skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

Four US pipeline operators have reported disruption of electronic data interchange (EDI) systems: Oneok, Energy Transfer Partners, Boardwalk Pipeline Partners, and Chesapeake Utilities' Eastern Shore Natural Gas were all affected. Energy Transfer Partners and Eastern Shore identified the issue as a third-party problem with service provider Latitude Technologies, a unit of Energy Services Group. Latitude Technologies has restored most of the affected services, but it's waiting until investigation is farther along before offering an account of how the hackers got in.

The attackers hit the EDI Latitude provides, not the operators' operational technology (OT). Some speculate the hackers' intention was to pivot from the IT to the OT, but there's no public evidence yet that this occurred.

The US Department of Homeland Security told the Senate that some foreign intelligence services are operating illicit Stingray intercept systems, mostly in Washington, but in other US cities as well.

Facebook has kicked one-hundred-thirty-five Russian troll accounts (associated with St. Petersburg's Internet Research Agency) from its platform.

Panera Bread apparently initially dismissed as a scammer the security researcher who reported their online system's vulnerability to data loss.

Europe's Enhanced Tactical Flow Management System (ETFMS), the continent's basic air traffic management system, failed late last night. The problems were glitches, not hacks, and service was restored early this morning. Several thousand flights were delayed, but backup systems functioned properly and flight safety was not compromised.

A shooter who wounded four before killing herself at YouTube headquarters was apparently upset by the platform's age-restricted policies.

Notes.

Today's issue includes events affecting Australia, Brunei, Cambodia, China, European Union, India, Indonesia, Iran, Ireland, Japan, Republic of Korea, Laos, Malaysia, Myanmar, Philippines, Romania, Russia, Singapore, Sweden, Thailand, United Kingdom, United States, and Vietnam.

Outmaneuver your most sophisticated cyber enemies—automatically.

Cyber attacks are getting more sophisticated. Cybercrime and data breach costs will reach the billions and even trillions in the next few years. These are things we already know. But what are you doing to help your cybersecurity teams (who are already stretched thin) mitigate the billions of threats? The ScoutShield threat intelligence gateway keeps your overburdened teams from throwing in the towel by blocking threats automatically – making their lives easier and saving you from cyber attacks. Watch our video to learn more.

In today's podcast we hear from our partners at Palo Alto Networks as Rick Howard discusses whether security platforms put all your eggs in one basket. Our guest, Aetna CSO  Jim Routh, describes model-driven security and the rise of unconventional controls.

Register for the Women in Tech Social on April 5 from 5:00-7:30pm in Howard County, MD. (Woodstock, Maryland, USA, April 5, 2018) Women working in or pursuing a technology/cybersecurity career in Maryland: join us for delicious food and drink as you connect with other fabulous women in tech. This friendly and casual gathering promises to be fun for one and all!

CYBERTACOS San Francisco (San Francisco, California, United States, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Job Fair, April 19, San Antonio visit ClearedJobs.Net or CyberSecJobs.com for details. (San Antonio, Texas, United States, April 19, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the Cyber Job Fair, April 19 in San Antonio. Meet leading cyber employers including Bank of America, Parsons, Engility, Fulcrum and more. Visit ClearedJobs.Net or CyberSecJobs.com for details.

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, United States, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

Four Gas Pipeline Data Systems Shut Down as Cyberattack Hits (Bloomberg.com) At least four U.S. pipeline companies have seen their electronic systems for communicating with customers shut down over the last few days, with three confirming it resulted from a cyberattack.

U.S. Pipeline Network Disables Transactions System After Digital Attack (Security Boulevard) A major U.S. pipeline network temporarily disabled a system that digitally processes customer transactions following a digital attack. Energy Transfer Partners (ETP), a Fortune 500 oil and natural gas company, disclosed the incident on 2 April in a notice sent to shippers. According to Dallas News, the announcement reveals that digital attackers targeted the electronic …

Hackers gaining access to U.S. energy systems 'to test our response' (Houston Chronicle) Cyberattacks targeting computer control operators at U.S. energy facilities have risen sharply over the past two years, as a sophisticated hacking group attempted to gain a foothold in networks that run the nation's critical infrastructure, a recent cybersecurity analysis shows.

