skip navigation

More signal. Less noise.

Get trending threat insights delivered to your inbox.

Do you want trending information on hackers, exploits, and vulnerabilities every day for free? Subscribe now to the Recorded Future Cyber Daily.

Daily briefing.

Taiwan-based chipmaker and Apple supplier TSMC has brought its plants back online after a cyber incident that caused them to shutter operations over the weekend. The malware in question is said to have been WannaCry, which is familiar from last year's widespread infestation. The company said the outbreak happened during software installation of a new tool, which then evidently carried the infection into other parts of the company's network. TSMC added that "data integrity and confidential information was not compromised."

The incident appears to have been due to operator carelessness, a secondary infection and not a direct attack, as had been widely feared in Taiwan when the malware infection was first reported. TSMC's CEO bluntly told the press, "This is purely our negligence so I don't think there is any hacking behavior." TSMC attributes the infection to failure to scan software for known threats before installation.

The BBC reports that Project Insecurity has found vulnerabilities in the widely used medical practice management system OpenEMR. The researchers disclosed the bugs to OpenEMR, which worked with them to fix the system. Some 100 million patients' records worldwide are thought to touch OpenEMR.

British authorities are said to be preparing extradition requests for Russian operators their investigation has concluded are responsible for the Novichok nerve agent attacks in Salisbury. The operation claimed one life, apparently incidentally to attack on the intended targets.

Twitter botnets are said to be growing in reach and sophistication. Experts warn of their potential for exploitation in information operations.


Today's issue includes events affecting Australia, China, Colombia, New Zealand, Russia, Singapore, Taiwan, United Kingdom, United States.

Don’t let threats SOC you where it counts.

Protecting your organization from an attack involves much more than the traditional “block & tackle” tactics of the past. A good boxer doesn’t just block the punch they see coming, they move against the next anticipated punch. The modern Security Operations Center (SOC) requires a combination of automation and human tradecraft to successfully repel the adversary. Learn more about the modern SOC in LookingGlass’ webinar featuring guest IDC, August 29 @ 2pm ET.

In today's podcast we speak with our partners at CenturyLink, as Mike Benjamin describes DDoS attack trends. Our guest, Casey Ellis from Bugcrowd, provides a timely overview of bug bounty programs.

XM Cyber is coming to Black Hat (Las Vegas, Nevada, United States, August 4 - 9, 2018) Visit XM Cyber at the Innovation City, booth IC2233, to experience the first fully automated APT simulation platform to Simulate, validate and remediate every hacker’s path to organizational critical assets.

Cyber Security Summits: August 29 in Chicago & in NYC on September 25 (Chicago, Illinois, United States, August 29, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The NSA, Darktrace, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, October 2, 2018) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Tuesday, October 2nd, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. To receive the early-bird rate, register now!

Dateline Black Hat

Top 10 Talks to See at Black Hat USA 2018 (eSecurity Planet) Security researchers, vendors and IT pros are headed for Las Vegas for Black Hat USA 2018. Here are 10 talks that shouldn't be missed.

3 storylines to watch during Black Hat 2018 (Fifth Domain) Three things that Fifth Domain is watching during Black Hat 2018

How to not get hacked at Black Hat (Fifth Domain) These cyber hygiene tips are necessary at one of the nation's premiere information security conferences.

How algorithms can harm cybersecurity (Fifth Domain) As more companies are using machine learning to defend their networks, a top researcher is warning that an over-reliance on algorithms can bring a false sense of digital security.

Cyber Attacks, Threats, and Vulnerabilities

Company that makes iPhone chips warns of delays after major problem (The Independent) The problems come just weeks before the expected release date of the new iPhone

Chip Giant TSMC Says WannaCry Behind Production Halt (SecurityWeek) Chipmaker giant TSMC said Monday the computer virus that brought its production to a halt for two days was a variant of the WannaCry ransomware that hit users all around the world

iPhone chipmaker blames ransomware for factory shutdowns (Naked Security) Taiwan chipmaker TSMC is back up and running, and pinning the blame for its shutdown on an infection by WannaCry ransomware.

TSMC shut down by WannaCry variant (Security Boulevard) Questions still surround the TSMC (Taiwan Semiconductor Manufacturing Company) computer virus incident which shut down operations for the world’s largest semiconductor foundry last Friday, August 3. While the company maintains this was not due to a cyberattack, it also reports that the virus was a variant of WannaCry, the ransomware that terrorized the world last year.

Singapore cyber attack has hallmarks of state-linked group,... (Reuters) Singapore's worst cyber attack in its history, in which personal information of about 1.5 million people including the Prime Minister was stolen, has the hallmarks of a state-linked group, the government's communications minister said on Monday.

Health records 'put at risk by security bugs' (BBC) Health records of almost 100 million patients worldwide were put at risk by security issues with a popular patient management system, researchers say.

