skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

Last Thursday the JokerStash "hacking syndicate" (also known as "Fin7") began offering more than 5 million payment cards for sale in dark web souks. The cards appear to have been compromised in a breach of retailers Saks and Lord and Taylor, both department store chains owned by the Toronto-based Hudson's Bay Company. The breach was disclosed yesterday, April 1, 2018, in a blog post by Gemini Advisory that was subsequently confirmed by the Hudson's Bay Company. Gemini Advisory believes that compromise dates back to May 2017 and has continued into this month. Most of the card data are thought to have been stolen from customers in New York and New Jersey. 125 thousand records have been released for sale so far; the rest are expected to appear on the black market within the next few months. Hudson's Bay tersely says it's addressed problems in its network security, continues to investigate, and plans to offer affected customers the usual sorts of post-breach assistance, including "free identity protection services, including credit and web monitoring."

The SamSam ransomware attack against Atlanta's municipal systems is proving distinctly difficult to remediate. The city is still struggling to recover, and other cities of comparable size are rightly spooked by the prospect that they might be next. Investigation continues.

City and regional governments in many countries appear to have become attractive targets for criminal hackers. The automatic meter reading system of Haryana power utilities in Panchkula, India, was raided last week, the hackers demanding ransom for data.

Notes.

Today's issue includes events affecting China, Czech Republic, European Union, France, Germany, India, Iran, Malaysia, NATO/OTAN, Philippines, Russia, United Kingdom, United States.

Outmaneuver your most sophisticated cyber enemies—automatically.

Cyber attacks are getting more sophisticated. Cybercrime and data breach costs will reach the billions and even trillions in the next few years. These are things we already know. But what are you doing to help your cybersecurity teams (who are already stretched thin) mitigate the billions of threats? The ScoutShield threat intelligence gateway keeps your overburdened teams from throwing in the towel by blocking threats automatically – making their lives easier and saving you from cyber attacks. Watch our video to learn more.

In today's podcast, we speak with our partners at Accenture Labs, as Malek Ben Salem from Accenture Labs  looks at a long-term approach to implementing cryptography.

Register for the Women in Tech Social on April 5 from 5:00-7:30pm in Howard County, MD. (Woodstock, Maryland, USA, April 5, 2018) Women working in or pursuing a technology/cybersecurity career in Maryland: join us for delicious food and drink as you connect with other fabulous women in tech. This friendly and casual gathering promises to be fun for one and all!

CYBERTACOS San Francisco (San Francisco, California, United States, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or CyberSecJobs.com for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or CyberSecJobs.com for details.

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, United States, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

Leaked emails expose Russian dirty tricks (Times) Russian attempts to fuel dissent and spread disinformation have been exposed by a cache of leaked documents that show what the Kremlin is prepared to pay for hacking, propaganda and rent-a-mob...

Saks, Lord & Taylor hit by payment card data breach (Reuters) Retailer Hudson's Bay Co on Sunday disclosed that it was the victim of a security breach that compromised data on payment cards used at Saks and Lord & Taylor stores in North America.

Saks, Lord & Taylor Hit With Data Breach (Wall Street Journal) The Saks Fifth Avenue and Lord & Taylor department-store chains have suffered a security breach that has compromised shoppers’ personal and financial information.

Fin7 Syndicate Hacks Saks Fifth Avenue and Lord & Taylor Stores (Gemini Advisory) Key Judgements On March 28, 2018, a JokerStash hacking syndicate announced the release for sale of over five million stolen credit and debit cards In cooperation with several financial organization…

The Under Armour Hack Was Even Worse Than It Had To Be (WIRED) If Under Armour had protected all passwords equally, its 150-million-user MyFitnessPal breach wouldn’t have been nearly as bad.

What happens when 150 million users are part of a hack (Fifth Domain) Here's why government agencies should care when a company, such as Under Armour, announce a data breach affecting 150 million users.

Philippine banks on alert after cyber attack at Malaysia central bank (NST Online) The Philippine central bank has sounded an alert to local financial institutions following a cyber attack at the Malaysian central bank, in which hackers sought to steal money using fraudulent wire transfers, its governor said on Saturday.

GoScanSSH Malware Avoids US Military, South Korea Targets (Infosecurity Magazine) A new strain of malware that targets vulnerable Linux-based systems is loose in the wild.

‘Highly critical’ CMS bug has left over 1 million sites open to attack (TechCrunch) The team behind the popular open-source CMS Drupal is urging admins to update their sites to ward off a nasty bug that could leave their sites “highly compromised” to attackers, according to the organization. The effected versions (Drupal 6, 7 and 8) of the CMS power over one million we…

The other problem that WannaCry exposes (Fifth Domain) The WannaCry intrusion at Boeing shows serious security gaps remain as modern airplanes rely more on code.

