skip navigation

More signal. Less noise.

Get trending threat insights delivered to your inbox.

Do you want trending information on hackers, exploits, and vulnerabilities every day for free? Subscribe now to the Recorded Future Cyber Daily.

Daily briefing.

Dragos this morning reported that threat actor, "RASPITE," which Symantec has tracked as Leafminer in the Middle East, is operating against targets in Europe, East Asia, and North America. Operations against electrical utilities seem focused on the US.

Fin7, the organized cybercrime gang also known as Carbanak, saw three of its leaders picked up by European authorities and indicted in the US. The FBI's Seattle Field Office ran the US side of the investigation in cooperation with police in Spain, Poland, and Germany. The ringleaders, all Ukrainian nationals, are Dmytro Fedorov, Fedir Hladyr and Andrii Kopakov. Carbanak specialized in gaining access to businesses' point-of-sale systems through phishing emails. They stole credentials enabling them to load malware that gave them access to paycard data. They would then sell the data in carding black markets. Carbanak also stole and sold non-public and proprietary data.

Reddit was hacked, apparently due to a two-factor authentication failure. The data that were compromised were mostly old, dating to 2007, and therefore probably stale. With Reddit, however, the hack was a recent one, with unauthorized access achieved between June 14th and 18th of this year. The hackers defeated two-factor authentication via SMS interception. Reddit doesn't use SMS for two-factor authentication, employing tokens instead, but one of its providers apparently did use SMS. In addition to older backup files, June’s email digests, including usernames and emails, were exposed. Reddit's offering advice on how users may protect themselves.

Cisco will buy Duo Security for $2.35 billion in cash.


Today's issue includes events affecting China, Estonia, European Union, Germany, Pakistan, Poland, Russia, Spain, Ukraine, United States.

What do Floppy Disks, Han Solo, and Insider Threats Have in Common?

Visit the ObserveIT booth at Black Hat USA to find out! They’re going back to the 80s to reminisce about throwback technology and show you how to take a 21st-century approach to your insider threat management strategy—so you don’t have to be stuck in the past with your DLP and Flock of Seagulls haircut. And before you head out to Vegas, take ObserveIT’s quiz on which 80’s pop culture icon best represents your insider threat management strategy.

In today's podcast we speak with our partners at Dragos, as CEO Robert M. Lee offers some thoughts on categorizing threat actors. Our guest is Wendi Whitmore from IBM with their 2018 Cost of a Data Breach study.

This week's Hacking Humans is also up, with discussion of clever gift card scams and some follow-up to last week's musings about the economics of wasting phone scammers' time. A more plausible phishing scheme comes through. Our guest David Shear from Flashpoint describes how scammers lure people into becoming money mules.

Billington Automotive Cybersecurity Summit (Detroit, Michigan, United States, August 3, 2018) Top automotive executives and government representatives will detail the latest cybersecurity threats and best safety practices at the second Billington Automotive Cybersecurity Summit on Aug. 3 at Cobo Center in Detroit. In the age of connected and autonomous cars, cybersecurity is a top priority for automakers and their suppliers.

XM Cyber is coming to Black Hat (Las Vegas, Nevada, United States, August 4 - 9, 2018) Visit XM Cyber at the Innovation City, booth IC2233, to experience the first fully automated APT simulation platform to Simulate, validate and remediate every hacker’s path to organizational critical assets.

Schedule a meeting with Terbium Labs at Black Hat. (Las Vegas, Nevada, United States, August 8 - 9, 2018) Matchlight by Terbium Labs is the world's most comprehensive and only fully private dark web monitoring solution, capable of quickly detecting compromised account data and minimizing the damage caused by a data breach. Book a 1:1 session with Terbium Labs' leadership team to learn how Matchlight can help your organization assess its sensitive data exposure on the dark web.

CyberTexas Job Fair, August 14, San Antonio visit ClearedJobs.Net for details. (San Antonio, Texas, United States, August 14, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the CyberTexas Job Fair, August 14 in San Antonio. Meet leading cyber employers including Bank of America, USCYBERCOM, USAA and more.

