skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

Hidden Cobra, the North Korean cyberespionage unit, has recently exhibited a higher level of activity. Observers expect this: increased espionage often accompanies periods of high-stakes diplomatic interaction, like the recent North and South Korean summit, and projected meetings between DPRK leader Kim and US President Trump.

Trend Micro offers an update on the FacexWorm, which researchers have been tracking since last year. The malware has picked up new, cryptomining functionality.

At the end of last week hackers made a raid on Mexico's banking transfer system. Three banks are said to have been affected: Banco del Bajio SA, Bancomext, and Grupo Financiero Banorte. They experienced unspecified difficulties in connecting to Mexico's central bank through SPEI, the country's interbank electronic transfer system. The attack seems to have been contained; the banks shifted their connections to an alternative contingency system.

Estimates of the cost of the Atlanta ransomware attack have now risen above $5 million.  SamSam appears to be moving toward targeting corporations.

UK Home Secretary Amber Rudd has resigned over the Windrush immigration scandal. Sajid Javid will succeed her as Home Secretary.

Investigations into Russian influence operations targeting British elections show some notable Twitterbot activity mounted in the interests of Labour leader Jeremy Corbyn.

In the US, The House Intelligence Committee has reported the results of its investigation into Russian attempts to influence US elections. Essentially the conclusion (with partisan animadversions from both sides) holds that the Russian government did seek to interfere, but that there's no serious evidence of US collusion.


Today's issue includes events affecting Australia, China, European Union, Germany, India, Indonesia, Iran, Japan, Democratic Peoples Republic of Korea, Republic of Korea, Mauritius, Mexico, New Zealand, Peru, Russia, Singapore, South Africa, Switzerland, United Kingdom, United States.

There's a better way to stop data loss. Learn more!

Data loss is a big problem. Every organization that deals with electronic data needs to have a data loss prevention strategy in place. ObserveIT’s white paper, Building a Strategy for the Post-DLP World, explores how organizations have been dealing with data loss to date, why these strategies are failing, and what a better path forward looks like. Get information you need to build a data loss prevention strategy that works for the modern organization. Download your free copy.

In today's podcast we hear from our partners at Dragos, as CEO Robert M. Lee talks about the difference between regulations and incentives in cybersecurity, and the difference that makes. Our guest, Dan Lyon from Synopsys, talks about some aspects of IoT security. 

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

Cyber Security Summits: May 15 in Dallas & Boston on June 5 (Dallas, Texas, United States, May 15, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, CenturyLink, IBM Security and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

Third Annual Cyber Investing Summit 5/15/18 (Dallas, Texas, United States, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

As two Koreas shake hands, Hidden Cobra hackers wage espionage campaign (Ars Technica) North Korea ramps up espionage hacks that target the US and 16 other countries.

SOCOM boss: Adversaries are disabling Air Force gunships in Syria (Air Force Times) Adversaries in Syria are attempting to use aggressive electronic warfare capabilities to disable the Air Force's gunships.

Hackers target Oracle WebLogic Servers following botched patch (Computing) Oracle failed to fix the core security flaw on WebLogic Server with its latest patches, claim security specialists

FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation (TrendLabs Security Intelligence Blog) Our Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger.

Mexican Banks Targeted in Cyber Attack ( Cyber attackers attempted to penetrate Mexico’s electronic payment systems Friday, forcing three banks to enact contingency plans, according to people familiar with the matter.

Top 10 Ways That Hackers Use To Hack Facebook Accounts (Threat Brief) With over 2 billion users, Facebook is perhaps the most sought-after social networking platform for cybercriminals. Facebook is targeted by hackers because it is one place where the scammers/fraudsters can access your email and other personal identifiable information because of Facebook’s real name policy. The risks of Facebook hacking are not only from hackers but …

MyEtherWallet DNS Hack Causes 17 Million USD User Loss (Darknet) Big news in the crypto scene this week was that the MyEtherWallet DNS Hack that occured managed to collect about $17 Million USD worth of Ethereum in just a few hours.

Security Trade-Offs in the New EU Privacy Law (KrebsOnSecurity) On two occasions this past year I’ve published stories here warning about the prospect that new European privacy regulations could result in more spams and scams ending up in your inbox.

SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies (Threatpost) The gang behind the Atlanta city shutdown and other attacks is selecting victims carefully and offering volume discounts to unlock whole organizations.

Atlanta ransomware attack cost city more than $5 million (SearchSecurity) Total costs to remediate the Atlanta ransomware attack from March have been revealed to be more than $5 million with costs continuing to rise as contracts move toward protection.

After Atlanta cyber attack, other cities prepare defenses (Reporter Newspapers) In the wake of a March 22 cyber attack that caused chaos on city of Atlanta computer systems, other local cities say they are prepared for similar threats, which occur almost constantly. Dunwoody s…

No, Mark Zuckerberg isn’t messaging you about winning a Facebook lottery (Naked Security) Beware lottery scams on Facebook and Instagram

Online poker site bombarded by DDoS attacks, pauses tournaments (HOTforSecurity) Bad news if you're crazy about playing online poker - one of the world's oldest online poker websites has been forced to pause its online tournaments after suffering a series of distributed denial-of-service attacks. Americas Cardroom, which claims to be home to over one million...

Twitter Sold Data Access to Cambridge Analytica–Linked Researcher ( Twitter Inc. sold data access to the Cambridge University academic who also obtained millions of Facebook Inc. users’ information that was later passed to a political consulting firm without the users’ consent.

YouTube snags millions of bad videos, but is it getting the right ones? (Naked Security) You don’t have to look far to find objectionable content

ClassDojo is harvesting data on how British schoolchildren behave (Times) A US company is gathering behavioural data, photos and video footage of thousands of British schoolchildren and storing it overseas, causing concern among parents and education experts. ClassDojo...

'It's a hacker's paradise out there' (BBC News) How cyber security firm Darktrace was set up by former members of the UK security services and maths professors.

Video software site slyly moves into mining cryptocurrency (iTWire) Researchers at security firm Check Point say they have found a once legitimate video download software site, OSDSoft, has now begun mining cryptocurre...

UK Watchdog Now Pushing Premature Ejaculation Treatment Rather than Surveillance Reports (Motherboard) The Interception of Communications Commissioner (IOCCO) is a recently closed UK watchdog. But now someone is using the body’s website to push premature ejaculation treatments in place of important IOCCO reports on surveillance.

Security Patches, Mitigations, and Software Updates

Google adds SSO verification check to G Suite (Naked Security) G Suite users logging in using Chrome via SAML single sign-on (SSO) providers will start seeing a new prompt the first time they log in.

Multiple Security Vulnerabilities Reported In IBM i (IT Jungle) IBM this month revealed an array of security vulnerabilities across IBM i middleware components, including OpenSSL, DHCP, and Java products.

Cyber Trends

US Signal Survey Reveals 81 Percent of Organizations Experienced Spike (PRWeb) US Signal, a leading end-to-end IT solutions provider, today announced the results of its 2018 Security ‘Health of the Nation’ survey, revealing 81 percent...

IT Security Versus Cybercriminals: Who Will Win (US Signal) To defeat cybercriminals companies should consider outsourcing some or all of their IT security to vendors with up-to-date knowledge and resources.

A Short History of Blaming 'Hackers' For Pretty Much Everything (WIRED) Joy Reid may have very well been the target of a malicious breach. Or she's just the latest person to blame hackers for her past mistakes.

Apple boss Tim Cook on data privacy, screen time and secrecy in Silicon Valley (Times) It is the afternoon of Mark Zuckerberg’s testimony to the United States Senate: a day of reckoning for Silicon Valley. The chief executive of Facebook is wearing a suit and tie for once and looks...

How GDPR, Other Regs Force Security to Respond (BankInfo Security) What two points do GDPR and other new regulations have in common? They put pressure on organizations to demonstrate strong security postures and mitigate

‘Cyber Blindspot’ Threatens Energy Companies Spending Too Little ( What’s the cost of securing the nation’s energy from a cyber attack?

Nuclear Power Plants Have a 'Blind Spot' for Hackers. Here's How to Fix That. (Motherboard) Malware hunters, regulators, and plant employees are hunting further down the supply chain for vulnerabilities as hackers continue to target critical infrastructure.

