skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

FireEye researchers report ("with high confidence") that North Korean government cyber operators are showing new sophistication and ambition. Studies of the threat group variously known as Reaper, APT37, Group123 (Cisco's Talos unit's name for them), and ScarCruft (as Kaspersky called it) suggest that its aggressively targeting international corporations. 

Most of Reaper's attacks are initiated, FireEye says, with sophisticated social engineering. Crowdstrike, which tracks the group as "Labyrinth Chollima," says they've shown the ability to bridge airgaps by unspecified means.

Reaper is known for pursuing government, defense industry, and media targets, but it's recently added the chemical, electronic, aerospace, healthcare, automotive, and manufacturing verticals to its target list.

Kaspersky Lab says signs indicate that Sofacy, the threat group linked with Russian military intelligence (also known as APT28, Pawn Storm, Sednit, Strontium, and-our favorite-Fancy Bear) has begun to shift its focus eastward from NATO targets. It's now taking a closer interest in Ukrainian and Central Asian networks.

Researchers at Votiro warn that they've determined it's possible to embed Monero-mining script in Microsoft Word documents.

Fraudulent transfers executed over the SWIFT network have prompted a new category of spam. Comodo reports that criminals are distributing the Adwind Trojan as the payload carried by a malicious email attachment that represents itself as a SWIFT transfer notice.

The US Department of Homeland Security is increasing its cybersecurity aid to state election officials as they prepare for midterm voting. The assistance includes classified threat briefings. The Department of Justice has also organized an anti-election-hacking task force.


Today's issue includes events affecting Belgium, Canada, China, European Union, Ireland, Democratic Peoples Republic of Korea, Republic of Korea, Japan, Russia, United Kingdom, United States.

Intelligent response to doing more with less.

Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. How do you fend off these attacks when you don’t have the budget or resources for everything you need to protect your organization: data feeds, tools, analysis and mitigation? Learn more in our webinar on Wednesday, March 21 @ 2pm ET. Sign up now!

In today's podcast we hear from our partners at Accenture, as Justin Harvey describes data-centric security. Our guest, Scott Totzke from ISARA, talks about the threat quantum computing poses to encrypted data.

Cyber Security Summits: February 28 in Atlanta & Denver on March 22 (Atlanta, Georgia, USA, February 28, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350)

Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) Billington International Cybersecurity Summit, March 21, Washington, D.C. Cybersecurity leaders from Asia, Europe, the Middle and U.S. on global threats and best practices, including Acting DoD CIO and Singapore Cyber Commissioner-designate. Sponsor Opportunities: Sandy Nuwar at 443-994-9832

Compete to win prize money plus the chance to be DataTribe’s next big investment (Online, March 23 - April 25, 2018) The DataTribe Inaugural Cyber Funding Competition: We put real firepower behind every idea. If you're part of a entrepreneurial technology team with a vision to disrupt cybersecurity and data sciences — we want to enhance your growth prospect with the opportunity for a DataTribe-financed seed capital of $2,000,000. Plus possible millions more in a Series A Venture Capital Round. The top three finalists will share $20,000 in prize money.

Cyber Attacks, Threats, and Vulnerabilities

Russian Cyberspies Shift Focus From NATO Countries to Asia (SecurityWeek) Russia-linked cyberspy group APT28/Fancy Bear/Sofacy shifts focus from NATO countries and Ukraine to Central Asia and further east

REVEALED: Latest North Korea 'Reaper' CYBERATTACK aims to cripple enemies 'CROWN jewels' ( A NORTH Korean backed hacker group called “Reaper” is targeting major international companies in the latest attempt by the rogue nation to disrupt the day-to-day lives of its enemies, according to a new report.

Lesser-known North Korea cyber-spy group goes international: report (Reuters) A North Korean cyber espionage group previously known only for targeting South Korea's government and private sector deepened its sophistication and hit further afield including in Japan and the Middle East in 2017, security researchers said on Tuesday.

