skip navigation

More signal. Less noise.

Get trending threat insights delivered to your inbox.

Do you want trending information on hackers, exploits, and vulnerabilities every day for free? Subscribe now to the Recorded Future Cyber Daily.

Daily briefing.

The Sandworm group, a less famous but familiar relative of Cozy and Fancy Bear, is working against the Spiez Laboratory, as Swiss facility performing forensic work on the Novichok attack against a former GRU officer in the UK. That attack has since claimed two additional victims, including one who lost her life, through what appear to be residual samples of Novichok agent staged in England. Russia has denied involvement in the chemical attack, but few believe this.

Facebook ejected thirty-two questionable accounts from its platform for engaging in what Facebook characterized as "inauthentic behavior." There's some evidence that the accounts are connected with the Internet Research Agency, the St. Petersburg troll farm implicated in earlier influence operations. This round of influence seems aimed at inflaming the alt-left against the alt-right, which makes perfect sense if the goal is disruption and chaos.

Finland is on alert for increased Russian influence operations.

Amnesty International says that at least one of its people had their phone infected with NSO Group's Pegasus spyware tool. Pegasus has been used by a number of governments to monitor dissent. The University of Toronto's Citizen Lab has confirmed the infection. The targets in this case appear to be Saudi dissidents.

Sophos Labs reports that ransomware payments to the controllers of SamSam ransomware have now amounted to $6 million. 

Yale University has realized that it was subjected to a data breach in 2008 and 2009. They don't know who did it, but they advise victims to protect their identity.


Today's issue includes events affecting China, Finland, Israel, Malaysia, Russia, Saudi Arabia, Switzerland, Ukraine, United Kingdom, United States.

What do Floppy Disks, Han Solo, and Insider Threats Have in Common?

Visit the ObserveIT booth at Black Hat USA to find out! They’re going back to the 80s to reminisce about throwback technology and show you how to take a 21st-century approach to your insider threat management strategy—so you don’t have to be stuck in the past with your DLP and Flock of Seagulls haircut. And before you head out to Vegas, take ObserveIT’s quiz on which 80’s pop culture icon best represents your insider threat management strategy.

In today's podcast, we speak with our partners at Cisco's Talos unit. Craig Williams describes the Talos team and the work they do. Our guest, Thomas Hofmann from Flashpoint, talks about the state of ransomware and online extortion. 

There's also a special edition of the podcast up. The topic is data-centric security.

Billington Automotive Cybersecurity Summit (Detroit, Michigan, United States, August 3, 2018) Top automotive executives and government representatives will detail the latest cybersecurity threats and best safety practices at the second Billington Automotive Cybersecurity Summit on Aug. 3 at Cobo Center in Detroit. In the age of connected and autonomous cars, cybersecurity is a top priority for automakers and their suppliers.

XM Cyber is coming to Black Hat (Las Vegas, Nevada, United States, August 4 - 9, 2018) Visit XM Cyber at the Innovation City, booth IC2233, to experience the first fully automated APT simulation platform to Simulate, validate and remediate every hacker’s path to organizational critical assets.

Schedule a meeting with Terbium Labs at Black Hat. (Las Vegas, Nevada, United States, August 8 - 9, 2018) Matchlight by Terbium Labs is the world's most comprehensive and only fully private dark web monitoring solution, capable of quickly detecting compromised account data and minimizing the damage caused by a data breach. Book a 1:1 session with Terbium Labs' leadership team to learn how Matchlight can help your organization assess its sensitive data exposure on the dark web.

CyberTexas Job Fair, August 14, San Antonio visit ClearedJobs.Net for details. (San Antonio, Texas, United States, August 14, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the CyberTexas Job Fair, August 14 in San Antonio. Meet leading cyber employers including Bank of America, USCYBERCOM, USAA and more.

Wombat Wisdom Conference, September 18 to 20, 2018, Pittsburgh, PA. (Pittsburgh, Pennsylvania, United States, September 18 - 20, 2018) Gain expert insights for strengthening your security awareness program at the Wombat Wisdom Conference, Sept. 18-20, 2018. Ideal for CISOs and infosec professionals looking to share ideas and actionable concepts for improving security awareness and training.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at

Cyber Attacks, Threats, and Vulnerabilities

Kremlin Hackers Take Aim at the Swiss Lab That’s Working the Skripal Poisoning Case (Defense One) The group that attacked Ukraine's power grid is phishing a chemical-weapons lab critical to the Skripal case.

