skip navigation

More signal. Less noise.

Daily briefing.

A variant of the familiar help-desk scam is taking advantage of widespread public concerns over WannaCry. The scammers call, tell you you're infected, then offer to "take over your machine" to fix the infection. The UK's Action Fraud center sounded the alert, but it's reasonable to expect this approach wherever the help-desk scam flourishes.

WannaCry was notable for being a "ransomworm." The US Department of Homeland Security warned that a vulnerability in Samba, the free Linux and Unix networking software, leaves it susceptible to similar worm infestations. According to researchers at Rapid7 there were no signs of exploitation in the wild, at least in the first twenty-four hours after discovery and disclosure.

The precise scope of the threat posed by EternalBlue and EternalRocks remains unsettled, but there is widespread concern that active exploitation may be taking more disturbing forms than the stumblebum extortion of the first WannaCry wave. Researchers at Cyber Detection Services are among those reporting quiet campaigns that seem to be evading detection by commodity firewalls. 

SentinelOne reports a new ransomware strain, "Widia," interesting in that it looks like early-stage commodity-level crimeware. Widia asks for a credit card payment as opposed to customary Bitcoin, but it seems more scareware than crytptoransomware—it throws up a screen that says your files are encrypted, but actually they're not. SentinelOne thinks the authors will eventually add the malicious encryption they now lack. Ransomware pandemics prompt calls for cryptocurrency regulation.

Investigation into the Manchester bomber's radicalization suggests his family warned the authorities.

Notes.

Today's issue includes events affecting Brazil, European Union, India, Israel, Democratic Peoples Republic of Korea, Libya, Russia, Syria, United Kingdom, United States, and Vietnam.

In today's podcast, Ben Yelin from our partners at the University of Maryland's Center for Health and Homeland Security takes us through the implications of a cell site data privacy case making its way to the Supreme Court. Our guest, Yong-Gon Chon from Focal Point Data Risk, discusses Focal Point's Cyber Balance Sheet Report.

 

The Cyber Security Summit: Seattle (Seattle, Washington, USA, June 1, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from the U.S. Dept of Justice, CenturyLink, root9B, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350)

CyberTech Fairfax (Fairfax, Virginia, USA, June 13, 2017) Cybertech Fairfax: meet tech execs, start-ups, investors & legal, media & mktg pros changing the global cyber landscape. Cybertech Fairfax is a thought-provoking conference on global cyber threats, solutions, innovations and technologies.

SANS Technology Institute (online event, June 13, 2017) Earn a master’s degree in cybersecurity from SANS, the world leader in information security training. Learn more at a free online information session on Tuesday, June 13th, at 12:00 pm (noon) ET. For complete information on master’s degree and graduate certificate programs, visit www.sans.edu.

Dateline 2017 Cyber Investing Summit

Mitnick on Misdirection: Hacking as Close-up Magic (The CyberWire) Call it social engineering or call it charlatanism, hacking, like conjuring, can take full advantage of human trust, expectation, and inattention. Who better than Kevin Mitnick to show some close-up magic for digital natives and digital sojourners?

A Realistic Appraisal of Conflict in Cyberspace (The CyberWire) Michael Chertoff, Executive Chairman and co-founder of the Chertoff Group, and well-known as a former US Secretary of Homeland Security, offered his views of the threat landscape: how it took shape, how it looks now, and how we should negotiate it going forward.

Kevin Mitnick performs hacking tricks, live on Wall Street (CSO Online) The second annual Cyber Investing Summit, held on Wall Street at the New York Stock Exchange, announced that Kevin Mitnick, the world's most famous hacker, will be its opening act on May 23, 2017.

ERI’s John Shegerian Explains Digital Security Issues to Cyber Investing Summit Panel at New York Stock Exchange (Sys-Con Media) John Shegerian, Chairman, CEO and co-founder of ERI, the nation’s leading recycler of electronic waste and the world's largest cybersecurity-focused hardware destruction company, shared insights about digital security issues as part of a panel discussion at the Cyber Investing Summit yesterday at the New York Stock Exchange.

Cyber Attacks, Threats, and Vulnerabilities

Seven NSA cyberweapons used in EternalRocks exploit (SearchSecurity) Seven NSA cyberweapons combined in the EternalRocks infection to set up footholds on target systems, but has yet to deliver its final malware.

