skip navigation

More signal. Less noise.

2017 cyberattacks proved more numerous, sophisticated, and ruthless than in years past.

WannaCry, NotPetya, ransomware-as-a-service, and fileless attacks abounded. And, that’s not everything. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. Read The Cylance Threat Report: 2017 Year in Review Report and learn about the threat trends and malware families their customers faced in 2017.

Daily briefing.

A day after Microsoft's announcement that it had taken control of six domains used for Russian disinformation operations (Russia says they didn't do it), Facebook reported that it had taken down six-hundred-fifty-two "pages, accounts, and groups" which were engaged in "inauthentic" behavior aimed at influencing US opinion. This is the second round of such takedowns in as many months. Last month Facebook was reluctant to offer attribution. There's no coyness this time: the company said directly that the inauthenticity emerged from Russia and Iran. There's no evidence of coordination between the two states. Tehran's front accounts purchased about $6 thousand in ads to run on Facebook and Instagram, and organized some twenty-five events. Iranian activity seems directed toward creating a climate of opinion favorable to Tehran as opposed to influencing elections.

Early this morning Twitter also took action against two-hundred-eighty-four accounts engaged in "coordinated manipulation," disinformation staged in many cases by Iran. This campaign used a network of front news organizations established for the purpose, and also organized a number of events. The themes were obvious choices: anti-Saudi, anti-Israeli, anti-Trump, and pro-Palestinian. A number of the impersonations posed as progressive supporters of US Senator Sanders (Independent, Vermont).

The Iranian information campaign was uncovered by researchers at FireEye, which noted that Google+ and YouTube were also affected. 

Last week US National Security Advisor Bolton said that Iran, China, and North Korea were involved in election meddling along with Russia. So now two of the familiar four seem to have been caught.

Notes.

Today's issue includes events affecting Australia, Brazil, Cuba, Germany, Iran, Democratic Peoples Republic of Korea, Russia, United Kingdom, United States.

Don’t let threats SOC you where it counts.

Protecting your organization from an attack involves much more than the traditional “block & tackle” tactics of the past. A good boxer doesn’t just block the punch they see coming, they move against the next anticipated punch. The modern Security Operations Center (SOC) requires a combination of automation and human tradecraft to successfully repel the adversary. Learn more about the modern SOC in LookingGlass’ webinar featuring guest IDC, August 29 @ 2pm ET.

In today's podcast, we speak with our partners at Cisco's Talos team, as Craig Williams discusses MDM (mobile device management) vulnerabilities. Our guest is James Burns of CFC Underwriting who lays some cyber security insurance knowledge on us.

Cyber Security Summits: August 29 in Chicago & in NYC on September 25 (Chicago, Illinois, United States, August 29, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The NSA, Darktrace, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com

IR18: Don’t Forget to Register for the first and only community-driven IR conference! Built by the community, for the community. (Arlington, Virginia, United States, September 5 - 6, 2018) IR18 is a conference for cybersecurity professionals to learn and develop playbooks to improve incident response processes. Receive 20+ hours of practical training on today’s best practices in IR topics, including 36 breakout sessions designed for all levels of experience.

Rapid Prototyping Event: The Chameleon and the Snake (Columbia, Maryland, United States, September 17 - 20, 2018) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM, is hosting a Rapid Protoyping Event that specifically targets malware signature diversity and signature measurement for Microsoft Windows in a simulated operational environment at a realistic pace. Join us September 17-20, 2018 at UMBC Training Center in Columbia, MD.

The force is stronger when MSPs and MSSPs come together. (Webinar, September 19, 2018) The managed service market has grown tremendously, with the demand for managed security being unprecedented. For managed service providers (MSPs) looking to answer those demands, partnering with a managed security services provider (MSSP) expands access to highly-skilled cyber security analysts and a full suite of security solutions. Join Delta Risk’s webinar, September 19 at 1 PM ET, to learn how the two sides can join forces.

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, October 2, 2018) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Tuesday, October 2nd, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. To receive the early-bird rate, register now!

Dragos Industrial Security Conference (DISC) 11/5/18 (Hanover, Maryland, United States, November 5, 2018) Reserve your spot now for the Dragos Industrial Security Conference (DISC) on November 5th, 2018. DISC is a free, annual event for our customers, partners, and those from the ICS asset community. Visit https://dragos.com/disc/ for more information.

