skip navigation

More signal. Less noise.

Get the top 10 vulnerabilities used by cybercriminals.

Recorded Future researchers have scoured open web, dark web, and technical sources to discover which vulnerabilities are being actively exploited by cybercriminals. Download the report now.

Daily briefing.

The Jerusalem Post reports that Clearsky says Hamas has been trying to install a bogus version of a missile warning app on Israeli smart phones. The app is a multifunctional one, designed to record conversations, take pictures, send texts, and geolocate the infected phone.

A new variant of Dharma ransomware—it appends a [dot]cmb extension to the files it encrypts, is now circulating in the wild. Like other stains of Dharma, this is installed manually by exploiting Remote Desktop Protocol. There's no decryptor available yet, and as always the first defense against a ransomware attack is secure, reliable, regular backup.

Radware reports that vulnerable D-Link routers are being exploited by criminals to send people to bogus Brazilian banks where they're bubbled out of their cash.

Dr. Web reports that a version of Clipper for Android is in circulation. As its name suggests, the malware replaces crypto-wallet addresses in the victim's clipboard with addresses that redirect to the criminals' wallets.

Utilities remain on alert for expected cyberattacks. In the US, the Tennessee Valley Authority, a large power provider, is taking steps to secure itself against hacking. Such attacks may not be as direct as expected. Princeton University researchers report results that suggest a botnet of home water heaters and air conditioners could cycle power demand rapidly enough to disrupt a significant portion of the grid.

An ioActive researcher has demonstrated the ability to hack not just in-flight airline Wi-Fi, but the satellite communications networks they and other aircraft systems depend on.

Notes.

Today's issue includes events affecting Australia, Brazil, China, Ecuador, India, Israel, Russia, United States.

Don’t let threats SOC you where it counts.

Protecting your organization from an attack involves much more than the traditional “block & tackle” tactics of the past. A good boxer doesn’t just block the punch they see coming, they move against the next anticipated punch. The modern Security Operations Center (SOC) requires a combination of automation and human tradecraft to successfully repel the adversary. Learn more about the modern SOC in LookingGlass’ webinar featuring guest IDC, August 29 @ 2pm ET.

In today's podcast, we speak with our partners at the University of Maryland's Center for Health and Homeland Security, as Ben Yelin talks about how the police have used facial recognition software to nab suspects.

Cyber Security Summits: August 29 in Chicago & in NYC on September 25 (Chicago, Illinois, United States, August 29, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The NSA, Darktrace, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com

Wombat Wisdom Conference, September 18 to 20, 2018, Pittsburgh, PA (Pittsburgh, Pennsylvania, United States, September 18 - 20, 2018) Gain expert insights for strengthening your security awareness program at the Wombat Wisdom Conference, Sept. 18-20, 2018. Ideal for CISOs and infosec professionals looking to share ideas and actionable concepts for improving security awareness and training.

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, October 2, 2018) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Tuesday, October 2nd, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. To receive the early-bird rate, register now!

Cyber Attacks, Threats, and Vulnerabilities

Hamas Tries to Hack Israeli Cell Phones with Fake App (JerusalemOnline) Designed to warn about anti-missile alarms.

FBI Warns of ‘Unlimited’ ATM Cashout Blitz (KrebsOnSecurity) The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an “ATM cash-out,” in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours.

US-CERT issues malware analysis on KEYMARBLE RAT, attributes threat to North Korea (SC Media US) Through its US-CERT division, the U.S. Department of Homeland Security yesterday issued a new analysis report on a remote access trojan called KEYMARBLE th

Ecuador's All-Seeing Eye Is Made in China (Foreign Policy) The country's pioneering surveillance and response system is entirely Chinese-built and funded.

Study: Iran Cyberattacks for Cash (VOA) In interview with VOA Persian, Accenture Security strategist says his US-based team has seen Iranian state hackers using more ransomware

In-flight satellite comms vulnerable to remote attack, researcher finds (Naked Security) On a journey between Madrid and Copenhagen, researcher Ruben Santamarta decided to use Wireshark to study the aircraft’s in-flight Wi-Fi.

15,000-strong army of Twitter robots found spreading cryptocurrency spam (Naked Security) Researchers unearthed an army of 15,000 robot Twitter accounts plying a cryptocurrency scam.

New Cmb Dharma Ransomware Variant Released (BleepingComputer) On Thursday a new variant of the Dharma Ransomware was discovered that appends the .cmb extension to encrypted files. This article will discuss how you become infected with the Cmb ransomware and how it encrypts a computer.

Hackers Exploiting DLink Routers to Redirect Users to Fake Brazilian Banks (BleepingComputer) Attackers are targeting DLink DSL modem routers in Brazil and exploiting them to change the DNS settings to a DNS server under the attacker's control. This then allows them to redirect users attempting to connect to their online banks to fake banking websites that steal the user's account information.

