skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

Energy Transfer Partners, a major US natural gas pipeline operator, announced Monday that its operations were being affected by a cyberattack against its electronic data interchange. The interchange, which expedites shipping and billing to customers by machine-to-machine document transfers, is a third-party system provided by Energy Services Group LLC. There's been no attribution; investigation and remediation are continuing. It's worth noting that the attack affects IT systems and not (insofar as is known) OT systems. Energy Transfer Partners says operations will continue during remediation.

The attack, which appears to be the work of criminals and not state espionage services, has reminded many of recent US Government warnings that Russian cyber operators are conducting apparent battlespace preparation of US infrastructure. Russian Foreign Minister Lavrov for his part thinks US-Russian relations are worse than they were during the Cold War.

Flashpoint reports that e-commerce sites running on the popular open-source Magento platform are undergoing brute-force attacks designed to scrape credentials and then install cryptocurrency-mining malware. Flashpoint says its researchers know of at least 1,000 Magento admin panels the attackers have compromised, and they say dark web operators have shown a strong interest in Magento since 2016.

Trustlook researchers have identified a new Android Trojan designed to take data from Skype, Facebook Messenger, and other instant messaging services. 

Zscaler warns that njRAT has been updated with ransomware and cryptocurrency-stealing capabilities.

Panera Bread is receiving poor reviews for the security of its online ordering system in the wake of the data breach disclosed yesterday.


Today's issue includes events affecting Australia, Azerbaijan, China, France, Germany, Bailiwick of Jersey, Democratic Peoples Republic of Korea, Russia, Thailand, United Kingdom, United States.

Outmaneuver your most sophisticated cyber enemies—automatically.

Cyber attacks are getting more sophisticated. Cybercrime and data breach costs will reach the billions and even trillions in the next few years. These are things we already know. But what are you doing to help your cybersecurity teams (who are already stretched thin) mitigate the billions of threats? The ScoutShield threat intelligence gateway keeps your overburdened teams from throwing in the towel by blocking threats automatically – making their lives easier and saving you from cyber attacks. Watch our video to learn more.

In today's podcast we speak with our partner is Jonathan Katz from the University of Maryland on isogeny-based cryptography. Our guest is Mike McKee from ObserveIT; he discusses data exfiltration.

Register for the Women in Tech Social on April 5 from 5:00-7:30pm in Howard County, MD. (Woodstock, Maryland, USA, April 5, 2018) Women working in or pursuing a technology/cybersecurity career in Maryland: join us for delicious food and drink as you connect with other fabulous women in tech. This friendly and casual gathering promises to be fun for one and all!

CYBERTACOS San Francisco (San Francisco, California, United States, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or for details.

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, United States, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

Cyber attack shuts pipeline data system, Energy Transfer says (World Oil) A system that digitally processes customer transactions for a major pipeline network in the U.S. was shut down Monday after a cyber attack.

Cyber attack cripples system that manages Dallas company's national pipeline network (Dallas News) A system that digitally processes customer transactions for a major pipeline network in the U.S. was shut down Monday after a cyber attack.The...

SECURITY: Cyberattack hits major pipeline service provider (E&E News) Dallas-based pipeline giant Energy Transfer Partners LP had to play cyber defense yesterday after hackers brought down the networks of an outside service provider, sources say.

Compromised Magento Sites Delivering Malware (Flashpoint) Ecommerce websites running on the popular open-source Magento platform are being targeted by attackers who are using brute-force password attacks to access administration panels to scrape credit card numbers and install malware that mines cryptocurrency.

Android Trojan Steals Data From Facebook Messenger, Skype, Other IM Clients (BleepingComputer) Security researchers have found a new Android malware strain that has been designed to steal data from mobile instant messaging clients.

A Trojan with Hidden Malicious Code Steals User’s Messenger App Information (Trustlook) Trustlook Labs has discovered a Trojan which obfuscates its configuration file and part of its modules. The purpose of the content/file obfuscation is to avoid detection. The malware has the follow…

njRAT Gets Ransomware, Crypto-Currency Stealing Capabilities (SecurityWeek) An updated version of the njRAT remote access Trojan (RAT) is capable of encrypting files and stealing virtual currencies from crypto-wallets, Zscaler warns.

Panera Bread's website leaks customer records: KrebsOnSecurity (Reuters) Bakery-cafe chain Panera Bread's website leaked customer records for at least eight months, cyber security blog KrebsOnSecurity reported on Monday.

