skip navigation

More signal. Less noise.

Daily briefing.

ISIS deals with loss of territory by looking for scriptural evidence that such setbacks are foreordained, and in no way compromise its legitimacy. Expect this to become a leitmotif in the Caliphate's ongoing information campaign.

The Syrian Electronic Army ("with Russian backing," says the victim) has attacked Belgian newspaper Nieuwsblad to protest Belgian participation in airstrikes against Syrian targets.

Pace the Jester and lots of other people who thought they'd glimpsed the hidden hand of Russia, it now appears that Friday's DDoS attacks were not directly the work of a state security service. The Mirai botnet remains under investigation, but according to US Director of National Intelligence Clapper, it looks more like a criminal operation than an attack by the state. Flashpoint has published a study that suggests the attackers were, as CSO calls them, "a bunch of amateurs," "script kiddies" and dark web lurkers without specific political or criminal motivation. If correct, this assessment is not reassuring, since it implies such attacks are well within the reach of many.

Utilities, especially electrical utilities, are worried. The not-forgotten Ukraine grid hack began with low-grade criminals and was coopted by a capable nation-state, and the same could happen with IoT vulnerabilities. Trend Micro points out one problem with the electrical power sector: too many of its personnel still use pagers.

Indegy has found a remote code vulnerability in Schneider Electric software used in programmable logic controllers.

Netskope describes the CloudFanta credential harvesting malware.

Forcepoint's study of millennials and cyber is out.


Today's issue includes events affecting Australia, Belgium, Brazil, Canada, European Union, Iran, Iraq, Malaysia, Mauritania, Mexico, Netherlands, New Zealand, Russia, Switzerland, Syria, Turkey, United States.

A note to our readers: National Cyber Security Awareness Month is now in its' final full week. The theme is "our continuously connected lives: what's your 'apptitude'?"

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll hear from Terbium Lab's Emily Wilson, who'll share our partners' insights into credit card fraud. Our guest is Ed Hammersla of Forcepoint Federal, who talks to us about their just-completed study of millennials in the workforce. As always, if you enjoy the podcast, please consider giving it an iTunes review.

TECHEXPO Cyber Security Hiring Event (McLean, VA, USA, November 2, 2016) Our professional hiring events have benefited nearly a million attendees since 1993. We look forward to helping you advance your career and saving you time in your job search by providing you the opportunity to meet face to face with the nation's leading companies.

Malware Detection: How to Spot Infections Early with AlienVault USM (Live Webcast, November 3, 2016) While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like CoreBot, have the ability to modify themselves on the fly, making them nearly impossible to detect with traditional preventative security measures. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.

Cyber Attacks, Threats, and Vulnerabilities

Allah Wants ISIS to Retreat (Foreign Policy) The Caliphate’s propagandists are digging through the Quran to prove that getting beaten back in Mosul doesn’t stray from the preordained plan

From French Soldier to ISIS Spymaster (Daily Beast) It’s been almost six months since The Daily Beast exposed Abu Suleyman al-Firansi. Now new details are emerging that can tell us a lot about ISIS’s organization

Amateurs were behind the Dyn Inc. DDoS attack, report says (CSO) Flashpoint says that despite speculation, nothing they’ve seen points to political motivation or extortion

Clapper: Non-state actor likely to blame for massive cyberattack (Federal Times) National Intelligence Director James Clapper has said it appears a "non-state actor" was behind a massive cyberattack last week that briefly blocked access to websites including Twitter and Netflix

Russia's power in cyberattacks (Israel Hayom) Last Friday, a long list of well-known websites -- including Amazon, PayPal and others -- were shut down for several hours. U.S. security authorities believe that the people behind the attack, one of the largest of its kind in recent years, are private Russian and Chinese hackers who worked together

Your DVR Didn’t Take Down the Internet—Yet (Wired) Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED) were inaccessible across the East Coast and beyond

