of enemy hands

What the US government really thinks about encryption (Christian Science Monitor Passcode) The encryption debate can't be simplified to a Silicon v. Washington fight over your privacy. Even though FBI concerns about "going dark" in its pursuit of criminals and terrorists have captured the headlines, the Obama administration is still deeply divided

For Director of New Cyber Center, Personal Leadership is the Ultimate Hack (Cipher Brief) Tonya Ugoretz, the President’s appointee to head the newly created Cyber Threat and Intelligence Integration Center (CTIIC), would not be faulted for wondering, “What have I done to deserve this?”

Mindful of the Snowden effect, the Air Force moves closer to cyber's private sector (Air Force Times) The Air Force is reviving its annual information technology conference in Montgomery, Alabama, which has been dormant since 2012 due to budget constraints, and the rebranded event has a new focus on cybersecurity

US nuke arsenal runs on 1970s IBM 'puter waving 8-inch floppies (Register) Uncle Sam blows billions a year on legacy tech

Litigation, Investigation, and Law Enforcement

State Dept. inspector general report sharply criticizes Clinton’s email practices (Washington Post) The State Department’s independent watchdog has issued a highly critical analysis of Hillary Clinton’s email practices while running the department, concluding that Clinton failed to seek legal approval for her use of a private server and that agency staff members would not have given their blessing if it had been sought because of “security risks”

Key Findings From Inspector General Report on Clinton Emails (ABC News) Key findings from the State Department inspector general's report on former Secretary of State Hillary Clinton's emails and private server and the department's email practices

Office of the Secretary: Evaluation of Email Records Management and Cybersecurity Requirements (Office of Inspector General, Department of State) As part of ongoing efforts to respond to requests from the current Secretary of State and several Members of Congress, the Office of Inspector General (OIG) reviewed records management requirements and policies regarding the use of non-Departmental communications systems. The scope of this evaluation covers the Office of the Secretary, specifically the tenures of Secretaries of State Madeleine Albright, Colin Powell, Condoleezza Rice, Hillary Clinton, and John Kerry

Clinton expressed worries about exposure of personal emails at State Dept. (Politico) The worry came after her top aide said they needed to discuss putting Clinton on State's email system

The State Department’s Top Cop Imperils Hillary Clinton’s Campaign (Observer) Explosive new State Department report delivers an 83-page doozy, outlining Ms. Clinton's apparent white collar crimes

Belgian Authorities Detain 4 Suspected ISIS Recruiters (AP via Time) Police say they may have planned new attacks in the country

List of French targets found in Adeslam's home (Local (France)) Investigators have found a list of targets for future terror attacks in France on a computer believed to belong to attacker Salah Abdeslam

Islamic State group recruited practising NHS doctor (BBC) An NHS doctor left his family in the UK and joined the Islamic State militant group in Syria, the BBC has learned from leaked IS recruitment papers

Sheffield doctor who joined Isis sparks call for stronger border checks (Guardian) MP says people like Dr Issam Abuanza, who reportedly left his family to join Isis, should know they will not be able to return

Two of her daughters joined ISIS. Now she’s trying to save her two younger girls. (Washington Post) In a small box in her bedroom, Oulfa Hamrounni keeps the photo she treasures most. It shows one of her daughters, brown hair flowing, a smile on her round face. The photo was taken before the girl and her sister left home to join the Islamic State’s affiliate in Libya

Hacker Guccifer Pleads Guilty to Hacking Bush Emails (AP via Time) The Romanian hacker known as Guccifer will serve at least two years in prison after pleading guilty to breaking into computer accounts of the Bush family and others

The Bank Robber (New Yorker) The computer technician who exposed a Swiss bank’s darkest secrets

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

CYBERSEC (Kraków, Poland, September 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC...

Upcoming Events

Enfuse 2016 (Las Vegas, Nevada, USA, May 23 - 26, 2016) Enfuse is a three-day security and digital investigations conference where specialists, executives, and experts break new ground for the year ahead. It's a global event. It's a community. It's where problems...

HITBSecConf2016 Amsterdam (Amsterdam, the Netherlands, May 23 - 27, 2016) The event kicks off with all new 2 and for the first time, 3-day training sessions held on the 23rd, 24th and 25th. Courses include all new IPv6 material by Marc 'van Hauser' Heuse of, an in-depth...

4th Annual Cybersecurity Law Institute (Washington, DC, USA, May 25 - 26, 2016) At our 4th annual Institute, in the capital where cybersecurity regulations and enforcement decisions are made, you will be able to receive pragmatic advice from the most knowledgeable legal cybersecurity...

