skip navigation

More signal. Less noise.

Daily briefing.

Maryland Cyber People's Choice Award: last day to vote for the CyberWire.

If you're a fan of the CyberWire, please vote for us today in Maryland Cyber's People's Choice Awards. (And thank you for your support.)

Spam surged this week after a global drop-off dating to mid-December of 2016. The December-to-March hiatus occurred when the Necurs botnet ceased activity, apparently at its masters' command. Its sudden return seems due to a pump-and-dump penny stock campaign. Naked Security says the attempted manipulation involves InCapta Inc. (INCT), a pink-sheet-listed media company, but the scam seems to be a third-party caper.

Necurs had formerly been used principally to distribute ransomware. This reappearance of the criminal botnet with a new purpose doesn't mean that ransomware is yesterday's news: the SANS Internet Storm Center continues to track new Cerber infestations daily.

A vulnerability in Moodle's content management systems, widely used in universities, could expose academic servers to compromise. eLearning platforms are particularly at risk.

In the US, the IRS and the Department of Education have suspended their online Federal Student Aid (FSA) tool. The IRS's related Data Retrieval Tool was suspended as security precaution. It appeared leaky.

Investigation and recriminations continue to surround US election hacking.

Security services worldwide grapple with ISIS messaging.

UK authorities have joined the US in prohibiting large electronic devices from being carried aboard airline flights originating in specific airports. Tunisia, Turkey, Lebanon, Saudi Arabia, and Egypt are affected. The UK referenced only "evolving terrorist threats"; the US cited intelligence indicating jihadist plans to conceal explosives in devices like laptops.

US armed services are looking for ways of punishing bad online behavior. Whatever they come up with will no doubt fall under Article 134 of the UCMJ.


Today's issue includes events affecting Australia, China, Egypt, Finland, Jordan, Lebanon, Russia, Saudi Arabia, Tunisia, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States.

In today's podcast, we hear from our partners at the Johns Hopkins University as Joe Carrigan offers his take on the Cloudbleed bug. Our guest is Philip Susmann (from the Norwich University Applied Research Institutes) on Norwich's DECIDE cyber security simulation platform.

Special editions of the podcast are also up. See Perspectives, Pitches, and Predictions from RSA, and an overview of how artificial intelligence is being applied to security. And see also Cylance's video interview with our Producer.

ThreatConnect Webinar: Threat Intelligence Isn’t One Size (Online, March 22, 2017) Threat intelligence (TI) can help any organization better protect themselves. With TI, you can identify threats and add context to them. Once you understand what you are facing, you can take decisive action to better protect your organization.

Billington International Cybersecurity Summit (Washington, DC, USA, March 30, 2017) 2nd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 30, 2017) The International Cybersecurity Summit features 20+ world class cybersecurity thought leaders from allied nations and US including DoD, IARPA, DHS, USCYBERCOM, ARCYBER, NSA, DOC, NCTC/UK, U.S. Army Cyber Command, U.S. Cyber Command, Cyber National Mission Force.

The Cyber Security Summit: Atlanta and Dallas (Atlanta, GA, USA, April 6, 2017) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts.

Dateline Cyber 9/12

"We've come a long way from where we were when I first started with cyber." (The CyberWire) US Representative Jim Langevin (D-RI), long-serving member of the House and currently ranking member of the House Armed Services Committee, addressed Cyber 9/12 with an account of how far he believed Congress had come, and what in his view impedes further progress.

Cyber Attacks, Threats, and Vulnerabilities

NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist (Foreign Policy) The deputy director of the NSA says he believes states have entered the bank-robbing business.

Necurs Botnet Returns with Get-Rich-Quick Spam (Infosecurity Magazine) The Necurs botnet has seen a recent spike in activity, shifting its intent from malware distribution to penny stock pump-and-dump spamming.

Switch From Ransomware to Stock Scam Spam by World's Worst Botnet Fiends (Cyware) Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution. In January, Cisco Talos reported that the Necurs botnet had gone offline, taking the typical volume of Locky ransomware-tainted spam emails with it.

Global spam volume goes back up to deliver huge pump-and-dump scam (Naked Security) Recently, global spam volumes plunged, but they’re back up, at least for now, with a huge pump-and-dump stock scam.