'Root' & The New Age Of IoT-Based DDoS Attacks (Dark Reading) Last Friday's massive DDoS that exploited online cameras and DVRs was simple to pull off -- and a new chapter in online attacks

Terabit-scale DDoS events are on the horizon (Help Net Security) Corero Network Security has disclosed a new DDoS attack vector observed for the first time against its customers last week

Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again (Forbes) Think Friday’s massive outage was bad? Worse is expected, as hackers are selling access to a huge army of hacked Internet of Things (IoT) devices designed to launch attacks capable of severely disrupting web connections

'This attack was different' — cyberthreat draws utility warnings (EE News) Swarms of hacked, internet-connected devices have menaced core parts of the web and put utilities on edge

What Businesses Can Learn From the Mirai Botnet DDoS Attack (Fox Business) Sitting in a cybersecurity conference days after a massive cyberattack is a surreal feeling

Can we secure the internet of things in time to prevent another cyber-attack? (Guardian) Easy-to-hijack ‘smart’ devices just crashed some of the world’s biggest online platforms. Experts say it’s a wake-up call to improve security – and quickly

History repeating: How the IoT is failing to learn the security lessons of the past (ZDNet) The massive cyberattacks which took down some of the most popular websites on the internet show that device manufacturers are not learning from the mistakes of the past

No, the Jester didn't hack the Russian Foreign Ministry website (Graham Cluley) Ho ho ho

Chinese Firm Defends Webcam Security After DDoS Attacks (Dark Reading) Hangzhou Xiongmai Technology says devices sold in the US before April 2015 will be recalled after attack on Dyn servers

ForeScout Reveals New Findings that Show Common Enterprise IoT Devices are Hackable in Under Three Minutes (ForeScout) In-depth analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks

Nuclear plants leak critical alerts in unencrypted pager messages (Ars Technica) A surprising number of critical infrastructure participants do, too, study finds

Power Plants Are Hackable Because Employees Are Still Using Pagers (Motherboard) After hackers attacked several Ukrainian power companies in December of last year, the cybersecurity of critical infrastructure has faced increased scrutiny

Syrian Cyber Army valt website Nieuwsblad aan (Nieuwsblad) Syrische hackers, gesteund door Rusland, hebben maandagnamiddag een grootscheepse aanval ingezet op de website van Het Nieuwsblad. Ze deden dat uit protest tegen de Belgische bombardementen op Syrië

How hackers broke into John Podesta, DNC Gmail accounts (Naked Security) Who hacked the Democratic National Committee (DNC)? The finger of blame has been pointed at, among others, Russia, with allegations being made with a varying degree of heat and conviction but – so far – without much evidence. However, evidence now is emerging – in the form of URLs shortened by the service

US Officials: Russian Hackers Could Spread Online Rumors Of Voter Fraud (Dark Reading) US authorities ask election officials to be alert to false documents posted online to influence public perception

WikiLeaks is exposing Clinton’s duplicity, but it’s no hero (Jackson Hole News and Guide) Winston Churchill once said that “if Hitler invaded hell, I would make at least a favorable reference to the devil in the House of Commons.” So it’s not surprising that many conservatives are thrilled to see WikiLeaks and the Clinton campaign at war, as Julian Assange releases emails exposing the duplicity and potential self-dealing of the Clinton machine and the blurred line between the Clinton Foundation and the State Department

Mauritania: Recent E-mail Scam Exposes Weaknesses (Wapack Labs) Mauritania, specifically their capital Nouakchott, face numerous cyber challenges to their banking/corporate, government and personal communications due to outside dependence on network infrastructure

The Phone Hackers at Cellebrite Have Had Their Firmware Leaked Online (Motherboard) Cellebrite, an Israeli company that specialises in digital forensics, has dominated the market in helping law enforcement access mobile phones. But one apparent reseller of the company's products is publicly distributing copies of Cellebrite firmware and software for anyone to download

Millions of Android Devices Vulnerable to DRAMMER Attack (HackRead) DRAMMER, a dangerous threat to Android devices — Google has awarded the researchers $4000 for identifying the bug but it will take a while for to get rid of it

