skip navigation

More signal. Less noise.

Daily briefing.

Yesterday Microsoft issued thirteen security bulletins, five of them rated "critical." Among the vulnerabilities patched is the one Google publicly disclosed last week, to Redmond's displeasure. That fix closes a privilege escalation hole in Windows that can be used to escape security sandboxes.

Adobe and Google also patched. Adobe addressed issues in Flash Player and Adobe Connect, fixing nine remote code execution vulnerabilities. Google addressed twelve critical vulnerabilities in Android, including the bit-flipping privilege-escalation risk known as Drammer, but Mountain View left a comprehensive fix for the Dirty Cow Linux kernel rooting vulnerability to a further round of patching. A supplemental patch did deal with Dirty Cow for Nexus and Pixel devices; other handsets will get their fix next month. Google also noted that Chrome's Safe Browsing will henceforth crack down on sites determined to be repeat offenders.

Banking malware is evolving this week. Svpeng, a mobile Trojan Kaspersky sees lurking in the AdSense network, is troubling bank customers, especially in India. IBM X-Force warns that TrickBot, a Dyre competitor, is using serverside injection and redirection against its targets.

Tesco resumes full operations, but says £2.5 million pounds were lost to debit card fraud. The money seems to have gone to crooks in Spain and Brazil.

FireEye reports a rise in Cerber ransomware attacks, largely driven by the Dridex botnet.

Oh—the US held elections yesterday, little disturbed by hacking, despite fears and a precautionary DHS all-hands-on-deck. WikiLeaks' Assange assumes the unlikely mantle of good-government advocacy—tell it to Vlad.


Today's issue includes events affecting Albania, Bosnia and Herzegovina, Brazil, Bulgaria, Canada, China, Croatia, European Union, Finland, France, Germany, Greece, Ireland, Kosovo, Macedonia, Montenegro, NATO/OTAN, New Zealand, Nigeria, Romania, Russia, Serbia, Slovenia, Spain, United Kingdom, United States.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the Johns Hopkins University, as Joe Carrigan discusses the privacy of medical information. Our guest is Gene Tsudik, of the University of California Irvine, who describes research into the risks of using a keyboard while Skyping. If you enjoy the podcast, please consider giving it an iTunes review.)

Cyber Attacks, Threats, and Vulnerabilities

Fears of hacked election ebb in quiet, watchful night (USA Today) Despite concerns about possible attempts to hack or otherwise tamper with the U.S. election, voting appears to have gone smoothly, with no attacks or intrusions

This Is What It Looks Like When Russia Really Wants to Mess With Your Election (Foregin Policy) In the U.S., the Kremlin is hacking emails. In the Balkans, it’s staging coups

On Election Day, WikiLeaks’ Assange says U.S. voters benefited from email leaks (McClatchyDC via the Idaho Statesman) With the U.S. election campaign at an end, WikiLeaks founder Julian Assange denied Tuesday that his group has “a nefarious allegiance with Russia” and said he had come under “enormous pressure” to halt publication of a trove of emails pirated from Hillary Clinton’s presidential campaign

Hackers Target Pro-Clinton Phone Banks—But Hit Trump’s Too (Wired) After months of hacker meddling in the US presidential election, government officials and campaign-watchers have been bracing for the next attack to hit on Election Day. As it turns out, one arrived a day early and focused on a key get-out-the-vote tool—a phone bank service

Canada immigration website goes down as Donald Trump gains lead (HackRead) Maybe some Americans were serious when they threatened they would move to Canada if Republican presidential candidate Donald Trump became successful in his often polarizing campaign for the White House

SpamTorte Version 2: Discovery of an Advanced, Multilayered Spambot Campaign that is Back with a Vengeance (Verint) Verint’s research team has recently discovered a new and unknown version of the Torte botnet malware. Christened SpamTorte 2.0, it is a powerful, multi-layered Spambot (Spam Botnet) that is capable of running large scale, efficient spam campaigns while cleverly masking itself to avoid detection. It’s worth noting that the initial detection was exclusively detected by the Verint TPS C&C Detection engine

An Aggressive Launch: TrickBot Trojan Rises With Redirection Attacks in the UK (Security Intelligence) IBM X-Force researchers reported that new banking malware TrickBot is now fully operational and able to deploy two of the most advanced browser manipulation techniques: serverside injections and redirection attacks

TrickBot Banking Trojan Adds New Browser Manipulation Tools (Threatpost) The TrickBot banking Trojan, a close relative to Dyre, has a growing target list and new browser manipulation techniques, experts at IBM X-Force said

