skip navigation

More signal. Less noise.

Get trending threat insights delivered to your inbox.

Do you want trending information on hackers, exploits, and vulnerabilities every day for free? Subscribe now to the Recorded Future Cyber Daily.

Daily briefing.

US-CERT has warned of a new remote access Trojan released by North Korea. McAfee and Intezer have conducted joint research into Pyongyang's attack tools and they've found considerable code reuse: some of the code that continues in use goes back to 2009's Brambul, one of the earlier malware strains to come from the DPRK. Code reuse is an obvious labor-saver. Intezer is particularly confident that DPRK code-reuse offers strong evidence for attribution; they call it the malware's "DNA."

Researchers at KU Leuven report finding vulnerabilities in implementations of the widely-used Wi-Fi Protected Access two (WPA2)’s 4-way handshake.

The PGA was hit with a ransomware attack just before its current golf championship tournament got underway. Investigation and remediation are in progress, but there's widespread speculation that the ransomware used was a strain of Bitpaymer. The hoods want their ransom in cryptocurrency.

Engadget reports that Amazon Web Services accidentally exposed GoDaddy information in the course of a sales call with the domain host.

South Korea's troubled Cyber Command is about to undergo reorganization.

The Russian government braces for US sanctions, and has promised retaliation in kind. The US sanctions are directed, first, against Russian breaches of chemical weapons treaties in the Novichok incident (which Russia denies) and second, against election meddling. The second class of sanctions, which Russian sources suggest the Kremlin thinks are soon to be tightened by the US Congress, appears to be the more threatening. (Russia also continues to deny election-related influence operations, but few believe that, either.)


Today's issue includes events affecting Australia, China, European Union, Iran, Ireland, Democratic Peoples Republic of Korea, Republic of Korea, Russia, United Kingdom, United States.

Don’t let threats SOC you where it counts.

Protecting your organization from an attack involves much more than the traditional “block & tackle” tactics of the past. A good boxer doesn’t just block the punch they see coming, they move against the next anticipated punch. The modern Security Operations Center (SOC) requires a combination of automation and human tradecraft to successfully repel the adversary. Learn more about the modern SOC in LookingGlass’ webinar featuring guest IDC, August 29 @ 2pm ET.

In today's podcast, we talk with guests Andrei Soldatov and Irina Borogan, authors of the book The Red Web.

Cyber Security Summits: August 29 in Chicago & in NYC on September 25 (Chicago, Illinois, United States, August 29, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The NSA, Darktrace, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, October 2, 2018) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Tuesday, October 2nd, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. To receive the early-bird rate, register now!

Dateline Black Hat

Parisa Tabriz's Black Hat 2018 keynote challenges infosec's status quo (SearchSecurity) Google's Parisa Tabriz celebrated defenders and the long-term, incremental work that can lead to better security during her Black Hat 2018 keynote address in Las Vegas.

A Guided Tour of the Asian Dark Web (SecurityWeek) To gain a better understanding of Asian onion sites and black markets, researchers from IntSights embarked on a six-month long investigation and analysis.

How hackers can defeat cyber deception methods (Fifth Domain) Effective cyber deception requires believability and diversity of information. But closely inspecting the data can defeat any spoofing attempt.

New research says ZTE phones could be hacked (Fifth Domain) The Chinese telecommunications firm ZTE have manufacturing vulnerabilities that allow them to be taken over.

A New Pacemaker Hack Puts Malware Directly on the Device (WIRED) Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will.

Brace for more Triton-like attacks, researchers warn (ComputerWeekly) The world has not seen the last of industrial control system (ICS) attacks like Triton, researchers have warned.

How long is too long for a cyber operation? NSA has an idea (Fifth Domain) Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers.

Reconnaissance, Lateral Movement Soar in Manufacturing Industry (SecurityWeek) High volume of malicious internal reconnaissance and lateral movement observed in the manufacturing industry, reports threat detection firm Vectra

Attacker Behavior Industry Report 2018 Black Hat Edition (Vectra) The Black Hat Edition of the Vectra® Attacker Behavior Industry Report provides a first-hand analysis of active and persistent attacker behaviors inside cloud, data center and enterprise environments of Vectra customers from January through June 2018.