70% of security experts say social media should be government regulated (Security Brief) A survey has found the majority believe social media data collection needs to be regulated, despite having little faith in their governments.


Huawei and ZTE face credibility issue in top telecom markets (Insider Car News) However, if it is found that Huawei did violate the law, its already tenuous place in the USA smartphone and telecom market could be dealt a death blow..

T-Mobile Agrees to Buy Sprint in $26 Billion Deal (Wall Street Journal) T-Mobile struck a $26 billion deal to buy Sprint in a combination that, if allowed by antitrust enforcers, would leave the U.S. wireless market dominated by three national players.

The Sprint/T-Mobile Merger Is Huge—But a Lot of Questions Remain (WIRED) The massive deal still has to be approved by regulators.

Amazon's New Blockchain Service Could Hurt IBM (The Motley Fool) AWS expands into private and public blockchain services.

Shadowy Brokers Pay Millions for Zero Day Exploits, While Tech Giants Pay Thousands (The Mac Observer) There's a new company called Crowdfense representing the obstacles companies like Apple, Google, and other operating system vendors have in keeping their platforms secure. Crowdfense is offering bounties up to US$3 million for zero day exploits, while the tech giants pay thousands.

Uber Tightens Bug Bounty Extortion Policies (Threatpost) Uber is tightening policies around its bug bounty program after a 2016 data breach exposed deep flaws in its policies around handling extortion.

Gaming the system for employee success, retention (Business Observer) KnowBe4 brings fun, games and extra cash to its workforce.

Products, Services, and Solutions

What is a Cybersecurity Technology Platform Anyway? (CSO Online) Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes.

Why Avast Gives Security Software Away for Free (eSecurity Planet) Ondrej Vlcek, CTO of Avast, discusses how his company's business model works and why machine learning for anti-virus technology is here to stay.

Bacula Enterprise Edition 10 Addresses Cloud Service Providers With New Business-Oriented Backup and Recovery (PR Newswire) Continuing to lead in high-performance backup and...

Sprint® Secure Wi-Fi to Provide Business and Consumer Wireless Customers with Automatic Data Encryption (PR Newswire) Sprint (NYSE: S) today announced the launch of Sprint Secure...

Technologies, Techniques, and Standards

Europe eyeing bot IDs, ad transparency and blockchain to fight fakes (TechCrunch) European Union lawmakers want online platforms to come up with their own systems to identify bot accounts. This is as part of a voluntary Code of Practice the European Commission now wants platforms to develop and apply — by this summer — as part of a wider package of proposals it’…

Strengthening information security to protect against fake news (Help Net Security) In order to protect against fake news, ENISA published an opinion paper meant to present some views and recommendations on the problem in the EU from a Network and Information Security (NIS) perspective.

Five Security “Gotchas” for MSPs (Infosecurity Magazine) Common attacker tricks which plague the managed security provider.

We need to talk about metadata: an interview with IBM distinguished engineer Mandy Chessell (Computing) Computing speaks to IBM's Mandy Chessell about the need for a common language for data about data

This giant cyber defence exercise has teams defending power grids, 4G networks, drones from hacker attack (ZDNet) The largest international cyber defence game involves 22 teams protecting critical national infrastructure against severe cyber attacks.

How security firms lead hackers into ‘honey pots’ (VentureBeat) I recently wandered around the RSA security conference in San Francisco, where the latest cybersecurity technologies were on display. And I came across the blue-bearded Chris Roberts, the chief sec…

3 ways to minimize cyberattack threats by reducing attack surfaces (TechRepublic) Cybercriminals leverage attack surfaces as a way to penetrate an organization's infrastructure. Learn how to reduce attack surfaces and apply deceptive cyberdefenses.

3 Steps To Beef Up Your SD WAN Security (Information Security Buzz) From Firewall Rules to Router Hardening: 3 Steps to Solidify SD-WAN Security Software-defined wide access networks (SD WANs) are becoming widespread, and for good reason…

What Meltdown and Spectre Mean for Mobile Device Security (Dark Reading) Here are four tips to keep your mobile users safe from similar attacks.