Comcast Xfinity web flaws exposed customer data (Naked Security) It’s one thing to discover a data leak, it’s another to find out from a journalist that your website is leaking customer data.

«Доктор Веб» обнаружил троянца-клипера для Android (Dr.Web) «Доктор Веб» – российский разработчик антивирусных программ и сервисов для предоставления услуг информационной защиты для корпоративных и частных пользователей.

An Android Spy App Left 1.7 Million Passwords And Nude Photos Exposed To Hackers (Forbes) Google's app store is home to spy apps that can be turned into powerful espionage tools by hackers, affecting millions of people, researchers warn.

How hackers can defeat cyber deception methods (Fifth Domain) Effective cyber deception requires believability and diversity of information. But closely inspecting the data can defeat any spoofing attempt.

How Hacked Water Heaters Could Trigger Mass Blackouts (WIRED) A new study found that just 42,000 of those hacked home devices could be enough to leave a country of 38 million people in the dark.

White Hat Hacker Infiltrates Several Commercial Aircraft Security Systems (KoDDoS Blog) His unsettling discovery was that the internet security system on the multimillion-dollar aircraft was very vulnerable to hackers, which in turn makes every connected personal device vulnerable.

Police Bodycams Can Be Hacked to Doctor Footage (WIRED) Analysis of five body camera models marketed to police departments details vulnerabilities could let a hacker manipulate footage.

Millions of Android Devices Are Vulnerable Right Out of the Box (WIRED) Firmware bugs introduced by manufacturers and carriers put Android smartphones at risk.

Android devices are stunningly vulnerable if you're a careless power-user (Mashable) Android users don't need to freak out just yet

Criminals can compromise company networks by sending malicious faxes (Help Net Security) Check Point has revealed details about the two RCE flaws it discovered in the communication protocols used in tens of millions of fax devices globally.

Fax Machines Are Still Everywhere, and Wildly Insecure (WIRED) Researchers have demonstrated that sending a single malicious fax is all it takes to break into a network.

Hackable Touchscreens Could Spy on Hotel Rooms and Meetings (WIRED) The technology company Crestron makes touchscreen panels and other equipment for places like conference rooms, which a researcher found can be turned into hidden microphones and webcams.

Analysis | The Cybersecurity 202: State officials bristle as researchers -- and kids -- at Def Con simulate election hacks (Washington Post) The tension is clouding the election security debate.

Hacking the websites responsible for election information is so easy an 11 year-old did it (TechCrunch) It’s time to talk about election security. Over the weekend at Def Con, the annual hacker convention in Las Vegas to discuss some of the latest and greatest (or scariest) trends in the wild world of hacking, a pair of election security hacking demonstrations set up for adults and kids alike o…

U.S. House candidates vulnerable to hacks: researchers (Reuters) Three of every 10 candidates running for the U.S. House of Representatives have significant security problems with their websites, according to a new study by independent researchers that underscores the threat hackers pose to the November elections.

Campaigns and candidates still easy prey for hackers (POLITICO) The Democrats' cyber-trauma of 2016 has inspired increased awareness — and some paranoia — about digital security. But experts say it's not enough.

Thousands of Android devices get stolen every month: study (TahawulTech.com) An average of 23,000 Android devices are being reported lost or stolen per month, according to the latest findings by Kaspersky Lab.

Hackers Found a Way to Make the Amazon Echo a Spy Bug (WIRED) Researchers found they could turn the smart speakers into surveillance devices—if they could get their own attack tool on the same Wi-Fi.

Siri is listening to you, but she’s NOT spying, says Apple (Naked Security) Apple’s working to keep iPhones from eavesdropping on us, through privacy policies, short buffer windows, local storage, and app review.

5 Examples of How Cheating in Fortnite Gets You Infected (BleepingComputer) Have you ever heard the saying "If it's too good to be true, then it probably is." If so, then it applies perfectly to programs that claim they can help you cheat in Fortnite or earn free V-Bucks. In this article we take a look at 5 malware samples that pretend to be Fortnite cheats, hacks, or tools.

Security Patches, Mitigations, and Software Updates

DNS Leak Fixed in Kaspersky VPN App for Android (BleepingComputer) Kaspersky has fixed a bug in their Kaspersky VPN app for Android that leaked the computer's configured DNS server while using a VPN connection.

ZTE To Fix Smartphone Security Flaws (Channel News) Research from the US Department of Homeland Security has discovered several security vulnerabilities in ZTE handsets, allowing hackers to access to user data without their knowledge. The news comes after Telstra ceased selling ZTE devices earlier this year.

