skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

The Olympic Destroyer malware that hit the Winter Games being held in South Korea appears to be a complex piece of work. It's a wiper, it spreads via EternalRomance (one of the alleged Equation Group exploits the Shadow Brokers leaked), and it also contains a self-patching functionality that enables it to change its characteristics as it moves from machine to machine. Cisco's Talos research unit have been examining it, and finds some similarities to code used in NotPetya and BadRabbit, and speculation about attribution has turned largely toward Russia, but speculation remains based mostly on motive and opportunity.

The US Intelligence Community's annual threat assessment sees Iran, Russia, and North Korea as growing more assertive in cyberspace. They expect Russian influence operations (propaganda and disinformation) during this year's midterm elections. The goal is to sow discord and mistrust.

On Patch Tuesday, Microsoft fixed fifty bugs, fourteen rated critical, affecting widely used products, including Outlook. Adobe patched thirty-nine flaws in Acrobat and Reader. 

US Army Lieutenant General Paul Nakasone, long the front-runner, has been nominated to succeed Admiral Rogers as Director NSA and Commander, US Cyber Command. He'll be dual-hatted, at least initially, when he takes over this summer. A fourth star will come with the job.

Graham Cluley reports that Salon magazine now offers a choice: you can block ads, but only if you let them install a coinminer on your machine. Mining is disruptive but not very lucrative: the recent CoinHive infestations seem have brought the crooks about $24.

Notes.

Today's issue includes events affecting Canada, China, Iran, Democratic Peoples Republic of Korea, Republic of Korea, Russia, United States, and Vietnam.

Do you know your adversary’s next move? We do.

Getting a leg up on your adversary – cyber espionage, cyber crime, or hacktivism – is no easy feat. You need strategic intelligence…from the experts. But what makes intelligence strategic? Learn more in LookingGlass’ webinar featuring the experts. Join our Sr. Directors of Research and Analysis Jonathan Tomek and Olga Polishchuk on February 21 @ 2PM ET for a discussion covering what security teams need to proactively defend against your next cyber attack. Sign up now!

In today's podcast, we hear from our partners at Ben Gurion University of the Negev, as Yossi Oren talks about two-factor authentication for the disabled. Our guest is John Kuhn from IBM X-Force IRIS on the uptick in spam around the Valentine’s Day holiday.

Cyber Security Summits: February 13 in Silicon Valley & Atlanta on February 28 (Silicon Valley, California, USA, February 13, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350) https://CyberSummitUSA.com

Compete to win prize money plus the chance to be DataTribe’s next big investment (Online, March 23 - April 25, 2018) The DataTribe Inaugural Cyber Funding Competition: We put real firepower behind every idea. If you're part of a entrepreneurial technology team with a vision to disrupt cybersecurity and data sciences — we want to enhance your growth prospect with the opportunity for a DataTribe-financed seed capital of $2,000,000. Plus possible millions more in a Series A Venture Capital Round. The top three finalists will share $20,000 in prize money.

Cyber Attacks, Threats, and Vulnerabilities

‘Olympic Destroyer’ Cyberattack Disrupted Pyeongchang Opening Ceremony (Variety) Hackers targeting the 2018 Winter Olympic Games managed to disrupt internet and TV operations during Friday’s opening ceremony using malware dubbed “Olympic Destroyer” …

Olympic Destroyer Data-Wiping Malware Is More Complex Than Previously Thought (BleepingComputer) The Olympic Destroyer malware that has caused damage to PyeongChang 2018 Winter Olympics computer networks is much more complex than previously thought.

Hackers Hit Winter Olympics in Attempt to Shame Organizers (Bloomberg.com) A cyberattack paralyzed internet networks at the opening ceremony of the Pyeongchang Winter Olympics in what appeared to be a bid to embarrass the organizers.

Winter Olympics hacked: Was it just disruptive or something more sinister? (Security Brief) The Winter Olympics recently fell victim to a cyberattack which seemed to be just a disruption, but this expert says there could be more behind it.

Cyber Threats to the 2018 Winter Olympics (Booz Allen Cyber4sight) Eleven-time U.S. Olympic medalist Mark Spitz once said, "If you failed to prepare, you're prepared to fail."

Russian actors mentioned as possibly launching Olympics cyber-attack (SC Media UK) Industry executives have gathered evidence showing the culprit behind the cyber-attack that hit the 2018 Winter Olympics might be a Russian group.

