skip navigation

More signal. Less noise.

Daily briefing.

The Shadow Brokers still haven't found any takers for those Equation Group zero-days they say they have for sale, so hop to it, shoppers (we guess).

The Mirai botnet's code is out on the dark web in a bad-news/good-news-good-news story. The bad news is that the code is out, and thus available for more IoT-driven distributed denial-of-service. The good news is that the author may be sensing the law's approach, and the other good news is that inspection of the botnet and its code is yielding some useful lessons. The biggest lesson is the danger default passwords pose when they're left unchanged: Mirai used 61 default passwords to herd its bots into the biggest DDoS attack yet seen. Krebs has an account of the manufacturers whose devices were exploited.

Kaspersky has cracked the MarsJoke crypto ransomware and they have a tool available to help the afflicted.

Interactive, "real-time" phishing has emerged in Brazilian cybercrime campaigns.

US concerns about election hacking and voter influence continue, with Russia the source of concern. US-Russian relations grew colder this week as Russia formally withdrew from a bilateral plutonium-control accord in response to US sanctions against Russia. The Russian point is that US imposition of costs (a centerpiece of American cyber policy) will itself have costs.

In industry news, Carbon Black prepares for an IPO as it partners with IBM to offer competition with Tanium in the endpoint security market.

Russia has tightened up cyber legislation: cybercrimes will henceforth be categorized as theft, not fraud.


Today's issue includes events affecting Brazil, Democratic Peoples Republic of Korea, Russia, United Kingdom, United States.

A note to our readers: This week we're attending the 2016 annual meeting of the Association of the United States Army. We'll be providing tweets and full coverage from the cyber-relevant portions of the three-day event. We're also spending some time with our colleagues from the Military Cyber Professionals Association.

It's also National Cyber Security Awareness Month in the United States. The theme for the first week is "STOP. THINK. CONNECT.™: The Basic Steps to Online Safety and Security."

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the University of Maryland's Center for Health and Homeland Security as Ben Yelin explains changes to Rule 41 of the Federal Rules of Criminal Procedure and how those changes could affect online privacy. Our guest today is Igor Volovich, CEO of ROMAD, who'll talk about signature-less solutions for fighting malware. If you enjoy the podcast, we invite you to consider giving it an iTunes review.

Tech Talk: Blockchain & Bitcoin (Laurel, Maryland, USA, October 17, 2016) Join Novetta and Chainanalysis at Jailbreak Brewery to learn about Bitcoin, a digital currency, and Blockchain, the technology that makes it all work. Rub elbows with like-minded techies and enjoy ice cold beer - Don’t miss out.

Cyber Security Summit (Los Angeles, California, USA, October 20, 2016) Senior-level executives are invited to learn about the latest threats and solutions in cyber security from experts from the U.S. Dept. of Justice, Darktrace, IBM and more. Use promo code cyberwire50 for a 50% off (Regular price $250).

CyberMaryland 2016 (Baltimore, MD, USA, October 20 - 21, 2016) This year's theme, “Leading the Cyber Generation,” captures the event’s intent to provide unparalleled information sharing and networking opportunities for development of cyber assets on both the human and technological side.

NICE Conference and Expo 2016 (Kansas City, MO, USA, November 1 - 2, 2016) The NICE 2016 Conference and Expo will feature timely, topical, and thought-provoking presentations, bringing together cybersecurity workforce, training, and educational leaders from academia, business, and government for two days of focused discussions.

Dateline 2016 AUSA Meeting and Exposition

AUSA Annual Meeting Preview (Defense News) Lt. Gen. Patricia McQuistion, senior director for AUSA membership, discusses what to expect from this year’s show

The World Changed in 2014 (The CyberWire) Everyone recognizes that the world changed on 9/11. It also changed, and just as drastically, in 2014. That year saw the Russian invasion of Ukraine (with its attendant suppression of civil society and hybrid warfare); it also saw the rise of ISIS and the beginning of the ongoing refugee crisis as people fled the failed states of North Africa and the Middle East. With that crisis, terrorism came back to Europe. A major feature of the new world of conflict has been intense operations in cyberspace

SECARM Sets Goals, Timeline for Rapid Capabilities Office: AUSA Exclusive (Defense News) The Army is aggressively pursuing overhauls this year to its troubled procurement system – concurrent with Congress’ own efforts to reform the Defense Department’s acquisition process at-large

