skip navigation

More signal. Less noise.

Do you know the best practices for applying threat intelligence?

Threat intelligence is one of the most talked about areas of information security today, but how do you actually use it? Learn best practices for applying threat intelligence with Recorded Future's latest white paper. Download your free copy now.

Daily briefing.

Ukrainian authorities attribute BadRabbit ransomware to Black Energy, the threat group they also believe was behind NotPetya. Ukraine and many (most?) security experts believe Black Energy operates in the interest and under the direction of the Russian government. (Moscow denies this, and also denies that it's carried out cyberattacks against Ukraine.)

A North Korean spokesman has denounced the UK's attribution of WannaCry ransomware to Pyongyang as a "wicked attempt" to ratchet up sanctions against North Korea. But global banks are not disposed to take the DPRK's protestations of innocence at anything approaching face value. The financial sector is taking steps to secure itself not only against the sort of SWIFT exploitation that diverted millions from Bangladesh Bank's holdings through fraudulent wire transfers, but also against the more destructive wiper malware the DPRK has deployed against other targets.

There's also some more traditional espionage news concerning the two Koreas: a South Korean lawmaker has accused the North of stealing sensitive warship plans.

A new ransomware campaign, "ONI," has been observed in operations against Japanese targets. Like a number of other apparent ransomware efforts, WannaCry and NotPetya prominently among them, ONI may blur the lines between ransom and simple disruption. Cybereason, which has been tracking ONI, says the ransomware (or wiper) was deployed only to active directory servers or what Cybereason calls "critical assets."

A phishing campaign underway in the wild is seeking to obtain Facebook or YouTube credentials.

Cyber companies continue to sell their certificate authority business. Comodo is the latest.

Notes.

Today's issue includes events affecting Bangladesh, European Union, Iran, Iraq, Israel, Japan, Democratic Peoples Republic of Korea, Republic of Korea, Russia, Saudi Arabia, Syria, Ukraine, United Kingdom, United States.

The IOC and IOA playbook: making sense of your indicators.

Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. However, a recent SANS survey revealed a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Senior Security Researcher Kyle Wilhoit to get clarification on the use and value of IOCs and IOAs and how they can enrich your investigations and overall security strategy.

In today's podcast, we hear from our partners at the SANS Institute, as Johannes Ullrich (proprietor of the ISC Stormcast and Dean of Research) discusses the ins and outs of honeypots. Our guest is Russell Jones from Deloitte, discussing the results from a recent medical security poll.

Cyber Security Summit: Boston and Los Angeles (Boston, Massachusetts, USA, November 8, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security on November 8 in Boston and November 29 in Los Angeles. Register with promo code cyberwire50 for half off your admission (Regular price $350).

Cyber Attacks, Threats, and Vulnerabilities

North Korea's elite cyber army hacked top secret warship blueprints, says South Korea lawmaker (Newsweek) The methods used were similar to other attacks attributed to North Korea.

N Korea hits back over UK WannaCry claims (BBC News) It comes after the UK said it was "as sure as possible" North Korea was behind a huge ransomware attack.

North Korea threat to UK: Panic in Westminster as Kim turns ire on ‘despicable’ Britain (Express) North Korea has issued a terrifying warning to the UK after the rogue state was accused of being behind this summer’s NHS hacking attack.

Banks fearing North Korea hacking prepare defenses: cyber experts (Reuters) Global banks are preparing to defend themselves against North Korea potentially intensifying a years-long hacking spree by seeking to cripple financial networks as Pyongyang weighs the threat of U.S. military action over its nuclear program, cyber security experts said.

Reuters Summit: Ukraine says NotPetya hackers likely behind BadRabbit malware (Reuters) Hackers behind the NotPetya virus that hit Ukraine and spread around the world in June probably also designed malware called BadRabbit used in a more recent strike, a Ukrainian presidency official said on Tuesday.

Backdoor Attacks From Windigo Operation Still Active (SecurityWeek) Windigo, a malicious operation uncovered over three years ago, continues to be active despite a takedown attempt in 2014 and the sentencing of one conspirator in August 2017.

How bots and fake accounts work (Axios) The difference between “good” bots and “bad” bots, and other things to know.