Facebook reveals Russian troll content, shuts down 135 IRA accounts (TechCrunch) Facebook is showing an unprecedented level of transparency around its latest effort to suspend Russian trolls trying to influence elections and mislead the public as it tries to regain the trust of users and the government. The company shared both stats about the account deletions and samples of th…

Feds: There are hostile stingrays in DC, but we don’t know how to find them (Ars Technica) There’s also “anomalous activity”—probably stingrays—in other US cities, too.

Comodo Prevents LinkedIn User Attack (Comodo News and Internet Security Information) Comodo Threat Research Lab Recently detected the phishing LinkedIn User Attack and have come up with methods to prevent them.

New Android Malware Secretly Records Phone Calls and Steals Private Data (The Hacker News) KevDroid — New Creepy Android Malware Discovered in the Wild that Secretly Records Phone Calls, Location and Steals Messages

Cryptocurrency Web Miner Script Injected into AOL Advertising Platform (TrendLabs Security Intelligence Blog) On March 25, we saw that the number of cryptocurrency web miners detected by the Trend Micro Smart Protection Network suddenly spiked. Our team tracked the web miner traffic and found that the bulk of it was linked to MSN.com in Japan. Further analysis revealed that malicious actors had modified the script on an AOL advertising platform displayed on the site to launch a web miner program.

Attacks of virtual currency "miners” have tripled in Romania in the last six months (Business Review) The cyber criminals have passed from ransomware attacks to virtual currency threats. An analysis of cyber security specialists at Bitdefender shows that in the last six months the share of monthly reports of applications that  "mine” the virtual currency have tripled in Romania in the last six

Live Chat Widgets Leak Employee Details From High-Profile Companies (BleepingComputer) At least two live chat widgets used on hundreds of high-profile sites are leaking the personal details of company employees.

Dot-cm Typosquatting Sites Visited 12M Times So Far in 2018 (KrebsOnSecurity) A story published here last week warned readers about a vast network of potentially malicious Web sites ending in “.cm” that mimic some of the world’s most popular Internet destinations (e.g. espn[dot]cm, aol[dot]cm and itunes[dot].cm) in a bid to bombard visitors with fake security alerts that can lock up one’s computer.

Experts Eye Phishing In Saks Fifth Ave Breach (PYMNTS.com) Experts say an employee phishing scam is likely to blame for the data breach affecting millions of Saks Fifth Avenue and Lord & Taylor payment cards. Reports in The New York Times on Sunday (April 1) said experts believe a notorious ring of cybercriminals implanted software into the retailers’ register systems, allowing them to access card […]

One-Third of Internal User Accounts Are 'Ghost Users' (Dark Reading) Attackers and malware can easily move laterally through an organization, thanks to inadequate access controls on file systems and a proliferation of inactive but enabled users.

Why a Minnesota National Guardsman was assigned to monitor social media for scams (Army Times) The Minnesota National Guard has assigned someone to monitor social media amid growing concern about scammers using soldiers’ identities on Facebook and other places.

Panera Bread Slammed After Sitting On Massive Data Leak For Eight Months (Threatpost) Panera is in hot water after sitting on a massive data leak for eight months on its website - and then trying to downplay the number of customers impacted by the leak.

Panera accused security researcher of “scam” when he reported a major flaw (Ars Technica) Panera didn't fix flaw for 8 months; 37 million records were allegedly exposed.

Don't blame Panera Bread's security guy just because he used to work at Equifax (Graham Cluley) Yes, we should be mad at Panera Bread for its lousy response to a serious security issue. But things turn ugly when the masses begin to blame individual named members of the security team.

Flights across Europe return to normal following IT system crash at Eurocontrol (Computing) 15,000 flights affected by computer crash on Tuesday night

Wi-Fi Returns to Atlanta Airport After Cyber Attack (TravelPulse) Travelers heading through Atlanta once again have free Wi-Fi access.

Hackers keep taking down 911 centers. Why is it so hard to stop them? (NBC News) America’s emergency-response networks remain dangerously vulnerable to criminals bent on crippling the country’s critical infrastructure.

Security Patches, Mitigations, and Software Updates

Google’s April Android Security Bulletin Warns of 9 Critical Bugs (Threatpost) Google updates its Android OS to address its own OS and component partners Qualcomm and Broadcom.