How Bitcoin and the Dark Web hide SamSam in plain sight (Naked Security) Bitcoin and the Dark Web are familiar terms, but what are they and how do they help SamSam operate in plain sight?

Twitter botnets are becoming more sophisticated (Fifth Domain) Twitter accounts are spoofing celebrity accounts, engaging in fraud and using verified profiles that have been hacked, at the same time the United States is warning of Russian disinformation operations using botnets.

GitHub to Warn Users on Compromised Passwords (SecurityWeek) In an effort to improve the safety of its users, GitHub is now alerting them whenever it detects their passwords have been compromised.

Campaigns on Their Own as Cyber Threats Roil Midterms (SecurityWeek) With midterm elections just months away, political campaigns report that they’re largely on their own in the increasingly challenging task of protecting sensitive information.

How to stop giving away your password reset answers (Fifth Domain) Some of the most devastating hacks have come from some form of human engineering. Here is how to guard against it.

How the GRU spy agency targets the west, from cyberspace to Salisbury (the Guardian) Accusations mount against the Russian army’s main intelligence directorate

This Hacker Party Is Ground Zero for Russia’s Cyberspies (The Daily Beast) Kremlin intelligence officers, Russian ‘traitors,’ and Moscow’s answer to ‘The Girl With the Dragon Tattoo’—they all gather at this cybersecurity confab.

Optiv Threat Actor Intel Series #1 | Russian Computer Network Operations (Optiv) The past year saw Russian cyber operations go from the purview of intelligence professionals into the public discourse.

Security Patches, Mitigations, and Software Updates

HP Patches Critical RCE Flaws in Inkjet Printers (SecurityWeek) HP releases firmware updates to patch two critical remote code execution vulnerabilities affecting 160 of its ink printers

Cyber Trends

‘Gentlemen don’t read other people’s mail!’ (The Asian Age) The NSA and the CIA together comprise the greatest intelligence-gathering effort in the world.

In contemporary warfare, cyber trumps nukes (Fifth Domain) While President Trump obsesses about politics, the U.S. is exposed to great danger.

Latest Quarterly Threat Report: August 2018 (Proofpoint) Malicious email campaigns shifted tactics and payloads. Social engineering dominated. Social media scams targeted hundreds of corporate executives.

Internet of Things Adoption to Rise Despite Security, Data Integration Challenges (Wall Street Journal) While companies are expanding existing IoT projects and launching new ones, many expect it will take longer than previously thought to scale within their organizations, according to a survey of more than 600 IoT decision-makers polled by consulting firm Bain & Co.

Managing Software Exposure (Checkmarx) In the early years of software development, you would often design it, build it, and only then think about how to secure it.


Fortnite ditches Google Play – will it undermine Android security? (Naked Security) Like it or not, the Play Store is a walled garden that keeps out malware.

Employees at Google, Amazon and Microsoft Have Threatened to Walk Off the Job Over the Use of AI (The National Interest) "The engineers are right to worry. But the stakes are higher than they think."

How the Army is competing with Google for these ninjas (Army Times) Bonuses for enlisted, bringing in officers as colonels are among the incentives in the works.

3 Reasons Cisco Paid $2.35 Billion for Duo Security (The Motley Fool) The networking hardware giant acquires a hot cybersecurity unicorn.

How Microsoft became tech’s good guy (Computerworld) Even if it’s doing so out of self-interest, the company has been acting as a force for good.

Why IBM is pushing to be the driving force in the IoT (TechRadar) The IoT and IBM could prove to be a match made in heaven

Jon Rambeau: Lockheed Expands Cyber Workforce, Product Security Effort (ExecutiveBiz) Jon Rambeau, vice president and general manager for Lockheed Martin‘s C6ISR line of business, has said the company has increased the number of its cybersecurity employees within the Orlando, Fla., area by 400 percent over the past five years, the Orlando Business Journal reported Friday. He told the publication in an interview the defense contractor aims to...

RiskRecon, Third-Party Cyber Risk Management Provider, Secures $25 Million in Series B Funding, Led by Accel (BusinessWire) RiskRecon today announced it has raised $25 million in Series B financing.

iS5 Communications Inc. Completes CDN $22 Million Round of Financing to Accelerate Growth and Development of Its Critical Infrastructure Protection Platforms. (Digital Journal) Phoenix Contact Innovation Ventures leads strategic investment round.

Dallas Startup to Verify People & Data via Blockchain Tech, Plans ICO (Dallas Innovates) VeriToken, an information verification company based on blockchain technology, has already signed almost 20 partners in the last few months including gourmet food distributor La Megara and Sutton Selects.

NTT to merge Dimension Data into new company: report (CRN Australia) Would create one of Japan's biggest IT solutions providers.