Could enemies target undersea cables that link the world? (Fifth Domain) Russian ships are skulking around underwater communications cables, causing the U.S. and its allies to worry the Kremlin might be taking information warfare to new depths.

Too many IoT smartphone apps making life easy for online criminals (Bitdefender BOX Blog) Warnings have been raised again about the security of the smartphone apps used to control IoT devices, with many found to be lacking elementary security and privacy measures. Researchers at Pradeo Lab looked at a representative sample of 100 mobile applications used to control a variety of IoT devices, including thermostats, electric blinds, and baby …

College Kids Turn to Crypto-Mining, Riddling Higher-Ed Networks (Infosecurity Magazine) Students are more likely to perform crypto-mining personally as they don’t pay for power, the primary cost of crypto-mining.

Expert: Israeli airport passport machines vulnerable (Globes) Ben Gurion airport's biometric passport machines use the outdated Windows XP operating system, which Microsoft stopped supporting four years ago.

Hackers take over power billing records of Indian state; demand ransom (HackRead) A group of unknown hackers targeted The AMR system (automatic meter reading system) and hold it for ransom last week.

The City of Atlanta Is Still Locked Out of Files Over a Week After SamSam Ransomware Attack (Gizmodo) City officials in Atlanta, Georgia are still trying to recover 10 days after a ransomware attack on municipal computer systems hit at least five out of 13 departments, knocking out some city services and forcing others to revert to paper records.

Atlanta Still Reeling From SamSam Group Cyber Attack (The Inquisitr) Atlanta slowly recovers from a crippling cyber attack. The SamSam group launched a major cyber attack against the government of the city of Atlanta. Nine days later, the city of Atlanta’s local ...

City of Atlanta Struggles to Recover from Cyber Attack (Insurance Journal) Atlanta’s top officials holed up in their offices on Saturday as they worked to restore critical systems knocked out by a nine-day-old cyber attack that plunged the Southeastern U.S. metropolis into technological chaos and forced some city workers to revert to paper.

Atlanta fell victim to a cyberattack. Could Kansas City be next? (Kansas City Star) The cyberattack on Atlanta underscores that cities must take steps to ensure that their IT departments are prepared to fight against malicious software.

Virginia Tech expert says ransomware attack on Atlanta is just the beginning (Augusta Free Press) As the city of Atlanta’s online data is still being held hostage by ransomware hackers, expert David Raymond explains how attacks like this could be merely the tip of the iceberg unless cities proactively seek network security.

Local and federal leaders say Atlanta's cyber attack shows all cities are vulnerable (WSET) Eight days later and Atlanta's Chief Operating Officer Richard Cox says things still aren't back to normal after the city was hacked.We were advised of several agencies, even here in Georgia, that have been impacted. There are really

Does Ransomware-as-a-Service Enable More Cyber-Criminals? (Infosecurity Magazine) Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.

Coinhive Exposé Prompts Cancer Research Fundraiser (KrebsOnSecurity) A story published here this week revealed the real-life identity behind the original creator of Coinhive — a controversial cryptocurrency mining service that several security firms have recently labeled the most ubiquitous malware threat on the Internet today.

How I Fell for an Academic Vanity Honeypot Hacking Scheme (WIRED) How a hacker weaponized flattery and took over our writer’s Twitter account.

Security Patches, Mitigations, and Software Updates

Apple puts privacy information screens in users' line of sight (Help Net Security) Apple has released the latest round of updates for its various products. They come with the usual security fixes, but also a new feature aimed at informing users about what information Apple-made apps collect about them and how that information is used.

Flawed Meltdown patch by Microsoft makes Windows more vulnerable (HackRead) Microsoft’s January patch to fix Meltdown flaw has made Windows computers even more vulnerable to cyber attacks.

Cyber Trends

What Changes Q1 Brought to Cybersecurity (Infosecurity Magazine) Mari Galloway from the Women's Society of Cyberjutsu looked at what major headlines changed cybersecurity in Q1.

Nation-state hackers are attacking our trust in critical systems (Help Net Security) The lines between cyber criminals and nation-states have become increasingly blurry and it has become obvious that the private sector is not capable of handling cyber threats on its own, Chris Inglis, former deputy director of the National Security Agency, told the crowd at World Cyber Security Congress this week.

Computer science faces an ethics crisis. The Cambridge Analytica scandal proves it (Boston Globe) Dynamite and the nuclear bomb led to soul-searching among chemists and physicists. Computer scientists have not yet witnessed negative consequences of their work — and behave accordingly.

Marketplace

Facebook Has Been Preparing for #DeleteFacebook for More Than a Decade (Motherboard) To many, the social network is irreplaceable because there's nothing to replace it with.