Tech support scams are now exploiting the WannaCry fiasco to trick users (Neowin) The Action Fraud centre of the UK is now warning people about tech support scams saying their machine is infected by WannaCry, and then demanding a hefty amount of money as payment.

North Korea ‘highly likely’ to be behind WannaCry ransomware attacks, says Symantec (Welcome to MDWLive! News Network) Symantec Corp, the cyber security expert on Monday said that the WannaCry ransomware attacks which occurred earlier this month were “highly likely” from a hacking group affiliated with North Korea.…

Samba flaw could spread WannaCry-like worm, warns DHS (Computing) More than 100,000 machines could be at risk.

Newly discovered vulnerability raises fears of another WannaCry (Reuters UK) A newly found flaw in widely used networking software leaves tens of thousands of computers potentially vulnerable to an attack similar to that caused by WannaCry, which infected more than 300,000 computers worldwide, cybersecurity researchers said on Thursday.

New “Widia” Ransomware Asks for Credit Card for Payment (SentinelOne) While hunting for new types of undetected ransomware, we came across a sample we’re calling Widia. Below is the ransom note it displays once it’s infected the device...

Ransomware attacks among the most likely to get through defences, research (Computing) Even before WannaCry, organisations were reporting relatively high infiltration rates for ransomware

Ransomware- A Tech or Human Problem? (Anomali) If you hadn’t heard of ransomware before WanaCry, you've heard of it now. Ransomware is a specially designed piece of malware that blocks a user's access to their files or even to the system itself. It is able to bypass many security controls because its behavior isn’t inherently malicious- it denies access to and encrypts data as a normal security application would. The issue is that the wrong person is in control.Regaining access involves paying the ransom within an

How does the Stegano exploit kit use malvertising to spread? (SearchSecurity) The Stegano exploit kit is being spread through a malvertising campaign found on major websites. Find out how organizations can prevent malvertising.

64-bit malware threat may be itty-bitty now, but it's only set to grow (Register) Upgrade and they will come

Malicious Movie Subtitles Can Give Hackers Full Control Over Your PC (BleepingComputer) A vulnerability in how video players load and parse subtitle files allows an attacker to execute code on a target's PC and effectively take over the device.

Stringing Victims Along: Leveraging Paste Sites to Bypass Security Controls (Recorded Future) Recorded Future researchers discovered an actor, self-named Leo, that uses encrypted strings and the public cloud to perform multi-stage malware attacks.

Synopsys and Ponemon Study Highlights Critical Security Deficiencies in Medical Devices (PRNewswire) Survey of medical device manufacturers and healthcare delivery organizations reveals industry's lack of confidence and alignment in securing medical devices

Samsung Galaxy S8 iris scanner can be fooled with a printed photo (Help Net Security) Samsung Galaxy S8 iris recognition is a joke. A hacker has proven that the system can be fooled by using a printed photo of the user's eye(s).

Hacked Twitter account spits out poison – make sure yours isn’t next (Naked Security) Salem State University was horrified when its account was taken over and used to spout racist venom – how could they have prevented it? We’ve got some advice

Cyber Trends

Password and Username Reuse is Putting Enterprises at Serious Risk of Account Takeover, According to Digital Shadows (Digital Shadows) Report highlights the growing risk of account take overs and the low barrier to entry to automate attacks

Security firms marching to the political beat (iTWire) Cyber security firms appear to be tailoring their research to help one side of politics or the other in pursuit of their respective enemies of the day...

Cyber-attacks have become a fact of life (Vietnam Net) Five days fter being released, the WannaCry ransomware has infected more than 300,000 devices in over 150 countries worldwide, as reported by the United States Homeland Security Advisor. The magnitude of this cyber attack is unprecedented and the number of victims is still rising in many parts of the world, including Vietnam.

'Rapid digitisation making India favourite cyber attack target' (The Economic Times) According to the researchers, "EternalRocks" exploited the same vulnerability in Windows that helped 'WannaCry' spread to computers. I

Marketplace

Cybersecurity Survey Shows Investment Will Not Match Growth in Attacks at US Companies (PRNewswire) Survey by FICO and Ovum reveals disconnect between investment and expected improvement in overall security

Aust cyber leaders’ call to action (InnovationsAus.com) Urgent action and considerable energy must be directed at building the cyber leadership skills across professions and across the economy if Australia is to fully participate in – and fully reap the benefits of – the global digital economy.