Why are Skype accounts getting hacked so easily? (Verge) Secure your Skype account immediately

Chrome exploit allows Svpeng trojan to bypass security measure; patch reportedly coming (SC Magazine) The mobile banking trojan Svpeng continues to infect Android devices through malvertising campaigns delivered via the Google AdSense network. But at least experts at Kaspersky Lab now understand how the malicious APK has been able to automatically download itself while bypassing Google Chrome browser permissions

Nearly 3,18,000 [sic] Android users hacked via Google’s AdSense vulnerability (Hindustan Times) Kaspersky Lab, an international cybersecurity and anti-virus provider headquartered in Moscow and operated by a holding company in the United Kingdom, on Tuesday said that it has discovered a modification of the mobile banking Trojan, Svpeng hiding in Google’s advertising network AdSense

DDoS Attacks on Apartments’ Heating System Left Residents Cold and Angry (HackRead) DDoS attacks are not meant for websites only — here is a case in which hackers conducted DDoS attacks on an apartment's heating system in Finland

Communications watchdog: Criminals behind home automation system cyber attack (Uutiset) The Finnish Communications Regulatory Authority Ficora says that a cyber attack that disrupted home automation systems in Lappeenranta, southeast Finland, was the work of criminals. The incident caused services such as heating to restart when web traffic overloaded the capacity of computers controlling the systems

Dyn, Liberia DDoS Attacks Were Just Test Runs (Infosecurity Magazine) The Mirai-fueled DDoS attacks that took the entire country of Liberia offline last week are waning—but researchers say the offensive was merely a test run for something much bigger

Floki Bot: The Rest of the Story (SC Magazine) Last week we took the 100,000 foot level view of the relatively new floki bot. This bot - allegedly modeled after Zeus is selling in the underground marketplaces for around $1,000

Cerber Ransomware On The Rise, Fueled By Dridex Botnets (Threatpost) Starting in April security experts at FireEye spotted a massive uptick in Cerber ransomware attacks delivered via a rolling wave of spam. Researchers there link the Cerber outbreaks to the fact that attackers are now leveraging the same spam infrastructure credited for making the potent Dridex financial Trojan extremely dangerous

Tesco says $3 million stolen in cyber theft, resumes service (Reuters) Retailer Tesco Plc's banking arm said on Tuesday that 2.5 million pounds ($3 million) had been stolen from 9,000 customers over the weekend in what cyber experts said was the first mass hacking of accounts at a western bank

Tesco Bank cyber raid 'unprecedented', says financial regulator (Guardian) FCA chief tells MPs that ‘serious’ theft from 20,000 accounts may be linked via debit card flaw as customers report money transfered to Brazil and Spain

Indiana county government shut down by ransomware to pay up (Ars Technica) Commissioner of Madison County says insurance company advised paying ransom

Cyber in Nigeria: Local Hub of Crime with Deep Roots (Wapack Labs) Nigeria continues to be known globally as the lead in Internet scams

Security Patches, Mitigations, and Software Updates

Microsoft patches Google-outed Windows security hole (Engadget) Attackers are using the exploit, so you'll want to update quickly

November 2016 Microsoft Patch Day (SANS Internet Storm Center) Microsoft today released 13 bulletins (plus one bulletin from Adobe for Flash). 5 of the Microsoft bulletins, and the Adobe Flash bulletin are rated critical. There are a number of vulnerabilities that have either already been known, or have already been exploited

Microsoft Patch Tuesday 2016-11-08 (SANS Internet Storm Center) [SANS tabular summary of Microsoft patches]

Adobe fixes flaws in Flash Player and Adobe Connect (CSO) The Flash Player patches address nine critical vulnerabilities

Adobe Patches Nine Code Execution Flaws in Flash Player (Threatpost) Two weeks after rushing out an emergency patch for a zero-day vulnerability, Adobe today released another Flash Player security update

Android patches fix Drammer RAM attack, but not Dirty Cow exploit (CSO) The security patches address 12 critical vulnerabilities in various Android components and drivers

Google Releases Supplemental Patch for Dirty Cow Vulnerability (Threatpost) Google’s November Android Security Bulletin, released Monday, patched 15 critical vulnerabilities and addressed 85 CVEs overall. But conspicuously absent is a fix for the Linux race condition vulnerability known as Dirty Cow (Copy-on-Write) that also impacts Android

Update now! Bug means large PAC files can crash Android phones (Graham Cluley) Oh yeah, that’s right, maybe you can’t update