MCRCon 2016: Some Assembly Required (Ypsilanti, Michigan, USA, May 10, 2016) The annual conference focuses on hacking prevention, incident handling, forensics and post-event public relations, with presentations delivered by nationally-recognized experts, cybersecurity skills competitions,...

C³ Voluntary Program Regional Workshop: Understanding and Managing Cyber Risk in the Water and Energy Sectors (Indianapolis, Indiana, USA, June 1, 2016) The Department of Homeland Security's Critical Infrastructure Cyber Community (C3) Voluntary Program and the Indiana Utility Regulatory Commission (IURC) will host a free cybersecurity risk management...

SecureWorld Atlanta (Atlanta, Georgia, USA , June 1 - 2, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

ISS World Europe (Prague, Czech Republic, June 7 - 9, 2016) ISS World Europe is the world's largest gathering of regional law enforcement, intelligence and homeland security analysts as well as telecom operators responsible for lawful interception, hi-tech electronic...

Data Breach & Fraud Prevention Summit Asia (Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the ...

New York State Cyber Security Conference (Albany, New York, USA, June 8 - 9, 2016) June 8-9 marks the 19th Annual New York State Cyber Security Conference and 11th Annual Symposium on Information Assurance (ASIA) and we invite you to join us for this nationally recognized event. The...

SecureWorld Portland (Portland, Oregon, USA, June 9, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

SIFMA Cyber Law Seminar (New York, New York, USA, June 9, 2016) During this full-day program attorneys and compliance professionals will gain insights and regulatory perspectives on cybersecurity law as well as strategies for how to take an active and valuable role...

Cleared Job Fair (Tysons Corner, Virginia, USA, June 9, 2016) connects you with cleared facilities employers, including Federal Acquisition Strategies, Firebird Analytical Solutions & Technologies, Leidos, PAE, TRIAEM, Commonwealth Computer Research,...

SANSFIRE 2016 (Washington, DC, USA , June 11 - 18, 2016) For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2016 is our annual "ISC Powered" event. Evening talks tap into the expertise behind...

4th International Conference on Cybercrime and Computer Forensics (ICCCF) (Vancouver, British Columbia, Canada, June 12 - 14, 2016) For the past four years, APATAS has organized the International Cybercrime and Computer Forensics conference at various locations throughout Asia. In 2016, our 4th annual ICCCF is moving for the first...

Show Me Con (St. Charles, Missouri, USA, June 13 - 14, 2016) SHOWMECON. The name says it all. Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they...

CISO DC (Washington, DC, USA, June 14, 2016) Tactics and best practices for taking on enterprise IT security threats. The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and...

The Security Culture Conference 2016 (Oslo, Norway, June 14 - 15, 2016) The Security Culture Conference 2016 is the leading, global conference discussing how to build, measure and maintain security culture in organizations. The conference is a part of the Security Culture...

2016 CyberWeek (Tel Aviv, Israel, June 19 - 23, 2016) The conference, held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), the Yuval Ne'eman Workshop for Science, Technology and Security, the Israeli National Cyber Bureau, Prime Minister's...

Cyber Security for Critical Assets LATAM (Rio de Janeiro, Brazil, June 21 - 22, 2016) Cyber-attacks on critical infrastructure have become an increasing threat for Latin American governments and companies within the oil and gas, chemical and energy sectors. Although the attack frequency...

National Insider Threat Special Interest Group - South FL Chapter Kickoff Meeting (Palm Beach, Florida, USA, June 21, 2016) The National Insider Threat Special Interest Group (NITSIG) is excited to announce the establishment of a South Florida Chapter. Presentations and discussions will be provided by Insider Threat Defense,...

Cyber 7.0 (Laurel, Maryland, USA, June 22, 2016) Cyber 7.0 delves into the cyber threat to the nation’s critical infrastructure—transportation, health care, utilities, and energy, to name a few. How can government and industry work together to battle...

Security of Things World (Berlin, Germany, June 27 - 28, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World in June...

SANS Salt Lake City 2016 (Salt Lake City, Utah, USA , June 27 - July 2, 2016) We are pleased to invite you to SANS Salt Lake City 2016, June 27-July 2. Are you ready to immerse yourself in the most intense cyber training experience available anywhere? Do you need to become a more...

DC / Metro Cyber Security Summit (Washington, DC, USA, June 30, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.