Wombat Wisdom Conference, September 18 to 20, 2018, Pittsburgh, PA. (Pittsburgh, Pennsylvania, United States, September 18 - 20, 2018) Gain expert insights for strengthening your security awareness program at the Wombat Wisdom Conference, Sept. 18-20, 2018. Ideal for CISOs and infosec professionals looking to share ideas and actionable concepts for improving security awareness and training.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at

Dateline Billington Automotive Cybersecurity Summit

Over 35 Speakers to Address Autonomous Cybersecurity at Detroit Summit (Fender Bender) Top automotive executives and government representatives will detail the latest cybersecurity threats and best safety practices at the second 2nd Billington Automotive Cybersecurity Summit on Friday, August 3 at Cobo Center in Detroit.

Security must evolve with connectivity if automobiles are to stay safe (Intelligent Transport) Ang Cui, CEO and Chief Scientist of Red Balloon Security, discusses how the increase in connectivity provides hackers with vulnerabilities to exploit.

Automotive Cyber Security market expected to grow 72.1% CAGR in terms of revenue, reach US$ 1480 million by 2023, from US$ 100 million in 2017 - True Industry News (True Industry News) Automotive Cyber Security market This report study based on the global Automotive Cyber Security Mar

Cyber Attacks, Threats, and Vulnerabilities

RASPITE (Dragos) RASPITE is an activity group targeting ICS operations.

Reddit breach exposes non-critical user data (TechCrunch) Reddit announced today that it suffered a security breach in June that exposed some of its internal systems to the attackers, although what was accessed was not particularly sensitive. Notably the hack was accomplished by circumventing the two-factor authentication Reddit had in place via SMS inter…

r/announcements - We had a security incident. Here's what you need to know. (reddit) 46,938 votes and 5,740 comments so far on Reddit

Reddit Breach Stems from SMS Two-Factor Authentication Breakdown (Threatpost) A hacker has compromised Reddit's systems and was able to make away with email addresses and account credentials.

Reddit Breach Highlights Limits of SMS-Based Authentication (KrebsOnSecurity) today disclosed that a data breach exposed some internal data, as well as email addresses and passwords for some Reddit users.

Cryptojacking Campaign Employs Deleted GitHub Account and Unofficial GitHub CDN (BleepingComputer) Cybercriminals appear to have an obsession with abusing GitHub and GitHub-related services to hide in-browser cryptocurrency mining scripts that they later use on hacked sites.

DHL-themed malspam reveals embedded malware in animated gif (SANS Internet Storm Center) On Wednesday 2018-08-01, @dvk01uk from myonlinesecurity[.]co[.]uk tweeted about a recent example of malicious spam (malspam) pushing malware

Credential Spills Fuel Account Takeover Threats (Credit Union Times) Credential stuffing attacks burden an IT security fraud and customer service department in different ways.

Spam still first choice for cyber crime, according to study (Information Age) According to a recent study by cyber security firms F-Secure and MWR InfoSecurity, spam remains the first choice for malware implementation.

Edward Snowden’s most important revelations (TASS) In June 2013, Snowden leaked classified information, which revealed global surveillance programs run by US and British intelligence agencies

Why Election Interference Campaigns on Facebook Are Still Working (Motherboard) “If they’re not caught, it leads to action in the real world. If they’re exposed, they’ve already undermined trust in the conversation."

During all the Russia hacking hype, China is rising in influence (USA TODAY) While Russia's role in the 2016 election dominates the news, China's spying and alarming influence within our borders is too little noticed.

Shipping Firm Avoids Customer Data Dump in Last Year's Hack & Ransom Incident (BleepingComputer) UK-based shipping company Clarkson PLC (or Clarksons) has revealed more details about a security breach that took place last year, and during which hackers threatened to release some of the company's data online if it didn't pay a ransom demand.

BitPaymer Ransomware Infection Forces Alaskan Town to Use Typewriters for a Week (BleepingComputer) On Monday, officials from Matanuska-Susitna (Mat-Su), a borough part of the Anchorage Metropolitan Statistical Area, said they are still recovering from a ransomware infection that took place last week, on July 24.

Private health providers called out in quarterly Australian data breach report (ZDNet) OAIC finds private health service providers and finance are the two most-breached sectors from April to end of June.