Russische Hacker greifen Labor Spiez an (Blick News-App) Die Russen haben sich als Labor Spiez getarnt und wollten so Forscher mit einem versteckten Schadprogramm übertölpeln.

Facebook Pulls Fake Accounts That Mimic Russian Tactics Ahead of Election (Wall Street Journal) Facebook said it deleted a new group of politically oriented accounts that were engaged in coordinated misinformation efforts ahead of the U.S. midterm elections that resemble Russian activities on the platform during the 2016 presidential campaign.

Facebook says it has uncovered a coordinated disinformation operation ahead of the 2018 midterm elections (Washington Post) The social media company said that it couldn’t tie the activity to Russia, which interfered on its platform around the 2016 presidential election. But Facebook said the three dozen profiles shared a pattern of behavior with the previous Russian disinformation campaign.

These Are the Pages Facebook Says Are Part of a ‘Coordinated’ Effort to Influence the Midterm Elections (Motherboard) Facebook has removed 32 accounts and pages for “inauthentic behavior” tied to the “Unite the Right 2" rally next month in Washington, DC.

So Our Voting Machines Are Extremely Easy to Hack? (Esquire) And a hostile foreign power interfered in our last election?

Finland and the Bear (Foreign Policy) Russian meddling is a rising concern in Helsinki.

Phone scam exploits Russian hacking fears (Graham Cluley) Guest contributor Bob Covello describes an unexpected phone call he received out of the blue.

Powerful Smartphone Malware Used to Target Amnesty International Researcher (Motherboard) Human rights charity Amnesty International has found hackers attempted to infect one of their researcher's phones with malware from Israeli vendor NSO Group

NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident (The Citizen Lab) Citizen Lab validates Amnesty International investigation showing targeting of staff member and Saudi activist with NSO Group's technology.

SamSam: The (almost) $6 million ransomware (Naked Security) New research reveals that SamSam ransomware has affected far more victims, and raised far more ransom, than previously thought.

Leaky radio devices broadcast chipset data, discover researchers (Naked Security) Researchers at EURECOM S3 Group found that they can extract crypto keys from a set of run-of-the-mill communications chips just by listening to the noise it makes.

When Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869 (SANS Internet Storm Center) Universal Plug an Play (UPnP) is the gift that keeps on giving. One interesting issue with UPnP (aside from the fact that it never ever should be exposed to the Internet, but often is), is the fact that it can be reached via various routes. One of the lesser used routes is SOAP requests via TCP port 52869.

NSA hasn’t closed security windows Snowden climbed through (Naked Security) One of three problems found in an audit: two-person access controls haven’t been properly implemented at data centers and equipment rooms.

How the SamSam attacker stole millions from US companies (Help Net Security) A new report by Sophos offers new insight into SamSam attacker's modus operandi and advice for organizations how to protect themselves against this menace.

Android apps infected with umm... *Windows* malware (Graham Cluley) Security researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.” Yes, you read that correctly. Android apps carrying malicious Windows executables.

Google Researcher Unpacks Rare Android Malware Obfuscation Library (Dark Reading) Analysis exposes the lengths malware authors will go to in order to protect their code from disassembly and reverse engineering.

Cryptojacking for beginners – what you need to know (Naked Security) Cryptojacking has hit the headlines in recent months. But what is it? And do you need to be worried?

Social Security Numbers Accessed in Yale Data Breach (NBC Connecticut) Yale University has just discovered it was the victim of a data breach in 2008 and 2009, and now school officials are warning personal information including social security numbers and dates of birth were...

Spam Campaign Abusing SettingContent-ms Found Dropping Same FlawedAmmyy RAT Distributed by Necurs (TrendLabs Security Intelligence Blog) Trend Micro detected a spam campaign that drops the same FlawedAmmyy RAT (remote access tool) used by a Necurs module to install its final payload on bots under bank- and POS-related user domains.

Porn-warning security scam hooks you up to “Apple Care” (Naked Security) It’s a toll free “Apple Care” number, meaning that in theory it shouldn’t cost you a thing – so what’s the harm in calling just in case?