Intel decides not to patch Spectre vulnerability for older processors (Digital Trends) Intel revealed that it will not be issuing Spectre patches to a number of older Intel processor families, potentially leaving many customers vulnerable to the security exploit.

Facebook to exclude US users from some privacy enhancements (TechCrunch) There’s no way to sugarcoat this message: Facebook’s founder Mark Zuckerberg believes North America users of his platform deserve a lower data protection standard than people everywhere else in the world. In a phone interview with Reuters yesterday Mark Zuckerberg declined to commit to …

Cyber Trends

EMEA Dwell Time Hits 175 Days (Infosecurity Magazine) EMEA Dwell Time Hits 175 Days. FireEye report reveals worrying trend

2018 Emerging Threats Show New Sophistication in Hackers (Security Boulevard) While it is difficult to know exactly what the bad guys are planning until we see it, security companies are able to determine the types of threats that are emerging.

CISO survey paints a grim picture: Weak staff, breach fears (SearchSecurity) A CISO survey shows 67% of respondents are worried that their company is more likely to suffer a data breach or cyberattack this year.

RSA Conference: CISOs' top 4 cybersecurity priorities (CSO Online) When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters.

Would automation lead to improved cybersecurity? (Help Net Security) By pairing human intelligence with automated tasks and putting human-machine teaming in practice, automated programs handle basic security protocols while practitioners have their time freed up to proactively address unknown threats.

How companies continue to expose sensitive data to threats (Help Net Security) It only takes one leaked sensitive file to cause a headline-making data breach. And we’re seeing hundreds of thousands of exposed sensitive folders in our risk assessments.

Industry leaders struggle to balance digital innovation and security (Help Net Security) Companies are struggling with the tug-of-war between advancing digital innovation and ensuring secure digital experiences that maintain user trust and mitigate risk.

Americans Resigned to ID Theft, But Taking Steps (Infosecurity Magazine) Many Americans are taking steps to change their behavior in order to be more protected.

How safe is your personal information? (Help Net Security) Nearly half of U.S. adults (48 percent) think it is at least somewhat likely identity theft will cause them financial loss in the next year.

Marketplace

Zix Acquires Seattle-Based Erado to Expand Its Unified Archiving, eDiscovery and Compliance Solutions (BusinessWire) Zix Corporation (Zix), (Nasdaq: ZIXI), a leader in email security, has acquired Seattle-based Erado, a provider of archiving, supervision, eDiscovery,

Red Balloon Security Raises $21.9 Million in Series A Investment for Embedded Device Cybersecurity (BusinessWire) Red Balloon Security is the creator of a government-grade technology which can protect any embedded device, from IoT to critical infrastructure.

Huawei and Cloud Security Alliance Sign MOU (The Financial) Huawei has signed an MOU with the Cloud Security Alliance (CSA) to cooperate in cloud security integration, jointly promote industry cloud security standards and build a more open and secure cloud ecosystem.

Huawei says U.S. security claims ‘simply aren’t true’, will hurt rural customers (Venture Beat) Following the FCC’s announcement last week of a plan to block U.S. carriers from using federal funds to purchase Huawei products or services — based on perceived national security risks — the Chinese networking giant today issued a statement broadly denying the security claims. In the statement Huawei said security issues cited by the FCC “simply aren’t true,” and that the block will hurt rural mobile customers.

South Korean carriers face 5G ‘dilemma’ due to Huawei security issues (VentureBeat) Growing international concerns over the security of Huawei 5G networking gear have created a “dilemma” for South Korean mobile carriers, The Korea Times reports today. As the carriers p…

Cyber Attack Doesn\'t Stop DLA Piper From Big Gains in Revenue, Profit (New York Law Journal) DLA Piper grew revenue and profits in 2017 as the firms international arms performed strongly and it rebuilt from the cyber attack that downed its systems last summer.

Hot security startup Duo Security opens office in Downtown Detroit (TechCrunch) Duo Security is opening a new office in Downtown Detroit, expanding from its headquarters in Ann Arbor, Michigan . The company will immediately relocate 30 team members to a shared space in Bamboo Detroit in the Madison Building and by the end of the year, and plans on moving into a 9,000 square fo…

Apple has hired Google’s head of search and artificial intelligence (Ars Technica) He started working at Google in 2010 and announced his departure yesterday.