ZeroFox raising $20 million in equity funding (Baltimore Business Journal) Baltimore cybersecurity company ZeroFOX Inc. is closing in on $20 million in new equity funding, according to documents filed with Securities and Exchange Commission.

What Makes Cisco an Attractive Investment in Cybersecurity Space? (Market Realist) More sophisticated cyberattacks ensure increased spending on cybersecurity

Army vehicles will get C4ISR upgrade (C4ISRNET) SAIC has been awarded a contract to upgrade C4ISR capabilities on Army vehicles.

Brazilian marines upgrade C4ISR (C4ISRNET) Israeli firm Elbit has been awarded a $40 million contract to upgrade C4ISR systems for the Brazilian marine corps.

Boeing Protests Air Force’s Jamming-Plane Decision, Alleging Conflict of Interest (Defense One) Company officials say the decision to let L3 pick the aircraft means a choice has already been made.

root9B Holdings Partners with The Chertoff Group Retains Chertoff Capital to Raise Growth Capital (PRNewswire) General Michael Hayden joins root9B Advisory Board

MobileIron Named to Silicon Valley 150 List of Top Public Technology Companies (PRNewswire) For the first time, MobileIron (NASDAQ:MOBL) was named to the...

Lastline Wins Gold in Two Categories at the 12th Annual 2017 IT World Awards - EconoTimes (EconoTimes) Lastline Inc., the leader in advanced malware protection, today announced that Network Products Guide, a leading technology research and advisory guide, has named Lastline®...

David Ross Joins SecureAuth as VP of Research (Globe Newswire) Ross to lead SecureAuth research efforts, focusing on identity-based threat detection and remediation in the fight against increased cyberattacks

Products, Services, and Solutions

New Thales CipherTrust Monitor 2.0 delivers convenience and operational savings for monitoring Hardware Security Modules (Thales) Next-generation tool gives customers instantaneous visibility of their entire Thales Hardware Security Module (HSM) estate

Venafi Trust Protection Platform in Evaluation for Common Criteria Certification (Venafi) With the Venafi Trust Protection Platform, organizations can efficiently orchestrate the entire machine identity lifecycle, keeping communications between machines secure and private.

Forcepoint Expands Visibility and Compliance for Cloud Applications with New Cybersecurity Analytics and Data Center Offerings (PRNewswire) Human-centric cloud security solution for web, email and CASB provides reporting and context to address biggest risks and behaviors including "Shadow IT"

Is your company’s data being sold on the Dark Web? (TECHSEEN) Jerald Nine from Comodo explains how his company can help enterprises and individuals to know whether their information is already for sale on the Dark Web

Cylance Takes Aim At Crowdstrike With Launch Of CylanceOPTICS EDR Solution (CRN) Cylance is expanding beyond its endpoint protection roots with the Wednesday launch of CylanceOPTICS, an endpoint detection and response solution that takes aim at competitors such as Crowdstrike.

Bitdefender reveals Hypervisor Introspection (CRN Australia) Provides solution for memory introspection around Citrix XenServer.

Inside Cisco's new Global Gold partner certification level (CRN Australia) Networking vendor unveils Global Gold.

75% of Organizations Will Struggle to Meet EU GDPR Regulations by Deadline, Survey Finds (Varonis) Varonis offers free online course by Troy Hunt to help organizations build a GDPR attack plan

TAG Becomes First Cybersecurity Information Sharing Organization for Digital Ad Industry (PRNewswire) Information Sharing and Analysis Organizations (ISAO) created by Congress to strengthen nation's cybersecurity defenses

Oxygen Forensics Launches Online Certification Course June 1 (PRNewswire) Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, today announced that beginning June 1, forensic experts will be able to take the Oxygen Forensic Expert Certification 3-day training course online.

Preempt Extends Secure Authentication to Any Application (Marketwired) Preempt Any App Solution gives enterprises development-free way to add multi-factor authentication to any application

Kaspersky launches Threat Intelligence Portal for businesses (BetaNews) Companies have to deal with an increasing number of cyber threats. To allow them to stay in touch with this ever evolving landscape they need up to date intelligence.

1Password Travel Mode protects passwords from border agents (Help Net Security) 1Password Travel Mode is a new feature that will allow users to protect their 1Password data from unwarranted searches when they travel.