The increased risk of cyberattacks against manufacturing organizations 2018 Spotlight Report (Vectra) Manufacturing organizations today rely on countless devices that are wirelessly connected, including numerous industrial internetof-things (IIoT) devices and others that integrate information technology (IT) with operational technology (OT).

Proofpoint Launches Three People-centric Cybersecurity Innovations: TAP Isolation, Enhanced Threat Detection, and Threat Response Python Scripting (GlobeNewswire News Room) Cybersecurity leader boosts advanced attack protection to safeguard how people work today across personal/corporate email, social media, and cloud applications

Xori Adds Speed, Breadth to Disassembler Lineup (Dark Reading) A new open source tool, introduced at Black Hat USA, places a priority on speed and automation.

Cyber Attacks, Threats, and Vulnerabilities

US-CERT warns of new RAT threat from North Korea (iTnews) State-sponsored malware writers sharing code.

North Korea's hackers are re-using old code to build new attacks (ZDNet) One of the world's most notorious cyber warfare operations has been cutting corners - but it hasn't dented their potency.

A First Look at the North Korean Malware Family Tree (BleepingComputer) Security researchers have analyzed malware samples from threat actors associated with North Korea and discovered connections with tools from older unattributed campaigns.

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families (McAfee Blogs) Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?

U.S. braces for possible cyberattacks after Iran sanctions (News-Gazette) The U.S. is bracing for cyberattacks Iran could launch in retaliation for the re-imposition of sanctions this week by President Donald Trump, cybersecurity and intelligence experts say.

History's Lesson Regarding Russian Cyber Warfare (The Cipher Brief) The world got a glimpse of Russian hybrid warfare ten years ago, and the lessons have never been more clear than they are today.

A botnet of smart irrigation systems can deplete a city's water supply (Help Net Security) Researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation systems that water simultaneously.

Flaws in Smart City Systems Can Allow Hackers to Cause Panic (SecurityWeek) Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn

Phones sold by the four major US carriers could have a major security flaw (Engadget) Sources say 'millions' of customers could be affected by the vulnerability.

Flaw in BIND Security Feature Allows DoS Attacks (SecurityWeek) High severity vulnerability affecting a security feature in the BIND DNS software can be exploited for DoS attacks. Patches and workarounds available

Amazon AWS error exposes info on 31,000 GoDaddy servers (Engadget) The documents contained detailed server configurations and Amazon Web Services pricing scenarios.

Researchers Find Flaws in WPA2's 4-way Handshake Implementations (SecurityWeek) Researchers have discovered several security vulnerabilities in implementations of Wi-Fi Protected Access two (WPA2)’s 4-way handshake, which is used by nearly all protected Wi-Fi networks.

Leaked GitHub API Token Exposed Homebrew Software Repositories (SecurityWeek) A GitHub API token leaked from Homebrew’s Jenkins provided a security researcher with access to core Homebrew software repositories (repos).

Cisco let an SSL cert expire in its VPN kit – and broke network provisioning brokers (Register) Well that's one way to secure systems: deny new trustpoints

Oh, fore putt's sake: Golf org PGA bunkered up by ransomware attack just days before tournament (Register) That's rough, bet they were well teed off – crooks want Bitcoin

WhatsApp security snafu allows sneaky 'message manipulation' (Register) You could put words in people's mouths, claim researchers

Smartphone Voting Is Happening, but No One Knows if It's Safe (WIRED) Online voting has major security flaws, and experts are concerned that Voatz, the platform West Virginia will use this midterm election, doesn't solve them.

Fortnite for Android goes “off market” – is that good or bad? [VIDEO] (Naked Security) Fortnite for Android will sidestep Google Play and be an “off market” experience – is that good or bad? We discuss the issues…

Butlins customer data exposed following phishing attack (Computing) Data of 34,000 customers exposed but not payment details, claims Butlins

10 Threats Lurking on the Dark Web (Dark Reading) Despite some high-profile takedowns last year, the Dark Web remains alive and well. Here's a compilation of some of the more prolific threats that loom.

