skip navigation

More signal. Less noise.

Daily briefing.

Yahoo! (its deal with Verizon still probable but now in doubt) attributed losing half-billion users' credentials to a "state-sponsored actor," but skeptical industry observers think PII inherently less interesting to states than intellectual property. That may be true, but one notes China's apparent interest in PII held by the US Office of Personnel Management (OPM) and Russia's apparent interest in White House and DNC email credentials. It's fair to say that, while blaming a nation-state for a hack is hardly an admission against interest, it's also entirely possible that US law enforcement agencies may have asked that Yahoo! refrain from saying too much about an ongoing investigation.

Venafi and others call the quality of Yahoo! encryption into question. Several class action suits are in progress, and many observers still have questions about the breach timeline—some think suspicion about a large breach may antedate "Peace's" dark net chatter about Yahoo! credentials for sale. The US Senate has invited the Securities and Exchange Commission to investigate.

Fancy Bear is poking at Western aerospace industry targets with a new Mac Trojan, "Komplex."

The FBI is investigating the exposure of apparent NSA tools released by the Shadow Brokers.

Netskope researchers warn against a new strain of Virlock ransomware. Virlock is now polymorphic—it both encrypts and infects—and it's particularly troublesome in a cloud, where it can spread through syncing and filesharing.

Users didn't much like Facebook's inspection of WhatsApp user data; now a German commissioner finds Facebook in violation of privacy laws.


Today's issue includes events affecting Australia, Canada, Cyprus, Estonia, India, Latvia, Lebanon, Lithuania, Netherlands, Russia, Switzerland, Ukraine, United Kingdom, United States.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the Johns Hopkins University, as the redoubtable Joe Carrigan gives us news we can use: providing security support for our parents. And our guest is Kathleen Smith of, who will comment on Intel's recent labor market study, "Hacking the Skills Shortage." As always, if you enjoy the podcast, please consider giving it an iTunes review.

Maryland Cyber Day (Rockville, MD, USA, October 5, 2016) Highlighting and celebrating Maryland’s cybersecurity entrepreneurs, innovators and companies and connecting them with two vital tools for growth and success – investment capital and customers – from Maryland and beyond.

CyberMaryland Job Fair (Baltimore, MD, USA, October 20, 2016) Top companies looking for cyber security professional, cleared and non-cleared opportunities.

Cyber Attacks, Threats, and Vulnerabilities

Yahoo's claim of 'state-sponsored' hackers meets with skepticism (CSO) Yahoo has blamed its massive data breach on a "state-sponsored actor"

Questions Mount Around Yahoo Breach (Threatpost) As Yahoo continues to investigate the biggest data breach in history, pressure is mounting on the company to admit when it knew about the attack, whether there was a delay in reporting it, and also about how it implements cryptography to secure data it’s responsible forr

Yahoo Found Wanting on Crypto Security (Infosecurity Magazine) Yahoo’s security challenges are showing no signs of abating after crypto specialist Venafi highlighted multiple issues which could indicate hackers are still present inside key systems following Yahoo’s disclosure of a massive data breach last week

Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan (Dark Reading) Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability

Sofacy APT Targeting OS X Machines with Komplex Trojan (Threatpost) The prolific APT gang allegedly behind the DNC hack and other targeted attacks against Western military and political targets is using a new Trojan called Komplex to infect OS X machines used in the aerospace industry

What The WADA Hack Proves About Today's Threat Landscape (Dark Reading) Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks

Virlock ransomware can now use the cloud to spread, say researchers (ZDNet) New strain of this two year old ransomware takes advantage of users syncing and sharing to spread infected files through the network

Cloud Malware Fan-out with Virlock Ransomware (Netskope) The ransomware landscape has dramatically grown since inception. Ransomware typically propagates via email, exploit kits, removable drives or external network shares. Ransomware authors regularly deploy several tactics to make the infection scale larger and also use hard-to-recover encrypted files to ensure that user pays the ransom

Security man Krebs' website DDoS was powered by hacked Internet of Things botnet (Register) Internet of Amazingly Insecure Tat? That's the one