LastPass’s new cloud backup option – sunny skies or a brewing storm? (Naked Security) Cloud backup for the password manager’s Authenticator certainly reduces the hassle for users – but it’s a security compromise

Texas A&M University System Saves $7 Million in One Year With Vectra Networks Automated Threat Hunting and Cyber Attacker Detection (PRNewswire) Vectra Networks, the leader in automating the hunt for in-progress...

Technologies, Techniques, and Standards

GDPR: One year to go, here are the best resources to read to prepare (Computing) Computing has covered GDPR in depth from the moment it was passed, covering it from every angle. Read these articles to be prepared for its implementation on 25 May 2018

Network-sniffing, automation, machine learning: How to get better threat intel (Register) When two 'innocent' events on the network are anything but

Spotting a system breach takes defensive and offensive strategies (SearchSecurity) A breach detection system can minimize the damage from a system breach, but the best path to security blends both defensive and offensive tools.

Design and Innovation

iPhone 8's Advanced Facial Recognition Feature Could Go Beyond Security (TechVicity- Technology Hub) Amidst swirling rumors that have gone as far as speculating over what could be the iPhone 9 even before its predecessor has managed to see the light of day, a new leak has turned up to shine the light on a possible new feature of Apple‘s upcoming anniversary edition smartphone. The new image that focuses specifically …

Research and Development

How the Army wants to protect missiles from GPS jammers (C4ISRNET) The Army points to newly developed algorithms that would enable a missile to detect jammers and determine their location.

Legislation, Policy, and Regulation

Govt reinforcing cyber security to deal with emerging threats (Business Standard) In face of emerging cyber threats such as the recent ransomware attack, fringe incidents of leaks of Aadhar database and other online attacks, the government is planning to separate the cyber security of different sectors. Also a centralised hub to

Opinion | The president just made a titanic foreign policy shift. The media missed it. (Washington Post) In Saudi Arabia, Trump directly called on the Muslim world to defeat the forces of terrorism and extremism.

US increases use of deconfliction hotline with Russia amid pending operation to liberate Raqqa (Military Times) U.S. and Russian forces operating in Syria have increased the use of a communication line opened to avoid midair collisions and reduce the potential for miscalculation by forces operating in Syria.

What defense leaders (are now willing to) tell us about offensive cyber ops (C4ISRNET) The Defense Department as well as the individual services have slowly but surely provided details regarding their offensive efforts in cyberspace, most notably the fight against the Islamic State group in Iraq and Syria.

What are services spending on offensive cyber? (C4ISRNET) The Defense Department continues to spend a great deal of time, attention and funds on cyber. How much goes to cyber operations?

CYBERCOM elevation at heart of budget increase (C4ISRNET) Cyber Command has asked for a 16 percent budget increase to fund initiatives such as the elevation to a unified combatant command.

Standalone U.S. Cyber Command would take big budget bump, Adm. Mike Rogers says (Fedscoop) The U.S. Cyber Command would need a 16 percent increase in its budget to separate itself from the NSA and become a full-fledged combatant command, Adm. Mike Rogers told House lawmakers Tuesday. “To execute our mission I have asked for a budget of $647 million, which is a nearly 16 percent increase from 2017,” Adm. Michael Rogers told …

For the 21st Century Battlefield, Army Trains 'Cyber Warriors' (WUNC) To prepare for sophisticated enemies, soldiers are learning to use and defend themselves against cyber weapons.

U.S. Cyber Forces Face Security Clearance Challenges (USNI News) Moving qualified service members through the security clearance process to be part of the rapidly expanding cyber mission force has been a challenge for the military, a key Senate panel was told on Tuesday.

Trump executive order aims to protect US from ‘catastrophic’ cyber attack (Financial Times) President highlights threats to military and crucial infrastructure

McCaul optimistic on DHS cyber reorganization (FCW) The House Homeland Security Committee chairman is preparing to reintroduce legislation to reorganize the Department of Homeland Security’s cyber directorate, and he believes forces are aligning to get it passed.

Wannacry attack: Responsible bitcoin regulation is the need of the hour (Business Standard) The main disadvantage of bitcoin is that transactions can be anonymous

House passes measure to outlaw nude photo sharing in the military (Military Times) The move comes in response to the Marine Corps scandal earlier this year, and concerns about legal loopholes.