Facebook Executive In 2016: “Maybe Someone Dies In A Terrorist Attack Coordinated On Our Tools” (BuzzFeed) Facebook Vice President Andrew “Boz” Bosworth said that “questionable contact importing practices,” “subtle language that helps people stay searchable,” and other growth techniques are justified by the company’s connecting of people.

Social media firms want us addicted to approval. So much for WiFi making us smarter. (USA TODAY) Facebook and social media are exploiting our evolutionary need for approval. That's one reason the Internet and WiFi aren't making us smarter.

Facebook's Ideological Imperialism (The Atlantic) Andrew Bosworth’s memo may seem insidious, but its logic used to be very popular.

MailChimp Bans ICO & Blockchain Marketing- Fundraisers Devastated (HackRead) Well-known email distribution platform MailChimp announced a change in its policy and banned ICO and Blockchain Marketing.

Bitcoin Will only Cease to Exist if Blockchain Technology Fails (BTCMANAGER) The concept of Distributed Ledger Technology (DLT), or a cryptographically secured chain of ‘blocks,’ has been known since the late 90s when Stuart Haber and W. Scott Stornetta first described explained the technology in their work. The two expert cryptographers took their blockchain experiment a step further ...

Digitale Gefahrenabwehr: Microsoft investiert eine Milliarde Dollar im Kampf gegen Cyberkriminalität (Wirtschafts Woche) Microsoft nimmt die Cybermafia ins Visier. Dabei geht es um nicht weniger als das Überleben des Unternehmens. Ein Besuch im Hochsicherheitstrakt.

Products, Services, and Solutions

U.S. Department of Defense Kicks Off Fifth Bug Bounty Challenge With HackerOne (BusinessWire) HackerOne, the leading hacker-powered security platform, today announced the fifth U.S. Department of Defense bug bounty program. The program opened r

Lloyd’s Register to expand its tech-based services (Financial Times) The 258-year-old register of shipping will focus on areas such as big data, cyber security and robotics

Cloudflare’s new ‘privacy-focused’ DNS service speeds up your web browsing (TechCrunch) Cloudflare decided to use April Fool’s Day (4/1) to share some news about four 1’s that could help speed your internet browsing. The company announced today that it’s launching a DNS service for consumers called 1.1.1.1 The company’s tool — which is not some super nerd…

New Encryption Service Adds Privacy Protection for Browsing (WIRED) Internet infrastructure company Cloudflare appears to be preparing to launch a service to encrypt traffic to the computers that resolve web addresses.

Technologies, Techniques, and Standards

What's Needed to Secure the Industrial IoT (EE Times) Industrial security and cybersecurity — not just security for the more consumer-focused Internet of Things — is a growing problem with not many comprehensive, concrete solutions.

How a new Army team plans to modernize the network (C4ISRNET) The Army's network cross functional team is looking to speed up the fielding of new equipment while evolving the development of longer term solutions.

Treat Security Data With the Same Purpose as Financial Data (Infosecurity Magazine) There’s a comparable amount of security data as there is financial data flowing through a financial organization.

10 Best Websites To Learn Ethical Hacking (Technotification) A list of top10 best websites for ethical hackers to learn and Practice

Maslow’s Pyramid Applied to Cyber Security | Networks Asia (Networks Asia) Implementing a robust cyber defense ecosystem may sound daunting and tedious but having the right board level support definitely helps. 

Design and Innovation

This small robot lures hackers away from other robots (ZDNet) Created by researchers at Georgia Tech, HoneyBot was inspired by IT security

Protecting Data Requires Investing in Imagination (SIGNAL) The hardest punch is the one you don’t see coming.

We Asked Game Designers If the CIA's El Chapo Board Game Is Any Good (Motherboard) The newly declassified training board game "clearly was done by people who love games."

Research and Development

DARPA wants new ideas for autonomous drone swarms (TechCrunch) The Defense Department's research wing is serious about putting drones into action, not just one by one but in coordinated swarms. The Offensive Swarm-Enabled Tactics program is kicking off its second "sprint," a period of solicitation and rapid prototyping of systems based around a central theme. …

How Cambridge Analytica’s Facebook targeting model really worked (Ars Technica) The researcher who built the model claims it wasn't very accurate on an individual level.

The Tricky Business of Measuring Consciousness (WIRED) An audacious theory of sentience offers a new way to understand who—and what—is conscious.

Legislation, Policy, and Regulation

NATO Strengthens Its Cyber Stance (SIGNAL) Committed to a collective defense, the alliance and its members face myriad digital threats.

The Cyber Ties That Bind (SIGNAL) NATO and the EU reinforce their cybersecurity partnership.