Attribution Games: Don't Rush to Blame (BankInfo Security) Following the online attack against the opening ceremonies of the Olympic Winter Games in South Korea, some pundits were quick to guess that Russia was involved. But some attribution experts call the rush to attribute any cyberattack premature or even "irresponsible."

Don’t cave in to Kremlin, Russia’s opposition leader Alexei Navalny tells tech giants (Times) Russia’s opposition leader has urged Google and Facebook to refuse Kremlin demands to block his latest investigation about a government official meeting an oligarch on a yacht with a group of...

Russia, Iran and North Korea Bolder in Cyber Realm (SIGNAL) The intelligence community delivers the annual threat assessment to Congress.

Russia Sees Midterm Elections as Chance to Sow Fresh Discord, Intelligence Chiefs Warn (New York Times) As the midterm elections approach, Russia is likely to throw more propaganda at Americans in an effort to deepen political divisions, American intelligence chiefs said.

5 Takeaways From the Worldwide Threats Briefing (WIRED) In a Senate hearing Tuesday, the heads of the three-letter intelligence agencies detailed their greatest concerns.

Salon website gives you a choice: turn off your ad blocker or let us mine cryptocurrencies (Graham Cluley) If you don't want to disable your ad blocker, maybe you'll feel comfortable letting Salon.com run code from Coinhive which will gobble up your computer's resources to mine some Monero cryptocurrency.

Newest Powerful Malware Threat Compromises Chinese, US Company Data (Digital Journal) CyberByte, the leading Romania-based cybersecurity and software solutions firm, has recently uncovered yet another powerful malware threat that has encroached upon numerous companies across Asia and the United States. This latest malware campaign, which goes by the name of Operation PZChao, has been indiscriminately affecting companies in the education, government, technology and telecommunications sectors and are located in the aforementioned geographical areas, scraping passwords, performing Bitcoin mining, and providing hackers with complete remote access and control of infected systems.

New AndroRAT Variant Emerges (SecurityWeek) A newly discovered variant of the AndroRAT mobile malware can inject root exploits to perform malicious tasks

Zero-Day in Telegram's Windows Client Exploited for Months (SecurityWeek) A zero-day vulnerability impacting Telegram Messenger’s Windows client had been exploited in malicious attacks for months before being discovered and addressed.

Kaspersky Says Telegram Flaw Used for Cryptocurrency Mining (Bloomberg.com) Hackers have been able to exploit a vulnerability in the Telegram messaging app’s desktop client to earn units of cryptocurrencies such as Monero and ZCash, according to Kaspersky Lab.

Telegram 0-Day Used to Spread Monero and Zcash Mining Malware (BleepingComputer) Malware authors have used a zero-day vulnerability in the Windows client for the Telegram instant messaging service to infect users with cryptocurrency mining malware, researchers from Kaspersky Lab plan to reveal today.

Critical Telegram flaw under attack disguised malware as benign images (Ars Technica) If you haven’t updated your Windows app lately, now would be a good time.

IT Pros: IoT Devices Most Vulnerable to Wi-Fi Attacks (Infosecurity Magazine) 92% of IT pros concerned about risks of using public Wi-Fi on company-owned devices

Email Fraud Attackers Grow More Sophisticated as the Average Number of Identities Spoofed per Organization Doubled in Q4 (Proofpoint) Proofpoint conducted extensive research to assess the state of email fraud in 2017. We analyzed a larger email fraud dataset than ever before, including more than 160 billion emails sent to more than 2,400 companies, spanning 150 countries.

A year after University email hacking, “Wildfire” email sparks further internet security concerns (The Michigan Daily) A year after hackers sent racist and anti-Semitic emails to engineering and computer science students, the University is still dealing with concerns regarding internet security — especially in the context of accurate security alerts reaching students on campus. 

Hacker extracts customer data from Canadian Telecom Firm after rebuttal (HackRead) A hacker who found critical vulnerability in Canadian Freedom Mobile has no downloaded the customer data.

Shedding tears over WannaCry (Sungard Availability Services) WannaCry ransomware crippled organizations in more than 150 countries worldwide. Here are some proactive measures to guard against a cyber-attack.

From Vietnam without love: Asia Pacific's next cyber attack hub (Security Brief) Vietnam may be called the next Silicon Valley for its technology prowess, but for the first time it is now one of the top five cyber attack sources.