Security Patches, Mitigations, and Software Updates

Google to warn G Suite admins of government-backed attacks (Help Net Security) Google started warning Gmail users of state-sponsored attacks in 2012 and now the option has been made available to G Suite admins.

Microsoft Brings Web Authentication to Its Edge Browser (eWEEK) By adding web authentication capabilities, Microsoft says it wants to bolster security for Edge browser users.

Cyber Trends

Three security trends to watch for at Black Hat USA 2018 (Help Net Security) Black Hat USA is a great opportunity for practitioners to get a glimpse into both emerging attack vectors and the latest technologies.

In Rush Toward ‘Digital Transformation,’ Corporations Often Skirt IT (Wall Street Journal) In the rush to deploy AI, automation and other tools for business-side divisions, many corporate IT units are neglecting their own digital upgrades, a Hackett Group report says.  That can spell trouble for the entire company.


Cisco is buying Duo Security for $2.35B in cash (TechCrunch) Cisco today announced its intent to buy Ann Arbor, MI-based security firm, Duo Security. Under the terms of the agreement, Cisco is paying $2.35 billion in cash and assumed equity awards for Duo. Duo Security was founded in 2010 by Dug Song and Jonathan Oberheide and went on to raise $121.M through…

Facebook CSO Alex Stamos departing, won't be replaced (ZDNet) The outspoken chief security officer has helped Facebook reorganize its security team, amid its ongoing effort to stop abuse of its platform.

Facebook doing ‘a lot’ to deal with prevalent issues: Palo Alto Networks executive (Fox Business) Facebook’s visibility makes it an easy target and CEOs are paying attention.

Activists call on Palo Alto tech firm Palantir to end ICE contract (The Mercury News) Immigration activists are calling on Palo Alto-based tech firm Palantir to end its contract with U.S. Immigration and Customs Enforcement.

Cyber security service providers investing in new technologies to predict, prevent attacks (Hindu Business Line) Artificial Intelligence,machine learning are key tools

Booz Allen lands $885M Pentagon AI contract (Fedscoop) Government contracting giant Booz Allen Hamilton has landed a five-year deal worth $885 million to help the Department of Defense and the intelligence community “rapidly employ artificial intelligence, neural and deep neural networks.” The contract calls upon Booz Allen to aid the Pentagon in dealing with, and using, the “unprecedented amounts” of reconnaissance data that exists …

Thales seeks clearance to acquire Gemalto (Scoop News) The Commerce Commission has received a clearance application from Thales S.A. (Thales) to acquire Gemalto N.V. (Gemalto).

Entrust Datacard invests in CensorNet (Finextra Research) Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced that it has made a strategic investment in CensorNet, the complete cloud security company, to propel Entrust Datacard toward achieving real-time threat awareness with enhanced pattern analysis for continuous authentication capabilities.

Cyber stakeholders in Md. join forces to launch national marketing campaign (Baltimore Business Journal) The goal of this new campaign was to focus in on one set of numbers, and one message that everyone involved with the state's cyber industry could rally around.

Cybersecurity Leader EdgeWave Appoints Steve Kelley as President and John Randall as Vice President of Product Management (PRNewswire) Heightened Demand for Solutions and Rapidly Evolving Security Threats to Businesses Prompt EdgeWave to Expand Executive Team and Development Efforts

Salient CRGT adds GD vet Deitz to leadership team (Washington Technology) Salient CRGT hires former General Dynamics executive Allen Deitz to lead the growth enablement team. He is the third GD veteran to join Salient CRGT in recent months.

Products, Services, and Solutions

NuData to boost transaction approvals and lower friction with new solution leveraging EMV® 3-D Secure protocol (GlobeNewswire News Room) NuData Security, a Mastercard company and leader in the field of online user verification with passive biometrics, announced today its solution to help partners increase transaction approvals and establish a great consumer experience through the EMV® 3-D Secure authentication protocol (EMV 3DS).

