skip navigation

More signal. Less noise.

Daily briefing.

The US FBI and Department of Homeland Security warn that North Korea's government is responsible for a botnet ("Hidden Cobra") that's conducted distributed denial-of-service attacks against media, aerospace, infrastructure, and financial targets since 2009. US businesses appear to have received the most attention, but Hidden Cobra's hood is thought to cover the globe.

As the US Congress votes overwhelmingly to sanction Russia over its probes of US electoral machinery, historians and security experts point out that such activities, both black propaganda and election influence operations, are nothing new. War on the Rocks, for one, usefully traces their history back eight decades.

CrashOverride malware is receiving close attention at high levels of government and industry.  Dragos analyzed CrashOverride from samples obtained during investigation of last winter's Ukrainian power grid hack. Related sectors are watching the electrical industry's response closely. DNG-ISAC and others suspect the malware may have implications for the natural gas industry as well.

Bitfinex, the world's largest Bitcoin exchange, began experiencing DDoS attacks Tuesday. They continued through yesterday, and the exchange seems not yet to have fully recovered.

A special Congressional election in the US state of Georgia draws attention to voting system security weaknesses. (Georgia is unlikely to be alone.)

Mozilla has patched thirty-two Firefox vulnerabilities.

In industry news, Microsoft confirmed last week that it was buying Hexadite; VentureBeat reports that Hexadite laid off most of its US-based workforce on the day of the announcement.

An unnamed company lost a 2014 court fight against expansive US FISA orders.


Today's issue includes events affecting Australia, Bahrain, Egypt, European Union, Germany, Indonesia, Iran, Israel, Democratic Peoples Republic of Korea, Kuwait, Philippines, Qatar, Russia, Saudi Arabia, Tunisia, United Arab Emirates, United Kingdom, United States, and Vietnam.

In today's podcast, we hear from our partners at Terbium Labs, as Emily Wilson exhorts us to take care of the basics. Our guest, Michael Callahan from FireMon, discussed the results of a survey that indicate just how much of an IT professional's time is eaten up by fixing colleagues’ personal computers.

UMBC Cybersecurity Graduate Program Open House (Catonsville, Maryland, USA, June 21, 2017) Whether you’re changing careers or want to move into management, UMBC’s Cybersecurity graduate programs can get you where you want to be. Join us to learn how on 6/21.

The Cyber Security Summit: DC (Washington, DC, USA, June 29, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from the U.S. Dept of Justice, Cybraics, CenturyLink, Alert Logic and more. Register with promo code cyberwire50 for half off your admission (Regular price $350).

CyberSecurity International Symposium (Chicago, Illinois, USA, July 10 - 11, 2017) Network with leading cybersecurity professionals, innovators, CIOs and regulators who are on the front lines of securing critical business and infrastructure networks. This in-depth Symposium examines the latest technologies, best practices, and lessons learned in achieving end-to-end network security for organizations of all varieties.

Cyber Attacks, Threats, and Vulnerabilities

DHS, FBI Warn of North Korea ‘Hidden Cobra’ Strikes Against US Assets (Threatpost) DHS and the FBI warned that North Korean attackers are targeting U.S. businesses with malware- and botnet-related attacks that are part of concerted effort dubbed “Hidden Cobra.”

US Warns of North Korea's Not-So-Secret 'Hidden Cobra' DDoS Botnet (Dark Reading) Reclusive government behind DDoS infrastructure is targeting organizations around the world US-CERT says.

US blames North Korea for series of cyberattacks (ABC News) U.S. officials are blaming the North Korean government for a series of cyberattacks dating to 2009 against media, aerospace, financial sectors and infrastructure in the United States and around the world. The FBI and the Department of Homeland Security issued a warning this week, saying the...

Russian fake news is not new: Soviet Aids propaganda cost countless lives (The Guardian) It’s easier than ever to spread myths and falsehoods, which shows how little we learned from one of the worst pieces of dezinformatsiya ever disseminated

Moscow’s Assaults on American Democracy Began 80 Years Ago (War on the Rocks) Over the last nine months, headlines have reverberated with questions regarding the Russian role in “hacking” the American electoral process. On January 5,

“Active measures”: a history of Russian interference in US elections (Prospect) Interconnectivity has made it easier than ever—but recent meddling has precedent.