DDoS takedown powered by IoT devices (CSO) The attack on Krebs serves as a wake up call to the security threats of IoT and firmware

Terrorist in the machine: U.S. DOJ fears IoT security threat (ReadWrite) The huge wave of Internet of Things (IoT) enabled devices has the U.S. government worried that the technology harbors lurking security threats

Symantec Raises Alarm Over IoT DDoS Attacks (Mobile ID World) Symantec is raising the alarm about the lack of security for the emerging Internet of Things. In a new blog post, the company specifically looks at DDoS (distributed denial of service) attacks, which can cripple an online target by flooding it with bogus traffic)

Ethereum DDoS Attack Abuses Internal Attributes (Security Intelligence) Ethereum, a system for decentralized applications that uses blockchain, has hit a rough patch. The company recently dealt with a distributed denial-of-service (DDoS) attack

Thousands of Cisco devices still at risk of unpatched NSA zero-day flaws (ZDNet) The tools may have been mistakenly left behind by the NSA following an operation

Security Bulletin: Vulnerability in Apache Commons affects IBM B2B Advanced Communications (CVE-2016-3092) (AusCERT) IBM B2B Advanced Communications is vulnerable to a denial of service, caused by an error in the Apache Commons FileUpload component

New Mac Trojan uses the Russian space program as a front (PC World) The Komplex Trojan can download, execute, and delete files from an infected Mac

Hancitor Downloader Abusing APIs, PowerShell Commands (Threatpost) Developers behind the malicious downloader Hancitor have bolstered the malware again, this time with new delivery approaches that make it more difficult to detect

New PonyForx Infostealer Malware Sold on Russian Hacking Forums (Softpedia) PonyForx is a fork of the more popular Pony infostealer

MarsJoke Ransomware Targets .EDU, .GOV Agencies (Threatpost) New ransomware has surfaced that targets state and local government agencies, and educational institutions that are less likely to have big budgets to ward off or mitigate threats, according to researchers

Shellshock Anniversary: Major Security Flaw Still Going Strong (Security Intelligence) Ready for me to go old school? How about SQL Slammer-level old school? More than 13 years after it was first found scurrying around the internet, the SQL Slammer worm can still be found propagating in the wild, albeit minimally, according to IBM Managed Security Services (MSS) data

Researchers Sound the Alarm on Vulnerabilities in Kerio Firewalls (Security Intelligence) The Kerio Control information appliance, usually known as Kerio Firewalls, can be attacked and the internal controls bypassed, according to SEC Consult. The device is designed by Kerio Technologies to be used as a network firewall, router or VPN gateway inside a network’s topology

Adware Campaign Using Advanced Nation-State Obfuscation Techniques (Dark Reading) New report from Carbon Black shows adware may be spreading ransomware, using similar tactics as Operation Aurora

Hey Dridex, Tu Runā Latviski? (Security Intelligence) Has Dridex been brushing up on its Latvian? Or perhaps its written Estonian skills? Maybe it’s preparing a long overseas stay requiring offshore banking accounts in the Cayman Islands? Recent Dridex configurations analyzed by IBM X-Force reveal that the new wave of Dridex attacks is resilient and more complex than your average malware campaign

Voters’ Database of 2.9 Million State of Louisiana Natives Leaked Online (HackRead) 2.9 million voters’ data means the entire state of Louisiana — it shows how vulnerable the US cyber infrastructure is

As we speak, teen social site is leaking millions of plaintext passwords (Ars Technica) i-Dressup operators fail to fix bug that exposes up to 5.5 million credentials

Looking for an iOS jailbreak? Beware of scammy offers (Help Net Security) Users searching for a way to jailbreak an iDevice should be extremely careful not to fall for fake offers such as that on the website

Apple has seriously weakened iOS 10 backups against password hackers (HITBSecNews) A flaw Apple introduced in iOS 10 has made it far easier for password crackers to brute-force data backed up to iTunes, including credentials stored in Keychain