Corelight Launches New Channel Program for Enterprises Seeking Strong Network Visibility to Accelerate Incident Response and Threat Hunting (GlobeNewswire News Room) Company aims to work with like-minded partners known for bringing strong network, data and security expertise to a wide range of enterprise customers and organizations

Pharos: Maximizing Security ROI (Pharos Security) Pharos: Maximizing Security ROI

Financial Institutions Fight Cybercrime with Intelligent Platform from Fiserv and BlueVoyant (MarketWatch) New cybersecurity platform designed for financial institutions orchestrates cybersecurity modules, enables threat remediation on institution’s behalf and simplifies reporting

ZeroFOX Announces TIP Integrations Providing Comprehensive Social Media Security Coverage (BusinessWire) ZeroFOX, the social media and digital security category leader, today unveiled three new integrations with Anomali, ThreatConnect and ThreatQuotient,

Kapalya Launches Intelligent End-to-End Encryption Software (PRNewswire) Data protection solution focused on key management

Endace and Ixia, a Keysight Business, Partner to Secure and Monitor Networks (Markets Insider) Endace, a world leader in high-speed network recording, playback and analytics hosting, and Ixia, a Keysight...

SentinelOne Partners with Lookout to Bring Next-Gen Protection to Mobile Devices (Solutions Review) Endpoint protection provider, SentinelOne, recently announced that it has partnered with Lookout as a means to integrate mobile threat data into SentinelOne’s console in order to protect mobile end…

Technologies, Techniques, and Standards

New open source effort: Legal code to make reporting security bugs safer (Ars Technica) The framework seeks to standardize "safe harbor" language for security researchers.

Here's a Non-Binary Approach to Smarter Cybersecurity ( Moving beyond an "allow or deny" choice could reduce friction between agency security pros and their end users.

Design and Innovation

Adversarial Sample Generation: Making Machine Learning Systems Robust for Security (TrendLabs Security Intelligence Blog) The history of antimalware security solutions has shown that malware detection is like a cat-and-mouse game.he efficiency of ML systems.

Forget VPNfilter – here’s BACKLASH, a networking hack from way, way back (Naked Security) With a name like BACKLASH, you might think this hack comes from the era of mechanical devices, with gears and pulleys. You’d be right!

Research and Development

Is Conscious AI Achievable & How Soon Might We Expect It? (BleepingComputer) Artificial general intelligence (AGI) can be defined as artificial intelligence (AI) that matches or surpasses human intelligence. It is, in brief, the type of intelligence through which a machine is able to perform any intellectual task that a human being can. And, it is currently one of the main objectives of AI research.


Gov. Edwards applauds LSU for securing $10M defense award for small business cybersecurity (KALB) The award comes from the U.S. Department of Defense’s Air Force Research Laboratory.

Legislation, Policy, and Regulation

Defence Forces cyber command takes up operations (ERR) The new cyber command of the Estonian Defence Forces (EDF) became operational on Wednesday, uniting all the different authorities and departments within the competency of the Ministry of Defence.

NACTA being strengthened to monitor misuse of cyberspace (Daily Pakistan Global) Plans are underway to strengthen Cyber Crimes Wing at Federal Investigation Agency (FIA) and Cyber Security Wing at the National Counter Terrorism Authority (NACTA) and increase their capac

Call for regulation after Facebook accused of shattering trust (Times) Self-regulation of social media has been declared “over” after an Oireachtas committee called for Ireland to lead a European crackdown on companies such as Facebook. The social network has been...

Senators ponder how to counter foreign influence operations (Fifth Domain) Senators wrestling with how to counter Russia and other foreign influence operations heard Wednesday from experts who said that not only did Russia continue its influence campaign after the 2016 presidential election, it “stepped on the gas.”

America could protect cyberspace like WMDs (Fifth Domain) The State Department is building a coalition of allies in cyberspace that it hopes can deter state-backed malicious activity.

Homeland Security Officials Strategize To Thwart Cyberattacks ( The department plans to protect the nation's infrastructure. Rachel Martin talks to DHS Under Secretary Christopher Krebs about the administration's strategy for confronting threats.

DHS Will Shore Up Cybersecurity for America's Infrastructure (WIRED) The National Risk Management Center will give critical infrastructure companies much needed-support when under cyberattack.

‘STOP interfering!’ Trump plans cyber security strategy to stop Russia's election meddling ( THE TRUMP administration is planning a major new cyber security strategy to defend the US from growing online threats as it attacks Barack Obama for leaving America in a “cyber crisis”.