Why linguistics can't always identify cyber attackers' nationality (CSO Online) The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

CRASHOVERRIDE poised to affect Natural Gas? (CSO Online) New malware affecting Ukraine's electric grid poses a future threat to US natural gas industry

Sophos: Cyber Attacks Often Recycle Existing Malware And Hacker Techniques (Silicon UK) INTERVIEW: Silicon talks threat trends with Fraser Howard, principle threat researcher at Sophos Labs

As airlines crack down on devices, passengers’ data is still vulnerable (Newsweek) Airlines collect a surprising amount of data about travelers — information that could be exploited by criminals or terrorists if not properly protected.

Are Airlines Dropping the Ball when It Comes to Your Online Data Security? (Chargebacks911) Airlines are asking for more and more of your personal data when you make a reservation. Are they really doing enough to make sure it’s safe?

Malvertising redirecting victims to exploit kits (SC Media US) Although there's been a drop in the activity of exploit kits, threat actors have adapted by redirecting unwitting victims to exploit kit servers.

Xavier Malware Infects Hundreds of Android Apps on Google Play Store (HackRead) You might have heard researchers urging Android users not to download apps from a third party store since a lot of them contain malware.

Millions of Android users left vulnerable due to Samsung's ignorance (HackRead) After Samsung had failed to renew the domain of one of their pre-installed apps, millions of users were left open to malware attacks.

Login-stealing phishing sites conceal their evil with lots of hyphens in URL (Ars Technica) Compromised domains target Android users with fake login pages for cloud services.

A Dark Web service claims to track any phone and read text messages (HackRead) Experts who understand how phone networks work as well as what their vulnerabilities are have warned about its dangers for years. However, it would seem th

Bitfinex Undergoing DDOS Attack, IOTA Wallets Temporarily Unavailable (CoinTelegraph) Bitfinex has been undergoing DDOS attack causing disruption on IOTA deposits and withdrawals.

World’s Largest Bitcoin Exchange Bitfinex Crippled by DDoS (Infosecurity Magazine) World’s Largest Bitcoin Exchange Bitfinex Crippled by DDoS. Attack has rendered IOTA deposits unavailable

Compromised websites redirecting tech support scam hosted on numeric domains (Graham Cluley) US internet users are being targeted with technical support scams hosted on sites with numeric domain names.

Mazda cars hacked with just a USB (HackRead) It seems that Mazda car owners have discovered a hack that allows them to tweak the Mazda’s MZD Connect infotainment system by just inserting a USB that ha

Analyzing the Fileless, Code-injecting SOREBRECT Ransomware (TrendLabs Security Intelligence Blog) Fileless threats and ransomware aren’t new, but a malware that incorporates a combination of their characteristics can be dangerous. Take for instance the fileless, code-injecting ransomware we’ve uncovered—SOREBRECT, which Trend Micro detects as RANSOM_SOREBRECT.A and RANSOM_SOREBRECT.B.

Infection by mouseover – what you need to know about PowerPoint spam (Naked Security) Malware-laced PowerPoint files are nothing new – but several recent spam campaigns have added a new twist.

Abuse of Apple Search Ads Feature Leading to Fraud (Threatpost) Apple has removed one of its top 10 grossing productivity apps after an independent developer’s story about fraudsters’ abuse of the App Store’s Search Ads functionality went viral.

Hackers Steal 6 Million User Accounts for Cash-for-Surveys Site (Motherboard) The data includes email addresses, passwords and physical addresses.

Don't touch that mail! London uni fears '0-day' used to cram network with ransomware (Register) Antivirus didn't pick up software nasty, say UCL IT peeps

Georgia’s lax voting security exposed just in time for crucial special election (Ars Technica) Report uncovers a litany of lapses in voting system used state-wide.

The Simple Fix that'd Help Protect Georgia from Election Hacks (WIRED) Early voting in the runoff for Georgia’s Sixth District congressional seat kicked off May 30; election day itself comes on June 20.

Sorry ma‘am, you didn’t win $43M—there was a slot machine “malfunction” (Ars Technica) Casino had apologized "for any inconvenience this may have caused."

Security Patches, Mitigations, and Software Updates

Mozilla Fixes 32 Vulnerabilities in Firefox 54 (Threatpost) Mozilla fixed 32 vulnerabilities, including a critical bug that could have resulted in a crash, with the release Tuesday of Firefox 54, the latest version of its flagship browser.