Google Safe Browsing goes after repeat offenders (Help Net Security) “Over time, we’ve observed that a small number of websites will cease harming users for long enough to have [Google Safe Browsing] warnings removed, and will then revert to harmful activity,” Brooke Heinichen, of the Safe Browsing Team, explained

Protecting users from repeatedly dangerous sites (Google Security Blog) Since 2005, Safe Browsing has been protecting users from harm on the Internet, and has evolved over the years to adapt to the changing nature of threats and user harm

Cyber Trends

Increasing number of financial institutions falling prey to cyber attacks (Help Net Security) 66.2 percent of financial organizations faced at least one cybersecurity attack in the last year, according to MetricStream Research

At the frontline: The cyber threat is becoming ever more subtle (City A.M.) On any given day, typing the words “cyber attack” into Google News will give you a fresh medley of hacking stories. Hollywood and Edward Snowden may have romanticised the perpetrators of these crimes, but behind most of the headlines sit one or more business owners who are the victims of these devastating breaches


VC-backed Thycotic acquires Cyber Algorithms (PE Hub) Thycotic, which is backed by Insight Venture Partners, has acquired Virginia-based Cyber Algorithms, a provider of network security analytics. No financial terms were disclosed

Synopsys Expands Software Security With Cigital, Codiscope Acquisitions (Dark Reading) Deal is expected to close by December 2016 and will be funded with combination of US cash and debt

Booz Allen, Techstars Name 6 Teams for Cyber Tech Development Program (ExecutiveBiz) Booz Allen Hamilton and Techstars have unveiled six teams comprised of startups and Booz Allen’s product teams that will work to develop cybersecurity technologies

Peter Thiel explains why his company’s defense contracts could lead to less war (Washington Post) When billionaire tech investor Peter Thiel explained his support for Republican nominee Donald Trump at length to a room of journalists last week, he based part of his rationale on the notion that Washington “insiders” currently leading the government have “squandered” money, time and human lives on international conflicts

RedSeal Reports Positive Cash Flow and Profitability in its Strongest Quarter to Date (RedSeal) Record revenue and gross margins propel cyber analytics company’s Q3 momentum

Dublin’s key role in the global cybersecurity challenge (Irish Central) You never have to look too far for a headline about the latest computer hack. The most recent one highlighted the dark side of all the IoT devices we surround ourselves with

NSS Labs Welcomes Gautam Aggarwal as Chief Marketing Officer (CMO) for Heading Marketing and Products (Marketwired) Seasoned cyber security and high tech-executive brings decades of experience for leading product development and driving NSS Lab's new go-to-market strategies

Vectra Networks appoints security industry executive Kevin Moore to lead worldwide sales (Marketwired) Vectra® Networks, the leader in automated threat management, today announced that Kevin Moore, a noted sales veteran in the security industry, was appointed senior vice president of worldwide sales. In this role, he is responsible for all direct and channel sales globally

Products, Services, and Solutions

LockPath and Edgile Team Up to Deliver Complete Enterprise GRC Implementations (LockPath) LockPath, a leader in governance, risk management and compliance (GRC) software, today announced its partnership with Edgile, the leading security and risk consulting firm and provider of industry-specific regulatory content libraries. Edgile will support implementations of LockPath’s Keylight® Platform, allowing organizations to more efficiently manage both their compliance and cyber risk

Forcepoint integrates Stonesoft’s firewall with cloud security technologies (Economic Times) The new release improves Stonesoft’s security efficacy, provides extra operation efficiencies, and expands support for evolving infrastructures

Secucloud Chooses Qosmos As A Technology Partner To Fight Growing Cyber Threats (Host Review) Secucloud strengthens its Elastic Cloud Security System (ECS²) with a further technology partnership in the field of real-time classification of applications and protocols by integrating Qosmos ixEngine

Signal Protocol’s crypto core has no major flaws, researchers find (Help Net Security) A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of its Key Agreement and Double Ratchet multi-stage key exchange protocol (the effective cryptographic core)

Signal’s protocol gets glowing reviews in first security audit (CyberScoop) Signal is widely considered the gold standard of secure encrypted messaging apps but, until today, it hasn’t been subject to a fine-toothed audit. But the technology passed a major test Tuesday after an international team of security researchers gave the messaging platform’s security glowing reviews in its first ever formal security audit

Enhancements to Verint Enterprise Feedback Management Solution Help Make Customer Interactions More Relevant, Contextual and In-the-Moment (BusinessWire) Company expands customer personalization and interaction opportunities via mobile applications and IoT devices with geolocation targeting and more