Espionage and Athletics is More Apparent than You Think (CyberDB) When it comes to targeting billion-dollar sports franchises, many would assume that cyber crime would be the foremost cyber actors behind the scenes...

FTC Warns Citizens About Government Imposter Scams ( No, the IRS doesn't demand gift cards.

Advanced Persistent Threat: Mat-Su Borough, Valdez fighting highly sophisticated cyber attack (KTUU) Matanuska-Susitna Borough computer systems were taken offline July 23 after what Borough officials described as an Advanced Persistent Threat was discovered in the Borough network after lying dormant for more than two months.

Staff dust off their typewriters after malware attack (Naked Security) Malware has taken down systems in at least two Alaskan municipalities in an attack that officials say is the worst they have ever seen.

Over 600K Shoppers Affected by E-commerce Security Incident (Infosecurity Magazine) Platform provider compromised by white hat hacker

Clarksons reveals details of cyber attack and blackmail (TradeWinds) Shipbroking giant outlines range of data stolen and response to data breach.

Update on 2017 Data Breach – Regulatory Notice (Clarksons) Clarkson PLC (“Clarksons”) has discovered a cyber security incident that may affect the security of certain of personal information.

Security Patches, Mitigations, and Software Updates

SoftNAS no longer a soft touch for hackers (for now)... Remote-hijacking vulnerability patched (register) Your files are someone else's files, too, thanks to storage bug

Mozilla still working on Firefox’s site isolation security revamp (Naked Security) Mozilla’s Firefox browser doesn’t have site isolation security yet, but plans to enable it are in the works.

Facebook shuts off access to user data for hundreds of thousands of apps (The Verge) All app makers who did not submit to the company’s review process by its August 1st deadline are being cut off

Cyber Trends

If we fight cyberattacks alone, we’re doomed to fail | Eugene Kaspersky (the Guardian) Online crime is borderless, and so must be our response, says cybersecurity expert Eugene Kaspersky

Most Organizations Risk Breaches Due to Gap Between Identity and Cybersecurity Silos (GlobeNewswire News Room) Survey reveals organizations know they can – and should – do more to bridge the gap


Cryptocurrency Insurance Could Be A Big Industry In The Future (Investopedia) As cryptocurrency markets mature, they are attracting players from other industries. The insurance industry is one them. 

Tenable raised $288.3 million with its IPO — now what? (Washington Business Journal) This is what the Maryland cybersecurity company plans to do with its stunning proceeds from its initial public offering.

Hedera Hashgraph Raises $100 Million to Further Develop Public Distributed Ledger Network and Dapp Ecosystem (Hedera Hashgraph ) The trust layer of the internet

Cloud Conformity Announces $2.8 Million Series A Financing Led by Paladin Capital Group (Paladin Capital) Cloud Conformity, a leader in public cloud infrastructure security and compliance monitoring, today announced a $2.8 million Series A funding led by Paladin

Mimecast splashes $88m on US security platform vendor (CRN) US vendor bolsters its offerings with purchase of Solebit,Finance and M&A ,Mimecast,Mergers and Acquisitions

HP announces bug bounty program for printer security (CRN Australia) Offering awards of between US$500 and US$10,000 per flaw.

Google Plans to Launch Censored Search Engine in China, Leaked Documents Reveal (The Intercept) Search app that will "blacklist sensitive queries" could be launched in six to nine months, according to documents and people familiar with the plans.

Leaked Documents Show Google is Making a Censored Search Engine for China (Motherboard) The Chinese version of Google will censor websites like the BBC and Wikipedia.

Apple Comes Under Media Fire in China (Wall Street Journal) Chinese state media claims the U.S. technology giant isn’t doing enough to block texts and images trafficking in prohibited content including pornography, gambling and counterfeit goods.

Apple closes in on $1trn market cap as it posts record third-quarter earnings (Computing) Revenues weigh-in at $53.3bn as punters scoop-up iPhone Xs and Apple Watches

Avnet expands relationship with Microchip (Help Net Security) Avnet customers now have access to the Microsemi portfolio of semiconductor solutions differentiated by power, security, reliability and performance.