How to not fall victim to a 'spoofing' cyber attack (Western Mass News) In an exclusive interview, Holyoke’s City Treasurer told Western Mass News she fell victim to a $10,000 cyber attack.

How to prove and fight online dating and romance scams (CSO Online) Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

Love letters from a Black Hat to all the fools on the Internet (Help Net Security) As an underground, "black hat" hacker, I don't have time for significant others. This Valentine's Day I want to show my appreciation by sending love letters to all those ignorant fools on the Internet that pay my bills by making the same mistakes over and over.

Security Patches, Mitigations, and Software Updates

Microsoft Patch Tuesday, February 2018 Edition (KrebsOnSecuirty) Microsoft today released a bevy of security updates to tackle more than 50 serious weaknesses in Windows, Internet Explorer/Edge, Microsoft Office and Adobe Flash Player, among other products. A good number of the patches issued today ship with Microsoft’s “critical” rating, meaning the problems they fix could be exploited remotely by miscreants or malware to seize complete control over vulnerable systems — with little or no help from users.

February Patch Tuesday Is a Bouquet of Fixes for Privilege Escalation Vulnerabilities (TrendLabs Security Intelligence Blog) Microsoft’s Patch Tuesday for February has a bevy of fixes addressing 50 security issues in Windows, Office (including Office Services and Web Apps), SharePoint, Internet Explorer, Edge, and ChakraCore JavaScript engine, as well as additional patches for the notorious Meltdown and Spectre vulnerabilities.

Microsoft February Patch Tuesday Fixes 50 Security Issues (BleepingComputer) Microsoft has released the February 2018 Patch Tuesday security updates, and this month's release comes with fixes for 50 vulnerabilities, along with additional patches for the Meltdown and Spectre vulnerabilities (ADV180002).

Adobe Patches 39 Vulnerabilities in Acrobat and Reader (SecurityWeek) Adobe patches 39 vulnerabilities in Acrobat and Reader, and two flaws in Experience Manager. No exploits in the wild

Microsoft to provide Windows Defender ATP for older OS versions (Help Net Security) Microsoft will backport Windows Defender ATP to meet the security needs of organizations that have not yet entirely switched to Windows 10.

Cyber Trends

Syncsort State of the Mainframe Report Reveals Focus on Improving Performance and Controlling Costs Across Full IT Environment (Syncsort) Uncovers five major trends; highlights data infrastructure optimization use cases and challenges from mainframe to the cloud

Marketplace

Carbonite acquires Mozy from Dell for $145.8 million (ZDNet) Carbonite also reported mixed Q4 and full year earnings.

Blueliv Secures €4M in Series A Funding (FinSMEs) Blueliv, a Barcelona, Spain-based provider of enterprise-class cyberthreat intelligence solutions, raised €4m in Series A funding

Deepfence Emerges from Stealth with Container Security Platform (eWEEK) New container security startup emerges from stealth, in a bid to help enterprises improve security for cloud native workloads.

4 questions raised by GD's deal for CSRA (Washington Technology) The blockbuster combination of General Dynamics IT with CSRA raises lot of questions about their strategy and the market at-large. We try to answer some of them.

Seeking Growth, Raytheon Reshuffles Forcepoint Cybersecurity Unit (The Motley Fool) The business, which was acquired in 2015 for $1.57 billion, is seeking to boost growth after a rebuilding period.

Intercede awarded Middle East contract worth more than £1m (ShareCast News - London South East) AIM-listed software and service company Intercede has been awarded a contract by a Middle Eastern country for its MyID solution worth more than £1m.

Former Information Security Bureaucrats, now cybersecurity top guns elsewhere (CISO MAG) The Information Security Officers who have walked through regency corridors are now assisting enterprises in constructing their cybersecurity retreats, as the increasing incidents of cyber heists continue to be a cause of worry for governments and businesses across the world. The last few years have seen top guns in bureaucracy changing gears to propel the …

Products, Services, and Solutions

Introducing HackerOne Response, the latest app from Coalition (Solve Cyber Risk - the Coalition blog) The HackerOne Response app, create in partnership with HackerOne, is another tool in the cyber risk management platform offered to all Coalition policyholders.

Netwrix becomes an approved CPE provider (Netwrix) Netwrix brings value to the IT community by providing CPE-accredited educational content for IT professionals.