CloudFanta Malware Targets Victims Via Cloud Storage App (Dark Reading) The malware campaign uses the Sugarsync cloud storage app to distribute malware that steals user credentials and monitors online banking activity

CloudFanta Pops with the Cloud using SugarSync (Netskope) Netskope Threat Research Labs has discovered a new malware campaign, which we suspect stole more than 26,000 email credentials and also monitors online banking activities. The malware, which we have named “CloudFanta,” has been in operation since July 2016 and primarily targets Brazilian users

CloudFanta Malware Campaign Technical Analysis (Netskope) We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities. This blog will detail the technical aspects of CloudFanta

Russian criminals' bank attacks go global (CSO) Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next

Lifting the lid on Sednit: A closer look at the software it uses (We Live Security) Security experts at ESET have released the final two parts of their new research into the operations of the notorious Sednit hacking group which – as previously discussed – has targeted over 1000 high-profile individuals with phishing attacks and zero-day exploits

Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the latest Windows 10 v1607 Build 14393 (Nettitude) We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting the pointer to the SecurityDescriptor to NULL in the header of a process object running as SYSTEM won’t work from Windows 10 v1607 (Build 14393)

Workstation software flaw exposes industrial control systems to hacking (CSO) Attackers can send malicious code to industrial engineering software to take over workstations used to program and control PLCs

Lyft customers face potential hack from recycled phone numbers (CSO) The problem involves Lyft's use of cell phone numbers to verify customers' identities

Stolen medical data on the cheap after waves of healthcare hacks (Christian Science Monitor Passcode) Buyers and sellers on the digital underground are trading healthcare records databases for as much as $200,000, according to a report from Intel Security. And that's at a discount

Following Lull, New Campaigns Pushing Retooled ‘Pumpkin’ Locky (Threatpost) New and increasingly diverse variants of ransomware are released weekly, but developers behind the Locky strain have managed to keep the malware fresh in the face of changing trends

7 Scary Ransomware Families (Dark Reading) Here are seven ransomware variants that can creep up on you

Cyber attack to blame for Grade 10 literacy test chaos (Hamilton Spectator) The computer troubles that plagued the online literacy test for more than 200,000 Ontario teens last week were caused by an "intentional, malicious and sustained Distributed Denial of Service (DDoS) attack — a type of cyber attack," the testing agency says

Flash mobs the latest threat this holiday season (CSO) The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise -- flash mobs

Security Patches, Mitigations, and Software Updates

Apple Patches iOS Flaw Exploitable by Malicious JPEG (Threatpost) Apple on Monday patched a code execution vulnerability in iOS that could be exploited via a JPEG file crafted to take advantage of the flaw

Critical account creation flaws patched in popular Joomla CMS (CSO) Developers urge users to update to Joomla 3.6.4 as soon as possible

Cyber Trends

Internet of Things: Have We Bitten Off More Than We Can Chew? (NBC News) Ready or not, the Internet of Things is about to explode. But whether we're equipped to handle security for it is another question

Millennials see future in cyber security (Enterprise Times) The future job prospects for millennials has been bleak for some time

Forcepoint™ Study Finds Millennials' Behavior Poses Significant Security Risk To Federal It Systems (PRNewswire) As security-conscious baby boomers retire, survey of growing millennial workforce reveals a new generation more likely to trade caution for digital productivity

The Rising Tide of Millennials (Forcepoint) A tsunami of risks for the Federal Government?