Where Are All the Startups? (Defense One) Pentagon leaders regularly tout Silicon Valley innovation, but entrepreneurs seem largely absent from the largest defense industry events

Army Looks For Ways To Make Contracting More Agile (Defense News) The Army is soliciting ideas on how it might make its contracting processes more agile, the service’s acquisition chief Katrina McFarland said during a panel at the Association of the US Army’s annual conference Monday

Cyber Attacks, Threats, and Vulnerabilities

South Korean military cyber command hacked by injecting malicious codes into routing server (International Business Times) It is not known where the attack originated from, but North Korea is on the radar of suspicion

Hacker group finds almost no takers for stolen NSA cyber tools (McClatchy DC) Foreign hackers responsible for the theft of top secret cyber weapons from the National Security Agency are ranting that no one is interested in buying the stolen cyber tools

Can you hack the vote? Yes, but not how you might think (CSO) It’s public confidence, not the actual vote count, that’s in danger, Symantec says

How Bots Can Influence the 2016 Presidential Election (ShieldSquare) Voting for elections happen around the world, and people choose their favorite candidate based on a lot of factors

IoT Devices at Risk After Mirai Code Leaked that Exploits Default Credentials (HackRead) The IoT Botnet Mirai’s source code has been published online by its author along with configuration and set-up details

IoT botnet highlights the dangers of default passwords (CSO) The Mirai botnet used IoT devices to launch a massive DDOS attack

Here are the 61 passwords that powered the Mirai IoT botnet (CSO) Mirai was one of two botnets behind the largest DDoS attack on record

Who Makes the IoT Things Under Attack? (KrebsOnSecurity) As KrebsOnSecurity observed over the weekend, the source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released. Here’s a look at which devices are being targeted by this malware

OpenJPEG zero-day flaw leads to remote code execution (ZDNet) The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec

Security company finds five “zero-day” flaws in EMC management console (Ars Technica) Unisphere for VMAX used insecured Flash-to-Java interfaces, leaving door open to attacks

Hack Crashes Linux Distros with 48 Characters of Code (Threatpost) With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd

The Oracle of Delphi Will Steal Your Credentials (Guardicore) It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the fact that her every move was recorded and fully analyzed. Thanks to our deception technology, we could easily reroute the attacker, making her believe she reached her real target. Something about this attack was different, though. All originating from the same source, the attacks repeatedly used brute force passwords for RDP credentials to connect to the victim machine, download and execute a previously undetected malware, which we named Trojan.sysscan. This is a new malware capable of running on every Windows version from XP through Server 2012 R2

Researchers Crack MarsJoke Crypto to Defang Ransomware (Infosecurity Magazine) Researchers have cracked the MarsJoke crypto-ransomware, defanging it and giving victims a way to decrypt their files

Real-Time Phishing Emerges in Brazil (Infosecurity Magazine) A real-time phishing campaign is targeting Brazil. This tactic is designed to emulate a banking Trojan by extracting critical data from its victims in real time via a live, interactive phishing attack

Buhmat banking malware infiltrates popular Russian boxing webiste (IBS Intelligence) Banking malware can be found in the strangest places, and a contender has been found in popular boxing website The site, which has more than three million visitors per month, was infected with code that redirected users to a third-party site containing an exploit and a Russian banking Trojan

Mount Holly Springs police fall victim to cyber attack (ABC 27 News) The Mount Holly Springs Police Department says no private information was jeopardized when hackers took over one its computers

Hutton Hotel removes unwanted malware guest (CSO) The long sorted list of companies that have had their payment systems has added a new victim to it’s ranks

Security Patches, Mitigations, and Software Updates

Big Blue Patches 14 More OpenSSL Flaws In IBM i (IT Jungle) IBM i shops that use the OpenSSL encryption protocol will want to know that IBM last week issued program temporary fixes (PTFs) for 14 security vulnerabilities impacting IBM i versions 7.1, 7.2, and 7.3. If you're running an older version of the IBM i OS, you are out of luck

BlackBerry Priv Starts Receiving October 2016 Security Update (Tech Times) BlackBerry is rolling out an October security update for the Android-powered BlackBerry Priv, ahead of Google's official release of the patch