Hospital Security Fears as Pagers Come Under Spotlight (Infosecurity Magazine) Healthcare organizations have been urged to immediately re-evaluate their use of pagers after a new report claimed unencrypted messages can be intercepted and spoofed with potentially life-threatening repercussions

Loyalty Program Theft: How Cybercriminals Are Helping Themselves to Hard-Earned Rewards (Security Intelligence) Most cybercriminals aren’t looking to make things complicated or cumbersome. Sure, some want the attention that comes with cracking a new system or developing a new attack vector, but most attackers are just in the market for easy money

German firm publicly rebukes security products' privacy policies (FedScoop) Some security products' privacy policies assert the manufacturer's rights over biometric data, as well as the user's gender, occupation, race and sexual orientation

The hacker's guide to boosting your ransomware's brand (Graham Cluley) Even ransomware needs good marketing to make it on the dark web

Security Patches, Mitigations, and Software Updates

Microsoft equips Edge with hardware-based container (Help Net Security) Microsoft has announced a new capability that will make its Edge browser the most secure web browsing option for enterprises: Windows Defender Application Guard

Cyber Trends

Is Wall Street bad for cybersecurity? (Christian Science Monitor Passcode) After an investment firm released apparent digital flaws in a company's products to profit on Wall Street, experts worry that security researchers may prioritize quick gains over public safety

Mobile Fraud Changes Outlook for Multifactor Authentication (Dark Reading) SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use

After Tesla: why cybersecurity is central to the car industry's future (CSO) The Tesla hack is the latest sign of trouble, says Adrian Davis of (ISC)2

How to mitigate hackers who farm their victims (CSO) Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now

Opinion: Privacy isn't dead. Here's why (Christian Science Monitor Passcode) The 'Snowden' biopic is reviving the global privacy debate. But for anyone who thinks it's dead, the notion that individuals want control over their personal information is hardly passé

Cyberwar and the Future of Cybersecurity (ZDNet) Today's security threats have expanded in their scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. And beyond that, cybersecurity will define many of the international conflicts of the future

Brits in Biometrics Boost as 20% Use Fingerprint Tech (Infosecurity Magazine) Over one fifth of the UK’s smartphone users now authenticate via their fingerprint, highlighting the growing influence of biometrics in cybersecurity, according to Deloitte

What worries US consumers and businesses the most? (Help Net Security) The Travelers Risk Index, an annual survey from The Travelers Companies, provides insight into the most pressing concerns of American consumers and business leaders


Adaptive security market to gain traction in the next five years (Help Net Security) The adaptive security market size is estimated to grow from $3.53 billion in 2016 to $7.07 billion by 2021, at an estimated CAGR of 14.9%, according to MarketsandMarkets

M&A Due Diligence, Cyber Security, and the Massive Yahoo Data Breach (eSecurity Planet) Verizon, which announced plans to acquire Yahoo two months ago, says it only learned of the breach last week

Yahoo wasn’t lying when it told Verizon it didn’t know about the biggest hack in history (Quartz) Since Yahoo admitted on Sept. 22 that a 2014 hack compromised half a billion user accounts, a key question has been: how long has it known?

Yahoo Security Breach Poses Opportunity (Gurufocus via Yahoo! Tech) This news hit the press over the last few days and to much dismay, there are many questions still left to be addressed

Cybercrime Pays for Tech Investors (HACK, CIBR, SYMC, PANW) (Investopedia) Headline cybercrime attacks such as the latest Yahoo Inc. (YHOO) security breach poses a significant opportunity for investors eyeing the ever-so-vital cybersecurity industry. Additionally, new markets such as the Internet of Things (IoT), the cloud, and the broader digitalization of commerce, politics, healthcare and essentially all types of organizations have furthered the scope and scale of cybercrime risk. Industry pioneers with a hold on the market may be in an optimal position to take advantage of the growing global demand for cybersecurity solutions

IBM – something old, something new, something borrowed, still Big Blue? (ComputerWeekly) IBM recently held its customer event, Edge, is Las Vegas. Although totally new announcements were a little thin on the ground, there were various items that are newsworthy

Is Cisco Systems Stock Really Worth $37? (Motley Fool) An analyst recently put a $37 price target on shares of the networking-hardware giant. Is the target justified?