Security Patches, Mitigations, and Software Updates

August Patch Tuesday forecast: Looking ahead after a frustrating July - Help Net Security (Help Net Security) Approaching August Patch Tuesday, we are supposed to be in the ‘dog days’ of summer where everything slows down. Unfortunately, July was full of CVEs and

NetComm Fixes Wireless Router Holes (ISS Source) NetComm Wireless created new firmware to mitigate multiple vulnerabilities in its 4G LTE Light Industrial M2M Router, according to a report with NCCIC.

Microsoft adding sandbox security feature to Windows 10 called 'InPrivate Desktop' (Neowin) InPrivate Desktop for Windows will work to help administrators run software programs from untrusted sources in a sandbox so that any risk and changes to the host operating system may be prevented.

Cyber Trends

Is the hype around AI deceiving cybersecurity professionals? (Silicon Republic) AI hype in the cybersecurity industry could be doing more harm than good, according to a global report from Eset.

Phishing and Social Media, Will it Over Take Email? (Security Boulevard) Each year in our Phishing Trends and Intelligence (PTI) report our team highlights the continued growth and impact email-based phishing attacks continue to have on brands and people around the globe. In following these trends, email-based attacks are still steadily growing in numbers; however, this begs the question of what the future holds. More specifically, at what point will phishing emails plateau and something else take its place?

State of Cyber Hygiene Report (Tripwire) Tripwire’s State of Cyber Hygiene report reveals the results of an extensive cybersecurity survey conducted in partnership with Dimensional Research. The survey examined if and how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as "Cyber Hygiene."

Atlanta, Orlando, and Denver Have the Highest Malware Infection Rates Among Major Cities in the U.S. During First Half of 2018 (EnigmaSoft Ltd) Atlanta, Orlando, and Denver top the list of the most malware-infected cities in the U.S. That's according to data released today by EnigmaSoft, makers of the SpyHunter 5 anti-malware software.

When it Comes to Managing Third-Party Risk, Many Organizations Are Falling Short (Security Boulevard) Many companies today do business in more complex environments than ever. They work with numerous third-party partners including suppliers, B2B customers, vendors, cloud providers, managed services providers, consulting firms, and others.


SinoTech: Google Plans Opening to China, and the NDAA Lets the ZTE Deal Off the Hook (Lawfare) Lawfare’s bi-weekly roundup of U.S.-China technology policy news.

Capsule8 Secures $15M in Series B Round (GlobeNewswire News Room) New funding led by ClearSky Security will fuel engineering and sales momentum

ClearSky Raises $244.7M for First Security Venture Capital Fund (FinSMEs) ClearSky, a venture capital and growth equity firm, raised $244.7m for its first security fund. ClearSky Security Fund I has been supported by 94 investors

VirtualArmour Wins $2.8 Million Contract with Global Chemical Manufacturing Company (GlobeNewswire) VirtualArmour International Inc.(CSE:VAI) (3V3:F) (OTCQB:VTLR), a premier cybersecurity managed services provider, has won a new Managed Threat Intelligence services contract with a global chemical manufacturing company and a long-time VirtualArmour customer.

Keeper Security Adds Two New Strategic Team Members (Markets Insider) Keeper Security, Inc., the leading creator of zero-knowledge security solutions, Keeper Password Manager and KeeperCha...

Cybersecurity Vet Joel Bagnal Named Vericlave President & COO (GovCon Wire) Joel Bagnal, a former executive at L3 Technologies (NYSE: LLL) and BAE Systems' U.S. subsidiary, has

Products, Services, and Solutions

Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits (Help Net Security) The Crowdfense platform allows vulnerability researchers to safely submit, discuss and quickly sell single 0day exploits and chains of exploits.

MSPs Reap Significant Benefits Of Enhanced Cloud Services That Offer Improved Revenue And Margin Opportunities (PRNewswire) StorageCraft Cloud Services Give MSPs Options of Cloud Pooling, One-Click Orchestrated Recovery, and 30-Day Free Virtualized Recovery

WhiteSource unveils free open source Vulnerability Checker (Help Net Security) Vulnerability Checker provides companies with real-time alerts on the 50 most critical open source vulnerabilities published in the open source community.

New G Suite Alerts Provide Visibility Into Suspicious User Activity (SecurityWeek) G Suite administrators can keep an eye on account actions that seem suspicious and can also opt in to receive alerts when critical actions are performed.