Mozilla Reduces Threat of Export-Grade Crypto to Firefox (Threatpost) Logjam was one of several downgrade attacks discovered in the last 18 months that could theoretically allow a resourced attacker to take advantage of lingering export-grade cryptography to read and modify data over a supposedly secure connection

Apple To Block WoSign Intermediate Certificates (Threatpost) Apple weighed in on the ongoing WoSign fiasco over the weekend, saying it would soon distrust certificates issued by the Chinese Certificate Authority’s Free SSL Certificate G2 intermediate CA on macOS

Cyber Trends

Tech budgets 2017: A CXO's Guide (ZDNet) See our original research on where organizations are spending their tech budgets in 2017 and what their top priorities are. We also provide practical advice on how to put your IT dollars to good use

Cloud providers not expanding security as fast as customers adopt cloud (Help Net Security) Information security professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the SANS Institute

National Cyber Security Awareness Month: Our Shared Responsibility (Federal Bureau of Investigation) Data breaches resulting in the compromise of personally identifiable information of thousands of Americans. Intrusions into financial, corporate, and government networks. Complex financial schemes committed by sophisticated cyber criminals against businesses and the public in general

Q&A: Interview with a Virus Slayer (Medium) Mikko Hyppönen on the Museum of Malware, the golden age of virus hunting, and the weaponization of viruses

BAE Systems: A cyber attack could cost your business £1 million (IT Pro Portal) Following on from Kaspersky Lab's report finding that DDoS attacks can cost large businesses up to £1.2 million, BAE Systems has also released new research highlighting the financial impact of cyber attacks

Women Underrepresented in Information Security Workforce (Credit Union Times) Women represent only 11% of the global information security workforce, including in financial services, despite a shortage of cybersecurity skilled personnel overall

Snowden: Privacy is dignity (This Week) Exiled ex-NSA contractor speaks via video feed at Ohio Wesleyan


Compliance pushing boards' cyber security more than breaches - survey (Channelnomics) Research shows increase in compliance mandates is the top driver for cyber security prioritization for boards of directors

Verizon Merger Likely to Force More Robust Yahoo Response (Bloomberg BNA) Yahoo! Inc. will likely undertake a more robust data breach response to reassure Verizon Communications Inc. that it isn't acquiring an unreasonable privacy and data security burden, cybersecurity professionals told Bloomberg BNA

Japanese group acquires Australian cyber firm (IHS Jane's 360) The Nomura Research Institute (NRI), a Japanese consulting and IT group, has entered an agreement to acquire Australian cyber-defence company ASG, it was announced 30 September

RTN Eyes Cybersecurity Market Growth (RTN) (Investopedia) Raytheon Co. (RTN) is making headway in the commercial cybersecurity market, which could help the business bolster its overall earnings for years to come

Corero recovering after September stumble (Proactive Investors) Contracts are taking longer to get over the line than anticpated, but the orders are still rolling in and the cyber-threat is not going to disappear

Report: Carbon Black Files For IPO As Endpoint Security Market Continues To Heat Up (CRN) In the latest sign of a booming market for endpoint security, Carbon Black has reportedly confidentially filed for its initial public offering

Carbon Black, IBM Take Aim At Competitor Tanium With New Partnership (CRN) Carbon Black and IBM are deepening their relationship, unveiling Tuesday a new endpoint management partnership that takes direct aim at competitor Tanium

Sophos to drop Quadsys after Five Avoid Jail (Register) Enid Blyton plot twist: Former Platinum Partner kicked to the curb

South GA cyber security firm partners with government (WALB 10 News) A South Georgia cyber security firm is working with the government to promote cyber security

Hexadite’s Aaron Cote Named to CRN “100 People You Don’t Know But Should” List (BusinessWIre) VP of Sales playing a critical role as security and orchestration platform expands in the channel with key resellers

ZTE offers OTN-based quantum encryption (Lightwave) ZTE Corp. (0763.HK/000063.SZ) has unveiled what it asserts is the first quantum encryption transport capability based on Optical Transport Network (OTN). The technology supports transmission of quantum paths and traditional paths on the same fiber