Merrill Lynch Remains Cautious on Cisco Systems, Inc. (CSCO) Amid Competitive Threats (Smarter Analyst) Merrill Lynch analyst Tal Liani is out with a research report on shares of Cisco Systems, Inc. (NASDAQ:CSCO) amid analysis of the growing impact of Huawei on Enterprise and Service Provider networking, in the context of how they affect the networking giant

The Leidos Shuffle: Dividends And Growth (Seeking Alpha) Leidos solves problems in five major markets. Investors will benefit from dividends and growth. The stock’s attractive valuation provides a good entry point

Cyber Media sells TDA Group acquired in 2008 (RTN.Asia) Cyber Media, a technology industry portal, said it sold its wholly owned subsidiary TDA Group to The Marketing Group

Who Should Acquire Imperva? (Seeking Alpha) The share price of Imperva spiked last week due to rumors of an acquisition. The growing number of interested acquirers might place an unjustifiable premium on the stock. The best acquirer will need a strong sales force and marketing prowess in addition to product synergies for the acquisition to generate value

Imperva Channel Chief: 'No Change' For Partners Despite Rise In Sale Rumors (CRN) Rumors are back in force that Imperva is looking for a buyer, with reports Friday that the security vendor has received interest from several large technology companies. But while those rumors fly, Imperva’s channel chief says partners should expect “no changes” in the way they do business with the company

Expel grabs $7.5 mln Series A (PE Hub Network) Cyber security startup Expel Inc has raised $7.5 million in Series A funding. Paladin Capital Group led the round with participation from other investors that included New Enterprise Associates, Battery Ventures, Greycroft Partners and Lightbank

Products, Services, and Solutions

FourV Systems Releases Enhanced Version of GreySpark for Managing IT Security Risk (BusinessWire) For the first time, security practitioners and business executives can speak the same language when discussing cyber risk in their enterprise

Microsoft announces new Office 365 Threat Intelligence (MS Power User) One of the main advantage Microsoft has over its rivals is their experience of running consumer and enterprise services at scale. They have several properties like Office 365, and Bing which gives them some distinct advantages from a security standpoint. With millions of activities going on in Office 365 at any given point in time, they have sea of signals from which they can surface anomalies to quickly identify, anticipate and mitigate real and potential threats

Microsoft pushes its three pillars at Ignite—security, intelligence, and cloud (Ars Technica) It's time for everyone to be all in on the cloud

Palo Alto Networks launches new cybersecurity guide for Australian execs (Security Brief) Palo Alto Networks is taking the cybersecurity fight to print as the company recently published its first book for Australian boards, executives and officers at government and other organisations

Fortinet Expands Security Fabric With New Technology Partner Program, SIEM Integrations (CRN) As part of a building integrated security strategy, Fortinet is extending its Security Fabric ecosystem with the launch of a new Fabric-Ready Partner Program for third-party vendor integration, the company said Monday

No, You Can’t Have a Minute – Avast’s New Call Blocker App Helps Users Avoid Unwanted Calls (BusinessWire) Avast Call Blocker gives iPhone users the ability to block spam and unwanted calls

FBI iPhone Hacking Partner Cellebrite Claims It Can Crack Nearly Any Smartphone (Hot Hardware) Security firm Cellebrite made headlines earlier this year when its services were employed by the FBI to help break into the phone of the San Bernardino shooter. Cellebrite recently invited a bunch of UK press to an event to show off what it's capable of

Valeo-Gemalto partners to turn your smartphone into car key (Economic Times) With Valeo InBlue, drivers can use their smartphone or connected watch to lock, unlock and start their car, control applications and remotely access useful vehicle data using Bluetooth

SafeBreach and Phantom Enable Enterprises to Get Ahead of the Breach With Its Complete Predict-and-Prevent Solution (MarketWired) SafeBreach integration with Phantom Security automation and orchestration platform preemptively discovers future attacks and prevents breaches