Cyber Trends

AI for cybersecurity is a hot new thing—and a dangerous gamble (MIT Technology Review) Machine learning and artificial intelligence can help guard against cyberattacks, but hackers can foil security algorithms by targeting the data they train on and the warning flags they look for.

Security's bane: The false positive (Help Net Security) Since false positives are a reality in the security world, we should be intentional and proactive in the way we deal with them.

Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality (Help Net Security) More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network.

Commentary: The SingHealth breach and the uphill task of governing cyberspace (Channel NewsAsia) Anonymity, long-distance penetration and the quality of stealth suggest a very different international order is at play in cyberspace, says one ...

India’s youth need cyberspace safeguards (dna) India’s youth need cyberspace safeguards - Specific legislation dealing with cyber bullying and introducing digital do’s and don’ts are the need of the hour

Aussie businesses would spend $166K to remediate a cyber attack (ARN) Australian organisations would spend an average of $166,000 in response to a major cyber event, “significantly lower” than the global average.

Marketplace

Ethical hacking jobs outstrip demand (Enterprise Times) Joblift is reporting that demand for ethical hacking jobs in the UK is outstripping demand by threefold which means salaries are continuing to climb

NSA Director: The Agency 'Sells Itself' to Potential Recruits (Government Executive) Nakasone tells industry group of 92 percent retention rate, need for diversity.

Cybersecurity Stocks: Many Are Hot But The Buyer Should Beware (Investor's Business Daily) The performance of cybersecurity stocks in the current round of earnings reports offers insight on this seemingly hot tech sector — and why the investor should beware.

Hiring of Chinese telecoms firm Huawei is security threat, experts warn (Times) Experts have accused the government of taking an unacceptable risk by clearing equipment from the Chinese company Huawei for use in critical infrastructure. They claim the telecoms giant has the...

China trips, lobbyists and media moguls: Inside Huawei’s WA charm offensive (The Sydney Morning Herald) A WAtoday investigation reveals Chinese telco Huawei spent years building influence within WA's political and business circles before winning a $136 million contract from the state government.

Can a combined Dimension Data and NTT work? (ARN) Following industry analysis covering the why aspect of the deal, key questions now centre around the feasibility of such an agreement.

SAIC Wins Potential $861M Navy C4ISR Tech Production IDIQ - GovCon Wire (GovCon Wire) Science Applications International Corp. (NYSE: SAIC) has won a potential seven-year, $861.1 million

Crypto company aims to buy its way onto wary Tokyo Stock Exchange (Nikkei Asian Review) Noah Ark's push to use Beat as virtual coin springboard puts bourse in a bind

Former Director of the NSA and Commander of US Cyber Command joins CyberCube's Board, bringing cybersecurity expertise to the insurance industry | (NEWSTAGE) CyberCube, a leading provider of cyber risk analytics for the insurance industry, today announced the

Products, Services, and Solutions

Secure messaging app, Signal, gets a new look in Android, iOS, and desktop (TechnoChops) Open-source and secure messaging app by Open Whisper Systems, Signal, just received a brand new user interface (UI) in its latest update, 4.24.7 in Android, 2.28.0 in iOS, and 1.15.0 in desktops. When you open the Signal app in mobile, you will notice the change of confirmation icon on the Read receipts/messages sent. Before the […]

The Security App That Actually Makes Browsing Easier (Wall Street Journal) The new Dashlane security suite—with password manager, a VPN and a tool to check if your personal information has been stolen—is the easiest way yet to protect yourself on the internet.

The Donau Chemie Group partners with Kaspersky Lab to boost its cyber-defenses (Enterprise Innovation) With cybersecurity already at the heart of its business processes, the Donau Chemie Group's priority is to measure the effectiveness of cybersecurity training among its staff.

Technologies, Techniques, and Standards

TVA center works to prevent cyber attack on power (Enewscourier.com) They say the bigger you are, the harder you'll fall, but at TVA, they're working around the clock to make sure the nation's largest public power utility doesn't fall to

Protecting the power grid: TVA beefs up security as cyber threats grow (Timesfreepress.com) Within the Tennessee Valley Authority's new cybersecurity center in the utility's downtown Chattanooga Office Complex, two dozen IT specialists stare at their computer terminals and scan email messages, twitter feeds and network activity looking to spot any signs of cyber threats.

Machine Learning Can Identify the Authors of Anonymous Code (WIRED) Researchers have repeatedly shown that writing samples, even those in artificial languages, contain a unique fingerprint that's hard to hide.

Design and Innovation

Ridding the World of Twitter Bots, One Network at a Time (PCMAG) A pair of researchers analyzed thousands of Twitter accounts looking for an algorithm to identify bots. They revealed their findings at the Black Hat security conference.