Products, Services, and Solutions

Kaspersky Lab Releases Decryption Tool for Polyglot Ransomware That Disguises Itself as CTB-Locker (BusinessWire) Kaspersky Lab announced today that users who have suffered from Polyglot ransomware, also known as MarsJoke, can now restore their files with the decryption tool developed by Kaspersky Lab experts

Cloudwick Announces Technology Partnership Program With Security and Analytics Leaders (MarketWired) Cloudwick, the leading open source services and solutions provider, launched its Technology Partnership Program (TPP). On the heels of the Cloudwick Data Analytics Platform (CDAP) launch, this announcement demonstrates the company's commitment to working with industry-leading advanced analytics and machine learning software providers to advance the cybersecurity market

Egnyte Goes All-In on Enterprise, Announcing End-to-End Collaboration with Microsoft (PRWeb) Offers Microsoft Azure as premiere storage provider for new customers

AristotleInsight's® Directional Matrix Proven Invaluable for Real-World Cyber Security Situation (IT Briefing) Sergeant Laboratories is excited to reveal that its flagship product, AristotleInsight, proved key in helping a customer identify an advanced persistent threat (APT) cyber attack. The client recently notified Sergeant Laboratories of the security incident

AT&T rebrands Network Functions on Demand into FlexWare, expands product offerings (Fierce Telecom) AT&T said it will rebrand its Network Functions on Demand service into the FlexWare brand. The company also said it added several new options to the service, including a smaller device and security services from Palo Alto Networks

Automation Enables Cyber Threat Mitigation at Machine Speed, Propels Organizations Toward Cyber Resiliency (BusinessWire) Booz Allen and Phantom deliver intelligent automation to help Federal and commercial clients combat threats, empowering security pros to focus on the most critical issues

Technologies, Techniques, and Standards

How do you work out a country’s level of cybersecurity? (We Live Security) When we talk about the cybersecurity of a nation state, we have to refer to many different aspects, such as the nation’s capacity to respond to large-scale security incidents, its legislation in this area, the protection of critical infrastructure, its capacity to work with other countries, and even the security culture that might exist among the population

DHS sets Oct. 31 comment deadline for draft cyber-response plan (Inside Cybersecurity) The Department of Homeland Security has posted a draft National Cyber-Incident Response Plan for public comment until Oct. 31. The revised plan was developed under Presidential Policy Directive 41 issued in July, and is expected to be issued as final early next year

Swift mandates banks to tighten security (Global Trade Review) Swift has unveiled the next phase of its customer security programme (CSP), established to support customers in the struggle against cyber-attacks. The controls will be mandatory by the start of 2018

Hackers for good: How Anand Prakash rescued Facebook (Christian Science Monitor Passcode) In the first installment in an occasional series about ethical hackers, Passcode profiles one of India's most successful freelance cybersecurity researchers known for finding – and helping fix – serious flaws in Facebook

Palo Alto Networks' three top tips for cybersecurity success (Security Brief) Some professionals are becoming jaded about their ability to protect themselves against cyber attacks, particularly as successful attacks are on the rise, Palo Alto Networks has found

Password Buddies: A Better Way To Reset Passwords (SANS Internet Storm Center) Implementing password resets is hard. The problem comes down to how we authenticate a user who forgot the common secret(s) we shared. We all know, that "password reset questions" are often just weak "password bypass questions," and can not be used to authenticate a user reliably

Sharing is caring: Public-private (SC Magazine) Threat intelligence information sharing efforts have become increasingly important as breaches become more pervasive. Karen Epper Hoffman reports

Design and Innovation

Dual-Data Defense in Depth Improves SCADA Security (SIGNAL) A new technique could help prevent a cascade of catastrophic cyber attacks across systems


Gulf Power summit: Cybersecurity jobs to flood market (Pensacola News Journal) A forthcoming, inaugural group of University of West Florida graduates should help supply a job market booming with growth in Northwest Florida and across the nation

Legislation, Policy, and Regulation

EU wants to curb export of cyber-surveillance tech (Help Net Security) The European Commission has proposed a new amendment to the regulation that forms the basis of EU’s export control regime of dual-use technology, i.e. technology that can be used for both peaceful and military aims

Privacy Shield's Drama Is Far From Over (Dark Reading) Businesses are working with trading partners to take responsibility for protecting private data in case the US-EU framework fails

The Truth About Thailand's Social Media Surveillance (Diplomat) The targeting of government critics is yet another concern in post-coup Thailand