UK Health Agency Switches to Windows 10 Citing WannaCry Ransomware Outbreak (Bleeping Computer) The UK Department of Health and Social Care has announced that it will transition all National Health Service (NHS) computer systems to Windows 10.

Design and Innovation

AI Can Help Cybersecurity—If It Can Fight Through the Hype (WIRED) There are a ton of claims around AI and cybersecurity that don't quite add up. Here's what's really going on.

How Estonia built a digital first government (PBS NewsHour) From filing taxes to accessing medical records to voting, 99 percent of all government services in Estonia are available online. Accessed at the state portal using an ID card and a pin code, the former Soviet nation is the first in the world to declare the internet a social right. NewsHour Weekend Special Correspondent Christopher Livesay reports on how Estonia protects itself from cyberattacks.


Ran Canetti Honored for Cryptography Innovation (BU Today) Ran Canetti, professor of computer science, has won one of the top awards in cryptography.

Army researchers find the best cyber teams are antisocial cyber teams (Ars Technica) High-performing blue teams are "purposive social systems"—they shut up and work.

Cyber-crime fighters win collegiate business-pitch summit (Lehigh Valley Business) A pair of crime fighters took prizes Thursday night at the Second Annual Lehigh Valley Collegiate Business Pitch Summit.

Time to Prevent Cyberthreats Lurking around India’s Educational Institutions (BW Businessworld) Anil Bhasin - There has been greater awareness about the implications of cyber threats. However, the education sector has somewhat lagged behind industry peers in the APAC region, , cyber attacks, cybersecurity, education

Legislation, Policy, and Regulation

Who leaked the idea of ASD spying on Australians, and why? (ZDNet) Mike Pezzullo's apparent thought bubble on domestic digital surveillance has been burst, but it foreshadows tense times ahead for Australia's new domestic security arrangements.

Facebook controversy: To ban or not to ban (The Jakarta Post) In contrast, the rapidly growing use of Facebook across the globe has taken place in a black box. Are people really better off? Have they reaped the benefits of this platform economically?  

US tech ban on ZTE exposes China’s Achilles’ heel (South China Morning Post) China’s reliance on key technologies from the West shows it still needs the developed economies much more than they need China

Team Trump goes to China to avert a trade war (CNNMoney) President Trump is sending top economic officials to China this week for trade negotiations.

Pompeo Rails Against Iran During Middle East Tour (Wall Street Journal) Secretary of State Mike Pompeo delivered a broadside against Iran on his first foreign trip as the U.S.’s top diplomat, calling Tehran the world’s “greatest sponsor of terrorism.”

UK Home Secretary Amber Rudd resigns over immigration scandal (CNN) UK Home Secretary Amber Rudd stepped down Saturday because she "inadvertently misled" a government committee about quotas for removal of immigrants, Rudd said in a resignation letter obtained by CNN.

Amber Rudd resignation: How her defence crumbled under a barrage of accusations (Times) Amber Rudd may have clung on to her post until last night but the scandal that engulfed her career began to unfold a fortnight ago. The problems facing Britons who arrived in the UK in the Windrush...

Windrush scandal: Sajid Javid named home secretary after Amber Rudd resigns (Times) Sajid Javid was today promoted to become the first Asian politician to hold a great office of state as Theresa May tried to shore up her government after Amber Rudd’s resignation. The prime...

Next NDAA might add more cyber provisions (Washington Technology) The 2019 National Defense Authorization Act could have a slew of new cyber provisions aimed at streamlining the Defense Department’s collaboration with the rest of government.

Will the empire strike back? OTA and the future of acquisition (Defense News) The military customer’s frustration with the Pentagon's acquisition system has reached new heights.

The Pentagon’s New R Chief Has a Mandate for Change (Defense One) Michael Griffin has orders to concentrate the Defense Department’s diverse research and development efforts on a few key technologies.

Federal 'turf war' complicates cybersecurity efforts (TheHill) Lawmakers are concerned that bureaucratic turf wars are complicating the federal response to cyber threats.

Is India ready for cyber war? (DNA) Cyber warfare involves an attempted or actual cyber attack, but for some in the media it means defacing some websites of important organisations.