3 Cybersecurity Stocks to Add to Your Buy List (InvestorPlace) While hacks are bad news for the companies struggling to safeguard information and for customers who have been compromised, they suggest a rising tide for cybersecurity stocks.

CrowdStrike Expands Partner Footprint and Alliances Globally on the Heels of Rapid Growth (CrowdStrike) CrowdStrike announced the explosive growth of its channel operations and partner ecosystem. This news comes following the record partner momentum and sales acceleration through the first half of 2018 and the company announcing a Series E round of $200 million.

PasswordPing Appoints Michael Greene as Chief Executive Officer (Markets Insider) PasswordPing, a cyber-security startup that screens online accounts for compromised credentials, is pleased to ...

Women in cyber security gather at new International Spy Museum for annual celebration (PRNewswire) For the 5th consecutive year, the CyberWire will be bringing together women from around the region and across the nation to celebrate their contributions and successes in the cyber security industry.

Products, Services, and Solutions

Optiv Security Announces Integrated Suite of Services That Allows Clients to See Themselves Through the Eyes of the Enemy; Further Helps Organizations Rationalize and Optimize Cyber Security (BusinessWire) Optiv announces #EnemyPerspectives@Optiv to allow clients to see themselves through the eyes of the enemy and help them remediate weaknesses.

Partnership Defends Targeted Cyber AttacksPartnership Defends Targeted Cyber Attacks (Automation World) Industrial software provider Aveva continues its cybersecurity collaboration with a new partnership agreement with Virsec, providing in-memory...

Gemalto Boosts Cloud Security with a Scalable Virtual Key Management Solution (Markets Insider) Gemalto announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. ...

Montana Bankers Association Endorses IP Services Cybersecurity and Managed Services for Critical Banking Systems (Markets Insider) The Montana Bankers Association (MBA) has endorsed IP Services to provide cybersecurity and critical Information ...

Mozilla faces resistance over DNS privacy test (Naked Security) Is Mozilla’s enthusiasm for DNS-over-HTTPS getting out of hand?

Qualys provides visibility of inaccessible IT assets (Help Net Security) Qualys announced a new Out-of-Band Configuration Assessment (OCA) module that allows customers to achieve complete visibility of all known IT infrastructure by pushing vulnerability and configuration data to the Qualys Cloud Platform from systems that are otherwise difficult or impossible to assess.

Irdeto provides anti-hacking protection for Indentive’s home IoT platform (Help Net Security) Irdeto is partnering with Indentive, a Swedish IoT technology provider, to secure its home IoT platform, Connective. Indentive will implement Irdeto Cloakware to ensure that security is built into the basis of the home network, including the latest generation of its consumer-facing IoT applications.

Carbon Black Launches Real-Time Query and Response Tool (SecurityWeek) Carbon Black aims to bridge security and IT operations with Cb LiveOps, a new tool to provide organizations with real-time query and response.

IBM X-Force Red Grows With New Labs and ATM Testing Service (eWEEK) IBM's X-Force Red penetration testing service is expanding with new labs and a service that will test the security of banking machines.

TruSTAR to Unveil Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018 (Dark Reading) Early warning system for emerging ransomware campaigns monitors Bitcoin (BTC) transaction data.

Wipro establishes Cyber Defense Platform (Deccan Herald) Wipro, one of the leading Bengaluru-headquartered IT services company, has launched a security platform to offer cyber security services to clients.

Technologies, Techniques, and Standards

Fitbits and fitness-tracking devices banned for deployed troops (Military Times) Announcement is latest to tighten security as device data exposes vulnerabilities.

Identifying the Cyberattack Patterns and Doing the Easy Stuff ( The math favors the attackers. There is little you can do about the attacker, but there is a lot you can do about you.

Cyber hygiene training is infrequent and inconsistent (Help Net Security) Finn Partners Research released findings from its Cybersecurity at Work study that examined the level of cyber risk that employees pose to their organizations.

How to Secure an IoT System in a Mere Few Minutes (eWEEK) By 2020, IoT devices are expected to grow to 31 billion in use globally, and by 2025, the number will surpass 75.4 billion devices. That’s a lot of potential attack surfaces. Everything has to be protected.

Preventing IDN homograph attacks from harming your brand/reputation (Help Net Security) Phishing is, by and large, the most often used attacker tactic to trick victims into sharing useful information such as login credentials. More often than

Elliptic Curve Cryptography: The Tech Behind Digital Signatures in Cryptocurrencies (Blockonomi) Cryptography underpins the digital signature schemes of cryptocurrencies and is the basis for their secure transaction verification between two parties across a decentralized network. There are numerous cryptographic methods used by different cryptocurrencies today, focusing on providing efficient and secure

7 Ways to Identify Darknet Cybersecurity Risks (Security Intelligence) Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.

I Hate this Cliché, but I'm Going There (SecurityWeek) I really do not want to do this.