ONI Ransomware Used in Month-Long Attacks Against Japanese Companies (BleepingComputer) As more and more ransomware outbreaks are discovered, the line has become blurred in whether they are being utilized as a wiper or an actual ransomware. Such is the case with a new ransomware attack called ONI that has been used in targeted month long attacks against Japanese companies.

Webroot's Top 10 Nastiest Ransomware Attacks of 2017 (Webroot Threat Blog) We’re revealing the top 10 nastiest ransomware attacks from the past year, underscoring that cybercriminals will continue to develop new infections.

Facebook Phishing Campaign Targets Android and iOS Users (BleepingComputer) A Facebook spam campaign is luring users to phishing pages that try to trick targets into handing over Facebook or YouTube credentials.

Researchers analyze 3,200 unique phishing kits (Help Net Security) Duo Security researchers analyzed 3,200 unique phishing kits left behind by lazy phishers on compromised websites/servers.

Why phishing attacks remain effective (The Nation Nigeria) Cybercrooks are on the prowl, designing one trick or the other to fleece unsuspecting victims. Telecoms infrastructure have become a willing tool in the arsenal of the virtual marauders. They often send text messages to unsuspecting account holders in banks alleging the suspension of their accounts for one reason or the other, LUCAS AJANAKU reports.

Dark Web Research: Illicit Code Signing Certificates More Valuable Than Passports and Handguns (Venafi) Venafi and Cyber Security Research Institute uncover flourishing trade in code signing certificates

Money stuck in cyberspace amid e-transfer issues at TD Canada Trust (CTVNews) A number of users are reporting issues with Interac e-transfer services at TD Canada Trust.

Security Patches, Mitigations, and Software Updates

Some Verizon Galaxy Devices Now Getting BlueBorne Patch (AndroidHeadlines.com |) Verizon Wireless has started rolling out a software update for the Samsung Galaxy S7, Galaxy S7 Edge, Galaxy Note 5, and Galaxy S6 Edge Plus, pushing out a

Cyber Trends

Internet already “poisoned” as businesses defy cybersecurity common sense by installing, trusting IoT devices (CSO) The pushing of billions of insecure Internet of things (IoT) devices into the market has already “poisoned” the Internet with a level of vulnerabilities that will be hard to claw back from, one security specialist has said in warning that “the damage is already done”.

Gemalto survey confirms that Consumers lack confidence in IoT device security (NASDAQ.com) Businesses and consumers support government-mandated IoT security regulations

Synopsys 2017 Coverity Scan Report Finds Significant Adoption of Secure Practices in OSS Projects (PRNewswire) Synopsys, Inc. (Nasdaq: SNPS) today released the 2017 Coverity®...

What More Does It Take to Make Cyber Security a Top Priority? (SecurityWeek) It has been yet another busy month in the world of cyber security news. What does it mean when breaches reach private sector and public institutions that are supposed to be experts in risk oversight?

The Future of Industrial Security - IT and OT Convergence (SecurityWeek) In industrial organizations, security is traditionally divided across three silos: physical security, IT security and operational security (plant security and system integrity). This divide makes it more difficult for facilities operators to identify and respond to incidents.

Healthy dose of skepticism and reality will carry companies through next cyberthreat (CIO Dive) Patching is a fundamental of cybersecurity, yet IT departments are more inclined to invest in "chasing security threats" rather than reexamining what is already available and fixable.

Marketplace

The Electronic Republic (Foreign Affairs) Over the past two months, Iranian cyberactivities have moved up the list of grievances against the Islamic Republic.

Loss of sales in U.S. would be less than 10 percent: Kaspersky (CISO MAG) Kaspersky said he expected global revenue for his company to reach about $700 million in 2017, as compared to $644 million in global revenue in 2016.

Cybersecurity Foundry Team8 Reveals New Cyber Startup (CTECH) Called Sygnia, the startup will focus on cybersecurity consulting and incident response

Israeli Cybersecurity Think Tank Team8 Announces New NYC Headquarters at its Annual Rethink Cyber Event at the NASDAQ (PRNewswire) Team8, Israel's leading cybersecurity think tank and company...

Meet the tech start-ups set to rise in Dimension Data-backed accelerator (ARN) The Victorian Government has named the local tech start-ups to be granted entry into CyRise, a new accelerator program backed by Dimension Data.