Rare XP Patches Fix Three Remaining Leaked NSA Exploits (Threatpost) Microsoft released patches on Tuesday for unsupported versions of Windows, a decision prompted by three NSA exploits that remained unaddressed from April’s ShadowBrokers leak.

Blast from the past – Patch Tuesday updates for Windows XP (Naked Security) Dust off your company procedures for Patch Tuesday! XP gets a raft of official updates this month to fix publicly-known holes.

Microsoft Issues Windows XP Security Updates for Previously Ignored NSA Hacking Tools (BleepingComputer) In two blog posts today, Microsoft announced it issued new security patches for Windows XP users to protect them against "potential nation-state activity" that could cause "destructive cyber attacks" similar to the WannaCry outbreak that hit users last month.

Virgin Media routers contain vulnerability which allows admin access (SC Media UK) Security researchers have found that the encryption key used for custom configurations of Virgin Media broadband routers is the same for all hubs across the UK.

Symantec CA remediation plan faces more delays (SearchSecurity) Symantec CA responds to demands from Mozilla on consensus plan to rehabilitate trust in its certificates.

Top threats to cyber defenders, according to a senior DISA official (C4ISRNET) The nature of today’s world requires personnel to be on guard in both their public and private personas.

Cyber Trends

The 15 worst data security breaches of the 21st Century (CSO Online) Security practitioners weigh in on the 15 worst data security breaches in recent memory.

Is Europe ready for GDPR? (Help Net Security) What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? 54% of businesses have little understanding of GDPR fines.

Insiders Often Responsible for $388B Annual Cost of Cyber Security Breaches (Benzinga) Human error, whether inadvertent or malicious, is a key factor in many cyber security threats. Organizations can mitigate the threat by identifying potential weaknesses,...

New Survey Shows Security Teams and Software Developers Can Get Along in Pursuit of Better Security (CA Technologies) DevOps processes provide meeting ground for collaboration and change

Enterprises spend $6M a year to detect and secure endpoints: Report (Techseen) Absolute and Ponemon Institute conducted a survey which reveals the opinion that IT professionals in enterprises have about their endpoint security solutions

Radware Survey Shows: Artificial Intelligence Joins the C-Suite as Execs Turn to Automated Cyber Defenses (GlobeNewswire News Room) Radware® (NASDAQ:RDWR), a leading provider of cyber security and application delivery solutions, released its 2017 Executive Application & Network Security Survey, which strikingly elicited that executives in the U.S. and Europe now place broad trust in Artificial Intelligence (AI) and machine learning systems, designed to protect organizations from more dynamic, pernicious cyber threats in addition to other key findings.


Verizon completes £3.5bn Yahoo takeover, Marissa Mayer resigns ( 2,000+ pink slips being prepped by US telecoms giant

Hexadite fired U.S. employees the day Microsoft announced its acquisition (VentureBeat) Last week, Microsoft confirmed plans to acquire Hexadite in a deal rumored to be valued at around $100 million. But on the same day, the cybersecurity startup laid off nearly all of its U.S.-based workforce, according to sources familiar with the matter.

Microsoft Ventures: A look at Redmond's latest 13 investments (ZDNet) Microsoft's venture-funding arm has disclosed investments in 13 companies since the start of this calendar year, primarily in the AI, security, and cloud and datacenter realms.

‘IBM’s Security Differentiator is Cognitive Technologies’ (BW CIOWORLD) Indian News - , Security-The security landscape and nature of threats is far different than what it was a few years ago. The nature, extent and velocity of attacks has changed today. And with businesses moving IT infrastructure to the cloud, application security becomes even more relevant. In this context, IBM changed its whole approach towards security.

McAfee: a timeline of transformation (CRN Australia) See how the security vendor has changed over 13 years.

How Buchanan & Edwards CEO Dennis Kelly Is Reaching Intelligence Community Customers (Washington Exec) Buchanan & Edwards is making big inroads into the intelligence community, and that’s just what Dennis Kelly had been envisioning as he settles into his first year as CEO of the Arlington, Virginia-based government IT consultancy.

SAIC CEO: 'still investing in' training, cyber areas as Marine vehicle programs advance (Washington Technology) SAIC's CEO tells investors the company's core government services investments remain intact as its vehicle platform integration programs for the Marine Corps move further along.