You Should Still Care About GDPR (SecurityWeek) Big companies can state they are GFPR compliant, but odds are their current structure will never allow them to find, identify, and categorize all the data that they have collected over time.

Addressing IoT Device Security Head-on (SecurityWeek) Security experts are essential to help uncover IoT vulnerabilities and offer recommendations to prioritize and mitigate risks of connected Internet of Things devices.


Colleges ‘over-estimating’ cyber-attack readiness (TES) A quarter of colleges suffered attempts to knock their internet services offline last year, research by Jisc shows

New HQ for UNSW Canberra Cyber (Australian Defence Magazine) A digital forensics lab and virtualised computing are among the features of the new headquarters for UNSW Canberra Cyber.

Legislation, Policy, and Regulation

Editorial: National security officials offer right message against foreign cyber threats ( The Trump administration’s top security and intelligence leaders used blunt language last week to describe Russia’s ongoing cyber efforts to meddle in U.S. elections and use disinformation to sow confusion

Battle lines drawn over US mass surveillance as senators probe NSA's bonfire of phone records (Register) Ding! Ding! Round three in blanket spying bout

Cyberattacks Haven’t Stopped but Neither Have Bills to Fight Them ( Top national security and intelligence leaders pledged to defend the country from foreign influence campaigns.

Klobuchar 'very concerned' midterms could be hacked (POLITICO) "I think you also have the fact that you've got the president undermining this on national TV,“ the Minnesota Democrat says

Congress offers millions in budget to cyber-harden missile defense systems (Defense News) House and Senate appropriators’ funding lines for cyber-hardening missile defense systems are essentially identical.

Army Boosts Electronic Warfare Numbers, Training, Role (Breaking Defense) The Army is giving its electronic warfare force more troops, more training, and a more prominent role in combat headquarters, senior officers said here Thursday, pushing back on criticisms that the service neglects EW even as Russia and China pull ahead.

Litigation, Investigation, and Law Enforcement

UK plans warrants to extradite Russian poisoners over Salisbury novichok case (Times) Britain is making plans to seek the extradition from Russia of two suspects identified as the perpetrators of the Salisbury poisonings. Scotland Yard detectives are understood to be confident that...

Win or Lose, the Alex Jones Lawsuit Will Redefine Free Speech (WIRED) The infamous conspiracy theorist is being sued for claiming the parents of a child killed in the Sandy Hook shooting were “crisis actors” paid by gun control activists. But also on trial is what it means to speak freely on internet.

Information Security News, IT Security News and Cybersecurity Insights (SecurityWeek) Security researchers looking to find bugs in Firefox should not worry about Mozilla suing them, the Internet organization says. That is, of course, as long as they don’t mess with user data.

Analysis | The Cybersecurity 202: Warrantless device searches at the border are rising. Privacy advocates are suing. (Washington Post) They say it's a violation of the Fourth Amendment.

Arista Networks To Pay Cisco $400 Million To Dismiss All Patent Lawsuits (CRN) Arista has entered into a binding agreement with Cisco in which it will pay Cisco $400 million to dismiss all pending district court and U.S. International Trade Commission lawsuits, according to an SEC filing.

Ex-Tesla Worker Accused of Hacking Seeks $1M in Counterclaim (SecurityWeek) Former Tesla employee Martin Tripp is seeking at least $1 million in defamation damages after it accused him of hacking into computers and stealing confidential information leaked to the media.

University online mass murder threat linked to Colombia (Stuff) The trail of a shooting threat to Otago University led to a city in Colombia.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

U.S. Department of Transportation Cybersecurity Symposium (Washington, DC, USA, October 9 - 10, 2018) The U.S. Department of Transportation (DOT) Cybersecurity Symposium is 2 days of training sessions and educational seminars focused on the mission of protecting government networks and privacy. Hosted...

Upcoming Events

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

Audit Your Digital Risk (Washington, DC, USA, August 7 - 8, 2018) Recent reports indicate that manufacturing is the most heavily targeted industry for cyber attacks in the past year. According to a study released by NTT Security, 34% of all documented cyber attacks in...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Insider Threat Program Development-Management Training Course (San Antonio, Texas, USA, September 17 - 18, 2018) Insider Threat Defense will hold its highly sought-after Insider Threat Program Development-Management Training Course, in San Antonio, Texas, on September 17-18, 2018. This two-day training course will...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) Advancing global collaboration and innovation. SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

Security in our Connected World (Beijing, China, September 19, 2018) This year’s seminar will not only examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), but will also delve into their associated business and...

Detect 18 (National Harbor, Maryland, USA, September 19 - 21, 2018) Detect '18 is the single largest conference dedicated to threat intelligence. This year we're calling on fellow "Threatbusters" to wage a high-tech battle against apparitions (aka bad actors) and learn...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.