"Blank Slate" campaign still pushing Cerber ransomware (Internet Storm Center) Cerber ransomware has been a constant presence since it was first discovered in February 2016. Since then, I've seen it consistently pushed by exploit kits (like Rig and Magnitude) from the pseudoDarkleech and other campaigns. I've also been tracking Cerber on a daily basis from malicious spam (malspam).

Locky, Cerber Ransomware Skilled at Hiding (Threatpost) Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems.

Microsoft's 'Application Verifier' bug-finder is easily pwnable (Register) Undocumented feature allows installation of persistent malware

Three UK's mobile customers experience new data breach (the Guardian) Customers logging into their accounts see other customers’ data usage and call history in ‘shocking breach of data privacy’

Critical Moodle Vulnerability Could Lead to Server Compromise (Threatpost) A critical vulnerability in Moodle, an open source system deployed across hundreds of thousands of universities, could expose the server to compromise.

Flaws in Moodle CMS put thousands of e-learning websites at risk (CSO Online) Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

Code Execution Vulnerability Found in Libpurple IM Library (Threatpost) A severe vulnerability has been disclosed in libpurple, the library used in the development of a number of popular instant messaging clients, including Adium for the macOS platform.

IRS issues new tax scam warnings, FSA tool suspended due to security concerns (CSO Online) The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US Department of Education suspended a tool that helps people obtain financial aid for college.

Student Aid Tool Held Key for Tax Fraudsters (KrebsOnSecurity) Citing concerns over criminal activity and fraud, the U.S. Internal Revenue Service (IRS) has disabled an automated tool on its Web site that was used to help students and their families apply for federal financial aid.

Victims' real details helping hackers trick victims into installing banking malware (Graham Cluely) Malicious spam campaign embeds German users’ real-life addresses and personal details into poisoned emails.

Security failings exposed by hackers’ cyber attack on hospitals (Yorkshire Post) Hackers exposed basic security failings in a major cyber attack on three hospitals in the region, an investigation has found.

Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware (Motherboard) A dive into the thriving black market of John Deere tractor hacking.

Security Patches, Mitigations, and Software Updates

GitHub Uses Broken Cryptography, But It Has a Plan (Motherboard) SHA-1 rears its ugly head.

LastPass extensions can be made to cough up passwords, deliver malware (Help Net Security) LastPass Chrome and Firefox extensions contain flaws that could allow malicious websites to steal victims' passwords or execute commands on their computer.

Mediaserver Vulnerabilities Highlight Android’s March Security Bulletin (TrendLabs Security Intelligence Blog) The Android security bulletin for March, published last March 6, contains 15 vulnerabilities that we discovered and privately disclosed to Google. Like some of our previous discoveries, many of these new vulnerabilities concern Mediaserver, which is the component responsible for scanning and indexing all available media files in the Android operating system.

Verizon BlackBerry Priv March Security Update Released (Geeky Gadgets) Verizon Wireless has released a new software update for the BlackBerry Priv smartphone on its network and the update includes the March security update for

Cyber Trends

Will Vault7 Shake Infosec Like Edward Snowden? (Infosecurity Magazine) The Wikileaks ‘Vault7’ release earlier this month reignited the reality of state-sponsored espionage, and what our governments know about us

What is the average cost of a cyber attack and the next possible targets (Stock News USA) Fulminant development of technology has meant a breakthrough and a major reconfiguration of how companies develop their activities. New technologies do not include, however, only benefits, but also promote a number of risks, such as increasing

iovation Survey Reveals 85% of Banking Customers Across Generations Eager to Replace Passwords with More Modern Authentication Methods (Marketwired) Consumers share desire for increased security and improved user experience, but each generation has its own idea of the best password alternative

Are Small Business Owners Protecting Themselves from Cyber Attack? (Manta) Hackers are increasingly targeting small businesses, but few owners believe they are at risk of attack.

Goodbye Mama Bear, the cybersecurity community will miss you (CSO Online) Becky Bace, top woman in cybersecurity, has passed away.


Five Questions Board Members Should Ask Their CISO (Infosecurity Magazine) Organizations need to approach security from the first line defenses in the IT department up to the board room

Follow the money! Where VC security investment is occurring (CSO Online) Where is investment happening now in security? Jeff Fagan, the founder of Accomplice, tells us about priorities in VC funding today

Elisa goes shopping at enterprise-focused Santa Monica Networks (European Communications) Finland’s Elisa has acquired part of IT network and data centre company Santa Monica Networks as it looks to strengthen its offering to enterprise customers.