North Korean Hacking Group APT37 Expands Targets (SecurityWeek) North Korean hacker group APT37 (aka Group123, Reaper, ScarCruft) has expanded the scope and sophistication of its operations

N Korea expanding cyber-attack capabilities, intention appears disruption (SC Media UK) North Korea appears to be planning major international cyber-attacks, with espionage group APT37 (Reaper) seen to be expanding its scope

North Korea hacking group is expanding operations, researchers say (CSO Online) A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

North Korea takes a great leap forward in hacking computers (NBC News) The North Koreans have figured out how to bridge the air gap — meaning they can hack into computers that aren't even connected to the internet.

Microsoft chief blames north korea for carrying out wannacry ransomware attack best bitcoin faucet (Bitcoin) Just when we thought WannaCry is dead, done and dusted, Microsoft President Brad Smith has accused North Korea of carrying out the cyberattack.

Tesla Internal Servers Infected with Cryptocurrency Miner (BleepingComputer) Hackers have breached Tesla cloud servers used by the company's engineers and have installed malware that mines the cryptocurrency.

Cryptojacking Scripts Could Soon Invade Your Word Documents (BleepingComputer) Cryptojacking scripts that mine Monero via JavaScript code can also run inside Word files, security researchers have discovered.

Cyber attackers are cashing in on cryptocurrency mining - but here's why they're avoiding bitcoin (ZDNet) Cryptocurrency mining malware has emerged as a key methof of criminal hackers making money - so why aren't they targeting the most valuable blockchain-based currency of them all?

Comodo Threat Research Lab reveals new vicious trick (Comodo News and Internet Security Information) The Comodo Threat Intelligence Lab reveals a new attack used by cybercriminals to camouflage malware attacks.

Scanned Canadian passports found on open FedEx Amazon S3 bucket (IT World Canada) The revelation last week of the discovery of unprotected scanned identification documents from a number of countries -- including Canadian passports --

AWS clients alerted to security risks by researchers (Computer Business Review) AWS cloud storage users have received warnings from security researchers telling them that their private content has been exposed.

Exposed Amazon clients get tip-off alerts (BBC News) US firm's clients told to update their settings and lock down data before it is stolen.

Coldroot RAT Still Undetectable Despite Being Uploaded on GitHub Two Years Ago (BleepingComputer) Coldroot, a remote access trojan (RAT), is still undetectable by most antivirus engines, despite being uploaded and freely available on GitHub for almost two years.

Year-Old Coldroot RAT Targets MacOS, Still Evades Detection (Threatpost) Researchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers.

Study on Fileless Attacks Underscores Risk of Over-Reliance on Endpoint Security (Bricata) The growth of fileless attacks demonstrates why cybersecurity needs to move beyond solely relying on signature analysis for enterprise protection.

Top US banks have multiple online security flaws (BetaNews) Analysis of the internet presence of 25 out of 50 top US banks reveals a worrying number of online security flaws.

Hackers Exploite Tegra Chipset Flaw to Run Linux OS on Nintendo Switch (HackRead) Hackers Exploiting Unpatched Tegra Chipset Flaw to Run Linux OS on Nintendo Switch Putting Nintendo Switch at Risk.

Cybersecurity Enforcers Wake Up to Unauthorized Computer Access Via Credential Stuffing (Big Law Business) Do you ever use the same username and password on more than one website? Most people sometimes do, and thereby put themselves at risk for “ credential stuffing.”

Statically Unpacking a Brazilian Banker Malware (SANS Internet Storm Center) After going through an almost endless amount of encoded droppers and loader scripts while analyzing a Brazilian banker, I finally managed to reach the actual payload, an interestingly packed/encrypted banking malware. How I statically unpacked this payload is the subject of today’s diary and I hope it will help you in your future analysis.

Warning of GDPR extortion attempts from strategic cyber criminals (Information Age) Cyber security roundup report from Trend Micro has revealed a growth in targeted, strategic, money-making attacks against those firms looking to implement GDPR

The advent of GDPR could fuel extortion attempts by criminals (Help Net Security) The number of exploit kit attacks is, slowly but surely, going down, but the bad news is that everything else is on the rise: BEC scams, ransomware, stealthy crypto-mining, the number of enterprise records compromised in data breaches.

Chinese Catholics’ petition suffers cyber attack (Catholic Herald) The petition has been signed by over 1,000 people

UK local councils under huge cyber attack pressure (Computer Weekly) Investigation underlines importance of security automation and employee awareness training.