Products, Services, and Solutions

Infoblox Enhances SaaS based Security to Address the DNS Cybersecurity Blind Spot (PRNewswire) Infoblox ActiveTrust® Cloud Prevents DNS-based Data Exfiltration, stops Malware spread and blocks access to objectionable content

Meta Networks launches secure, cloud-native NaaS platform (ZDNet) Network-as-a-service startup Meta Networks has emerged from stealth mode with a platform that lets companies connect users, applications, cloud services, datacentres, and branches, securing them with a software-defined perimeter.

State of Indiana Relies on Thycotic Secret Server to Unify, Automate and Customize Privileged Access Password Management (PR Newswire) Thycotic, a provider of privileged account management (PAM) solutions for...

Ixia, a Keysight Business, and Eastwind Collaborate to Deliver Breach Analytics of Cloud Network Traffic (BusinessWire) Eastwind Network Sensor for AWS, powered by Ixia’s CloudLens, offers seamless cloud-native data collection for improved visibility and security in the public cloud

TrapX Security And Check Point Collaborate To Enhance Enterprise Security (MENAFN) TrapX Security ®, the global leader in deception-based advanced cybersecurity defense, is collaborating with Check Point Software Technologies Ltd. (NASDAQ: CHKP ) to provide a real-time visibility, threat detection, and rapid threat containment solution for both internal networks and cloud deployments.

Exabeam signs up Exclusive Networks to deliver SIEM solutions (Tahawul Tech) Next-gen SIEM vendor, Exabeam, has chosen Exclusive Networks to accelerate its market impact in the Middle East enterprise sector. The move supports Exabeam’s 100 percent channel model, which is focused on recruiting specialist partners, market-maker VARs and global SIs to exceed ambitious revenue targets.

Grant Thornton and Exabeam team to thwart cyber theft and sabotage (BusinessWire) Grant Thornton LLP has entered an alliance agreement with Exabeam, a company that provides next-generation security intelligence and management soluti

CenturyLink Enlists Adaptive Threat Intelligence to Fight Cybercrime, Monitors 1.3 Billion Security Events Daily (Telecompetitor) CenturyLink cybercrime initiatives rely on cloud-based Adaptive Threat Intelligence, along with Threat Research Labs, which use machine learning and verification techniques to . . .

KnowBe4 Arms IT Pros With No-Cost Mailserver Security Assessment Tool to Stop Social Engineering Attacks (PR Newswire) TAMPA BAY, Fla., April 3, 2018 /PRNewswire/ -- KnowBe4, the world's largest security awareness training and simulated...

Alcide Announces General Availability of Its Cloud-Native Security Platform to Secure Modernized Data Centers & Cloud Ops (PR Newswire) Alcide, today announced the general availability of its Data...

Technologies, Techniques, and Standards

How to Deal With Russian Information Warfare? Ask Sweden's Subhunters (Defense One) Other nations can learn from the Swedes’ long experience with mysterious incidents followed by disinformation campaigns.

Decrypters for Some Versions of Magniber Ransomware Released (BleepingComputer) Security researchers from AhnLab, a South Korea-based cyber-security firm, have created decrypters for some versions of the Magniber ransomware.

4 ways to deliver tactical cyber to the battlefield (Fifth Domain) The pace of network-centric warfighting on the battlefield is increasing and the DoD needs to keep pace by adopting new technologies.

New Vulnerability? Begin Change Management to Patch and Start... (Bricata) The change management process to patch new vulnerabilities can take time, which sets off a race for transgressors that seek to exploit the holes. Modern IDS systems enable security teams to monitor for exploits even as they wait for a patch to be implemented. #idp #ids #malware

20% of US Sites Now Block Traffic from Russia and Your Business Should Too (Small Business Trends) The fifth annual Distil Networks Bad Bot Report has the Russian Federation as the most blocked count

AWS S3 security falls short at high-profile companies (SearchCloudSecurity) AWS S3 security has a people problem. Developers aren't the only ones using Amazon's internet cloud storage; untrained staff is on the 'bucket list.'