Panera Bread’s half-baked security (HOTforSecurity) We've heard it all before. XYZ Company "takes your data security very seriously." Most commonly you'll hear these words just after a company has suffered an embarrassing data breach, perhaps having carelessly exposed the personal information of innocent...

No, Panera Bread Doesn’t Take Security Seriously (Medium) tl;dr: In August 2017, I reported a vulnerability to Panera Bread that allowed the full name, home address, email address, food/dietary…

Java Deserialization Attack Against Windows (SANS Internet Storm Center) Recently we talked a lot about attacks exploiting Java deserialization vulnerabilties in systems like Apache SOLR and WebLogic. Most of these attacks targeted Linux/Unix systems. But recently, I am seeing more attacks that target windows.

Could Atlanta-style ransomware attack happen to Austin? (KXAN) After hackers took control of much of the city of Atlanta's computer network more than a week and a half ago, a cybersecurity researcher says there's "a reason to worry" about the attacks targeting other major cities, including Austin.

Former NSA exec Phil Quade tips increase in state-led cyber attacks (Financial Review) Western nations should brace for more cyber security attacks from "second tier" nation states, according to former NSA executive Phil Quade.

ISIS has 'raised the bar' in technology it uses against UK, GCHQ say (Mail Online) Two analysts working for the top secret spy headquarters (pictured) say that the terror group has become a 'very advanced adversary' in its war against the West.

Poor coding and GUI caused America's largest-ever telephone outage (Computing) Poorly coded critical system helped Level 3 to accidentally blacklist itself

Security Patches, Mitigations, and Software Updates

Google to purge cryptomining extensions from Chrome Web Store (Help Net Security) In a bid to prevent Chrome users' computers being covertly used for cryptocurrency mining, Google will try to purge the Chrome Web Store of extensions that hijack machines' CPU resources to do just that.

Chrome Is Scanning Files on Your Computer, and People Are Freaking Out (Motherboard) Some cybersecurity experts and regular users were surprised to learn about a Chrome tool that scans Windows computers for malware. But there’s no reason to freak out about it.

Cyber Trends

The Dark Side of the GDPR (Infosecurity Magazine) GDPR could have a negative side with fraudsters, activists and phishers all ready to pounce on the regulation’s capabilities.

Are legacy technologies a threat to EU's telecom infrastructure? (Help Net Security) In this context, ENISA has developed a study, which has examined a critical area of electronic communications: the security of interconnections in electronic communications, also known as signalling security.

Insiders pose biggest threat to health information security, report finds (Healthcare Dive) Prime motivations behind security breaches include money and convenience.

Most healthcare pros believe their organizations adequately protect patient data (Help Net Security) Most of the healthcare professionals polled remain confident regarding their own organization’s cyber security protocols despite apprehensions connected with their own healthcare information and general healthcare infrastructure.

You Weren’t Born in 1905? Why People Lie to Facebook (Wall Street Journal) Users build false online identities—with social media, retailers and other data collectors—to throw off advertisers and muddle databases.

Cybersecurity threats are on the rise in Thailand (South China Morning Post) The rise of cryptocurrency rise is adding fuel to fire


NEDs’ best form of defence is defence, warns cyber expert (Jersey Evening Post) NON-EXECUTIVE directors have a host of cyber security issues to take into account, according to an information security expert talking at the Channel Islands NED Forum last week.

How the Pentagon can get serious about cyber (Fifth Domain) To make cybersecurity a priority within the defense community, the Pentagon has its acquisition office.

Qualys Acquires 1Mobility (Markets Insider) Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud-based security and compliance soluti...

Thoma Bravo to exit Bomgar (PE Hub) Francisco Partners said April 3 that it agreed to buy Bomgar. Financial terms weren’t announced. Thoma Bravo is the seller. Bomgar provides secure access solutions.

Critical Start Closes Acquisition of Advanced Threat Analytics (PR Newswire) Critical Start today announced it has completed the acquisition of Advanced...

Monex offers to take over hacked cryptocurrency exchange Coincheck (Nikkei) Japanese online broker seeks majority stake and own management team

Cofense explains the PhishMe rebrand and human empowerment for complete phishing defense (Security Brief) Cofense is now about so much more than ‘awareness’ – it’s about taking better phishing defenses to everyone.

Microsoft granted “protected” clearance for classified Govt data (ARN) ​Microsoft Australia is the latest cloud services provider to be awarded the Federal Government’s “protected” status.