Cyber Threat Alliance Welcomes SK Infosec As Twelfth Member (Marketwired) The South Korean-based cybersecurity company joins industry leaders to enhance the cyber ecosystem through geographic expansion

Tufin to Open U.S. Headquarters in Boston (PRNewswire) Fueled by Rapid Growth, Leading Israeli Cybersecurity Company Will Open New U.S. Headquarters Led by CEO Ruvi...

Scott Darling of Dell Technologies Capital Joins Zscaler Board of Directors (Marketwired) Zscaler, Inc., the leading cloud security company, today announced the appointment of Scott Darling, president of Dell Technologies Capital, to the Zscaler™ board of directors.

Exabeam Adds Former FireEye EVP Tony Kolish to Executive Team (Marketwired) 25-year leading industry veteran will drive Exabeam's services offerings globally

Leidos Adds Veteran Defense-Sector Lawyer as General Counsel (Inside Counsel) Defense contractor Leidos Inc. announced last week the appointment of seasoned defense attorney Jerald Howe Jr. as executive vice president and general counsel.

Products, Services, and Solutions

GlobalPlatform Technology Deployed on 22 Billion Secure Elements (Fintech Finance) Adoption of industry specifications creates a collaborative, open ecosystem to efficiently deliver and protect secure digital services GlobalPlatform has conservatively estimated that 41% of all Se…

Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains (GlobeNewswire News Room) Farsight Security, Inc., a leading provider of DNS Intelligence, and Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced a reseller partnership that will integrate Farsight’s Newly Observed Domains (NOD) solution with the Infoblox ActiveTrust® platform to significantly reduce the risk of cyberattacks associated with new domains.

1 in 5 Enterprise Passwords Can Be Easily Compromised (Preempt Blog) The Results are In. Preempt Inspector Shows Weak Employee Passwords Putting Enterprises at Risk.

Threat Intelligence Provider Recorded Future Launches Partner Program (CRN) The initiative expands the vendor's channel outreach beyond MSSPs and technology partners so VARs can "get in on the next big thing."

One of These Things Is Not Like the Other – Defending Against Homograph Attacks (Cybrary) One of These Things Is Not Like the Other – Defending Against Homograph Attacks POSTED BY JULIAN DEFRONZO Recently there has been an increase in homograph attacks. These attacks take advantage of certain Unicode characters that look very similar to certain ASCII characters and use a similar-looking

Palo Alto Networks set to drive new era in security innovation (ComputerWeekly) Palo Alto Networks has announced a cloud-based application framework the company claims will enable its security platform to disrupt and change the security industry completely within a decade

RiskLens Awarded Best Risk Analytics Tool at 2017 OpRisk Awards Dinner In London (Marketwired) High-profile industry commendation results in back-to-back OpRisk award wins for RiskLens, cementing its leadership position as the provider of choice for purpose-built risk quantification solutions

Area 1 Security Announces Industry's First 'No Phish Guarantee'™ Backed by Area 1 Horizon™ New Capabilities (PRNewswire) Gartner Security and Risk Management Summit...Area 1 Security,...

WISeKey Partners with the Blockchain Interface Company RIDDLE&CODE to Develop Innovative Solutions for Securing IoT via Blockchain Technology and Crypto-Hardware (BusinessWire) WISeKey International Holding Ltd (“WISeKey”) (SIX:WIHN), a leading global cybersecurity company announced today, that they will embark on

Bay Dynamics Announces Risk Fabric Analytics Platform is Now on CDM BPA for Civilian Agencies | 06/13/17 (Business Insider) Bay Dynamics® is now in an agreement with EC America, a subsidiary of immixGroup, Inc., the distributor of the Bay Dynamics flagship analytics platform, Risk Fabric®, for Continuous Diagnostics & Mitigation (CDM) program contracts.

IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops (eSecurity Planet) IBM Cloud Identity Connect brings secure single sign-on capabilities to businesses looking to manage user access on-premises and in the cloud.

End-to-end email encryption with no central point of attack (Help Net Security) PreVeil offers end-to-end email encryption, and works in conjunction with mail applications, or can be used when you access your email from a web browser.