Cyber Attacks, Threats, and Vulnerabilities

Facebook, Twitter Remove Accounts Linked to Iran, Russia (VOA) Anouncements come after Microsoft said it had taken control of websites it said were trying to hack into conservative American think tanks and the US Senate

Facebook Pulls 652 Fake Accounts Engaged in Coordinated Influence Campaign Ahead of Midterms (Wall Street Journal) Facebook Inc. dismantled 652 pages, groups and accounts engaged in an coordinated influence campaign ahead of the 2018 U.S. midterm elections, part of the social-media company’s broader purge of bad actors on its site

Facebook: Iran has been posting hundreds of fake pages since 2011 (Ars Technica) State-run media, military intelligence posted politically charged memes for years.

Taking Down More Coordinated Inauthentic Behavior (Facebook Newsroom) We removed multiple Pages, groups and accounts for coordinated inauthentic behavior on Facebook and Instagram.

Iran's fake news push was much bigger than Facebook, and spread to Twitter and Google (Business Insider) Twitter announced that it has suspended  284 accounts for "coordinated manipulation" a day after a tip-off from cybersecurity firm about a coordinated Iranian-backed influence campaign caused Facebook to shut down 652 pages.

Twitter Safety on Twitter (Twitter) “Working with our industry peers today, we have suspended 284 accounts from Twitter for engaging in coordinated manipulation. Based on our existing analysis, it appears many of these accounts originated from Iran.”

Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East (FireEye) FireEye has identified a suspected influence operation that appears to originate from Iran aimed at audiences in the U.S., U.K., Latin America, and the Middle East.

Sprawling Iranian influence operation globalizes tech’s war on disinformation (Washington Post) The Iranian effort dated to 2011 and had ties to state media operations in that country, Facebook said, involving hundreds of accounts on both Facebook and its sister site, Instagram. It also spread to Twitter and YouTube, with accounts that both companies said they also removed.

We are taking new steps against broadening threats to democracy - Microsoft on the Issues (Microsoft on the Issues) It’s clear that democracies around the world are under attack. Foreign entities are launching cyber strikes to disrupt elections and sow discord. Unfortunately, the internet has become an avenue for some governments to steal and leak information, spread disinformation, and probe and potentially attempt to tamper with voting systems. We saw this during the United...

Russia denies Microsoft allegations it targeted U.S. think tanks: Ifax (Reuters) The Russian authorities deny allegations from Microsoft that hackers linked to Russia's government tried to target the websites of two right-wing U.S. think-tanks, the Interfax news agency reported on Tuesday.

Fake News 2.0: The propaganda war gets sophisticated (Axios) Creators of fake news are becoming increasingly savvy

Analysis | The Cybersecurity 202: Tech giants open up about election cyberthreats as specter of regulation looms (Washington Post) "It's a corporate win-win," one expert said.

The Untold Story of NotPetya, the Most Devastating Cyberattack in History (WIRED) Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.

New "Turning Tables" Technique Bypasses All Windows Kernel Mitigations (BleepingComputer) Security researchers have discovered a new exploitation technique that they say can bypass the kernel protection measures present in the Windows operating systems.

Misconfigured backup leads to exposure of 50.5 million GOMO Mobile customers (HackRead) The same company was once caught spying on its Keyboard app users.

USBHarpoon Is a BadUSB Attack with A Twist (BleepingComputer) Several security experts have built a malicious version of a USB charging cable, one that can compromise a computer in just a few seconds. Once plugged in, it turns into a peripheral device capable of typing and launching commands.

Malspam Campaign Targets Banks Using Microsoft Publisher (Trustwave) It's very unusual for malware authors to utilize publishing software like Microsoft Publisher which is mainly used for fancy documents and desktop publishing tasks. So when we saw an email sample with a .pub attachment (Microsoft Office Publisher file) and...

This new ransomware campaign targets business and demands a massive bitcoin ransom (ZDNet) Ryuk ransomware attackers demand huge sums of Bitcoin for returning encrypted files in what appear to be highly targeted attacks.

JavaScript Web Apps and Servers Vulnerable to ReDoS Attacks (BleepingComputer) JavaScript web apps and web servers are susceptible to a specific type of vulnerabilities/attacks known as regular expression (regex) denial of service (ReDoS).

Don’t want Google tracking you? You have almost no choice, according to a study. (Washington Post) It's almost impossible to escape Google's advertising tracking, according to a new study from Digital Content Next -- a frequent Google critic.

Third Party Apps: The Next Big Data Sharing Scandal? (Forbes) In the wake of the data sharing scandal over Facebook and Cambridge Analytica, the building of websites using third party widgets could be the stage for the next big story.