Celebrated Technology Leaders Come Together To Tackle Devasting Data Loss In Banking (PRNewswire) Three eminent technology leaders have joined forces to launch BOHH...

Why the Best Is Yet to Come for Palo Alto Networks, Inc. (The Motley Fool) The next-gen security company's top-line slowdown shouldn't last forever.

Is Ixia (XXIA) in Oversold Territory? (Oracle Examiner) In the last trading session, Ixia (XXIA) subtracted its value by -0.15% closing at the price of $19.55. The stock currently has market capitalization of 1.62 Billion, with average volume of 1.35 Million shares.

Cisco Systems Dividend Stock Analysis (Seeking Alpha) Whoa! Shaking off the cobwebs on my full-on dividend stock analysis skills here. It’s been quite some time since I’ve independently wrote an article on one divi

FireEye CEO: Russian hacking has changed the cybersecurity game (TheStreet) Kevin Mandiant says the security giant has adapted to the new geopolitical landscape, and hopes its results will follow.

Optus Business signs Energy Australia for telco and managed services (ZDNet) Optus Business has extended its telecommunications and managed services deal with Energy Australia for a further five years to provide security, datacentre, contact centre, and mobile management services.

Digital Shadows Appoints Alex Seton as VP Business & Corporate Development (Online PR Media) Alex Seton joins the rapidly growing leader in external digital risk management to drive global strategic partnering and corporate development efforts

Northrop's commercial cybersecurity spinoff just hired a former Trump transition official for its board (Washington Business Journal) A commercial cybersecurity company that spun off from Northrop Grumman Corp. (NYSE: NOC) earlier this year, known as BluVector, announced Tuesday that it’s hiring a former member of President Donald Trump’s transition team to its board of directors.

KnowBe4 Appoints Former Gartner Research Analyst Perry Carpenter as Chief Evangelist and Strategy Officer (Yahoo! Finance) Perry Carpenter, former Research Director, Security & Risk Management and esteemed analyst at Gartner, has joined KnowBe4 as Chief Evangelist and Strategy Officer. As the provider of the most popular platform for security awareness training and simulated phishing, KnowBe4 developed this new role to strengthen

Products, Services, and Solutions

Google will provide free cybersecurity tools for election organizers in Europe (Cyberscoop) As the threat of cyberattacks looms over Europe in the months preceding several crucial elections, Alphabet subsidiary companies Jigsaw and Google announced Tuesday the launch of a security tool package to help election organizers and civic groups ward off hackers and other forms of digital interference.

A Cybersecurity Arsenal That’ll Help ‘Protect Your Election’ (WIRED) Google and Jigsaw are helping protect elections from DDoS attacks and more.

Red Flag Windows: Microsoft modifies Windows OS for Chinese government (Ars Technica) Chinese government blocked Microsoft product purchases after NSA leaks.

Atos, Siemens sign cyber-security MoU in US market (Telecompaper) Atos and Siemens have expanded their strategic partnership by signing a Memorandum of Understanding (MOU) to collaborate on integrated services addressing the cyber-security needs of utility, oil and gas companies in the US market.

Sticky Password and ESET Team Up on a Password Management Solution (Benzinga) ESET Password Manager allows users to securely store and organize passwords

Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys (Gemalto) Organizations can now take advantage of “Hold Your Own Key” capabilities with on-premises SafeNet Luna HSMs to secure confidential data in Microsoft Azure and Microsoft Office 365

Code Dx Announces Integration with Burp Suite Application Security Tool (Marketwired) Code Dx now available in PortSwigger BApp Store offering Uusers greater application security coverage

DUBAI : DarkMatter’s Pegasus takes flight as UAE’s answer to Palantir - Intelligence Online (Intelligence Online) The cyber-security firm which has a special relationship with the Dubai police force is getting into data mining.

Microsoft Edge comes last in browser security battle (TechRadar) Chrome remains the undisputed champion at Pwn2Own

Waterfall Security Collaborates with Educational Organization Cybati for Indepth ICS Cybersecurity Training (Yahoo! Finance) Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructures and industrial control systems, today announced its collaboration with the cybersecurity educational organization Cybati. Cybati's mission

Best Mobile Antivirus (Computer Business Review) These five options for mobile antivirus include varying prices and features from household names, and some up and coming names...

Jamf gives admins zero day support for the latest Apple OS releases (BetaNews) New releases always present a challenge for system admins and that applies to Apple just as much as other systems.