Security Patches, Mitigations, and Software Updates

Twitter updates its policy on tweets that encourage self-harm and suicide (TechCrunch) Twitter, which is constantly criticized for not doing enough to prevent harassment, has updated its guidelines with more information on how it handles tweets..

Cyber Trends

Munich Security Conference highlights cyber, Russian threat (Inside Cybersecurity) Emerging from the Munich Security Conference, German defense minister Ursula von der Leyen and other NATO leaders said they anticipated an increased focus on cybersecurity while highlighting ongoing cyber threats from Russia.

Spy Chiefs Descend on Munich Confab in Record Numbers (Foreign Policy) An annual security gathering in Munich has become the new hot spot for top intelligence officials meeting in the shadows of a public event.

The Annual Cost of U.S. Cybercrime Could Top $100 Billion ( Companies aren’t properly incentivized to protect their networks and we’re all paying the price, the Council of Economic Advisers concludes.

Cyber security in (big) numbers (BetaNews) We hear a lot about cyber attacks and the latest threats, but it can sometimes be hard to comprehend the scale of the problem.

RedLock Releases Cloud Security Report Highlighting Focus on Shared Responsibilities, Uncovers Cloud-Related Exposures at Tesla (BusinessWire) RedLock releases its Cloud Security Trends report, uncovering serious threat vectors and revealing that hackers infiltrated a Tesla cloud environment.

By the Numbers: Global Cyber Risk Perception Survey (Marsh) Is your organization employing best practices for managing cyber risk? Benchmark your performance against the results of our survey, conducted in partnership with Microsoft.

Business fears: The need for better security in the Internet of Things (VanillaPlus) Cybersecurity in business is often overlooked, underfunded or simply not given enough thought. Though recent research by Avast Business found that 96% of S

C-Level Prioritises Breach Costs Over Customer Losses (Infosecurity Magazine) C-Level Prioritises Breach Costs Over Customer Losses. Centrify study also claims CEOs are too focused on malware threat


Discover hidden cybersecurity talent to solve your hiring crisis (Help Net Security) Folks with security experience on their resumes are in such high demand, CISOs need to hunt beyond the fields we know to find hidden cybersecurity talent.

Cloud security vendor Zscaler files for US$100 million IPO (CRN Australia) Says its partner business accounts for 90 percent of sales.

Google to Acquire IoT Management Platform Xively (SecurityWeek) Google is stepping up its Internet of Things (IoT) game as it has entered into an agreement to acquire Xively, a division of LogMeIn, for approximately $50 million.

Qualcomm increases offer for NXP to $44bn in order to push deal through quickly (Computing) Qualcomm acquisition of NXP could make the company too big a buy for Broadcom

Cisco Systems Raises Dividend 14% - Now What? (Seeking Alpha) Shares of Cisco have jumped on good quarterly results and significant repatriation of cash. The company recently raised its dividend by 14%. Cisco Systems is va

Tech Dividend Showdown: Cisco Vs. IBM (Seeking Alpha) Some tech companies are attractive for income focused investors, despite most tech companies being focused on growth and not paying out attractive dividends. IB

Israeli Cyber Security Startup Morphisec Closes $12 Million Series B (ReadITQuik) Funding was spearheaded by the investing arm of French telco bigwig – Orange

UK cyber security agency sticks with China's Huawei despite US spy fears (The Telegraph) The UK’s top cyber security agency has reaffirmed its commitment to working with Chinese smartphone giant Huawei after US spy chiefs accused the company of presenting a national security risk.

Concerns over ZTE and Huawei security (My Broadband) Intelligence agencies have warned Americans not to purchase Huawei or ZTE smartphones.

CyberArk Software Ltd Sales Leap 25% (The Motley Fool) CEO Udi Mokady said the cybersecurity specialist delivered a "strong finish" to 2017.

Bitcoin’s transaction fee crisis is over—for now (Ars Technica) The median fee peaked at $34 in mid-December—now it's less than $1.