Georgia Unveils Massive Cybersecurity Investment to Protect Against Emerging Threats (CRN) Georgia CIO Calvin Rhodes told XChange SLED attendees that the state is leveraging partnerships with technology vendors to help with better identifying and mitigating gaps in its security ecosystem.

Litigation, Investigation, and Law Enforcement

MI5 was warned about Manchester bomber Salman Abedi’s support of Islamists (Times (London)) A relative of the Manchester bomber warned the British authorities that he was “dangerous”, it emerged yesterday, amid concerns that chances to stop him were missed. Salman Abedi’s support for...

Worried parents took Manchester bomber Abedi to Libya and confiscated passport (Times (London)) The parents of the Manchester bomber were so concerned about his radicalisation in Britain that they moved him to Libya and confiscated his passport, family friends said yesterday. Salman Abedi, 22...

Britain 'Furious' Over US Leaks On Manchester Attack (NDTV.com) A British minister said Wednesday it was "irritating" that details about the Manchester concert bombing had been leaked to US media before being released in Britain, saying she had spoken to US authorities.

How to Hunt a Lone Wolf (Foreign Affairs) To make one-off attacks less likely and prepare for those that do occur, governments should keep would-be terrorists isolated, build strong relationships between Muslim communities and law enforcement, monitor social media, and discredit the ideology that lone wolves embrace.

Apple sees a spike in government requests for data relating to national security (CNBC) But Apple received fewer requests for data relating to devices.

Classified Senate briefing expands to include Russian cyber firm under FBI scrutiny (ABC News) U.S. officials worry that hackers would exploit certain anti-virus software.

Ex-C.I.A. Chief Reveals Mounting Concern Over Trump Campaign and Russia (New York Times) John O. Brennan, the former director of the C.I.A., offered the fullest public account yet of how the federal investigation into Russian election meddling began.

Report: Obama Lied and Obama Spied (Fox News) A new report out this morning details just how much Obama spied on Americans during his administration and it’s a lot. Even the liberal ACLU organization says these new disclosures are some of the most serious to ever be documented:

Police swoop on gang that planted banking Trojan on 1m phones (Naked Security) The Cron gang’s malware was infecting some 3,500 Android devices every day – and siphoning money out of 60 accounts every day

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

CyberSecurity International Symposium (Chcago, Illinois, USA, July 10 - 11, 2017) The Symposium will take an in-depth look at the latest cyber security threats and trends, as well as real-world strategies for securing critical networks and data in enterprise, commercial, government...

CyberSecurity4Rail (Brussels, Belgium, October 4, 2017) Facilitated by Hit Rail, this conference will bring together experts in cybercrime and digital security, plus leaders in ICT and representatives from transport and railway companies, European organisations...

QuBit Conference Belgrade 2017 (Belgrade, Serbia, October 18 - 19, 2017) A Cyber Security Community Event in the SEE Region. QuBit Conference is a cyber security event gathering all levels of security professionals, industry experts, academics and government officials. QuBit...

Upcoming Events

SECON 2017 (Jersey City, New Jersey, USA, May 25, 2017) Social engineering impacts security. (ISC)2 New Jersey Chapter is a 501(c)(3) not-for-profit charitable organization. Our chapter’s mission is to disseminate knowledge, exchange ideas, and encourage community...

Cyber Southwest (Tucson, Arizona, USA, May 27, 2017) CSW will be dedicated to furthering the discussion on cyber education and workforce development in Arizona, healthcare cybersecurity, and technical training in areas such as threat intelligence, insider...

SANS Atlanta 2017 (Atlanta, Georgia, USA, May 30 - June 4, 2017) Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Take advantage of tips and tricks from the experts...

Cyber Security Summit: Seattle (Seattle, Washington, USA, June 1, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: Seattle. Receive...

Cyber Security Summit: Seattle (Seattle, Washington, USA, June 1, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: Seattle. Receive...

SANS Houston 2017 (Houston, Texas, USA, June 5 - 10, 2017) At SANS Houston 2017, SANS offers hands-on, immersion-style security, security management, and pen testing training courses taught by real-world practitioners. The site of SANS Houston 2017, June 5-10,...

Cyber Resilience Summit: Measuring and Managing Software Risk, Security and Technical Debt (Brussels, Belgium, June 6, 2017) The Consortium for IT Software Quality is bringing the Cyber Resilience Summit to Europe, to take place on 6 June 2017 in Brussels, Belgium, the vibrant heart of political Europe and headquarters of the...