High-Tech Bridge Teams with F5 to Deliver Comprehensive Web Application Security Testing (Yahoo! Finance) High-Tech Bridge, a leading web security company, announced today that it has joined the F5 Networks® Technology Alliance Program . High-Tech Bridge’s award-winning application security testing platform ImmuniWeb® leverages a machine learning technology for intelligent automation of web vulnerability

Transform Your SOC with Managed Services Using Carbon Black and QRadar (Security Intelligence) Carbon Black is a leader in next-generation endpoint security, and its products are initiating an evolution in SOC process and procedure.

IBM Automates Compliance Controls and Data Security for Multi-Cloud Workloads (PRNewswire) IBM (NYSE: IBM) today announced a new cloud-based...

Technologies, Techniques, and Standards

Unused apps pose a huge security risk says Kaspersky Labs; here's what you could do for safety (Tech2) According to a report by Kaspersky Labs, your smartphone is vulnerable to threats, if you have a lot of unused apps installed on your phone.

Software development teams embrace DevSecOps automation (Help Net Security) Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype.

Hybrid IT is becoming a standard enterprise model (Help Net Security) The hybrid IT enterprise model is becoming reality, but there’s no single playbook to get there. Automation helps reduce the operating costs.

Your Mac is not malware-proof: a look at the threats and defenses (Naked Security) What’s the state of play on malware for the Mac platform? We checked in with Sophos Labs for an update

Deception security doesn't have to be onerous or expensive (Help Net Security) When talking about deception security, most infosec pros' mind turns to additional solutions that companies have to buy, deploy, and manage.

Cyber threat sharing improved, but 'not the end of the road' ( The intelligence community says it's laid groundwork for public-private cyber threat hub, but still far from cyber 911" that lawmakers, agencies envisioned.

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals (eSecurity Planet) Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Future of the SIEM (Dark Reading) Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

Trend Micro's three tips to catch a hacker (IT Brief) If you know what you’re looking for you might be able to spot a potential hacker and an impending cyber attack.

Design and Innovation

Forget Bitcoin. The Blockchain Could Reveal What’s True Today and Tomorrow (WIRED) The technology underlying bitcoin could fuel powerful systems for forecasting the future—and create a digital feed for facts.


Marshall alum wins prestigious NASA award, credits university’s digital forensics program for his success (Huntington News) Marshall alumnus Brad Roeher has received the Excellence in Values Award for his work with the NASA Independent Verification and Validation Program (IV&V) Secure Coding Portal.

Legislation, Policy, and Regulation

UK follows US ban of electronic devices in cabins on some flights (CSO Online) The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.

Rebuild Our Defenses for the Information Age (Wall Street Journal) AEI’s Mackenzie Eaglen writes that Trump’s infrastructure upgrades could start at the Pentagon, which still uses 8-inch floppy disks.

Army Central can’t 'look the other way' from network vulnerabilities (C4ISRNET) Lt. Col. Dwyke Bidjou, ARCENT’s deputy chief of information operations, spoke to C4ISRNET about strategy, some of which remains classified.

Military seeks new ways to punish bad online behavior (Military Times) Skeptical Congress members on Tuesday pressed senior military leaders to take more aggressive action to prevent and punish inappropriate online activity by service members, including posts of "intimate" images on social media sites.

In wake of Marines United nude-photo scandal, lawmakers question DOD social media policies (Stars and Stripes) Leaders from the Marines, Navy, Air Force and Army testified during a hearing held by a House armed services subcommittee about each service’s social media policies and the training in place after reports that some Marines and sailors had participated in a Facebook site that distributed nude photos of women in the service.

Litigation, Investigation, and Law Enforcement

Cyber Firm at Center of Russian Hacking Charges Misread Data (VOA) Influential British think tank, Ukraine’s military dispute US cybersecurity firm report used to buttress claims of Russian hacking in presidential election

2 Detained for Possible Weapon Link in Paris Airport Attack (VOA) Paris prosecutor's office says two suspects remained in custody Tuesday after being detained Monday, and face possible preliminary charges of association with a terrorist enterprise

ISIS is winning the cyber war. Here's how to stop it. (TheHill) OPINION | We must beat ISIS at its own game.