Losses widen at security start-up Darktrace as it embarks on hiring spree (The Telegraph) Darktrace, the British cybersecurity start-up backed by Autonomy founder Mike Lynch, has more than doubled losses amid a hiring spree, despite a leap in revenues.

The Case for A Zuck-Free Facebook (WIRED) WIRED columnist Felix Salmon argues the time has come for Mark Zuckerberg to step aside and give Facebook the fresh start it needs.

Is Apple about to snub Intel? (CRN) Report claims Apple will use its own chips in Mac products as early as 2020

Products, Services, and Solutions

Tor Project Discontinues Tor Messenger After Only 2.5 Years (BleepingComputer) The Tor Project announced today plans to discontinue Tor Messenger, the organization's security-hardened instant messaging application.

RiskSense Partners with WhiteHat Security for App Security Risk Management (BusinessWire) RiskSense-WhiteHat Security partnership automates web application security risk assessment, scoring and management to prioritize remediation.

MITRE Evaluates Tools for APT Detection (Dark Reading) A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.

Google Shuts Down URL Shortening Service & Acquires GIF Search Platform (HackRead) Google's URL shortening service has been shut down while the company has bought the GIF Search Platform called Tenor.

Granite Secure Announces the Launch of a Unique, Comprehensive Suite of Cybersecurity and Cyberprivacy Solutions for Consumers and Small Business (PR Newswire) Granite Secure ( today launched a unique, comprehensive...

Spirent Extends Industry Leadership in Security Assurance by Expanding Performance and Scale Testing to TLS v1.3 Encryption Protocol (Spirent) First-to-Market Capability Allows Functional Security-to-Security Performance Testing at Scale

Here are the companies working to make sure 911 doesn't get hacked again (Baltimore Business Journal) The goal of the statewide 911 infrastructure assessments is to make sure systems are shored up against cyber threats as the state transitions to "Next Generation 911."

Bancor takes on Crypto exchanges with wallet that converts across tokens (TechCrunch) With the number for cryptocurrencies passing 1,000, and the craze continuing, things are getting pretty wild out there to say the least. And these cryopto asssets can vary from the tokens issued by some no-name startup all the way up to Ether and the venerable Bitcoin. The trouble is, converting th…

Secure software development practices for developers, organizations and technology users (Help Net Security) SAFECode announced today the publication of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third Edition).

Microsoft adds AI course to its certification program (ZDNet) Microsoft is adding a new paid AI course to its list of certification-program offerings, and it's open to the public.

Microsoft Australia flicks switch on Protected Azure-for-Gov service (Register) Co-location is the interesting part of otherwise vanilla Azure with-extra-security offering

Azerbaijan's e-security center , Microsoft to cooperate in cyber security ( The e-security center CERT (Computer Emergency Response Team) of the Azerbaijani Ministry of Transport, Communications and High Technologies will take advantage of Microsoft's experience in providing protection against cyber attacks, the ministry said on April 2.

What cryptocurrency wallets are realistically safe from Quantum Attacks? (Global Coin Report) As more people get aware of the possibility of quantum attacks (and more powerful quantum computers start getting built), their prices will probably tend to rise in accordance, so it may be important to take this into account when investing in long-term.

Why IBM is investing big on Stellar (XLM) – Federated Byzantine Agreement simply explained (The independent republic) Stellar (XLM) has been one of the most effervescent topics in the crypto space for a few months now mainly because of IBM related news. News such as IBM providing 9 key validators for Stellar’s net…

Technologies, Techniques, and Standards

What is Mitre's ATT&CK framework? What red teams need to know (CSO Online) The ATT&CK framework allows security researchers and red teams to better understand hacker threats.

Using biometrics to protect crypto currency (Help Net Security) Biometrics play a vital role in all processes and can establish strong customer authentication (SCA) associated with identity credentials.

Supply chain cyberattacks surging -- How can we prevent them? (LinkedIn) Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year...

True Random Entropy Is an IoT Necessity (SIGNAL) Internet of Things devices can be a security nightmare.

Embrace machine learning to beat daily data breaches says Centrify (CSO) Centrify advises Australian businesses to embrace machine learning to strengthen cybersecurity as new NDB law reports more than one data breach a day

Reducing Dwell Time With Automated Incident Response (Security Intelligence) As the threat landscape evolves, it is increasingly important for organizations large and small to invest in automated incident response solutions to reduce dwell time and eliminate alert fatigue.

4 main reasons why SMEs and SMBs fail after a major cyberattack (CSO Online) The challenges SMEs and SMBs face and what to do about them.