()

Why Cyber Insurance Works (Infosecurity Magazine) Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.

Design and Innovation

Father Of Crpytocurrency David Chaum: ‘Blockchain Can Lead to Direct Democracy’ (Business Korea) Dr. David Chaum, who invented the world’s first electronic cash, visited South Korea to attend this year’s Distributed Economy Forum taking place on April 3 and 4 at Walker Hill Hotel Seoul.

Academia

More universities to offer Hacking for Defense program (Fifth Domain) The Hacking 4 Defense program is preparing the next generation of technologists and policy experts to solve the Pentagon's toughest problems.

Legislation, Policy, and Regulation

Russian call for joint inquiry on Salisbury attack ‘is perverse’ (Times) Britain has called Russia’s demand for a joint investigation into the Salisbury poisoning “perverse” and dismissed it as a “diversionary tactic”. Britain’s delegation to the Organisation for the...

H.R. McMaster: US has 'failed to impose sufficient costs' on Russia (Washington Examiner) Outgoing national security adviser H.R. McMaster said the U.S. has “failed to impose sufficient costs” on Russia, adding that Russian President Vladimir Putin was mistaken to believe his county’s actions would avoid consequences.

CSIRO spent millions after Chinese data breach (Financial Review) A security scare contributed to a major rethink of how Australia approached its bilateral relationship with China.

What’s Behind the New Japan-ASEAN Cyber Center? (The Diplomat) The new initiative is yet another testament to the increased attention to this realm and important ongoing cooperation.

Domestic apps should aim to break monopoly not restrict cyberspace   (Mehr News Agency) Iran’s President Hassan Rouhani said Tue. that developing domestic messaging apps should aim at breaking foreign monopoly on cyberspace not at restricting public's access.

The Department of Cyber? (FCW) As some nations unify their cybersecurity operations, there are calls for a similar effort to create a single agency for civilian cyber authorities in the U.S.

Litigation, Investigation, and Law Enforcement

Zuckerberg will testify before Congress on April 11 (TechCrunch) Mark Zuckerberg will testify before the House Energy and Commerce Committee on April 11. E&C Committee Chairman Greg Walden (R-OR) and Ranking Member Frank Pallone, Jr. (D-NJ) made this announcement this morning, clarifying that Zuckerberg will speak on the company’s use and protection of…

A Cambridge Analytica Whistle-blower Claims That “Cheating” Swung the Brexit Vote (New Yorker) John Cassidy writes about testimony in the U.K. by Christopher Wylie that claims that Cambridge Analytica influenced the Brexit vote.

Founders of Cryptocurrency-Focused Tech Company Face Federal Fraud Charges (New York Law Journal) Sohrab Sharma and Robert Farkas told investors they were creating a debit card that would instantly convert cryptocurrency to legal tender with the backing of Visa and Mastercard. Federal officials say none of it was true.

Ex-Trump campaign chairman challenges special counsel's authority (Reuters) President Donald Trump's former campaign chairman Paul Manafort will try to convince a federal judge on Wednesday to throw out criminal charges filed against him by Special Counsel Robert Mueller, arguing Mueller has overstepped his legal authority.

First person sentenced in Russia probe draws 30 days, fine (Federal Times) Alex van der Zwaan’s sentence could set a guidepost for what other defendants charged with lying in special counsel Robert Mueller’s investigation may receive when their cases are resolved.

Spin chiefs among 19 people on INM dossier (Times) The former communications advisers to Independent News & Media are among 19 people on a list uncovered by the state’s corporate watchdog whose emails and other data may have been accessed...

Several wounded, one dead in shooting at YouTube headquarters (TechCrunch) At 12:46PM, an active shooter was reported in an outdoor patio area at YouTube’s headquarters in San Bruno, California. Police arrived at the scene in a manner of minutes, police chief Ed Barberini confirmed during a brief press conference. “We have four victims who have all been transp…

YouTube shooter IDed as woman angry at site’s “age-restricted” policies (Ars Technica) Nasim Aghdam wrote: "Videos of targeted users are filtered & merely relegated."

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (Arlington, Virginia, USA, April 12, 2018) With the support of the Hewlett Foundation, the National Security Institute is excited to host “Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language.” This networking...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and...

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.