How to Hunt a Lone Wolf (Foreign Affairs) To make one-off attacks less likely and prepare for those that do occur, governments should keep would-be terrorists isolated, build strong relationships between Muslim communities and law enforcement, monitor social media, and discredit the ideology that lone wolves embrace.

Russian bank claims hackers are trying to connect it to Trump (Naked Security) Claims of DNS spoofing between a Russian bank and a Trump server add ‘fake traffic’ to the lexicon of obfuscation

Russian hackers were likely surprised by blowback from cyberattacks on U.S. elections, analysts say (Los Angeles Times) Moscow may have miscalculated the fallout of its suspected hacking, which has led to the resignation of a high ranking U.S. official, Congressional hearings and a bipartisan circling of the wagons.

Ukraine Lawmaker Calls On U.S. To Investigate New 'Evidence' Of Secret Payments To Manafort (RadioFreeEurope/RadioLiberty) Paul Manafort is under scrutiny again after a Ukrainian lawmaker released documents he says show that U.S. President Donald Trump’s former campaign chairman went to great lengths to hide $750,000 tied to his work for former President Viktor Yanukovych.

GOP Lawmaker to FBI: Stop the Leaks in Russia Probe or Lose A Key Surveillance Tool (Defense One) After top cop confirms investigating the Trump campaign, a House member threatens to hold investigatory powers hostage.

Intel leaders express regret over Russian hacking response (TheHill) At a Thursday hearing on Russian interference in the 2016 election, FBI director James Comey said he regretted not being more forceful in notifying the Democratic party about the threat of Russian hackers.

Clinton camp unloads on Comey (POLITICO) “Russia probe that Comey confirmed was, as best we can tell, in effect before Nov. 8,” a former Clinton spokesman says.

Breitbart covered by FBI's Russia probe: Report (Washington Examiner) Breitbart News, the right-leaning news site that aggressively promoted Donald Trump's bid for the presidency, is part of the FBI's probe on Russia's influence of the election, according to a report.

A Court Will Decide if a GIF Can Be Considered a ‘Deadly Weapon' (Motherboard) Cases like this have strong implications for the roughly 10,000 people with photosensitive epilepsy in the US.

Park uses facial recognition to wipe out toilet paper thieves (Naked Security) ‘I am a bit uncomfortable about being watched in such places’, as one user of the public facilities in Beijing’s Tiantin Park noted, is probably the understatement of the week

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

EnergySec Security Education Week (Austin, Texas, USA, May 14 - 19, 2017) The Energy Sector Security Consortium, Inc.'s Security Education Week is designed for early to mid career cybersecurity professionals currently employed at electric utilities in North America. Students...

2017 ISSA International Conference (San Diego, California, USA, October 9 - 11, 2017) Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to...

Upcoming Events

Maryland Cybersecurity Awards Celebration (Baltimore, Maryland, USA, March 22, 2017) Help us celebrate the best and brightest of the Maryland cyberscurity community as we honor the companies, organizations, and individuals that have protected businesses and government agencies with their...

Integrated Adaptive Cyber Defense (IACD) Community Day (Laurel, Maryland, USA, March 23, 2017) Advancing cyber operations through secure automation & interoperability. Government agencies, commercial firms, research organizations, academic institutions and cyber security experts align in community...

SANS Pen Test Austin 2017 (Austin, Texas, USA, March 27 - April 1, 2017) Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That's what SANS Pen Test...

cybergamut Tech Tuesday: Software Defined Networking Forensics (Elkridge, Maryland, USA, and online at various local nodes, March 28, 2017) Volatility and Tshark were critical components in Booz Allen Hamilton winning the 2016 Digital Forensics Research Work Shop (DFRWS) international Software Defined Networking (SDN) digital forensics challenge.

IT Security Entrepreneurs' Forum Bridging the Gap Between Silicon Valley & the Beltway (Mountain View, California, USA, March 28 - 29, 2017) SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment community in an open, collaborative environment focused...

PCI Security Standards Council: 2017 Middle East and Africa Forum (Cape Town, South Africa, March 29, 2017) Join your industry colleagues for a full day of networking and one-of-a-kind partnership opportunities. Whether you want to learn more about updates in the payment card industry or showcase a new product,...

Insider Threat 2017 Summit (Monterey, California, USA, March 29 - 30, 2017) The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and ethical physical...

2nd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 30, 2017) The 2nd Annual Billington International Cybersecurity Summit on March 30, 2017 at the National Press Club in Washington, DC will feature over 300 world class cybersecurity decision-makers from allied nations...