The fight over Trump’s cyber strategy (Fifth Domain) A senior Defense Department official described the current administration's cyber policy as “a potential catastrophe” because cyber briefings are missed or not taking place altogether.

Senators Propose Curbing Trump’s National-Security Tariff Power (Wall Street Journal) GOP Sen. Rob Portman of Ohio is proposing legislation that would make it harder for the White House to impose the sort of duties that have already hit metals imports and sparked a global backlash.

China has no idea how to play Trump (South China Morning Post) In the past, Beijing has reacted to economic challenges by opening its credit spigot and letting the money flow, and that’s what it has started doing this time too even though the mess from the last crisis is yet to be cleared

The rolling tide that is GDPR … say hello to the CCPA (CSO Online) Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

Litigation, Investigation, and Law Enforcement

Analysis | The Cybersecurity 202: Feds arrest three in global cybercrime ring linked to hacks on Chipotle, Arby's and other U.S. chains (Washington Post) They relied on private companies for information.

How Cyber Crime Group FIN7 Attacked and Stole Data from Hundreds of U.S. Companies (Federal Bureau of Investigation) Three high-ranking members of FIN7, a sophisticated international cyber crime group operating out of Eastern Europe, have been arrested and are currently in custody.

Federal prosecutors announce arrest of Ukrainians for alleged hacking of US businesses (TheHill) Federal prosecutors on Wednesday announced the arrest of three high-ranking members of a criminal hacking gang known as Carbanak.

The End for Fin7: Feds cuff suspected super-crooks after $$$m stolen from 15m+ credit cards (Register) Three alleged ringleaders nabbed in EU, indicted in US

Nuisance Call Firm Hit with £100K ICO Fine (Infosecurity Magazine) AMS Marketing the latest to break privacy regulations

Darknet Market Spokesman Gets Nearly 4 Years in Prison (SecurityWeek) Ronald L. Wheeler, who worked as a public relations specialist for criminal online marketplace AlphaBay was sentenced in Atlanta to serve nearly four years in federal prison.

Leaked Chats Show Alleged Russian Spy Seeking Hacking Tools (SecurityWeek) The leak of an alleged Russian hacker’s conversations with a security researcher shows more about the shadowy group of 12 Russian spies indicted by the FBI for targeting the 2016 U.S. election.

Federal judge finds no constitutional violation in cell site simulator lawsuit (Maryland Daily Record) A federal judge sided with police Wednesday in a civil lawsuit over the constitutionality of using a cell site simulator, finding an order obtained by police met the warrant requirement.

Tesla whistleblower’s lawyer: My client may have been effectively swatted (Ars Technica) Storey County Sheriff's Office releases report detailing June 20 incident.

Man accused of sabotage at Tesla brings his own lawsuit over defamation (Ars Technica) Martin Tripp says he reported waste but was punished for it, among other claims.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Merging of Cyber Criminal and Nation State Techniques: A Look at the Lazarus Group (Loudon, Virginia, USA, September 24, 2018) This presentation on North Korea's Lazarus Group as a case study of the convergence of organized cyber crime and nation-state intelligence services will be led by Allan Liska, a solutions architect at...

Fifth Annual Cyber Warfare Symposium (New York, New York, USA, October 18, 2018) The Fifth Annual Cyber Warfare Symposium is an annual one-day event presented by the Journal of Law & Cyber Warfare in conjunction with academia, government and private industry organizations at NYU School...

Cyber Investing Summit (New York, New York, USA, May 16, 2019) The Cyber Investing Summit is an all-day conference focused on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the...

Upcoming Events

Community College Cyber Summit (3CS) (Gresham, Oregon, USA, August 2 - 4, 2018) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Who should attend 3CS? College faculty and administrators, IT faculty who are involved or who would...

2018 Community College Cyber Summit (3CS) (Gresham and Portland, Oregon, USA, August 2 - 4, 2018) 3CS is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), and Broadening Advanced Technological...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

Audit Your Digital Risk (Washington, DC, USA, August 7 - 8, 2018) Recent reports indicate that manufacturing is the most heavily targeted industry for cyber attacks in the past year. According to a study released by NTT Security, 34% of all documented cyber attacks in...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.