WhatsApp to clamp down on 'sinister' messages in India: IT minister (Reuters) India said Facebook-owned WhatsApp had pledged on Tuesday to develop tools that would combat fake messages, to help the country crack down on people whipping up public anger through mass message forwards on social media.

Facebook Fueled Anti-Refugee Attacks in Germany, New Research Suggests (New York Times) Towns where people use Facebook more also had more attacks on refugees, building on suspicions that the platform makes users more prone to violence.

ICAP condemns cyber-attack to web site that spreads the reality of Cuba (Radio Cadena Agramonte) The Cuban Institute of Friendship with the Peoples (ICAP) denounced today a cybernetic attack against Cubainformación.tv, alternative way of the Basque Country.

Security Patches, Mitigations, and Software Updates

Microsoft dates Windows 8.1's demise (CRN Australia) Urges developers to port to Windows 10.

Skype Gets a Major Security Upgrade (Fortune) Skype gets end-to-end encryption of text and calls that even, its owner, Microsoft can't intercept.

Cyber Trends

Most Americans Continue to Have Privacy and Security Concerns, NTIA Survey Finds (NTIA) Privacy and security online continue to be major issues for Americans, according to an NTIA survey conducted by the U.S. Census Bureau.

Loss of Customer Trust and Confidence Biggest Consequence of DDoS Attacks (Infosecurity Magazine) New study examines the worst effects of DDoS attacks for a business

In an Evil Internet Minute, $1,138,888 is Lost to Cybercrime, Reveals RiskIQ (GlobeNewswire News Room) With cybercriminals costing the global economy $600 billion last year alone, global digital threat management leader RiskIQ tapped proprietary and third-party research to examine the growing volume of malicious activity on the internet to reveal the latest ‘Evil Internet Minute.’

E is for Efficiency (Optiv) Efficiency has become the most sought-after outcome for security operations teams. The ideal state is a self-learning environment with automated analysis, triage, and remediation.

Cyber security reaching a ‘tipping point’ (Government News) Australian organisations are facing increasingly frequent and “more destructive” data breaches and need to adopt integrated risk management, experts warn.

Malaysia’s financial sector warms up to cloud, but lacks security leadership (ComputerWeekly.com) Almost two-thirds of Malaysia’s financial services firms are developing a cloud strategy but not all have a security plan in place

Marketplace

Fortinet: Firms Adopting Managed Security Services For Ease Of Use (CRN) Customers want to migrate risk out of their IT department and avoid having to worry themselves about the loss of intellectual property, compliance regulations, or associated fines, according to Fortinet’s Stephan Tallent.

Companies reliant on consumer data are at risk (Help Net Security) The Data Privacy Puzzle report finds that companies with business models reliant on the increasing quantity and scope of consumer data are at risk.

Six Degrees acquires CNS Group in security consultancy drive (Cloud Pro) The service provider will sell CNS Group’s Cyber Security Maturity Benchmarking model to clients

Fulton cyber firm raising funds after acquiring tech, leadership from Silent Circle (Baltimore Business Journal) Gregg Smith is CEO of new cyber company Attila Security Inc. Previously, he has led two other local cyber firms, Silent Circle and Optio Labs Inc.

The demand for Data Discovery and Classification tools helps Netwrix exceed its Q2 2018 target (Netwrix) Netwrix’s quarterly results highlight rising demand for Netwrix Auditor in the consumer goods, education and government sectors, as well as major product update and new leadership

Products, Services, and Solutions

KnowBe4 Partners With Twist & Shout Expanding Its Library of Security (PRWeb) KnowBe4, the world’s largest security awareness training and simulated phishing platform, has entered into a strategic partnership with Twist & Shout, crea

IDC White Paper Finds Recorded Future Customers Identify Threats 10x Faster (Recorded Future) Results from an IDC White Paper reveal that Recorded Future users are afforded more time to proactively attack threats before they impact the organization.

Trustar Developers Set To Unveil A New ‘Early Warning System’ Called White Rabbit (HiBusiness) Sometime this week in Las Vegas, two events were organized dedicated to information security and the global hacking counterculture, namely – Black Hat Arsenal and Defcon 2018. As the conference goe…

CrowdStrike Helps Advance Malware Searches on Hybrid Analysis Portal (eWEEK) The Hybrid Analysis community portal is getting a technology infusion from CrowdStrike that will enable researchers to conduct more complex searches for malware analysis.

Thycotic’s cloud-based PAM offering now has full capabilities (Channel Life) Thycotic has upgraded its privileged account management-as-a-service offering with all of the features of the on-premise version.