Microsoft Looks to Trusted Computing for Blockchain Security Boost (CoinDesk) The phrase "trusted execution environment" is identified in two Microsoft patent applications to be a key component in future blockchain projects.

What Termites Teach Us About Robot Cooperation (WIRED) We imagine that the future of autonomous swarms is machinelike perfection, but moments of unpredictable, Three Stooges–like chaos are also likely to emerge.

Legislation, Policy, and Regulation

House Intel lawmakers introduce bipartisan election security bill (TheHill) Four lawmakers on the powerful House Intelligence Committee, including two Republicans, are introducing legislation to help states secure the nation's digital election infrastructure against cyberattacks following Russian interference in the 2016 election.

New election security bill would require fast action from feds (Fifth Domain) A bipartisan group of lawmakers on the House Intelligence Committee are introducing legislation to protect local elections infrastructure from cyber attacks following Russian meddling in the 2016 election.

Unisys CEO: It's time for a cybersecurity agency in America (The Augusta Chronicle) Times change, and given the intersecting trends of increasing global cyber threats and the civilized world’s increasing dependence on Internet

US-Russian Cybersecurity: Espionage at Home and Afar (71 Republic) The US and several multinational organizatons have a focus on cybersecurity and spying, and so it falls to whistleblowers to expose them.

Election officials say money, training needed to improve security (Las Vegas Review-Journal) Regional U.S. election officials attending a hacker conference in Las Vegas Friday said they need more money and training to enhance cybersecurity of their election infrastructure.

Litigation, Investigation, and Law Enforcement

Rick Scott demands Bill Nelson provide proof of Russian election meddling (Tampa Bay Times) Amid growing concerns over the security of Florida voter registration systems, Gov. Rick Scott demanded Friday that Sen. Bill Nelson prove a vague claim that Russians have penetrated state safeguards.

Feds indict 12 for allegedly buying iPhones on other people’s dimes (Naked Security) They allegedly hacked into phone accounts, convinced retailers they were who they weren’t, and upgraded to shiny new gadgets for small fees.

Nuix founder Castagna cops seven years jail sentence for offshore tax fraud (iTnews) Ministers savage fraud detection software founder.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Insider Threat Program Development-Management Training Course (San Antonio, Texas, USA, September 17 - 18, 2018) Insider Threat Defense will hold its highly sought-after Insider Threat Program Development-Management Training Course, in San Antonio, Texas, on September 17-18, 2018. This two-day training course will...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) Advancing global collaboration and innovation. SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

Security in our Connected World (Beijing, China, September 19, 2018) This year’s seminar will not only examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), but will also delve into their associated business and...

Detect 18 (National Harbor, Maryland, USA, September 19 - 21, 2018) Detect '18 is the single largest conference dedicated to threat intelligence. This year we're calling on fellow "Threatbusters" to wage a high-tech battle against apparitions (aka bad actors) and learn...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

IT Security Leadership Exchange (Phoenix, Arizona, USA, September 23 - 25, 2018) IT Security Leadership Exchange is an invitation-only, strategic business summit that gathers Chief Information Security Officers (CISOs), senior decision-makers, and industry experts to address the unique...

Global Security Exchange (Las Vegas, Nevada, USA, September 23 - 27, 2018) Global Security Exchange—formerly the ASIS Annual Seminar and Exhibits—delivers new opportunities to exchange key ideas and best practices, expand global connections, and experience innovations. The GSX...

Merging of Cyber Criminal and Nation State Techniques: A Look at the Lazarus Group (Loudon, Virginia, USA, September 24, 2018) This presentation on North Korea's Lazarus Group as a case study of the convergence of organized cyber crime and nation-state intelligence services will be led by Allan Liska, a solutions architect at...

Connect Security World 2018 (Marseilles, France, September 24 - 26, 2018) While the number of IoT devices predicted by 2020 varies within tens of billions, all analysts agree that security is now the top concern of organizations looking at deploying IoT solutions. To address...

The Cyber Security Summit: New York (New York, New York, USA, September 25, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

5th Cyber Operations for National Defense Symposium (Washington, DC, USA, September 25 - 26, 2018) The 2018 Cyber Operations for National Defense Symposium will focus on the evolving nature of US Cyber policies and strategies. Cyber leaders from throughout the federal government will come together to...

PCI Security Standards North America Community Meeting (Las Vegas, Nevada, USA, September 25 - 27, 2018) The PCI Security Standards Council’s 2018 North America Community Meeting is THE place to be. We provide you the information and tools to help secure payment data. We lead a global, cross industry effort...

Hack the Capitol (Washington, DC, USA, September 26 - 27, 2018) The National Security Institute is partnering with the Wilson Center and ICS Village to host Hack the Capitol, a two-day event focused on Industrial Control Systems (ICS) and security. ICS are used throughout...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.