National Cyber Security Summit (Huntsville, Alabama, USA, June 6 - 8, 2017) The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation’s infrastructure from the ever-evolving cyber threat. The summit...

Infosecurity Europe 2017 (London, England, UK, June 6 - 8, 2017) Infosecurity Europe is the region's number one information security event featuring Europe's largest and most comprehensive conference programme and over 360 exhibitors showcasing the most relevant information...

Cyber 8.0 Conference (Columbia, Maryland, USA, June 7, 2017) Join the Howard County Chamber of Commerce for their 8th annual cyber conference, where they will explore innovation, funding, and growth. Participants can expect riveting discussions from cyber innovators...

2017 ICIT Forum: Rise of The Machines (Washington, DC, USA, June 7, 2017) The 2017 ICIT Forum brings together over 300 cybersecurity executives from across critical infrastructure sectors to receive the latest ICIT research from our experts, share knowledge, develop strategies...

SecureWorld Chicago (Rosemont, Illinois, USA, June 7, 2017) Join your fellow security professionals for high-quality, affordable training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn...

NYS Cyber Security Conference (Albany, New York, USA, June 7 - 8, 2017) June 2017 marks the 20th Annual New York State Cyber Security Conference and 12th Annual Symposium on Information Assurance (ASIA) and we invite you to join us for this nationally recognized event. Technology's...

RSAC Unplugged (London, England, UK, June 8, 2017) Informal, up close and personal, intimate…that’s RSAC Unplugged. Ignore the background noise and focus on what’s important in information security right now as part of a one-day program focused on excellent...

Insider Threat Program Development / Management Training For NITP-NISPOM CC 2 (Huntsville, Alabama, USA, June 8 - 9, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program (ITP) Development / Insider Threat Risk Management (National Insider Threat Policy (NITP), NISPOM Conforming...

BSides Pittsburgh 2017 (Pittsburgh, Pennsylvania, USA, June 9, 2017) BSides Pittsburgh is part of a global series of community-driven conferences presenting a wide range of information security topics from technical topics, such as dissecting network protocols, to policy...

29th Annual FIRST Conference (San Juan, Puerto Rico, USA, June 11 - 16, 2017) FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs.

21st Colloquium, Cyber Security Education Innovation for the 21st Century (Las Vegas, Nevada, USA, June 12 - 14, 2017) The Colloquium for Information Systems Security Education (CISSE) provides a forum for dialogue among academia, industry and government. Protection of the information and infrastructure used to create,...

ETSI Security Week 2017 (Sophia Antipolis, France, June 12 - 16, 2017) This year's event will address key cybersecurity standardization challenges in the short, medium and longer term. The event will look at the different aspects of cybersecurity underpinning our digital...

Cyber Tech Fairfax (McLean, Virginia, USA, June 13, 2017) Cybertech Fairfax will provide attendees with a unique opportunity to learn about the latest innovations and solutions from the cyber community. It will serve as an incredible B2B platform with a strong...

Cyber Tech Fairfax (McLean, Virginia, USA, June 13, 2017) A thought-provoking conference and exhibition on global cyber threats, solutions, innovations and technologies. At Cybertech Fairfax, high-profile speakers and panelists will focus on the global cyber...

LegalSec Summit 2017 (Arlington, Virginia, USA, June 13 - 14, 2017) Whatever your role in security, there’s something here for you! Hear from experts who will share their experiences related to information security, and develop takeaways to use in your organization. The...

AFCEA Defensive Cyber Operations Symposium (Baltimore, Maryland, USA, June 13 - 15, 2017) Cyber operations are a challenging mission for the U.S. Defense Department and government community that builds, operates and defends networks. Cyber leaders and warriors must continually evolve to adapt...

Global Cybersecurity Summit 2017 (Kiev, Ukraine, June 14 - 15, 2017) During the two-day summit, participants will be exposed to cybersecurity best practices, cutting-edge advancements, and emerging innovations in defensive security across a series of categories, including...

Information Assurance Symposium (Baltimore, Maryland, USA, June 19 - 21, 2017) The Information Assurance Symposium is the premier IA event at which leaders and practitioners share vital information and provide direction and best practices to meet today's challenges in IA and the...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.