Putin suspends nuclear pact, raising stakes in row with Washington (Reuters) Russian President Vladimir Putin on Monday suspended a treaty with Washington on cleaning up weapons-grade plutonium, signaling he is willing to use nuclear disarmament as a new bargaining chip in disputes with the United States over Ukraine and Syria

U.S Halts Cooperation with Russia on Syrian War (Foreign Policy) The United States has suspended plans to coordinate with Russia on counter-terrorism strikes in Syria, and talks with Moscow are over a cease-fire are definitely dead after Russia’s continued attacks on the besieged city of Aleppo, the State Department announced Monday

Is DHS Going To Take Over The Cybersecurity Of The Election System? (Inside Counsel) The Department of Homeland Security (DHS) has offered to provide more cybersecurity protections to help states secure their voting systems

Previous Next For the Corps, It Is Game On (SIGNAL) The U.S. Marine Corps looks to a gaming-inspired course to train the next generation of cyber warriors

U.S. Army Creates Cybersecurity Strategy For a New Normal (SIGNAL) Thriving in the digital age means embracing disruptive technologies and work force reforms

Cyber Mission Force approaches initial operating capacity (C4ISRNET) In a major milestone, U.S. Cyber Command announced that the Cyber Mission Force is nearly initially operationally capable. A CYBERCOM spokesman said, as of Oct. 3, 99 percent of the CMF achieved initial operating capability with 132 of the total 133 teams reaching IOC by the end of fiscal 2016, Sept. 30

New cyber directorate encompasses critical missions (C4ISRNET) In a world where cyber is part of virtually every operation, the military is working to determine how it fits in and works best with a close, but very different, capability: electronic warfare (EW). To that end, Pentagon leadership recently established a new cyber directorate within the Army’s Office of the Deputy Chief of Staff, G-3/5/7, headed up by Brig. Gen. Patricia Frost

Trump calls for ‘crippling cyberattacks’ on US enemies (Federal Times) Republican presidential nominee Donald Trump has a plan for the nation’s cybersecurity and, following last week’s debate performance, he’s rolling it out on the stump

Trump announces plans for Cyber Review Team (FCW) After calling the security aspect of cyber "hardly doable" during the first presidential debate, the Republican presidential nominee took another whack at addressing cybersecurity during an Oct. 3 campaign event

Microsoft Unveils Security Policy Doc for Lawmakers (Infosecurity Magazine) Microsoft has launched a major new policy document designed to lobby governments into legislating and regulating towards “a trusted, responsible, and inclusive cloud”

Litigation, Investigation, and Law Enforcement

Russian government equates cyber-crimes to theft (SC Magazine) Russia is making it easier to prosecute cyber-crimes by characterising them as theft, not fraud, which will also allow the imposition of tougher penalties as it was previously difficult to establish that they were serious crimes

The company linked to the OPM hack just got hired by the government again (ZDNet) Keypoint is suspected of being the source of the leaked credentials that allowed hackers to swipe millions of records from the OPM database

Lawmakers: 'Mileygate' commander doesn't deserve brigadier general's star (Air Force Times) Two lawmakers are urging the Senate to reject the Air Force's decision to award a brigadier general's star to the commander who reprimanded and grounded three pilots over text messages containing Miley Cyrus' lyrics referencing drug use

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

GTEC (Ottawa, Ontario, Canada, November 1 - 3, 2016) For the public sector and business, count on GTEC to help you keep up with the changing landscape of technology and service delivery in Canada. With our nationally recognized awards program and annual...

Upcoming Events

Cyber National Security – The Law of Cyberspace Confrontation (Hanover, Maryland, and Fort Meade, October 3 - 6, 2016) US Cyber Command will host the fourth annual COCOM-Interagency Cyber Law Conference from 3 through 6 October 2016, Cyber National Security – The Law of Cyberspace Confrontation. This year the conference...

Crossroads Regional Cybersecurity Summit (Victoria, Texas, USA, October 4, 2016) Bringing together top experts from both the public and private sectors, the Crossroads Regional Cybersecurity Summit (CRCS) will be an exciting and educational day for local businesses. Through a variety...