Lieberman Software Securely Manages Credentials and Access to Cloud and On-Premises Resources (MarketWired) Privileged identity management solution leverages OAUTH2, SAML and LDAP for secure authentication

AvePoint Unveils New Compliance Guardian Integration with Office 365 Data Loss Prevention at Microsoft Ignite 2016 (Benzinga) AvePoint Compliance Guardian mitigates privacy, information security, and compliance risk across information gateways, including Exchange Online, SharePoint Online, and OneDrive for Business

Bot Metrics gives developers the tools to measure and analyze their chat bots (TechCrunch) Bot Metrics, a San Francisco-based company that specializes in — you got it.. — metrics and analysis for chat bots has landed funding to help developers and early bot enthusiasts get a better understanding of their services and users

Technologies, Techniques, and Standards

Ransomware: Coming To A Hospital Near You? (Dark Reading) 10 ways to protect healthcare systems from ransomware and other malware infections

Incident response survival guide (Help Net Security) All organizations are impacted by a security breach at some point

Cyber advice for Hill staffers (FCW) On Capitol Hill, every lawmaker's office has its own network, which makes cyber hygiene especially complicated for staffers

10 ways to secure a mobile workforce (CSO) As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture

What is…an exploit? (Sophos Blog) Most cyberattacks involve criminals exploiting some sort of security weakness

What Pippa Middleton can teach us about iCloud security (We Live Security) This weekend it emerged that Pippa Middleton was the latest in a long line of celebrities to have her online accounts broken into by criminals, and private photographs stolen

Preventing Privileged Account Abuse (Infosecurity Magazine) Fraud or theft that occurs as a result of privileged account abuse is one of the most challenging for organizations to identify and mitigate. An organization’s so called ‘super users’ – those with the highest access rights and privileges – hold the keys to a mine of valuable information and data

Design and Innovation

Private Data Is the Ultimate Luxury Good (Motherboard) What if an SD card was worth more than a diamond?

Research and Development

DARPA developing new computer code that is effectively hack-proof (Blastr) As the world becomes more and more dependent on technology, it also becomes imminently more hackable. That’s where DARPA’s latest breakthrough comes in

UCL blockchain center calls for research papers on blockchain and bitcoin (EconoTimes) UCL Center for Blockchain Technologies, London has announced the call for submissions of student research thesis and research papers in areas of blockchain, bitcoin or other financial cryptography research, as a part of its Student Thesis/Paper Competition 2016


2016 National Cyber Analyst Challenge announces 10 university finalists (PRNewswire) Ten university finalists have been selected for the 2016 National Cyber Analyst Challenge (NCAC), a competition that supports top students currently pursuing cyber-related degrees in the nation's leading programs. Powered by Leidos (NYSE: LDOS) and administered by Temple University's Institute for Business and Information Technology (IBIT), the competition will send 10 teams to Phase 2 advanced cyber training and the subsequent Phase 3 finals in Reston, Va., Oct. 27-29

Back to college/university? Don’t take cybercriminals with you! (Naked Security) The cybercrime almanac reads like a sociopathic version of the regular calendar

Legislation, Policy, and Regulation

On the Cyber Frontier, Hacking Back is Ethical — and Even Desirable (Defense One) Governments could treat retaliatory cyberattacks as ‘frontier' incidents, which are not necessarily escalatory

The Cyber-War Era (AIJAC) The potential for Israel-Australia cooperation on a new kind of threat

Russian Hacking Claims Resurface In Trump/Clinton Debate (Radio Free Europe/Radio Liberty) Claims of Russian hacking resurfaced during the TV debate between presidential candidates Hillary Clinton and Donald Trump, with Clinton saying there was "no doubt" Russian was hacking various organizations in the United States and Trump responding "I don't think anybody knows it was Russia"

Trump: “The security aspect of cyber is very, very tough” (Ars Technica) Candidates face off during first presidential debate in New York

Donald Trump actually made a valid point, securing the internet is hard (CSO) That headline hurt to write, but he made a fair point