ROOT Data Center Secures $90 Million in New Financing (Marketwired) Funding will enable ROOT Data Center's expansion into new regions and position company to meet growing demand for colocation at its Montreal facilities

Rollbar snags $6 million for error monitoring (TechTarget) Rollbar, which provides a real-time error monitoring SaaS offering, recently advanced its cause, securing $6 million in series A funding this week to further build out its engineering and sales operations, among other things.

Comodo Sells Certificate Business to Private Equity Firm (SecurityWeek) Francisco Partners acquires Comodo's certificate authority business

DigiCert Completes Acquisition of Symantec’s Website Security and Related PKI Solutions (DigiCert) DigiCert Inc., the leading global provider of scalable identity and encryption solutions for the enterprise, and Symantec Corp. (NASDAQ:SYMC), the world’s leading cyber security company, today announced that DigiCert has completed its acquisition of Symantec’s Website Security and related PKI solutions. With the transition …

Mozilla Raises Concerns Over DigiCert Acquiring Symantec CA (SecurityWeek) Mozilla has raised some concerns regarding DigiCert acquiring Symantec’s website security and related public key infrastructure (PKI) solutions after major web browser vendors announced that certificates issued by the security firm would no longer be trusted.

Why Cisco Systems Spent $1.9 Billion on BroadSoft (The Motley Fool) Cisco expands its collaboration ecosystem again with another big buy.

Corero Network Security bags first Aussie contract and says more to come Share (Proactive Investors) The firm expects to win another new Australian customer before the end of the financial year

Tanium, WWT land $750M cyber contract from DOD Silicon Valley hub (Washington Technology) Tanium and World Wide Technology finalize a potential five-year, $750 million cyber services contract with the Defense Department's Silicon Valley organization.

Groundbreaking to be held for Fort Meade cyberspace facility (Air Force Times) Maryland Gov. Larry Hogan will be the keynote speaker at a groundbreaking ceremony for the 175th Cyberspace Operations Squadron Facility at Fort Meade.

Tech company that ‘delivers social intelligence data like a pizza’ expands in Clearwater (Tampa Bay Business Journal) A big-data tech startup that analyzes social media posts for the Department of Defense and other clients is adding employees and moving to a bigger office in downtown Clearwater.

Equifax board picks former Broadcom exec for tech committee (SC Media US) Scott McGregor's resume includes stints at Philips Semiconductor, Santa Cruz Operation Inc., Digital Equipment Corporation, Xerox PARC and Microsoft.

Accenture federal arm adds former Army CIO, Booz Allen exec Susan Lawrence (Washington Technology) Accenture Federal Services hires Susan Lawrence, a former Army CIO who was a Booz Allen Hamilton executive for the past three years.

Products, Services, and Solutions

Ixia Enables Enterprises to Leverage Existing Open Network Switches to Deliver Network Packet Broker (NPB) Functionality (BusinessWire) Ixia Enables Enterprises to Leverage Existing Open Network Switches to Deliver Network Packet Broker (NPB) Functionality

EclecticIQ launches Fusion Center Intelligence Essentials, enabling any organization to jumpstart a cost-effective cyber threat intelligence practice (EclecticIQ) EclecticIQ Fusion Center Intelligence Essentials places threat intelligence within reach of organizations that cannot afford or recruit dedicated threat analysts.

FireEye releases open source managed password cracking tool (Help Net Security) FireEye has released GoCrack, an open source tool for managing password cracking tasks across multiple machines. Learn more about it.

Quttera Enhances Its Anti-Malware Platform With More Security Features to Provide Efficient and Cost-Effective Malware Solutions for Websites (Business Insider) Quttera is happy to announce the upgrade of ThreatSign - Website Anti-Malware platform. This update includes enhanced server-side (FTP/ sFTP) malware monitoring, DNS/IP monitoring, server uptime monitoring as well as improvements to the existing website security features.

Parks Associates: Nest, Ring, and Samsung Announce Major Security Innovations in DIY Segment (PRNewswire) New research by Parks Associates notes that new and more economical DIY...

Fortinet expands Security Fabric to IIoT (ITP) Recent IoT-based attacks have revealed risk posed by unsecured IoT devices.