Technologies, Techniques, and Standards

Decrypted: Kaspersky Releases Decryptor for the Jaff Ransomware (BleepingComputer) Fedor Sinitsyn, a senior malware analyst at Kaspersky Labs, has discovered a weakness in the Jaff ransomware and was able to release a decryptor for all current variants For those who were infected with Jaff and had their files encrypted with the .jaff, .wlu, or .sVn extensions, this decryptor can recover your files for free.

What will it take for the Army to succeed in multi-domain battle? (C4ISRNET) Army CECOM's Liz Miranda discusses sustainment and logistics priorities for the service.

Cyber 'beat cop' needed to add context for SWAT teams (C4ISRNET) In the experience of one combatant command official, there needs to be a beat cop performing a daily patrol to provide context to the SWAT team when an incident happens.

How to stop wasting money on security shelfware (CSO Online) Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.


Preparedness & Cyber Risk Reduction Part Three: Organize & Equip (SurfWatch Labs, Inc.) In Parts One and Two of this blog series, “Introduction to the Preparedness Cycle,” we took a general look at threats, risks and preparedness, as well as a slightly deeper look into planning —…

Protecting the Large Enterprise vs Securing the Smaller Business (Infosecurity Magazine) The challenge of maintaining effective oversight of our security posture is exciting and challenging in equal measure.

Counterpoint: Securing the Smaller Business (Infosecurity Magazine) It is natural to think that it is more difficult for smaller firms to implement security as the perception is that it’s a specialist area.

Design and Innovation

Facebook requests input on hard questions about censorship (TechCrunch) How should Facebook decide what's allowed on its social network, and how to balance safety and truth with diverse opinions and cultural norms? Facebook wants..

Getting to grips with machine learning (Computing) Jean-Cyril Schütterlé explains how ML is taking us from rules-based algorithms to data-driven processes

SailPoint turns to AI to protect users (Enterprise Times) SailPoint demonstrates the future of its security products as it show off IdentityAI to customers at its annual conference, Navigate '17.

Research and Development

DARPA Programs Create Defense Systems for Data, Networks (U.S. Department of Defense) The internet is an infrastructure that supports all aspects of modern life, and the Defense Advanced Research Projects Agency is creating technology to protect U.S. data, networks and national security, DARPA’s acting director said in Baltimore today.

DARPA works to ensure man can trust machine (C4ISRNET) “A lot of AI today is a black box, you have this neural net that you put in the inputs, it spits out an answer and 90 percent of the time it’s right. But that last 10 percent, sometimes it really screws up,” says DARPA's acting director.

3 ways DARPA will attack the cyber problem (C4ISRNET) The acting director of DARPA outlined three research areas his organization is focusing on.


University of Edinburgh and Huawei collaborate on joint data lab (ComputerWeekly) University is setting up a research and development lab dedicated to distributed data management and processing, with help from Chinese company.

Cybersecurity Focus of Conference at Suffolk County Community College ( Presiding Officer Gregory, Legislator Hahn partner with college to address cyber threats and assess IT skills gaps.

Legislation, Policy, and Regulation

Could an independent NGO solve the problem of cyber attack attribution? (Help Net Security) Cyber attack attribution is a necessary prerequisite for holding actors accountable for malicious cyber activity, but is notoriously difficult to achieve.

Russia eyes controlling soldiers' online accounts to boost secrecy (Reuters) The Russian Defense Ministry has drawn up a draft law allowing it to ban soldiers from posting certain personal data on social networks, something that reporters and researchers have used in the past to monitor Russia's activities in Syria and Ukraine.

Senate overwhelmingly approves new sanctions on Russia for election meddling (Fifth Domain | Cyber) The Senate has voted overwhelmingly to approve new sanctions against Russia to punish Moscow for meddling in the 2016 election and its aggression in other parts of the world.

The Middle East’s Crisis Factory (Foreign Policy) The Iran-Qatar-Saudi conflict shows that the sclerotic, unpredictable, petulant dictatorships of the region produce nothing but endless conflict and brutal repression.

A cyber-attack on our ambassador is an assault on all of us (The National) We will not abide those who promote the destabilisation of our state, writes Mohammed Fairouz.

How BAE sold cyber-surveillance tools to Arab states (BBC News) BBC Arabic found the sales included decryption software that could be used against the West.