Arista partners with VMware and Zscaler for hybrid cloud security (Help Net Security) Arista Networks partners with VMware and Zscaler for hybrid cloud security. Integration includes VMware NSX Data Center and Zscaler for holistic security.

Dojo by BullGuard and BGN Technologies form partnership to develop IoT security technology (Help Net Security) Dojo by BullGuard and BGN Technologies partner to develop technologies for automated IoT threat detection utilizing AI and machine learning algorithms.

Zerum Selects Webroot BrightCloud Threat Intelligence Services (PRNewswire) Webroot, the Smarter Cybersecurity® company, today announced its partnership with Zerum, a security and operations data science company

Veristor Partners with Signal Sciences to Unify Web Application Security in Multi-Cloud Environments (PRNewswire) Nex-Gen WAF and RASP Solutions Provide Reliable Blocking and Security Attack Protection without Impacting Application Performance

Reporting on inactive users (Netwrix) How to get a list of all inactive users in the IT ennironment

Gigamon and Endace collaborate to clean network traffic (Security News Desk) Endace and Gigamon have announced a technology partnership designed to improve transparency and clean network traffic to ensure against security threats

Technologies, Techniques, and Standards

Brazilian Army Conducts Unprecedented Cyberdefense Exercise (Dialogo Americas) The Cyber Guardian exercise brought together finance, nuclear, and defense experts to increase the security of Brazil’s critical structures.

Fleet Cyber Command and Information Warfare Training Group Synchronize Cybersecurity Inspections (DVIDS) U.S. Fleet Cyber Command’s Office of Compliance and Assessment (OCA) and the Information Warfare Training Group (IWTG) are working together towards ensuring Navy cyber assessments and inspections are aligned, synchronized and provide greater value to operational commanders through the Command Cyber Operational Readiness Inspections (CCORI) program.

Ransomware Attacks in Healthcare: Nine Key Questions Answered (Manatt) Discover the answers to nine critical questions on how healthcare organizations can prepare and protect themselves from ransomware attacks.

Design and Innovation

6 reasons gamification improves cybersecurity training (TechRepublic) Experts suggest using gaming as a framework to bolster cybersecurity training for employees. Find out why.

Research and Development

"L'ordinateur quantique n'aura pas de limite dans son pouvoir" (Agefi) Les technologies de machine learning conduisent à un changement de paradigme. Dont les entreprises n’ont pas encore mesuré l’ampleur, selon Kelly Richdale, SVP ID Quantique à Genève.

Academia

Education needs to adapt in cyber age (Financial Review) Training of cyber security professionals needs to be enhanced to deal with the looming threats.

Officials to Cut Ribbon on Cyber Academy (Inside Indiana Business) Governor Eric Holcomb will join officials from the Indiana National Guard and Ivy Tech Community College to cut the ribbon on the new Ivy Tech Cyber Academy at Muscatatuck in Jennings County. The a...

Hackers make internet a dangerous destination (Daily Herald) In the last year, data breaches and compromised-information crises hit major retailers, financial service providers, insurance carriers and social media sites.

Legislation, Policy, and Regulation

MP warns of cyber threat to Australian elections (Computerworld) The shadow assistant minister for cyber security, Gai Brodtmann, has called for the government to classify Australia’s election systems as a “critical infrastructure sector” under the Trusted Information Sharing Network in order to “overlay the appropriate scrutiny and assurance mechanisms to assure the Australian people of the cyber resilience of their democracy”.

U.S. imposes fresh sanctions for Russian cyber-related activity (Reuters) The United States on Tuesday imposed sanctions on two Russians, one Russian company and one Slovakian company for what Washington said were their actions to help another Russian company avoid sanctions over the country's malicious cyber-related activities.

Facing New Russian Hacking, Senators Signal They Are Ready to Act (New York Times) After Microsoft revealed new Russian attacks, senators in three hearings prodded the Trump administration to do more with its existing authorities to protect America’s political infrastructure.

Cyber Threats to Our Nation’s Critical Infrastructure (United States Senate Committee on the Judiciary) Subcommittee on Crime and Terrorism. DATE: Tuesday, August 21, 2018. TIME: 02:30 PM. LOCATION: Dirksen Senate Office Building 226. PRESIDING: Senator Graham.

How America should respond to Russia’s alleged hacking (Fifth Domain) Experts and lawmakers argued that the U.S. should aggressively respond to reports that Russia tried to hack the Senate and conservative think tanks.