Arctic Wolf Networks Appoints New Chief Security Services Officer (BusinessWire) Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced the addition of Marty Sanders as the company’s

Products, Services, and Solutions

AlienVault Expands USM Anywhere to Include Endpoint Detection and Response Capabilities (GlobeNewswire News Room) Only Security Solution to Automate Threat Detection and Response Across Endpoints and Networks in Cloud and On-Premises Environments from a Single Platform

Managed Detection and Response Service from Fidelis Cybersecurity Bolsters Internal Security Teams with 24x7 Threat Monitoring, Hunting, Detection and Response (Fidelis Cybersecurity) Rates of cybercrime and nation-state espionage are increasing while the cybersecurity skills gap continues to grow.

ThreatConnect Expands its Threat Intelligence Analysis Workbench (ThreatConnect) ThreatConnect adds functionality and features to enhance user collaboration and analysis

FireEye Brings Advanced Machine Learning to Endpoint Security with MalwareGuard (FireEye) New FireEye machine learning capabilities are trained on unique, real-world data from the frontlines to identify and block the most sophisticated, emerging threats targeting the endpoint

Bromium Announces Protected App®, New Product Offering to Isolate and Secure Critical IP (Business Insider) Bromium®, Inc., the pioneer and leader in virtualization-based endpoint security that stops advanced ...

Nehemiah Security’s RQ Delivers 360-Degree View of Cyber Risk (BusinessWire) Upgrades Trace Computed Loss Exposures Directly to Endpoints and Areas of Impact

ShiftLeft Demonstrates Comprehensive Application Protection in the First Test of Its Kind (BusinessWire) ShiftLeft™ Inc., an innovator in application security, announced the first public real-world benchmark of its continuous application security solution

MyRepChat Compliant Texting Tool Announces New Data Loss Prevention Feature (PRNewswire) Allows Organizations to monitor, flag, and halt transmission of sensitive data via text

CIS Hardened Images Now on Azure Government Marketplace (MarketWatch) CIS securely configured operating systems for cloud environments now available for government users

Protego Labs and Mode2 to Provide Serverless Security to U.S. Cloud Cu (PRWeb) Protego Labs today announced that it has signed a strategic partnership with Mode2, a cloud native solutions developer, to strengthen the operational security

SailPoint and Rackspace collaborate to deliver cloud-hosted identity governance (Help Net Security) SailPoint and Rackspace agreement enables organizations to host their identity governance programs in the cloud while leveraging Rackspace’s cloud expertise.

Verizon Announces Safe Wi-Fi App to Protect Users from Dodgy Public Hotspots (TechNadu) Verizon joins the list of many tech companies that are offering their own VPN services with its new Safe Wi-Fi app that secures up to 10 devices.

Gemalto and Entrust Datacard Extend Partnership to Accelerate IoT Security Adoption (Markets Insider) Gemalto, the leader in digital security, and Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced the expansion of their longstanding partnership to include a secure framework for Internet-connected devices. Gemalto, the leader in digital security, and Entrust Datacard, a leading provider of trusted identity and secure transaction techno...

Technologies, Techniques, and Standards

States are diligently preparing for midterm cyber threats (TheHill) As secretaries of State, we are natural risk managers. Long before cyber threats, we dealt with planning for hazards such as natural disasters, disruptions at polling places and power outages.

Remove Locky Locker Ransomware – Restore .locky Files (Security Boulevard) This article will aid you to remove Locky Locker ransomware totally. Follow the ransomware removal instructions provided at the end of the article. Locky Locker is a virus that encrypts your files and demands money as a ransom to get...

Firms Urged to Scour Dark Web for Breached Data (Infosecurity Magazine) Firms Urged to Scour Dark Web for Breached Data. Terbium Labs releases top 10 list of things to look for

Critical security measures government agencies are overlooking (Fifth Domain) Creating a comprehensive shield against cyberattacks is a process that never really ends, and many areas tend to fall through the cracks.

Convergence Guides Army Cyber (SIGNAL) Intelligence, electronic warfare and signals lock arms in the digital battle.

How US Military Hackers Prepared to Hack the Islamic State (Motherboard) Documents obtained by Motherboard give insight into how hackers at CYBERCOM prepare before launching offensive cyber operations, including figuring out how likely an attack will be attributed back to them.