Ivanti and Huawei partner in response to high security demands (Information Age) Ivanti and Huawei have have partnered up to tackle increasing services and security demands from customers.

CyVent signs Partnership Agreement with 24By7Security (Benzinga) CyVent signs Partnership Agreement with 24By7Security The companies will help clients with complementary and end-to-end cybersecurity and cyber resilience services PR Newswire...

Norton Core Validates Need for Home Wi-Fi Network Security: More Than 90 Million Threats Blocked in First Year (Markets Insider) Since launching in August 2017, Symantec’s Norton Core secure Wi-Fi router for the connected home has blocked more than 90 million threats at the network level. Since launching in August 2017, Symantec’s Norton Core secure Wi-Fi router for the connected home has blocked more than 90 million ...

CyberSponse Unveils its New CyOPs Community Edition (Benzinga) CyberSponse, Inc., an aggressive and disruptive leader in Security Orchestration Automation and Response is proud to unveil...

Criptext Announces New Email Client With Focus on Your Privacy (BleepingComputer) After Facebook revealed that users' data was collected without their consent and used for political campaigns, more and more people across the world started looking for a secure medium to communicate. Today, Criptext, an independent company, announced a new email app which is hyper-secure and cares about your privacy.

Dragos Makes Critical ICS Threat Intelligence More Accessible to Cybersecurity Community with New Partner Integrations (BusinessWire) Dragos to integrate ICS-specific threat intelligence with leading cyber intelligence partners ThreatConnect, Recorded Future, ThreatQuotient, and EclecticIQ

Lastline announces AI-driven network traffic analysis solution (Geospatial World) US: Lastline, the leader in advanced threat protection, has announced Lastline Network Defender, an AI-driven network security product that prevents costly business disruption by stopping advanced threats from entering or operating within a network. Companies can more effectively protect sensitive data and valuable IP from cyber attack with their limited security staff. Security teams are facing …

Sumo Logic Expands Certification Program to Empower Users to Better Secure Modern Applications and Cloud Infrastructures (Security Boulevard) New Certification Level Helps Users Learn How to Bolster the Security of Environments with Advanced Cloud Security Analytics and Threat Intelligence to

Technologies, Techniques, and Standards

Election Tech Providers Join Cybersecurity Group to Bolster Systems Ahead of Midterms (Wall Street Journal) A group of elections technology vendors on Wednesday announced plans to partner with an IT-focused cybersecurity information sharing group to better protect voting infrastructure amid allegations of a widespread Russian effort to interfere in the 2016 U.S. election.

An Executive Guide to the Network and Information Security (NIS) Directive (CyberX) Get a free copy of 2017 global ICS & IIoT Risk Report: Data-driven analysis of ICS, SCADA and IIoT vulnerabilities based on the analysis of 375 OT networks.

Enterprises as modern software factories: Infusing security throughout the app dev process (Help Net Security) Learn how to improve app dev process security. Using a modern software factory approach, like DevOps, can improve an enterprise’s overall speed and agility.

What current, hopeful federal employees should know about polygraphs ( Federal security clearances may grab headlines, but the polygraph portion has gone virtually unchanged for decades. Now they're getting a closer look.

Back to Basics: Retro Cybersecurity Lessons Still Matter (SecurityWeek) People are becoming complacent and ignoring the basic lessons we learned decades ago. Technology has advanced immensely since 1990 when the term “cybersecurity” arrived on the scene.

Four Ways to Mitigate Cyber Risks for ERP Applications (SecurityWeek) Recommendations to help improve the cyber security posture of your organization’s ERP applications, whether deployed on premise or in public, private and hybrid cloud environments.

Three Ways To Thwart Email Scams And Protect Your Employees' Most Sensitive Data (Forbes) Because of the sensitive data we oversee, HR professionals will continue to be a primary BEC target.

Research and Development

DARPA takes aim at deepfake forgeries (Naked Security) DARPA’s MediaFor project has come up with tools it says can spot AI-created fakes.

DARPA looks to BAE for cyber tools - DB - Digital Battlespace (Shephard Media) BAE Systems will develop cyber-hunting tools for the US Defense Advanced Research Projects Agency under a deal announced on 7 August.  The work will be ...