Cyber Train to Cyber Fight (SIGNAL) Simulators bridge experience gap to ensure warriors stay on top of latest threats.

3 Security Measures That Can Actually Be Measured (Dark Reading) The massive budgets devoted to cybersecurity need to come with better metrics.

Design and Innovation

South Korean capital Seoul mulls ‘S-Coin’ tokens and blockchain-based government (TechCrunch) South Korea has been at the forefront of the blockchain movement, with some of the highest density of cryptocurrency traders anywhere in the world. Now, as the frenzy around cryptocurrency prices recedes (Bitcoin is around $7350 right now, down from a high of almost $20,000 last December), the coun…

Research and Development

DHS Awards Galois Contract To Enable Sensitive Network Data To Remain Encrypted When Shared And Analyzed (Benzinga) Cryptographic tool will be leveraged by DHS and, over time, government agencies and corporations seeking to enable cyber security solutions and safeguard sensitive data


Cybersecurity Graduate Certificate offered this summer (University of North Georgia) In 2017, nearly 780,000 people in the United States were employed in cybersecurity positions with more than 200,000 positions unfilled. As companies face increased threats, cybersecurity spending worldwide is expected to exceed $101.6 billion by 2020, according to research by the International Data Corporation.

Legislation, Policy, and Regulation

Russia relations could descend into ‘a real war, not a Cold War’ (Times) Moscow has said that relations with the West are now worse than during the Cold War in the aftermath of the Skripal poisoning. Sergei Lavrov, the Russian foreign minister, claimed that unwritten...

When Diplomats and Spies Must Go (Foreign Affairs) Diplomatic expulsions are a standard if extreme way of showing outrage. But tactically speaking, they have mixed results.

Bolton's plan to retaliate against Russia for cyberwarfare makes Putin meeting seem more unlikely (Haaretz) Politico documents Bolton's belief the U.S. should use digital warfare against Russia and entities as well, singling out Wikileaks as a good testing ground

Trump reaches out to German, French leaders on Russia, N Korea (Kaplan Herald) US President on Tuesday reached out to German Chancellor and French President Emmanuel Macron on their coordinated actions against Russia and his forthcoming summit with North Korean leader , the White House said.

Will the Real Trump Russia Policy Please Stand Up? (Foreign Policy) Trump’s surprise White House invitation to Putin could undermine his administration’s tougher stance on Moscow.

Protect our elections from Russian (and other) threats (Los Angeles Times) Congress finally begins to shore up vulnerable voting systems.

The Next NSA Chief Is More Used to Cyberwar Than Spy Games (WIRED) The appointment of Paul Nakasone raises the question again: should the NSA and Cyber Command be controlled by one man?

US blasts 'unfair' Chinese tariffs on 128 products (The Bull) The United States on Monday blasted as

New Bill in Georgia Could Criminalize Security Research (SecurityWeek) A new bill that the Georgia State Senate deems all forms of unauthorized computer access as illegal, thus potentially criminalizing the finding and reporting of vulnerabilities.

Litigation, Investigation, and Law Enforcement

Cambridge Analytica Faces Facebook Privacy Lawsuit in New York (New York Law Journal) The suit filed in federal court is the latest in a nationwide wave of litigation over recent revelations the firm accessed 50 million user's information ahead of the 2016 presidential campaign.

Would Facebook and Cambridge Analytica be in Breach of GDPR? (SecurityWeek) The question is whether Facebook and/or CA would have been in breach of GDPR were it already operational, and therefore whether GDPR will prevent any future repetitions of this sort.

Report: Russian cyber spy wanted by FBI admits intel sharing (Mcclatchydc) A Russian cyber spy wanted by the FBI is reportedly admitting to sharing intel with foreign governments. He’s suspected of being linked to Russian meddling in the 2016 election.

Grindr hit with privacy complaint in Europe over sharing user data (TechCrunch) The Norwegian Consumer Council has filed a privacy complaint about Grindr, arguing it’s in breach of national and European data protection laws after it emerged the dating app has been sharing personal information about its users with third parties. As we reported earlier, Norwegian research …

YouTube prankster sued by In-N-Out Burger (Naked Security) #Funny? #JustAPrank? Nah. How about instead #Lawsuit, #RestrainingOrder, #$25KInDamages?

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (Arlington, Virginia, USA, April 12, 2018) With the support of the Hewlett Foundation, the National Security Institute is excited to host “Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language.” This networking...

Upcoming Events

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.