Cybersecurity is not receiving enough attention from presidential candidates (Help Net Security) Heading into the first presidential debate, 58 percent of Americans feel the presidential candidates are not paying enough attention to cybersecurity, according to LifeLock

Military intelligence cyber programs get boost from fund shift (Federal News Radio) The Defense Department is beefing up its cyber investments in the military intelligence arena by shifting some of its 2016 funds

Critics are skeptical of New York's proposed financial cybersecurity rules (CNBC) New York state is proposing regulations aimed at protecting your money from criminal hackers, and the initiative is already drawing criticism from Wall Street

Litigation, Investigation, and Law Enforcement

FBI Probes Dumping Of NSA Hack Tools On Public Site (Dark Reading) National Security Agency says tools left exposed by mistake - and dumping by presumably Russia-backed hackers Shadow Brokers

Clinton confidant's immunity deal looms over debate: Jonathan Turley (USA Today) FBI appears to have undermined its own investigation with ill-considered witness agreements

Obama’s Conflict Tanked the Clinton E-mail Investigation — As Predicted (National Review) Hillary couldn’t be proven guilty without proving the president guilty as well

Clinton Privately Warned of U.S. Cyber-Attack Vulnerabilities (Washington Free Beacon) Remarks came a day before classified emails on private server were revealed

Mall shooting suspect had blog with picture of ISIS leader (Fox News) The Turkish immigrant accused of gunning down five people at a Washington mall smirked at his first court appearance Monday even as reports revealed he had a blog with photo posts of ISIS leader Abu Bakr al-Baghdadi and Iranian Supreme Leader Ayatollah Khamenei

U.S. senator seeks SEC probe of Yahoo disclosure on hacking (Reuters) Democratic Senator Mark Warner on Monday asked the U.S. Securities and Exchange Commission to investigate whether Yahoo (YHOO.O) and its senior executives fulfilled obligations to inform investors and the public about a hacking attack affecting 500 million user accounts

U.S. Regulators Accuse Palantir of Bias Against Asians (Fortune) Lawsuit says tech company favored non-Asians job applicants

Germany Says Facebook's Collection of WhatsApp Data Is Illegal (Motherboard) Facebook and WhatsApp have been told to immediately stop the mass collection, storage, and sharing of data scooped up from 35 million WhatsApp users in Germany, just one month after Facebook-owned WhatsApp announced its decision to start harvesting and sharing user data with its parent company

2016 Congressional Report: CylancePROTECT Halted OPM Breach (Wireless Heat) Congressional report concludes CylancePROTECT played a pivotal role in discovering, stopping and remediating malware that caused OPM data breach

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Privacy, Security and Trust: 14th Annual Conference (Auckland, New Zealand, December 12 - 14, 2016) This year’s international conference focuses on the three themes of Privacy, Security and Trust. It will provide a forum for global researchers to unveil their latest work in these areas and to show how...

Upcoming Events

CYBERSEC (Kraków, Poland, September 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC...

Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, September 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in...

Structure Security (San Francisco, California, USA, September 27 - 28, 2016) Technology companies have created a digital revolution through the sheer pace of their innovation. CIOs and business leaders in every industry are adopting digital technology at breakneck speed and transforming...

IP EXPO Nordic 2016 (Stockholm, Sweden, September 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases...

SecureWorld Dallas (Plano, Texas, USA , September 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

escar Asia 2016 (Tokyon, Japan, September 28 - 30, 2016) Founded in 2003, escar has established itself as the premier forum for the discussion and exchange of ideas to identify and minimize threats to data and vehicles. Held in Europe, the US and now for the third time in Asia, escar provides a forum for collaboration among industry, academia and governments for in-vehicle cyber security.

Cyber National Security – The Law of Cyberspace Confrontation (Hanover, Maryland, and Fort Meade, October 3 - 6, 2016) US Cyber Command will host the fourth annual COCOM-Interagency Cyber Law Conference from 3 through 6 October 2016, Cyber National Security – The Law of Cyberspace Confrontation. This year the conference...