Seagate, RackTop Launch Secure Data Storage Product for Governments (SecurityWeek) Seagate and RackTop join forces to launch a secure data storage product designed to help government organizations address cybersecurity and compliance challenges

Large Financial Institution Partners with Comodo CA to Diversify Security Portfolio (EIN News) Comodo CA, a worldwide leader in digital identity solutions, today announced that it has entered into an enterprise partner agreement with one of the largest

Verizon to Use KSI Blockchain Technology Developed for Estonia (SDxCentral) Verizon Enterprise Services plans to use KSI blockchain technology developed by Guardtime for the Estonian government.

CrowdStrike Falcon Endpoint Protection Platform Validated Against MITRE ATT&CK™ Framework in Nation-State Emulation Test (BusinessWire) CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced it has successfully completed an evaluation by MITRE’s Leveragin

Dragos Releases Dragos Platform 1.2 (PR Newswire) Industrial cybersecurity company Dragos, Inc. today announced that Dragos...

City, University of London, selects PhishMe to provide the highest degree of phishing and ransomware protection (Markets Insider) University employs human behavioural conditioning techniques designed to build student and staff resilience to phishing

Eaton, UL teaming on cybersecurity testing for power management (Electric Light & Power) The program, currently in development on a limited basis, aligns Eaton’s testing methodologies and data generation with the UL Cybersecurity Assurance Program for UL standards 2900-1 and UL 2900-2-2. 

Grant Thornton Australia strengthens defences with Darktrace (Cambridge Network) Darktrace, the world’s leading AI company for cyber defence, has today announced that leading growth advisory firm, Grant Thornton Australia, has deployed the Enterprise Immune System to detect emerging cyber-threats in real time, in partnership with The Missing Link.

Zimperium Delivers Industry's First Mobile Security Solution Available Across All Cloud Platforms (PR Newswire) Zimperium, the global leader in mobile security, today announced that its...

Canon Dumps Perimeter Security for Vera's Data-centric Approach (eWEEK) New relationship takes aim at data leaks and protects digital information processed by multi-function devices and digital imaging solutions.

Palo Alto Networks extends security to the big 3 public clouds (CSO Online) Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

Technologies, Techniques, and Standards

Cloud Security Alliance Releases New Report Examining Ways in Which Blockchain Technology Can Facilitate, Improve IoT Security (Cloud Security Alliance) Report offers high-level overview, use-case examples of blockchain for IoT security

Hybrid data storage is growing rapidly in the digital workplace (Help Net Security) Hybrid data storage provides businesses with flexibility, combining the mobility of the cloud with the performance and security of on-premises infrastructure.

How to guard your data like it’s an Olympic sport (The Parallax) Heading to the Winter Olympics in South Korea or another major public event? Don’t let yourself get so carried away with excitement that you forget that the bad guys are just waiting for you to slip up.

Can Ancient Chinese Military Strategy Bring Success in Cyber Conflict? (Data Center Knowledge) Without an understanding of who the enemy really is, how they operate, and the many techniques they use to gain entry, successful defense is unlikely.

Endpoint security suites must have these features (CSO Online) Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete.

Unnecessary security cordons making fintech more vulnerable: Rahul Kumar,WinMagic (Banking & Finance) It is no gainsaying the fact that fintech is the most preferred hunting ground for hackers and attackers.

‘BuckHacker’ Search Engine Lets You Easily Dig Through Exposed Amazon Servers (Motherboard) This makes searching through leaky Amazon Web Services servers much easier.

AI and Machine Learning: Breaking Down Buzzwords (Dark Reading) Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.

Design and Innovation

AMP for email is a terrible idea (TechCrunch) Google just announced a plan to "modernize" email, allowing "engaging, interactive, and actionable email experiences." Does that sound like a terrible idea to..

Research and Development

Cyber R Would Go Up at Defense, Down At Standards Agency (Defense One) Budget proposal would cut 18% from NIST, just as it updates cybersecurity rules that apply across government.

Facebook Funded Most of the Experts Who Vetted Messenger Kids (WIRED) Equally notable are the experts Facebook did not consult: Two large nonprofits say they weren’t informed about the app until weeks or days before its debut.

Academia

Girls Go CyberStart Competition Kicks Off Next Week (WBOI) A multi-state effort aimed at getting more women in the cybersecurity career pipeline comes to the web this month. High school girls from 16 states will

Legislation, Policy, and Regulation

Intel chiefs: No direction from Trump on election security (FCW) At a Senate hearing, three intelligence chiefs acknowledged the White House has not specifically directed them to dedicate resources towards securing election infrastructure, but told lawmakers they are still focused on addressing the issue.