Over one-third of Americans have been hacked (Help Net Security) Two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the worst offenders, according to Arbor Networks

Intellectual property cyber theft to rise 58% (Help Net Security) The number of intellectual property cyber theft incidents in the next 12 months is expected to increase, according to 58 percent of respondents to a recent Deloitte poll

61% of employers have no BYOD policy (Help Net Security) Trustlook has shared findings on the latest BYOD trends and best practices from a survey of 320 Android users


As IPO Looms, Tanium Sells Itself As More Than Cybersecurity (Forbes) On Tuesday morning in San Francisco, Orion Hindawi will kick off Tanium’s inaugural user conference as the CEO of one of the hottest cybersecurity startups in Silicon Valley. But the 36-year-old Hindawi wants the $3.5 billion-valued Tanium to be known as more than a tool to fight hackers

Is An American Company's Technology Helping Turkey Spy On Its Citizens? (Forbes) “I do not wish to spend the rest of my life with the regret of having been a part of Erdoğan’s insanity, so I’m out.” The company-wide email on April 4 from Kriss Andsten, a senior technical engineer for Fremont, California-based Procera Networks, landed with a thud and marked the beginning of an internal revolt that has rattled the telecom technology provider

Lessons to learn from Wynyard Group failure (NewsHub) There are lessons for both investors and entrepreneurs from the failure of Wynyard Group

Ballooning costs spell trouble for Wynyard (Otago Daily Times) Wynyard Group appeared to be paying the price for not controlling its costs as revenue failed to grow quickly enough, Craigs Investment Partners broker Peter McIntyre said yesterday

Former White House cybersecurity chief launches Uplevel Security (TechCrunch) Launching today with a new security technology Uplevel Security wants to be the go-to tool IT departments use to respond to breaches and hacks

National security brain drain (CSO) Former Defense, Intelligence and National Security senior officials who were charged with protecting our country’s secrets, classified networks and technical assets are in high demand by corporate America

Kudelski Security Unveils Research Unit to Drive Development of Industry's Most Advanced Enterprise Cybersecurity Programs (Yahoo! Finance) Kudelski Security, a trusted advisor and cybersecurity innovator for the world's most security-conscious organizations, today launched a research unit dedicated to driving the most effective cybersecurity programs possible for enterprises and public sector institutions

Gatekeeper of cyber security (Docklands News) Victoria is one step closer to becoming one of the world’s top five cyber security powerhouses and Docklands is the headquarters of the hub

Products, Services, and Solutions

Delta Risk LLC and AlienVault Team Up to Help Companies Fight Ransomware (CBS 8) Ransomware attacks are on the rise, with a 300 percent increase in daily attacks since the beginning of the year, according to a recent U.S. government interagency report

PacketRAID: All-in-One Portable Network Recorder Multi-Port—Multi-Format—Multi-Speed (The Packet Company) PacketRAID delivers remarkable performance and flexibility with an intuitive GUI in a portable platform. Designed for use in test labs and in network security applications, it can record and replay almost any type of traffic at a wide range of speeds

TV Rheinland and OpenSky Join the RSA SecurWorld Partner Program to Help Enterprises Take Command of Risk in an Increasingly Digital World (9 & 10 News) OpenSky announces channel partnership with RSA in the US, UK and Switzerland

Breaking the Android Puzzle With Oxygen Forensic Detective v. 9.0 (PRNewswire) Oxygen Forensics, the worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, announced today that it has added a Jet-Imager module to its Oxygen Forensic Detective product that allows users to acquire data from Android devices faster saving experts critical time while solving law enforcement cases

Appmobi Extends Protection Center Platform to Defend IoT Devices (PRNewswire) New IoT security solution uses machine learning to identify and resolve DDoS attacks and other cyber threats in real time

Breathe New Life into Your Old PC with Paragon Migrate OS 5.0 – One-Step Migration to New Storage Devices (Paragon Software Group) Paragon Software Group (PSG), the leader in data backup, disaster recovery and data migration solutions, announces Paragon Migrate OS 5.0, a one-step tool to help with Windows systems migration to new storage devices – solid-state drives (SSDs) and hard disk drives (HDDs). Paragon Migrate OS 5.0 instantly performs fast and safe Windows migrations and even downsizes to smaller capacity drives, thanks to advanced data exclusion capabilities. You can transfer a live system with no impact to your work, and have your partitions automatically aligned in the process, if needed. The new release fully supports Windows 10 and comes with an even more intuitive UI providing easy access to the software's step-by-step migration wizard