Forrester Research Inc. (NASDAQ:FORR) and Verint Partner to Deliver Unprecedented Actionable Intelligence (Benchmark Monitor) Research and advisory firm Forrester Research Inc. (NASDAQ:FORR) and Verint® Systems Inc. announced a partnership designed to provide a holistic approach to customer experience (CX) measurement and management

Technologies, Techniques, and Standards

The 7 Types Of Security Jobs, According To NIST (Dark Reading) NIST's Cybersecurity Workforce Framework gives the security industry a way to classify specific specialty areas and work roles and identify a path for career growth

The Enemy Within: The Soft Underbelly of Cybersecurity (Metropolitan Corporate Counsel) “Cybersecurity” is a term that occupies virtually everyone these days. The list of U.S. government agencies that have been hacked seemingly grows with each passing day and includes the White House, the Pentagon, the State Department, the Office of Personnel Management, the National Oceanographic and Atmospheric Administration, and even the U.S. Postal Service

Ransomware Doesn’t Have To Mean Game Over (Dark Reading) 3 methods can help you recover from a ransomware attack relatively unscathed

Every Minute Of Security Planning Will Save You 10 Minutes In Execution (Dark Reading) Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later

Prepare to manage the aftermath: reducing the impact of cyber crime (Deloitte) Organisations can take up to five years to recover from a serious cyber breach, and some never recover at all, says Deloitte Africa. Preparedness helps organisations manage the aftermath of an attack more effectively

Stay Vigilant To The Evolving Threat Of Social Engineering (Dark Reading) Even the most cyber-savvy individuals can easily get tripped up by a social engineering attack. But users can trip-up a threat simply by paying attention

National Security: A Matter for Public Companies (Forbes) Several news outlets recently reported on the release of a suite of hacking tools apparently stolen from the NSA. Should we be concerned?

IT Departments ‘Should Report’ To Cybersecurity Teams To Combat Threats (TechWeek Europe) Malwarebytes CISO Justin Dollu has flipped the traditional IT hierarchy so tech adoption is done with cyber security in mind

Design and Innovation

Is Fingerprint Authentication Making The Password Problem Worse? (Dark Reading) Problems emerge when users switch to a new phone

How bitcoin protects against geopolitical risk (TechCrunch) Today’s election is anything but ordinary. People from every corner of the globe have been watching, not only for its theatrical elements but because the impact will be felt around the world in very real ways. And nowhere will the impact be more immediate and certain than on the economy

Darktrace: Machine Learning Will Filter Through The Noise Of Cyber Security (TechWeek Europe) Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that pressured tech teams might miss

Research and Development

Carnegie Mellon researchers visualize way to fend off DDoS attacks (Network World) CyLab tool puts emphasis on visualization, could add virtual reality application to fight DDoS attacks


18-year-old Wins Cyber Security Challenge UK (Infosecurity Magazine) Ben Jackson, an 18-year-old student from the Sussex town of Bexhill-on-sea, has won the Cyber Security Challenge UK’s Masterclass competition, making him the youngest ever champion

Legislation, Policy, and Regulation

French plan for biometric database of 60 million people sparks outcry (CSO) A government minister and the National Digital Council are among the opponents of the database

China formalises existing restraints with new cybersecurity law (ZDNet) China's top legislative body this week passed a cybersecurity law that elevates the formally 'low-level regulations' applied across the nation in areas such as security, online speech, and citizen rights

Experts Comment On New Chinese Cyber Security Legislation (Information Security Buzz) Following the news that the Chinese government has approved a broad new cybersecurity law aimed at tightening and centralizing state control over information flows and technology equipment. IT security experts from Prevoty and Lieberman Software commented below

Cloud Adoptions Practices and Priorities in the Chinese Financial Sector: Survey Report (Cloud Security Alliance) The Financial Services Institution (FSI) industry has never been an early adopter of technology. Furthermore, it is also one of the most heavily regulated industry internationally. However, with the improvement of Cloud security over the years, many FSIs have become more confident in embracing it. Having seen this trend, the Cloud Security Alliance (CSA) and Ernst & Young (China) Advisory Limited (”EY China”) have jointly conducted a survey, part of the result related with the FSI are have been used by the CSA for this report, to provide a clearer picture of Cloud adoption and to identify potential gaps that are holding back the adoption of Cloud within the FSI sector