Opinion | The U.S. needs to think about the unthinkable on cybersecurity (Washington Post) The longer we go without an effective response, the more pain we’ll suffer.

The Trump Administration Just Threw Out America’s Rules for Cyberweapons (Foreign Policy) U.S. cyberstrategy needs updating, but this isn’t the way to do it.

Britain Confident Trump Will Stand Up to Putin (VOA) British Foreign Secretary Jeremy Hunt says US President Donald Trump has shown indications he will be tougher on Moscow than his predecessors, while administration officials hint at ever stronger sanctions

Sen. Whitehouse raises the specter of 'hack back' once again (Cyberscoop) Sen. Sheldon Whitehouse, D-R.I., raised the specter of "hacking back" once more on Tuesday

Utility Official: DoD, Cyber Command Should Handle ‘Hack-Backs’ (Meritalk) Thomas Fanning, chief executive officer of Atlanta-based electric utility holding company Southern Co. and a key player in developing private-sector cybersecurity policy, said today at a Senate subcommittee hearing that he has begun to have interactions with senior Federal government military leaders about capabilities to “hack back” at cyber attackers, but emphasized he believes that those types of retaliatory capabilities need to remain in the hands of the military rather than become a corporate function.

Taking the Cyber Out of Cyber Command (SIGNAL) The military may be evolving from the cyber era to information operations

State & Territories Plan to Spend Majority of HAVA Grant Funds on Election Security, System Upgrades (US Election Assistance Commission) EAC Releases 48 HAVA Grants State Plans, Budgets

What Does Your State’s Laws Require of your Business Following a Data Breach? (INFOGRAPHIC) (Small Business Trends) If you fall victim to a cyber-attack in the United States, do you know each state has different laws

Litigation, Investigation, and Law Enforcement

Net neutrality activists, state officials are taking the FCC to court. Here’s how they’ll argue the case. (Washington Post) State officials, tech companies and consumer groups are calling the policy change "arbitrary and capricious."

Opinion | A ‘perjury trap’ isn’t the real reason Trump won’t answer Mueller’s questions (Washington Post) We already know Mueller won't indict a sitting president. Here's what Trump is really afraid of.

Michael Cohen Admits to Making Payments to Silence Women With Damaging Information on Trump (New York Law Journal) Michael Cohen admitted making a $130000 payment to Stephanie Clifford known as Stormy Daniels to silence her about her alleged affair with President Donald Trump.

Manafort Found Guilty of Bank, Tax Fraud in First Trial Win for Mueller (New York Law Journal) U.S. District Judge T.S. Ellis declared a mistrial on the 10 remaining counts after polling the jury.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

Wall Street Journal Pro CyberSecurity Executive Forum (New York, New York, USA, December 11, 2018) The WSJ Pro Cybersecurity Executive Forum will bring together senior figures from industry and government to discuss how senior executives can best prepare for hacking threats, manage breaches, and work...

Upcoming Events

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Insider Threat Program Development-Management Training Course (San Antonio, Texas, USA, September 17 - 18, 2018) Insider Threat Defense will hold its highly sought-after Insider Threat Program Development-Management Training Course, in San Antonio, Texas, on September 17-18, 2018. This two-day training course will...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) Advancing global collaboration and innovation. SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

Security in our Connected World (Beijing, China, September 19, 2018) This year’s seminar will not only examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), but will also delve into their associated business and...

Detect 18 (National Harbor, Maryland, USA, September 19 - 21, 2018) Detect '18 is the single largest conference dedicated to threat intelligence. This year we're calling on fellow "Threatbusters" to wage a high-tech battle against apparitions (aka bad actors) and learn...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

IT Security Leadership Exchange (Phoenix, Arizona, USA, September 23 - 25, 2018) IT Security Leadership Exchange is an invitation-only, strategic business summit that gathers Chief Information Security Officers (CISOs), senior decision-makers, and industry experts to address the unique...

Global Security Exchange (Las Vegas, Nevada, USA, September 23 - 27, 2018) Global Security Exchange—formerly the ASIS Annual Seminar and Exhibits—delivers new opportunities to exchange key ideas and best practices, expand global connections, and experience innovations. The GSX...

Merging of Cyber Criminal and Nation State Techniques: A Look at the Lazarus Group (Loudon, Virginia, USA, September 24, 2018) This presentation on North Korea's Lazarus Group as a case study of the convergence of organized cyber crime and nation-state intelligence services will be led by Allan Liska, a solutions architect at...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.