G2 Web Services Wins 2016 Florin Awards Asia (PRNewswire) G2 Transaction Laundering Detection recognized as the Best Fraud Prevention Innovation

Certus Software presents Certified Data Erasing according to the Common Criteria EAL3+ level (Global Security) Certus Software provides fully transparent certified data erasing, including management of all users, reports and licenses in a cloud-based tool and according to the CCRA

Free tool for Active Directory changes monitoring (Help Net Security) Netwrix Change Notifier for Active Directory tracks changes to Active Directory (AD) users, group memberships, OUs, permissions, and provides visibility into what’s happening inside your AD

Carahsoft Partners With Okta to Bring Secure and Simplified Approach to Identity and Security to the Public Sector (Marketwired) Okta Identity Cloud now available on Carahsoft's GSA Schedule and SEWP V Contracts

Visa opens tokenisation services to third party partners (Finextra) Today Visa (NYSE:V), announced it is accelerating the adoption of secure, digital payments by allowing third party partners to offer Visa Token Service (VTS)

Malaysian insurer partners IT supplier to tailor cyber security policies (ComputerWeekly) Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance

Technologies, Techniques, and Standards

'Siri, catch market cheats': Wall Street watchdogs turn to A.I. (Reuters) Artificial intelligence programs have beaten chess masters and TV quiz show champions. Next up: stock market cheats

How to approach keeping your IoT devices safe (CSO) A DVR has now become a major weapon as seen with the latest round of DDoS

What is a Botnet & How to Prevent Your PC From Being Enslaved (Heimdal Security) Is your computer used to attack others? Everything you need to know about botnets and zombies

What awareness is supposed to be (CSO) Recent W-2 and accounts payable thefts show governance should be the cornerstone of awareness

FS-ISAC Announces The Formation Of The Financial Systemic Analysis & Resilience Center (FSARC) (PRNewswire) Established by financial institutions, FSARC deepens analytic capabilities to combat cyber risk and strengthen resiliency of U.S. financial system

Getting To The 'Just Right' Level Of Encryption (Dark Reading) The key to unlocking secure business messaging is controlling who has the key

Best practices for securing your data in-motion (Help Net Security) Security and compliance is at the top of every IT pro’s mind, yet much of that effort is focused on protecting data within the organization that’s “at rest.” While it’s important to protect all data, data in-motion is when it’s at its most vulnerable point and needs to be more of a focus of your efforts

Why don’t all businesses have a good continuity strategy? (Help Net Security) It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the need for a cure

What is malware & what threats does it pose to you? (Network Support Company) Malware is software designed with malicious purpose. It may be designed to disable your phone or computer, remotely control your device, or steal valuable information like credit card information or passwords

Design and Innovation

The Latest Battle in Software Is All About Artificial Intelligence (Fortune) What if AI could make our software simple again?

Research and Development

How MIT Is Teaching AI to Scare Us (Motherboard) Halloween's approaching, and MIT wants to use AI to scare the daylights out of you


Meet the winners of the Passcode Cup (Christian Science Monitor Passcode) After a four-hour hacking competition organized by Passcode on Friday, October 21, the team from the University of Virginia emerged as the winners

15 under 15: Rising stars in cybersecurity (Christian Science Monitor Passcode) Kids born after the year 2000 have never lived a day without the internet. Everything in their lives is captured in silicon chips and chronicled on Facebook. Algorithms track how quickly they complete their homework; their text message confessions and #selfies are whisked to the cloud

Legislation, Policy, and Regulation

Should companies be fined for not doing cyber security basics? (Computer Business Review) GDPR will punish slow breach reporting: but should it extend to doing cyber security basics?