Yale Cyber Leadership Forum: Bridging the divide between law, technology, and business (New Haven, Connecticut, USA, March 30 - April 1, 2017) The Yale Cyber Leadership Forum will take place on Yale University's campus and will focus on bridging the divide between law, technology and business in cybersecurity. With McKinsey & Company as our knowledge...

WiCyS 2017: Women in Cybersecurity (Tucson, Arizona, USA, March 31 - April 1, 2017) The WiCyS initiative has, since 2013, become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity...

GITECH Summit 2017: Revolution of Solutions (Annapolis, Maryland, USA, April 2 - 4, 2017) The GITEC Summit “Revolution of Solutions: Transforming Government” will be held April 2-4, 2017 at the Westin Annapolis. This year’s summit will focus on the continued transition and transformation surrounding...

InfoSec World Conference and Expo 2017 (ChampionsGate, Florida, USA, April 3 - 5, 2017) The conference will feature security practitioners who speak from experience on the real-world challenges companies are facing today. The conference is most suitable for those whose responsibilities include...

Cyber Security Summit: Atlanta (Atlanta, Georgia, USA, April 6, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: Atlanta. Receive...

SANS 2017 (Orlando, Florida, USA, April 7 - 14, 2017) Success in information security requires making a commitment to a career of learning, from the fundamentals to advanced techniques. To put you firmly on that learning path, join us at SANS 2017 in Orlando,...

Unprecedented Counterintelligence Threats: Protecting People, Information and Assets in the 21st Century. (Arlington, Virginia, USA, April 10, 2017) This full day symposium will provide insights into evolving threats to the nations security and identify effective ways of addressing them. Highlights Include: A keynote address from National Counterintelligence...

Hack In the Box Security Conference (Amsterdam, the Netherlands, April 10 - 14, 2017) Back again at the NH Grand Krasnapolsky, HITB2017AMS takes place from the 10th till 14th of April 2017 and features a new set of 2 and 3-day technical trainings followed by a 2-day conference with a Capture ...

Cyber Warrior Women: Blazing the Trail (Catonsville, Maryland, USA, April 19, 2017) Join the Cybersecurity Association of Maryland, Inc. (CAMI), in partnership with The CyberWire, Fort Meade Alliance, and presenting sponsor Exelon Corporation, for "Cyber Warrior Women: Blazing the Trail."...

SANS Baltimore Spring 2017 (Baltimore, Maryland, USA, April 24 - 29, 2017) SANS Institute, the global leader in information security training, today announced the course line-up for SANS Baltimore Spring 2017 taking place April 24 – 29. All courses offered at SANS Baltimore are...

Defence Information 2017 (Cranfield, England, UK, April 26 - 27, 2017) Defence Information 2017 is the major annual communications event of Joint Information Group activities (the JIG reports to the Defence Suppliers Forum) and the Event’s content spans both Information and...

Defence Information 2017 (Cranfield, England, UK, April 26 - 27, 2017) Defence Information 2017 is the major annual communications event of Joint Information Group activities (the JIG reports to the Defence Suppliers Forum) and the Event’s content spans both Information and...

Crimestoppers Conference (Eden Project, Bodelva, St Austell , April 27, 2017) Crimestoppers is organising a major one-day conference designed to help local businesses shore up their online security. A range of expert speakers will pinpoint typical cyber pitfalls to avoid. 80% of...

Atlantic Security Conference (Halifax, Nova Scotia, Canada, April 27 - 28, 2017) Atlantic Canada's non-profit, annual information security conference. AtlSecCon, the first security conference in Eastern Canada focusing on bringing some of the worlds brightest and darkest minds together...

SANS Automotive Cybersecurity Summit 2017 (Detroit, Michigan, USA, May 1 - 8, 2017) SANS will hold its inaugural Automotive Cybersecurity Summit to address the specific issues and challenges around securing automotive organizations and their products. Join us for a comprehensive look...

cybergamut Tech Tuesday: Distributed Responder ARP: Using SDN to Re-Engineer ARP from within the Network (Elkridge, Maryland, USA, and online at various local nodes, May 2, 2017) We present the architecture and initial implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP) intended...

Cyber Security Summit in Dallas (Dallas, Texas, USA, May 5, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from Proofpoint, CenturyLink, IBM and more. Register with promo code cyberwire50 for half off...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.