The ProtectWise Grid™ Now Available On AWS Marketplace (Business Insider) ProtectWiseTM, the enterprise security company that delivers pervasive visibility, automated threat detection and forensic exploration, today announced The ProtectWise GridTM is now available on Amazon Web Services (AWS) Marketplace.

IBM unveils new security tool to help stop bank fraud (ARN) ​Financial institutions will soon have the ability to identify and stop cybercriminals from opening fraudulent bank accounts, thanks to IBM.

Malwarebytes discontinues Junkware Removal Tool (gHacks Technology News) Malwarebytes announced on October 26, 2017 that it will discontinue supporting the company's Junkware Removal Tool in the first quarter of 2018.

Force7 Offers CyberSec First Responder (CFR-210), Newly Approved as DoD-8570 Compliant (Digital Journal) Force7, Inc. is pleased to announce that the CyberSec First Responder (CFR-210) training and certification program is now added to their public training schedule.

Technologies, Techniques, and Standards

Google: Chrome is backing away from public key pinning, and here's why (ZDNet) Google wrote the HTTP public key pinning standard but now considers the web security measure harmful.

NCSC To Revamp Cyber Risk Management Guidance (Silicon UK) The National Cyber Security Centre said it will aim to present a 'toolbox' of approaches for different types of organisations and situations

How Do We Know We're Secure? (CIO Review) “How do we know we’re secure?”

The uphill battle for network defense (GCN) Protected virtual environments combined with greater transparency and better threat intelligence sharing offer agencies the potential to mitigate cybersecurity threats.

Design and Innovation

Niagara University Professor Offers Outlook on Coexistence of Humans & Robots (Niagara University) A recent Oxford University Press collection that examines the ethics of artificial intelligence includes a chapter by Dr. Steve Petersen, associate professor of philosophy at Niagara University, on how a "superintelligence" -- an AI much smarter than humans -- would (or could) learn to be ethical.

Huawei's mobile AI technology is key to its GDPR preparations (The Drum) With one in seven companies still unprepared for GDPR, Huawei is in the enviable position of having a “three pillar” plan to safeguard itself ahead of the May deadline.

Academia

Deloitte, EDUCAUSE Joint Report: Impact of New Federal Data Protection Requirements on Higher Education Institutions (PRNewswire) Institutions of higher education are facing a series of upcoming federal...

A&M-San Antonio celebrates its cybersecurity bona fides (San Antonio Express-News) For the second time in Texas A&M University-San Antonio's relatively short life, it has been recognized for the rigor of its cybersecurity certification program. But it's hardly the only local academic center for the growing field.

Deloitte sponsorship helps progress of Bletchley cyber school (ComputerWeekly) Sponsorship will provide hundreds of places on online Qufaro CyberEPQ course.

California Legislators Make Cybersecurity Education a Top Priority (Sys-Con Media) Educators, government and business come together to meet workforce demand and create opportunities for students across the state

IBM Scholarship Boosts Female Attendance at Hacker Halted Conference (Security Intelligence) IBM sponsored 460 women to attend this year's Hacker Halted conference in an effort to promote inclusion and diversity in the cybersecurity industry.

Legislation, Policy, and Regulation

Containing Our Intelligence War with Russia (The National Interest) We should be wary of conflating Moscow’s desire to change our international behavior with an intent to destroy our nation.

[Opinion] Lessons for EU to protect against next cyber attack (EU Observer) As 'Bad Rabbit' ransomware attack ravages through Ukraine, Turkey and Germany, three steps can help governments protect against future cyber-attack threats.

Saudi Arabia sets up new authority for cyber security (Reuters) Saudi Arabia has set up a new authority for cyber security and named its minister of state Musaed al-Aiban its chairman, strengthening security in the world’s largest oil exporter, a royal decree said.

Brits demanding urgent government intervention to improve IoT device security1 (TEISS) The amount of money that manufacturers in the UK invest on IoT device security is the second lowest globally, thereby increasing the chances of such devices getting breached by malicious actors.

NHS England releases new data security requirements for ALL healthcare organisations (TEISS) Not long after the National Audit Office pulled up the NHS for failing to respond effectively to the WannaCry ransomware attack in May, NHS England has announced its new 2017/18 Data Security and Protection Requirements.

Senators to introduce bill to boost cyber defenses of voting systems (Reuters) A bipartisan pair of U.S. senators plans to introduce legislation on Tuesday seeking to boost the cyber defenses of state election systems, after warnings from senior U.S. officials that future elections may be vulnerable to foreign interference.