US wants Mexico under grid security pact before year's end (Washington Examiner) The Obama administration is scrambling to make Mexico by the end of the year a full-fledged member of a North American industry pact that works to defend the electric grid from cyberattacks

Malaysia’s Cyber Defense: One of ASEAN’s Best? (Diplomat) Defense minister praises the country’s developing capabilities

NHTSA Issues Cybersecurity Best Practices For Automakers (Dark Reading) Focus is on limiting access to electronic components and what someone can do with that access

US transport agency guidance on vehicle cybersecurity irks lawmakers (CSO) The guidelines issued by the NHTSA are only voluntary

Senator Prods Federal Agencies on IoT Mess (KrebsOnSecurity) The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure “Internet of Things” (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday’s major Internet outages

Federal regulators: Increasing cybersecurity stance on financial institutions (Help Net Security) Everyone is increasing the attention of cybersecurity given the continued parade of hacking incidents. Just last week, the three main prudential regulators for financial institutions—Office of the Comptroller of the Currency (OCC), Federal Reserve Board (FRB), and Federal Deposit Insurance Corporation (FDIC)—released new proposed cybersecurity risk mitigation standards called, Enhanced Cyber Risk Management Standards

FOIA committee mulls Section 508 responsibilities (Federal News Radio) Section 508 of the Rehabilitation Act is meant to serve as a curb ramp for access to federal information and communication technology, but for some Freedom of Information Act stakeholders, 508 is more like a pothole

Cyber mission force reaches key milestone (C4ISRNET) After narrowly missing its self-imposed deadline, U.S. Cyber Command’s cyber mission force has reached initial operating capability

Litigation, Investigation, and Law Enforcement

IoT Device Maker Vows Product Recall, Legal Action Against Western Accusers (KrebsOnSecurity) A Chinese electronics firm pegged by experts as responsible for making many of the components leveraged in last week’s massive attack that disrupted Twitter and dozens of popular Web sites has vowed to recall some of its vulnerable products, even as it threatened legal action against this publication and others for allegedly tarnishing the company’s brand

Iranian-American Citizen Sentenced To 18 Years In Prison For Espionage (RadioFreeEurope/RadioLiberty) A dual Iranian-American citizen sentenced to 18 years in prison for insulting the Islamic republic and engaging in espionage for the United States was convicted based on his social-media posts, according to a close acquaintance

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Enfuse 2017 (Las Vegas, Nevada, USA, May 22 - 25, 2017) Enfuse™ is a three-day security and digital investigations conference where specialists, executives, and experts break new ground for the year ahead. Enfuse offers unsurpassed networking opportunities,...

Upcoming Events

SANS San Diego 2016 (San Diego, California, USA , October 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals...

2016 ICS Cyber Security Conference (Atlanta, Georgia, USA, October 24 - 27, 2016) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other...

14th Annual EWF National Conference (Scottsdale, Arizona, USA, October 25 - 27, 2016) Balancing risk and opportunity: transforming cybersecuity; risk and privacy beyond the enterprise. The Executive Women's Forum (EWF) Annual Conference provides an exclusive opportunity to personally interact...

SecureWorld Bay Area (San Jose, California, USA, October 27, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Security By Design (McLean, Virginia, USA, October 28, 2016) The essential security conference for all who desire to build trustworthy software. Developers, DevOps Engineers, Software Architects, Security Software Engineers, Designers and more.

Regional Cyber Security Summit (Sharm El-Sheikh, Egypt, October 30 - November 1, 2016) The Regional Cyber Security Summit comes this year with the theme of “Boundless Collaboration, Boundless Protection”. It focuses on the cooperation in cybersecurity as one of key pillars to tackle the...

Inside Dark Web (Washington, DC, USA, November 1 - 2, 2016) Individuals, organizations, corporations, and governments use the Dark Web to protect themselves and their users, employees, customers, and citizens seeking a more accessible and secure Internet experience.

National Institute for Cybersecurity Education 2016 Conference and Expo (Kansas City, Missouri, USA, November 1 - 2, 2016) Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing,...

GTEC (Ottawa, Ontario, Canada, November 1 - 3, 2016) For the public sector and business, count on GTEC to help you keep up with the changing landscape of technology and service delivery in Canada. With our nationally recognized awards program and annual...