Cambridge Cyber Summit (Cambridge, Massachusetts, USA, October 5, 2016) This unique one-day summit will bring together c-suite executives and business owners with public and private-sector leaders in security, technology and defense to discuss ways to combat urgent cyber threats...

IP EXPO Europe (London, England, UK, October 5 - 6, 2016) IP EXPO Europe is Europe's number ONE IT event for those looking to find out how the latest IT innovations can drive their business forwardIP EXPO Europe now includes six co-located events with their own...

RFUN 2016: 5th Annual Threat Intelligence Conference (Washington, DC, USA, October 5 - 6, 2016) The fifth annual RFUN Conference is a two-day event that brings together the diverse and talented community of analysts and operational defenders who apply real-time threat intelligence to out-innovate...

SecureWorld Denver (Denver, Colorado, USA, October 5 - 6, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

VB 2016 (Denver, Colorado, USA, October 5 - 7, 2016) The 26th annual international Virus Bulletin conference meets this October in Denver

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

TU-Automotive Cyber Security Europe (Munich, Bayern, Germany, October 6 - 7, 2016) The most focussed forum on the ‘here and now’ of automotive cybersecurity. As we are inundated by headlines on cyber-attacks, we go beyond the hype to focus on the current challenges and solutions that...

AFCEA CyberSecurity Summit (Washington, DC, USA, October 11 - 12, 2016) AFCEA Washington, DC invites you to attend the 7th Annual Cybersecurity Summit on October 11–12, 2016. This two-day summit will feature keynotes from government leaders, thought-provoking discussion panels,...

AppSecUSA 2016 (Washington, DC, USA, October 11 - 14, 2016) OWASP’s 13th Annual AppSecUSA Security Conference is the premier application security conference for developers and security experts. Come hear an amazing group of inspirational speakers—including YouTube’s...

Cyber Security Summit 2016 (Aukland, New Zealand, May 5, 2016) New Zealand’s first Cyber Security Summit will be held in Auckland on 5 May 2016. The theme is “Keeping New Zealand’s Economy Cyber Secure”. Hosted by the Minister for Communications Hon Amy Adams, the...

Insider Threat Program Development Training for NISPOM CC 2 (Warrington, Pennsylvania, USA, October 17 - 18, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). PA. For a limited time the training is being offered at a discounted rate of...

Cyber Ready 2016 (McDill Air Force Base, Florida, USA, October 18, 2016) We invite you to join us for our first annual Cyber ReadyTM 2016 conference observing National Cyber Security Awareness Month: The Impact of Cyber Crime. The National Cyber Partnership, joined by the MITRE MITRE National Capture the Flag (CTF) Competition Cyber Challenge Awards Ceremony.

EDGE2016 Security Conference (Knoxville, Tennessee, USA, October 18 - 19, 2016) The EDGE2016 conference is where true collaboration between business and technology professionals happens. Combining engaging keynotes from world-renowned visionaries, recognized technology industry leaders,...

SecureWorld St. Louis (St. Louis, Missouri, USA, October 18 - 19, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

CyberTini at CyberMaryland (Baltimore, Maryland, USA, October 19, 2016) The bwtech@UMBC Cyber Incubator will be hosting a CyberTini as the official opening event of the CyberMaryland Conference on the evening of October 19, 2016 at the Columbus Center in Baltimore’s Inner...

Los Angeles Cyber Security Summit (Los Angeles, California, USA, October 28, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

CyberMaryland 2016 (Baltimore, Maryland, USA, October 20 - 21, 2016) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private...

CyCon US: International Conference on Cyber Conflict (Washington, DC, USA, October 21 - 23, 2016) The inaugural U.S. based International Conference on Cyber Conflict will take place 21-23 October 2016 in Washington D.C. Focusing on a theme of Protecting the Future. CyCon U.S. seeks to create greater...

SANS San Diego 2016 (San Diego, California, USA , October 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

2016 ICS Cyber Security Conference (Atlanta, Georgia, USA, October 24 - 27, 2016) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other...

SecureWorld Bay Area (San Jose, California, USA, October 27, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Regional Cyber Security Summit (Sharm El-Sheikh, Egypt, October 30 - November 1, 2016) The Regional Cyber Security Summit comes this year with the theme of “Boundless Collaboration, Boundless Protection”. It focuses on the cooperation in cybersecurity as one of key pillars to tackle the...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.