Cyber security would play important role in protecting nation's assets: IT Minister Nara Lokesh (Deccan Chronicle) Responding to the emerging global and local cyber threats, the government of Andhra Pradesh

Indian state sets up cybersecurity operation center (CISO MAG) Last week, Chief Minister of Indian state of Andhra Pradesh, N Chandrababu Naidu unveiled the Cyber Security Operations Center (CSOC) in the capital region of Amaravati...

Litigation, Investigation, and Law Enforcement

Watchdog faces probe after data leak (IT PRO) UK electoral commission under investigation after leaking details of pro-union campaign donors

Exposed: Russian Twitter bots tried to swing general election for Jeremy Corbyn (Times) The first evidence of Russian attempts to influence the result of the general election by promoting the Labour leader, Jeremy Corbyn, has emerged in a ground-breaking investigation into social...

How Russian bots invaded Twitter to fight in Jeremy Corbyn’s army (Times) It was the moment that brought a tear to the eye of the prime minister. At 10pm on June 8, 2017, a shock exit poll revealed that Theresa May’s seemingly well-judged gamble of bolstering her...

How we traced Russian bots supporting Jeremy Corbyn (Times) What did we do? Swansea University passed The Sunday Times 20,000 general-election-related tweets sent in the four weeks leading up to the vote by accounts that gave their language or location as...

House panel officially clears Trump, but finds Russian cyber interference (Fifth Domain) The Republican-led House intelligence committee on Friday released a lengthy report concluding it found no evidence that Donald Trump’s campaign colluded with Russia in the 2016 presidential campaign, a finding that drew praise from the president and rebuttals from Democrats.

House Russia report says major spy law has a cyber problem (Fifth Domain) The House Intelligence Committee is recommending malicious cyber actors be included as part of the Foreign Intelligence Surveillance Act.

The Russia Investigations: The House Intel Committee Duels Over Evidence. Again (KWIT) Republicans on the House intelligence committee gave President Trump another clean bill of health this week. And the committee's Democrats laid out...

The House Intel Committee's Russia Report Doesn't Let Trump Off the Hook (WIRED) Republicans concluded that Trump's campaign didn't collude with Russia, but the investigation is far from over.

Report: James Clapper Leaked Dossier Briefing To CNN, Lied About It (The Federalist) A newly declassified congressional report claims that James Clapper leaked details of a secret briefing about the Steele dossier, then lied about it.

Alleged NSA leaker seizes on Comey memos (POLITICO) Lawyers for Reality Winner tell court Trump comments show 'extraordinary pressure' on FBI.

A pair of children’s smartwatch companies are in trouble for spying on kids (The Outline) Products from Gator and Tinitell have been collecting kids’ data without obtaining parental permission.

Cyber police chief reports 296 serious cyberattacks on Iran vital systems (Mehr News Agency) Iran’s Cyber Police Chief General Kamal Hadianfar said Sun. that there have been 296 serious attacks on the country’s vital infrastructures in 2017, 50% of which were launched from US and China.

Hacker who almost sprung a prisoner out of jail is himself imprisoned for seven years (Graham Cluley) IT staff were tricked into visiting a webpage which installed malware onto their computers, ultimately giving a hacker complete control of prison records.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Integrated Cyber (Laurel, Maryland, USA, May 1 - 2, 2018) Integrated Cyber is the premier cyber event bringing together the Integrated Adaptive Cyber Defense (IACD), Automated Indicator Sharing (AIS), and cyber information-sharing communities. This two-day event...

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (New York, New York, USA, May 3, 2018) This event brings together technologists and leading policymakers, lawyers, and journalists to bridge the gap between non-technical and technical cyber professionals and features Lisa Monaco, former Assistant...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Ready 2018 Cybersecurity/Intel Conference (MacDill Air Force Base, Florida, USA, May 14, 2018) Major General Mike Ennis (USMC, ret), CIA National Clandestine Service's first Deputy Director for Community Human Intelligence (HUMINT), will deliver the keynote. The conference will also feature an all-audience...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Cyber:Secured Forum (Denver, Colorado, USA, June 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively...

Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, June 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.