As Primaries Loom, Election Security Efforts Behind Schedule (Dark Reading) While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.

Army's Nakasone nominated to lead U.S. Cyber Command and the National Security Agency (Federal Times) Lt. Gen. Paul Nakasone has been tapped to be the next commander of U.S. Cyber Command and director of the National Security Agency.

Here’s how Cyber Command is preparing for its next job (Fifth Domain) The Department of Defense is taking steps to prepare to elevate Cyber Command to a full, unified combatant command?

Outsourcing Intel: How Intel-for-Hire Undermines U.S. Intelligence (MintPress News) Despite lacking professional credentials, a commitment to public service, or the minimum amount of vetting that would go into a security clearance background check, these private-sector spies collect intelligence that is passed along and ultimately may be included in the President’s Daily Briefing.

Litigation, Investigation, and Law Enforcement

U.S. senators concerned about Chinese access to intellectual property (Reuters) China is trying to gain access to sensitive U.S. technologies and intellectual properties through telecommunications companies, academia and joint business ventures, U.S. senators and spy chiefs warned on Tuesday at a Senate hearing.

Six top US intelligence chiefs caution against buying Huawei phones (CNBC) The directors of the CIA, FBI and NSA express their distrust of Apple-rival Huawei and fellow Chinese telecom company ZTE.

NY Top Court: Private Facebook Postings Not Off Limits in Discovery (New York Law Journal) The New York State Court of Appeals decided 7-0 that limiting access only to a person’s public posts on Facebook is counter to “New York’s history of liberal discovery.

Text Messages as Evidence: The Current State of Affairs in New York State Courts (New York Law Journal) Does each individual text message in a chain require a separate foundation and basis for admissibility? Examination of available case law suggests that the answer is yes.

Russia says hackers stole more than $17 million from its banks in 2017 (Reuters) Hackers stole more than 1 billion roubles ($17 million) from Russian banks using the Cobalt Strike security-testing tool in 2017, a central bank official said on Tuesday.

The Cybersecurity Legal Plot Thickens (SecurityInfoWatch.com) When it comes to cyber vulnerability and liability, integrators are often stuck in the middle between manufacturers and customers

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Security Titans (Scottsdale, Arizona, USA, February 23, 2018) Security Titans is a ground-breaking event, bringing the biggest names in Information Security together - all in one day, on a single stage to give the nation's cyber security industry access to the very...

CyberThreat 18 (Westminster, England, UK, February 27 - 28, 2018) Hosted by the UK’s National Cyber Security Centre, a part of GCHQ, and the SANS Institute, CyberThreat18 brings together a packed schedule of talks on a broad range of familiar and less familiar topics...

Midlands Cyber: US Cyber Market Workshop (Lutterworth, England, UK, February 27, 2018) We are delighted to announce that we will be running two workshops, led by Andy Williams, the International Director of the iCyber Centre @bwtech, Maryland. The workshops have been tailored by the team...

European Cybersecurity Forum – CYBERSEC Brussels (Brussels, Belgium, February 27, 2018) CYBERSEC Forum is an unique opportunity to meet and discuss the current issues of cyber disruption and ever-changing landscape of cybersecurity related threats. Our mission is to foster the building of...

The Cyber Security Summit: Atlanta (Atlanta, Georgia, USA, February 28, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

PrivacyCon 2018 (Washington, DC, USA, February 28, 2018) The 2018 PrivacyCon will expand collaboration among leading privacy and security researchers, academics, industry representatives, consumer advocates, and the government. As part of this initiative, the...

NITSIG Meeting: Protecting Controlled Unclassified Information On U.S. Government Contractor Information Systems (Laurel, Maryland, USA, March 2, 2018) This meeting will discuss the security control requirements for the protection of Controlled Unclassified Information (CUI), for contractor information systems upon which CUI is processed, stored on, or...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, March 6 - 7, 2018) The course will cover current regulations like National Insider Threat Policy NITP and NISPOM Conforming Change 2, and more. The course will provide the ITP Manager and Facility Security Officer with the...

SINET ITSEF 2018 (Silicon Valley, California, USA, March 7 - 8, 2018) Bridging the gap between Silicon Valley and the Beltway. SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment...

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes...

SecureWorld Boston (Boston, Massachussetts, USA, March 14 - 15, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.