We’re Winning The Crypto Wars (Motherboard) This year has been filled with bad news. The world of cybersecurity has been no different, with zombie armies of hacked internet-connected devices taking down the internet, seemingly endless data breaches hitting hundreds of millions of people, and Russian hackers allegedly trying to mess with the US election

US Army Races To Build New Cyber Corps (Breaking Defense) The US Army is rushing to stand up cyber forces but its progress shows both how far we’ve come, and how far we have to go

2016’s craziest “cybersex” political scandal comes from… Nebraska (Ars Technica) Skype sex scam caught one Nebraska politician and changed state policy

Litigation, Investigation, and Law Enforcement

Canadian police spied on reporters, raising questions of press freedom (Christian Science Monitor Passcode) Revelations that police in Quebec spied on at least 10 journalists has set off a nationwide debate over police surveillance and press freedom in the Digital Age

Inside the secret command center tracing Election Day cyber threats (CBS News) Federal officials are still looking for people who may have information about a potential terror threat linked to the presidential election

Let’s Cheer This Badass Nevada Judge Who Understands Twitter Harassment (Wired) A Nevada judge was none too pleased when Trump campaign lawyers asked for a list of poll workers’ names today

Army lieutenant colonel sentenced to 20 years for child pornography (Army Times) A lieutenant colonel formerly assigned to the Defense Intelligence Agency is set to spend two decades in prison for goading six underage girls into sending him illicit photos and videos while using his government laptop

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

IAPP Europe Data Protection Congress 2016 (Brussels, Belgium, November 7 - 10, 2016) The GDPR is finalised, the Data Protection Congress is returning to Brussels and you have a great deal of work ahead. Begin at the Congress, where you’ll find thought leadership, a thriving professional...

SANS Miami 2016 (Coconut Grove, Florida, USA, November 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing...

11th Annual API Cybersecurity Conference & Expo (Houston, Texas, USA, November 9 - 10, 2016) Join us at the 11th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter...

SecureWorld Seattle (Bellevue, Washington, USA, November 9 - 10, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Institute for Critical Infrastructure Technology Annual Gala and Benefit (Washington, DC, USA, November 10, 2016) The Annual ICIT Gala and Benefit is the year’s most prestigious gathering of legislative, agency and private sector leaders committed to protecting our Nation’s critical infrastructures. This intimate...

Israel HLS and Cyber 2016 (Tel Aviv, Israel, November 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach,...

SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, November 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the...

Infosec 2016 (Dublin, Ireland, November 15, 2016) Infosec 2016 conference addresses the critically important issues that threaten businesses in the information age By any measure, the digital threats that businesses and organisations of all sizes face...

Commercial Cyber Forum: Insider Threat (Odenton, Maryland, USA, November 15, 2016) Please join us for a panelist discussion with insider threat experts on upcoming Federal rules, key elements of an insider threat program and privacy, due process, and human resource requirements.

Kaspersky Academy Talent Lab (Online, then Prague, Czech Republic, November 15, 2016) Kaspersky Academy Talent Lab is an international cyber-world competition for young researchers and professionals aged 18-30 who are interested in the cybersecurity challenges facing the world. 50 finalists...

CISO Charlotte (Charlotte, North Carolina, USA, November 15, 2016) The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions ...

Pharma Blockchain Bootcamp (Edison, New Jersey, USA, November 16, 2016) Blockchain technology has gained recognition as one of the most disruptive technologies in the industrial world with the potential of redefining how businesses operate similarly the internet changed it...

CyberCon 2016 (Washington, DC, USA, November 16, 2016) CyberCon 2016 is the forum for dialogue on strategy and innovation to secure civilian and defense networks, as well as private-sector networks that hold their sensitive data. Cybersecurity will be the...

Versus 16 (San Francisco, California, USA, November 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing...

Focusing On The Future: Prioritizing Security in the Digital Economy (Washington, DC, USA, November 18, 2016) In today's digital economy, developing and prioritizing a cyber strategy is critical to address diverse and evolving threats, foster trust in the technology we use, and define a path forward where security...

Data Breach & Fraud Prevention Summit Asia (Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the ...

SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, November 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public...

4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, November 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial...

Internet of Things (IoT) (Elkridge, Maryland, USA, November 29, 2016) This cybergamut Technical Tuesday features Dr. Susan Cole, currently the Cybersecurity Lead for a Federal Information Systems Controls Audit Management (FISCAM) preparation team and also provides consulting...

CIFI Security Summit (Toronto, Ontario, Canada, November 30 - December 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.