John Bolton, cyber warrior (POLITICO) Trump’s incoming adviser has said the U.S. should launch a “retaliatory cyber campaign against Russia” and “use WikiLeaks for target practice.”

Incoming NSA chief has a reputation for winning ‘all the important fights.’ Russia will be his biggest test yet. (Washington Post) Lt. Gen. Paul Nakasone, who is widely expected to be confirmed this month, will also take the helm of U.S. Cyber Command.

Triggering the New Forever War, in Cyberspace (The Cipher Brief) The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the future of the internet. The just-released U.S. Cyber Command “vision” accurately diagnoses the current state of cyber conflict and outlines an appropriate new operational model for the command: since cyber …

Opinion | America is hanging up on China’s telecom industry (Washington Post) The U.S. government is waking up to potential economic and security threats from Chinese companies.

China hammers U.S. goods with tariffs as 'sparks' of trade war fly (Reuters) China has increased tariffs by up to 25 percent on 128 U.S. products, from frozen pork and wine to certain fruits and nuts, escalating a dispute between the world's biggest economies in response to U.S. duties on imports of aluminum and steel.

Breaking down China’s electronic warfare tactics (C4ISRNET) Russia has garnered attention with its advanced electronic warfare capability, and China has upped its game in this space as well.

Tech Must Open Up About Algorithms as AI Takes Hold, France’s Macron Says (Bloomberg.com) Internet companies need to be more transparent about the technology that runs their networks, especially with the emergence of systems fueled by artificial intelligence, French President Emmanuel Macron said.

Cybersecurity Faces Challenges in Congress (SIGNAL) Lawmakers push for fellow legislators to step up digital protections.

Facebook—even as it apologizes for scandal—funds campaign to block a California data-privacy measure (CALmatters) How companies collect and share consumers' personal information is likely to grow into an expensive fight as election season unfolds in California.

US wants 5 years' worth of social media history from visa applications (CSO Online) Extreme vetting may get even more extreme under a new proposal that asks U.S. visa applicants for their social media accounts, email addresses, and phone numbers.

Litigation, Investigation, and Law Enforcement

Russia demands a visit to spy’s daughter Yulia Skripal in hospital (Times) Russia has demanded the right to see the daughter of its former spy after the British authorities confirmed that the condition of Yulia Skripal in hospital had rapidly improved. The Russians...

Clinton campaign app may have harvested Facebook data of millions (Fox News) Hillary Clinton’s 2016 presidential campaign may have harvested the Facebook data of millions of people using an app that asked them to pair their Facebook friends list with their smartphone's contacts list -- in a bid to reach those people and persuade them to vote for Clinton.

Hard Questions: What is Facebook Doing to Protect Election Security? | Facebook Newsroom (Facebook Newsroom) We want to provide regular updates on what we’re doing and the progress we’re making.

Exposed: Jeremy Corbyn’s hate factory (Times) Jeremy Corbyn faces a damaging new anti-semitism scandal as a bombshell dossier reveals the full extent of anti-Jewish, violent and abusive comments on Facebook groups mobilising his most fervent...

Facebook ‘puts profits before clampdown on anti-semitism’ (Times) Facebook was accused last night of avoiding responsibility for anti-semitic material appearing on its platforms in favour of the pursuit of profit. A senior Metropolitan police source who works...

Zuckerberg fires back at Tim Cook, opens up about fake news (TechCrunch) Zuckerberg has been on a bit of a publicity tour following the Cambridge Analytica scandal and a generally tough year for the social media behemoth. This morning, an interview with Zuck was published on Vox. In it, the Facebook CEO waded through some of the company’s most pressing issues, inc…

Accused NSA leaker wants to subpoena states, cybersecurity firms and federal agencies (POLITICO) But the justification for the subpoenas remains under seal.

Iran's need to steal intellectual property (CSO Online) The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property.

Prague Extradites Russian Hacker to US for Alleged Cyberattacks (SecurityWeek) The Czech Republic said it had extradited Russian hacker Yevgeni Nikulin to the United States where he is wanted for alleged cyberattacks on social networks.

Web giants ‘drive violence’ (Times) Social media sites are driving children to commit violence and murders “within minutes”, Britain’s most senior police officer has warned. Cressida Dick, the Metropolitan Police commissioner, said...

The FBI Used Classified Hacking Tools in Ordinary Criminal Investigations (Motherboard) The FBI’s Remote Operations Unit has hacking tools typically reserved for protecting national security. But an overlooked section of a new report says ROU has used these secret techniques in criminal cases.

Privacy fears over police spy tools that can break into mobile phones (Times) Police forces across Britain are using espionage technology to download the entire contents of mobile phones belonging to suspects, witnesses and victims. At least 26 forces use the laptop-size...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.