Elections chairman: State must ready for more Russian attempts to hack election systems (Madison.com) How the state should respond will be the topic of a special elections commission meeting next month.

Litigation, Investigation, and Law Enforcement

Russia paid Facebook in roubles for US election ads (Times) Facebook was rebuked on Capitol Hill last night for failing to identify a Kremlin-funded advertising campaign aimed at disrupting last year’s US election, despite the adverts being paid for in...

It’s Time for the State Department to Stop Throwing Money at Facebook (Foreign Policy) We need to demand accountability from social media companies — and from U.S. diplomats.

Who’s who in the George Papadopoulos court documents (Washington Post) The Post has identified several of the unnamed individuals who were in contact with the Trump campaign adviser.

As Smoke Clears from Mueller Indictments, Two New Characters Rise In Russia Spy Scandal (Defense One) By Monday’s close, Trump-Russia watchers had two names to add to their ‘persons of interest’ list.

Clovis said to be 'cooperative witness' in Senate Russia probe (POLITICO) Clovis awaits confirmation for a top scientific job at the Agriculture Department.

Trump’s nominee to head the Justice Department’s National Security Division pledges to cooperate on Russia probe (Washington Post) John Demers, a former Bush administration appointee, said he would be “loath” to jail reporters in leak investigations.

Facing a Russian Cyber Attack, Obama Officials Struggled To Respond (FRONTLINE) In interviews with FRONTLINE for the documentary "Putin's Revenge," former CIA director John Brennan and other top intelligence officials described a delicate balancing act about how to respond to the Russian threat amid a hyperpartisan political environment.

The Equation Group malware mystery: Kaspersky offers an explanation (Tech Target) The ongoing drama between Kaspersky Lab and the U.S. government received some much-needed sunlight last week as the antivirus vendor finally uttered two very important words: Equation Group.

Equifax is facing a towering pile of class action law suits (Naked Security) More than 70 different class action suits are in the works

Finjan, Blue Coat Back Before Jury After $39.5M IP Verdict (Law360) Symantec unit Blue Coat Systems continued infringing Finjan Inc.'s online security patents even after Finjan won a $39.5 million verdict in 2015, Finjan’s attorney said at the start of a California federal trial Tuesday, while Blue Coat’s attorney said Finjan is holding it responsible twice for the same conduct.

Officials: Active investigation into cyber attack on Oklahoma Corporation Commission network (NewsChannel4) Officials with the Oklahoma Corporation Commission say they expect to have their website fully restored on Tuesday after being targeted by a cyber attack.

Troll gets 5 years for framing brother-in-law as terrorist and paedophile (Naked Security) The 26-year-old man set up fake Twitter, Facebook and YouTube accounts to publish praise for terror attacks and Islamic State

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber Southwest (Tucson, Arizona, USA, November 9, 2017) CSW will focus on creating a positive, unique, and highly productive unification point to further Arizona's developing leadership in cybersecurity. Cyber Southwest is an annual event, and a platform for...

cyberSecure (New York, New York, USA, December 4 - 5, 2017) cyberSecure is a unique cross-industry conference that moves beyond the technology of cyber risk management, data security and privacy. Unlike other cybersecurity events, cyberSecure brings together corporate...

CyberUSA (San Antonio, Texas, USA, January 29 - 30, 2018) The CyberUSA Conference will be held in San Antonio, TX at the Henry B. Gonzalez Convention Center on Tuesday, January 30, 2018. A welcome reception will be held on the evening of Monday, January 29, 2018.

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Upcoming Events

Third International Conference on Information Security and Digital Forensics (ISDF 2017) (Thessaloniki, Greece, December 8 - 10, 2017) A 3 day event, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Cyber Security Indonesia 2017: Shaping National Capacity for Cyber Security (Jakarta, Indonesia, December 6 - 7, 2017) Cyber Security Indonesia 2017 exhibition and conference, brought to you by the organisers of the Indonesia Infrastructure Week, will bring cyber security solutions providers together with key government...

National Insider Threat Special Interest Group Meeting (Virginia Chapter) (Herndon, Virginia, USA, December 5, 2017) The National Insider Threat Special Interest Group (NITSIG) is excited to announce it has established a Virginia Chapter. NITSIG Members and others may attend meetings at no charge. Attendees will receive...