Mission First: The Story of an NSA Hacker (SIGNAL) A front-line network warrior describes the heat of battle.

Research and Development

Predicting geopolitical events with greater accuracy the goal of IARPA, Raytheon project (Military Embedded Systems) Raytheon BBN Technologies has been awarded a contract worth $14.5 million from the Intelligence Advanced Research Projects Activity (IARPA) to develop a system that improves the accuracy of predicting a range of geopolitical events, including elections, conflict, and disease outbreak.

Hacking the Human Is the Next Cyber Threat (SIGNAL) Security flaws in medical nanotechnologies could be deadly.


Security Industry Association Announces RISE Scholarship Opportunity for Young Security Professionals (Security Industry Association) The SIA RISE Scholarship – available to SIA RISE program participants or SIA student members – provides recipients with funds for professional development.

High-schoolers’ data put up for sale after being scraped from surveys (Naked Security) Millions of students’ data is being sold after being harvested from college-planning questionnaires or surveys that come with the SAT or PSAT tests.

Legislation, Policy, and Regulation

Analysis | The Cybersecurity 202: Pence takes tough tone on Russia in first cybersecurity speech (Washington Post) And other takeaways from the DHS conference.

Homeland Security announces new first response cyber center (Fifth Domain) The National Risk Management Center is supposed to provide a centralized home where companies and local agencies can go to for cybersecurity issues.

DHS launches one-stop shop for cyber threat sharing with private sector ( The Homeland Security Department is standing up a new one-stop shop aimed at protecting and sharing cyber threat information with major industries, including banks, and electric companies and telecommunications companies.

3 steps for putting the DHS cybersecurity strategy to work (FCW) Some attacks against the corporate world can have national security consequences, further validating the need for public-private partnerships.

Supply Chain Cybersecurity a Major Legislative Priority for House Homeland ( The committee wants to broaden DHS’ authority to kick questionable contractors off government networks.

Cyber Command wants to partner with private sector to stop hacks (Fifth Domain) Gen. Paul Nakasone, head of the National Security Agency and Cyber Command, advocated for a more expansive partnership with the private sector amid an array of cyberthreats.

Litigation, Investigation, and Law Enforcement

MH370 Was ‘Manipulated’ Off Course to Its End, Report Says ( Malaysia Airlines Flight 370, missing since 2014, was probably steered off course deliberately and flown to the southern Indian Ocean, according to the Malaysian government’s safety report into the disaster.

Sixth Circuit Finds Coverage Under Crime Policy for Business Email Compromise (McGuireWoods Insurance Recovery Blog) For the second time in ten days, a federal appeals court ruled a crime insurance policy provides coverage for losses arising from a business email compromi

Ancestry, 23andMe and others say they will follow these rules when giving DNA data to businesses or police (Washington Post) Genetics-testing companies are setting new rules for how they assess and share consumers' DNA.

Alex Jones, Pursued Over Infowars Falsehoods, Faces a Legal Crossroads (New York Times) The Infowars founder is seeking the dismissal of a bellwether defamation lawsuit this week, as social media platforms take steps to curb him.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

Merging of Cyber Criminal and Nation State Techniques: A Look at the Lazarus Group (Loudon, Virginia, USA, September 24, 2018) This presentation on North Korea's Lazarus Group as a case study of the convergence of organized cyber crime and nation-state intelligence services will be led by Allan Liska, a solutions architect at...

Upcoming Events

SINET61 2018 (Melbourne, Victoria, Australia, July 31 - August 1, 2018) Promoting cybersecurity on a global scale. SINET – Melbourne provides a venue where international solution providers can engage with leaders of government, business and the investment community to advance...

Community College Cyber Summit (3CS) (Gresham, Oregon, USA, August 2 - 4, 2018) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Who should attend 3CS? College faculty and administrators, IT faculty who are involved or who would...

2018 Community College Cyber Summit (3CS) (Gresham and Portland, Oregon, USA, August 2 - 4, 2018) 3CS is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), and Broadening Advanced Technological...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

Audit Your Digital Risk (Washington, DC, USA, August 7 - 8, 2018) Recent reports indicate that manufacturing is the most heavily targeted industry for cyber attacks in the past year. According to a study released by NTT Security, 34% of all documented cyber attacks in...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.