Crossroads Regional Cybersecurity Summit (Victoria, Texas, USA, October 4, 2016) Bringing together top experts from both the public and private sectors, the Crossroads Regional Cybersecurity Summit (CRCS) will be an exciting and educational day for local businesses. Through a variety...

Cambridge Cyber Summit (Cambridge, Massachusetts, USA, October 5, 2016) This unique one-day summit will bring together c-suite executives and business owners with public and private-sector leaders in security, technology and defense to discuss ways to combat urgent cyber threats...

IP EXPO Europe (London, England, UK, October 5 - 6, 2016) IP EXPO Europe is Europe's number ONE IT event for those looking to find out how the latest IT innovations can drive their business forwardIP EXPO Europe now includes six co-located events with their own...

RFUN 2016: 5th Annual Threat Intelligence Conference (Washington, DC, USA, October 5 - 6, 2016) The fifth annual RFUN Conference is a two-day event that brings together the diverse and talented community of analysts and operational defenders who apply real-time threat intelligence to out-innovate...

SecureWorld Denver (Denver, Colorado, USA, October 5 - 6, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

VB 2016 (Denver, Colorado, USA, October 5 - 7, 2016) The 26th annual international Virus Bulletin conference meets this October in Denver

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

TU-Automotive Cyber Security Europe (Munich, Bayern, Germany, October 6 - 7, 2016) The most focussed forum on the ‘here and now’ of automotive cybersecurity. As we are inundated by headlines on cyber-attacks, we go beyond the hype to focus on the current challenges and solutions that...

AppSecUSA 2016 (Washington, DC, USA, October 11 - 14, 2016) OWASP’s 13th Annual AppSecUSA Security Conference is the premier application security conference for developers and security experts. Come hear an amazing group of inspirational speakers—including YouTube’s...

AFCEA CyberSecurity Summit (Washington, DC, USA, October 11 - 12, 2016) AFCEA Washington, DC invites you to attend the 7th Annual Cybersecurity Summit on October 11–12, 2016. This two-day summit will feature keynotes from government leaders, thought-provoking discussion panels,...

Insider Threat Program Development Training for NISPOM CC 2 (Warrington, Pennsylvania, USA, October 17 - 18, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). PA. For a limited time the training is being offered at a discounted rate of...

Cyber Ready 2016 (McDill Air Force Base, Florida, USA, October 18, 2016) We invite you to join us for our first annual Cyber ReadyTM 2016 conference observing National Cyber Security Awareness Month: The Impact of Cyber Crime. The National Cyber Partnership, joined by the MITRE MITRE National Capture the Flag (CTF) Competition Cyber Challenge Awards Ceremony.

EDGE2016 Security Conference (Knoxville, Tennessee, USA, October 18 - 19, 2016) The EDGE2016 conference is where true collaboration between business and technology professionals happens. Combining engaging keynotes from world-renowned visionaries, recognized technology industry leaders,...

SecureWorld St. Louis (St. Louis, Missouri, USA, October 18 - 19, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry...

Los Angeles Cyber Security Summit (Los Angeles, California, USA, October 28, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

CyberMaryland 2016 (Baltimore, Maryland, USA, October 20 - 21, 2016) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private...

CyCon US: International Conference on Cyber Conflict (Washington, DC, USA, October 21 - 23, 2016) The inaugural U.S. based International Conference on Cyber Conflict will take place 21-23 October 2016 in Washington D.C. Focusing on a theme of Protecting the Future. CyCon U.S. seeks to create greater...

SANS San Diego 2016 (San Diego, California, USA , October 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

2016 ICS Cyber Security Conference (Atlanta, Georgia, USA, October 24 - 27, 2016) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other...

SecureWorld Bay Area (San Jose, California, USA, October 27, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry...

Regional Cyber Security Summit (Sharm El-Sheikh, Egypt, October 30 - November 1, 2016) The Regional Cyber Security Summit comes this year with the theme of “Boundless Collaboration, Boundless Protection”. It focuses on the cooperation in cybersecurity as one of key pillars to tackle the...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.