Cyber Security Summit Los Angeles (Los Angeles, California, USA, November 30, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: Los Angeles. Receive...

Cyber Security, Oil, Gas & Power 2017 (London, England, UK, November 29 - 30, 2017) ACI’s Cyber Security - Oil, Gas, Power Conference will bring together key stakeholders from energy majors and technology industries, to discuss the challenges and opportunities found in the current systems.

INsecurity (National Harbor, Maryland, USA, November 29 - 30, 2017) INsecurity is for the defenders of enterprise security—those defending corporate networks—and offers real-world case studies, peer sharing and practical, actionable content for IT professionals grappling...

INsecurity (National Harbor, Maryland, USA, November 29 - 30, 2017) Organized by Dark Reading, the web’s most trusted online community for the exchange of information about cybersecurity issues. INsecurity focuses on the everyday practices of the IT security department,...

AutoMobility LA (Los Angeles, California, USA, November 27 - 30, 2017) The Los Angeles Auto Show Press & Trade Days and Connected Car Expo have MERGED to form AutoMobility LA, the new auto industry’s first true trade show. Register to join us in Los Angeles this November.

Global Conference on Cyberspace (GCCS) (New Dehli, India, November 23 - 24, 2017) The Global Conference on Cyberspace (GCCS) aims to deliberate on the issues related to promotion of cooperation in cyberspace, norms for responsible behaviors in cyberspace and to enhance cyber capacity...

Aviation Cyber Security (London, England, UK, November 21 - 22, 2017) Join us on November 21/22 in London, England for the Cyber Senate Aviation Cyber Security Summit. We will address key issues such as the importance of information sharing and collaboration, supply chain...

Cyber Security Opportunities in Mexico Webinar (Washington, DC, USA, November 15, 2017) Learn about the cyber security opportunities in Mexico. Mexico is ranked 28th out of 164 countries in the ITU's 2017 Global Cyber Security Index. Companies spend approximately 3.5% of their IT budgets...

Federal IT Security Conference (Columbia, Maryland, USA, November 14, 2017) The Federal IT Security Institute (FITSI) in partnership with Phoenix TS in Columbia, MD is hosting the second annual Federal IT Security Conference. Speakers from NIST, DHS, the Defense Department as...

Sector (Toronto, Ontario, Canada, November 13 - 15, 2017) Illuminating the Black Art of Security. Now entering its 11th year, SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving...

Countermeasure (Ottawa, Ontario, Canada, November 9 - 10, 2017) Now into its sixth year in Ottawa, and consistently advancing in both size and content quality, COUNTERMEASURE continues to be the national capital's premier IT security event. As in years past, attendees...

2017 ICIT Gala & Benefit (Washington, DC, USA, November 9, 2017) The Annual ICIT Gala and Benefit is the year’s most prestigious and intimate gathering of legislative, agency and private sector leaders committed to protecting our Nation’s critical infrastructures. This...

4th Annual Journal of Law & Cyber Warfare Conference (New York, New York, USA, November 9, 2017) Join thought leaders across the industry for a day of collaboration and education with an outstanding group of cyber security experts. In this one-day program, we continue JLCW's 5+ year reputation for...

Fourth Annual JLCW Conference (New York, New York, USA, November 9, 2017) The 2017 Journal of Law and Cyber Warfare symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from...

SINET Showcase 2017 (Washington, DC, USA, November 8 - 9, 2017) SINET – Washington DC provides a platform to identify and highlight “best-of-class” security companies that are addressing the most pressing needs and requirements in Cybersecurity. As always, this event...

CyCon US (Washington, DC, USA, November 7 - 8, 2017) The 2017 International Conference on Cyber Conflict U.S. (CyCon U.S.) will take place 7-8 Nov 2017 at the Ronald Reagan Building in Washington D.C. CyCon U.S. facilitates knowledge generation and information...

RSA Conference 2017 Abu Dhabi (Abu Dhabi, UAE, November 7 - 8, 2017) RSA Conference 2017 Abu Dhabi is the leading information security event in the region. This year's Conference will take place 7 to 8 November at the Emirates Palace in Abu Dhabi. Join us for two days of...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.