Black Hat Europe 2016 (London, England, UK, November 1 - 4, 2016) Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days--two days...

TECHEXPO Cyber Security Hiring Event (Tysons Corner, Virgina, USA, June 30, 2016) Cyber security professionals are invited to interview face-to-face with employers including The CIA, Deloitte, Intel Security, Northrop Grumman, Lockheed Martin, Deloitte, Vencore and many more. Hundreds...

ISSA International Conference (Orlando, Florida, USA, October 22 - 23, 2014) Join us for solution oriented, proactive and innovative sessions focused on security as a vital part of the business.

SINET Showcase 2016: Highlighting and Advancing Innovation (Washington, DC, USA, November 2 - 3, 2016) SINET Showcase provides a platform to identify and highlight “best-of-class" security companies that are addressing industry and government’s most pressing needs and requirements. The chosen SINET 16 Innovators...

3rd Annual Journal of Law and Cyber Warfare Conference (New York, New York, USA, November 3, 2016) The 2016 Journal of Law and Cyber Warfare symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from ...

Security of Things World USA (San Diego, California, USA, November 3 - 4, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World USA in...

2nd Annual Summit: Global Cyber Security Leaders (Berlin, Germany, November 7 - 8, 2016) The Global Cyber Security Leaders 2016 is designed to provide unrivaled access to peers from across the globe, and encourage participants to discuss the current challenges and explore the ideas shaping...

IAPP Europe Data Protection Congress 2016 (Brussels, Belgium, November 7 - 10, 2016) The GDPR is finalised, the Data Protection Congress is returning to Brussels and you have a great deal of work ahead. Begin at the Congress, where you’ll find thought leadership, a thriving professional...

SANS Miami 2016 (Coconut Grove, Florida, USA, November 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing...

Federal IT Security Conference (Columbia, Maryland, USA, November 8, 2016) The Federal IT Security Institute in partnership with PhoenixTS in Columbia, MD is hosting the first annual Federal IT Security Conference. Speakers from NIST, DHS, the Defense Department as well as private...

11th Annual API Cybersecurity Conference & Expo (Houston, Texas, USA, November 9 - 10, 2016) Join us at the 11th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter...

SecureWorld Seattle (Bellevue, Washington, USA, November 9 - 10, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Institute for Critical Infrastructure Technology Annual Gala and Benefit (Washington, DC, USA, November 10, 2016) The Annual ICIT Gala and Benefit is the year’s most prestigious gathering of legislative, agency and private sector leaders committed to protecting our Nation’s critical infrastructures. This intimate...

Israel HLS and Cyber 2016 (Tel Aviv, Israel, November 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach,...

SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, November 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the...

Infosec 2016 (Dublin, Ireland, November 15, 2016) Infosec 2016 conference addresses the critically important issues that threaten businesses in the information age By any measure, the digital threats that businesses and organisations of all sizes face...

Kaspersky Academy Talent Lab (Online, then Prague, Czech Republic, November 15, 2016) Kaspersky Academy Talent Lab is an international cyber-world competition for young researchers and professionals aged 18-30 who are interested in the cybersecurity challenges facing the world. 50 finalists...

CISO Charlotte (Charlotte, North Carolina, USA, November 15, 2016) The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions ...

Pharma Blockchain Bootcamp (Edison, New Jersey, USA, November 16, 2016) Blockchain technology has gained recognition as one of the most disruptive technologies in the industrial world with the potential of redefining how businesses operate similarly the internet changed it...

Cybercon 2016 (Washington, DC, USA, November 16, 2016) The forum for dialogue on strategy and innovation to secure defense and government networks, as well as private-sector networks that hold their sensitive data.

Versus 16 (San Francisco, California, USA, November 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing...

Data Breach & Fraud Prevention Summit Asia (Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the ...

SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, November 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public...

4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, November 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial...

CIFI Security Summit (Toronto, Ontario, Canada, November 30 - December 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.