Hacking threat soaring as countries fail to unite, cybersecurity leader warns (The Times of Israel) ‘Israel is probably the best protected country in the world today,’ declares Kaspersky Lab’s CEO. ‘But given the threats it faces, it can’t be complacent’

Crypto-politics: A sleeper awakes ( Prime Minister Malcolm Turnbull’s assertion that technology companies should help security services circumvent encryption measures has drawn a sharp response from Greens senator Scott Ludlam.

No end in sight for NSA and CIA exploit leaks (The Parallax) Zero-day exploit leaks from U.S. intelligence agency stockpiles highlights internal security and cultural structures that aren’t likely to change.

Is it time for cash for medical “Clunkers”? (Naked Security) What will it take to improve cybersecurity in the problem-plagued healthcare industry?

Fasoo Announces Release of Ponemon Report on NYDFS Cybersecurity Regulations at Gartner Summit (PRNewswire) Fasoo, Inc., a leader in data security and compliance, will join Dr. Larry...

Litigation, Investigation, and Law Enforcement

Additional Release of FISA Section 702 Documents (IC on the Record) Today, the ODNI, in consultation with the Department of Justice, is releasing additional FISA Section 702 documents.

US internet company refused to join NSA's PRISM program, documents reveal (ZDNet) The company, which wasn't named, quietly pushed back in the government's secret court against the National Security Agency's surveillance program, but ultimately failed.

Company Lost Secret 2014 Fight Over ‘Expansion’ of N.S.A. Surveillance (New York Times) The 2014 fight is the first time that a communications company that works with the N.S.A. is known to have challenged a law on warrantless surveillance.

Robert Mueller Chooses his Investigatory Dream Team (WIRED) President Donald Trump had almost certainly never heard the name Aaron Zebley before the announcement that the former FBI agent was joining the special counsel investigation into ties between Trump’s campaign and Russia.

International operation targets customers of counter anti-virus and crypter services (Help Net Security) Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries.

Thai Police Bust Major Click Farm, Arresting Three (Infosecurity Magazine) Thai Police Bust Major Click Farm, Arresting Three. Chinese men allegedly paid by company back home to game system

Northern Ireland teen charged in connection with TalkTalk cyber attack (BelfastTelegraph) A north Antrim teenager has been charged in connection with a cyber attack on telecom giant TalkTalk.

Alleged Latvian cybercriminal extradited to US in costly ‘scareware’ investigation (Fifth Domain | Cyber) Peteris Sahurovs has been extradited from Poland for his alleged involvement in a scheme that spread malware through fraudulent online advertising for an American hotel chain on the Minneapolis Star Tribune’s website, resulting in the ransoming of over $2 million from affected users.

IT security expert warns cybercrime to continue to grow (The Irish Times) Low chance of getting apprehended makes cybercrime attractive

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Inside Job 2: Improving Cybersecurity by Improving Cyber Hygiene (Arlington, Virginia, USA, June 15, 2017) This symposium brings together a diverse group of talented cyber professionals from government, private sector, and academia to talk about Cyber Hygiene. Most cyber breaches are due to human error so,...

Information Assurance Symposium (Baltimore, Maryland, USA, June 19 - 21, 2017) The Information Assurance Symposium is the premier IA event at which leaders and practitioners share vital information and provide direction and best practices to meet today's challenges in IA and the...

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 19 - 21, 2017) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the first annual Cyber Security Summit in June 2017. The summit, presented in a continuing education format,...

Hack in Paris (Paris, France, June 19 - 23, 2017) Hack In Paris brings together major professional IT security and technical hacking experts to attend training and talks exclusively in English. Intrusion attempts grow more frequent and sophisticated,...

SANS Minneapolis 2017 (Minneapolis, Minnesota, USA, June 19 - 24, 2017) Get relevant, practical cybersecurity training at SANS Minneapolis 2017 (June 19-24). This event features the information needed to build crucial skills in protecting your organization from the latest...

Naval Future Force Science and Technology Expo (Washington, DC, USA, June 20 - 23, 2017) The Office of Naval Research’s (ONR) biennial 2017 Naval Future Force Science and Technology (S&T) EXPO will take place July 20-21, 2017. The Expo is the premier S&T event for the Navy and Marine Corps...

Borderless Cyber USA (New York, New York, USA, June 21 - 22, 2017) Borderless Cyber is an international, executive-level conference series that began in 2015. It’s designed to bring together the private sector and policy makers to evaluate, debate, and collaborate on...