SEI Seeks Responses to ODNI-Sponsored Online Cyber Intelligence Survey (PRNewswire) SEI Seeks Responses to ODNI-Sponsored Online Cyber Intelligence Survey

Cyber Intelligence Tradecraft Survey (Carnegie Mellon University Software Engineering Institute) Welcome to the Cyber Intelligence Tradecraft Survey.

Legislation, Policy, and Regulation

Russia Braces For 'Crushing' New Sanctions Over Electoral Interference (Atlantic Council) On August 8, the Russian newspaper Kommersant published a draft of what they claim is the new Defending American Security from Kremlin Aggression Act (DASKAA), a bill US senators introduced on August 2 that aims to punish Moscow for its...

Moscow to retaliate in sanctions war with US (Times) President Trump’s hopes for a thaw in relations between Moscow and Washington appeared to have been dashed last night as Russia signalled it was ready for a full-blown economic war over the...

S. Korea to reshape scandal-ridden cyber command, eyes 'absolute superiority' in online ops (Yonhap News Agency) South Korea will revamp its scandal-tainted cyber command to shore up public trust and secure "absolute superiority" in the increasingly crucial security domain, the defense ministry said Thursday.

Cyber minister pushes ‘forward defence’ for Australia (Computerworld) Despite many of the information security threats faced by Australian governments and the private sector coming from known sources, not enough is not being done to block bad actors, according to the minister for cyber security and law enforcement, Angus Taylor.

Analysis | The Cybersecurity 202: Here's what security researchers want policymakers to know about the Internet of Things (Washington Post) One thing: More cyberattacks are coming.

Litigation, Investigation, and Law Enforcement

FCC lied to Congress about made-up DDoS attack, investigation found (Ars Technica) Despite lies to Congress, US attorney declined to prosecute any FCC employees.

FCC Denies Cyber Attack Ever Happened, But the Evidence Isn't Clear-Cut (InsideSources) Federal Communications Commission (FCC) Chairman Ajit Pai released a statement Monday backtracking on the agency's previous position that its public commen

MIT crypto system shares police data without wrecking investigations (Engadget) The cryptographic approach could improve transparency in law enforcement without over-exposing the officers themselves.

Cryptography May Hold the Key to Preventing a Surveillance Dystopia (Inverse) Cryptography May Hold the Key to Preventing a Surveillance Dystopia

INM threatens to sue experts who ran data ‘interrogation’ (The Irish Times) Outside contractors searched company system for information about individuals

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Insider Threat Program Development-Management Training Course (San Antonio, Texas, USA, September 17 - 18, 2018) Insider Threat Defense will hold its highly sought-after Insider Threat Program Development-Management Training Course, in San Antonio, Texas, on September 17-18, 2018. This two-day training course will...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) Advancing global collaboration and innovation. SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

Security in our Connected World (Beijing, China, September 19, 2018) This year’s seminar will not only examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), but will also delve into their associated business and...

Detect 18 (National Harbor, Maryland, USA, September 19 - 21, 2018) Detect '18 is the single largest conference dedicated to threat intelligence. This year we're calling on fellow "Threatbusters" to wage a high-tech battle against apparitions (aka bad actors) and learn...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

IT Security Leadership Exchange (Phoenix, Arizona, USA, September 23 - 25, 2018) IT Security Leadership Exchange is an invitation-only, strategic business summit that gathers Chief Information Security Officers (CISOs), senior decision-makers, and industry experts to address the unique...

Global Security Exchange (Las Vegas, Nevada, USA, September 23 - 27, 2018) Global Security Exchange—formerly the ASIS Annual Seminar and Exhibits—delivers new opportunities to exchange key ideas and best practices, expand global connections, and experience innovations. The GSX...

Merging of Cyber Criminal and Nation State Techniques: A Look at the Lazarus Group (Loudon, Virginia, USA, September 24, 2018) This presentation on North Korea's Lazarus Group as a case study of the convergence of organized cyber crime and nation-state intelligence services will be led by Allan Liska, a solutions architect at...

Connect Security World 2018 (Marseilles, France, September 24 - 26, 2018) While the number of IoT devices predicted by 2020 varies within tens of billions, all analysts agree that security is now the top concern of organizations looking at deploying IoT solutions. To address...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.