Global Insider Threat Summit (London, England, UK, June 22, 2017) Companies are spending millions on cybersecurity, but breaches are still on the rise. Multinational enterprises, small businesses, healthcare organizations, and even national governments are all feeling...

Chertoff Group Security Series: Security in the Boardroom (East Palo Alto, California, USA, June 22, 2017) The Chertoff Group Security Series will aim to enhance and add to the Security in the Boardroom conversation by applying our insights into technology, threat, and policy to help executives respond to the...

Cyber Week (Tel Aviv, Israel, June 25 - 29, 2017) Bringing together international cybersecurity experts and enthusiasts, Cyber Week provides the opportunity to gain insight into the latest global developments in cybersecurity. The conference welcomes...

O’Reilly Artificial Intelligence Conference (New York, New York, USA, June 27 - 29, 2017) From bots and agents to voice and IoT interfaces, learn how to implement AI in real-world projects, and explore what the future holds for applied artificial intelligence engineering.

SIA GovSummit (Washington, DC, USA, June 28 - 29, 2017) The 2017 SIA GovSummit focuses on how government leverages security technologies to drive success across a wide spectrum of missions. Held annually in Washington, the Security Industry Association's government...

2017 Community College Cyber Summit (C3S) (National Harbor, Maryland, USA, June 28 - 30, 2017) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Four tracks are available for college faculty and administrators, IT faculty who are involved or who...

Cyber Security Summit: DC (Washington, DC, USA, June 29, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: DC. Receive 50%...

SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration on security initiatives. (New York, New York, USA, June 29, 2017) SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration on security initiatives.

CyberSecurity International Symposium (Chcago, Illinois, USA, July 10 - 11, 2017) The Symposium will take an in-depth look at the latest cyber security threats and trends, as well as real-world strategies for securing critical networks and data in enterprise, commercial, government...

East Midlands Cyber Security Conference and Expo (Leicester, England, UK, July 11, 2017) The conference and expo will bring together over 150 businesses, information security providers and key influencers to discuss the threats posed by online criminals and the practical ways in which business...

Electronic Warfare Olympics & Symposium (Colorado Springs, Colorado, USA, July 13 - 14, 2017) The 2017 Electronic Warfare Olympics & Symposium will improve the capability, and marketability, of spectrum warriors by building the local EW/IO community. and bringing awareness to the capabilities in...

3rd Edition CISO Summit India 2017 (Mumbai, India, July 14, 2017) Cyber security has gone through a tremendous change over the last couple of months. Ecosystem disruptions like demonetization, emergence of payment banks and fintech play have put technology as the sine...

CYBERCamp2017 (Herndon, Virginia, USA, July 17 - 28, 2017) Always wondered what “cyber attacks” really are? How a special group of cyber warriors protect and defend our banks, stores, and electric plants every second? Join experts from the FBI and the foremost...

National Insider Threat Special Interest Group - Insider Threat Symposium & Expo (Laurel, Maryland, USA, July 18, 2017) The National Insider Threat Special Interest Group (NITSIG) is excited to announce that it will hold a 1 day Insider Threat Symposium & Expo (ITS&E), on July 18, 2017, at the Johns Hopkins University Applied...

2nd Annual Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, July 18, 2017) The 2017 Billington Automotive Cybersecurity summit will build on the 2016 inaugural summit that brought together a who’s who of speakers including the CEO of GM and the Secretary of Transportation, prestigious...

SANSFIRE 2017 (Washington, DC, USA, July 22 - 29, 2017) Now is the time to advance your career and develop skills to better protect your organization. At SANSFIRE 2017, choose from over 45 hands-on, immersion-style security training courses taught by real-world...

ISSA CISO Executive Forum: Security Awareness and Training--Enlisting your entire workforce into your security team (Las Vegas, Nevada, USA, July 23 - 24, 2017) The gap in Security skills in the workforce have put the pinch on Security teams. Join us to learn how to get lean by empowering the rest of your organization to understand and manage security risks. We’ll...

AFA CyberCamp (Pittsburgh, Pennsylvania, USA, July 24 - 28, 2017) The AFA CyberCamp program is designed to excite students new to cybersecurity about STEM career opportunities and teach them important cyber defense skills through hands-on instruction and activities.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.