Cybersecurity and Intelligence Expert Tom Kellermann Joins Carbon Black as Chief Cybersecurity Officer (BusinessWire) Carbon Black, a leader in next-generation endpoint security, today announced Tom Kellermann has joined the company as chief cybersecurity officer. As

Products, Services, and Solutions

RiskIQ Announces New Digital Footprint Risk Reporting to Improve Digital Defense (GlobeNewswire News Room) The leader in digital threat management expands Digital Footprint product to cover enterprise risk reporting and prioritize remediation of digital threat exposures outside the firewall

Chef InSpec 2.0 helps automate security compliance in cloud apps (TechCrunch) How many times do you hear about a company exposing sensitive data because they forgot to lock down a data repository on Amazon? It happens surprisingly..

Encrypted large file transfer and Private Chat (get2Clouds) The most advanced end-to-end encryption and cloud security protection. Protect your cloud and communicate securely for free. Send encrypted large files to clients and friends, chat in private messenger.

Spirent Expands CyberFlood Security and Performance Assurance Options with New Virtual and Scalable Solutions (BusinessWire) CyberFlood's expanded platform gives customers flexible and scalable deployment options that address their testing needs today and in the future.

Forreston State Bank Ensures FFIEC and GLBA Compliance while Saving Hours of Work (Netwrix) Forreston State Bank has to ensure compliance with Federal Financial Institutions Examination Council (FFIEC) standards that govern GLBA requirements.

BRIEF-Sectra says gets reference customer in critical infrastructure (Reuters) Sectra gains important reference customer in critical infrastructure, does not name company

Data I/O to Showcase Production-Ready SentriX Security Provisioning at Embedded World (Data I/O) Data I/O Corporation (NASDAQ: DAIO), the leading global provider of advanced data and security programming solutions for flash, flash-memory based intelligent devices and microcontrollers, will demonstrate security provisioning on the...

G Data scannt nach Meltdown- und Spectre-Sicherheitslücken (LANline) Der Bochumer IT-Sicherheitsanbieter G Data stellt einen kostenlosen Scanner zum Download bereit, der Nutzern dabei helfen soll, sich gegen die jüngsten Angriffsszenarien Meltdown und Spectre (LANline berichtete) zu wappnen. Zwar schützt nach Meinung des IT-Sicherheitsspezialisten eine gute IT-Security-Software den

Entersekt, ForgeRock Partner On Mobile Security ( Entersekt, the mobile-first authentication and eCommerce enabling company, announced news on Tuesday (Feb. 20) that it has joined the ForgeRock Trust Network as a principal technology partner. In a press release, Entersekt said its mobile app security, authentication and digital signing technology is now available to ForgeRock’s customers. ForgeRock, said Entersekt in the press release, […]

ERPScan Joins NVIDIA Inception Program (PR Newswire) ERPScan today announced that it has joined the NVIDIA Inception...

Radware’s New ERT Active Attackers Feed Stops Attackers Before They Target Your Network (GlobeNewswire News Room) New Threat Intelligence Subscription Provides Pre-Emptive Protection from Emerging DDoS Threats like IoT Botnets

Researcher to Release Free Attack Obfuscation Tool (Dark Reading) Cybercrime gang FIN7, aka Carbanak, spotted hiding behind another Windows function, according to research to be presented at Black Hat Asia next month.

Facebook Aims to Make Security More Social (Dark Reading) Facebook's massive user base creates an opportunity to educate billions on security.

Technologies, Techniques, and Standards

NIST Proposes Metadata Schema for Evaluating Federated Attributes (SecurityWeek) NIST has published 'Attribute Metadata: a Proposed Schema for Evaluating Federated Attributes' in order to provide the basis for the evolution of a standardized approach to entity attributes.

Operation Gladiator Shield targeting DoD’s cyber terrain ( The Joint Force Headquarters – Department of Defense Information Networks (DoDIN) reached full operating capability in January.

The Army is putting cyber, electronic warfare teams in its BCTs (Army Times) Soldiers with Cyber-Electromagnetic Activities Teams provide support to brigade combat team commanders, giving them tailored capability in training and on deployment.

Endpoint Devices: The New Battleground for Public Sector Cybersecurity (State Tech Magazine) Local governments are getting wise to the importance of protecting themselves from potential cybersecurity attacks, but there is still room for improvement, says HP's Christoph Ruef.

Analyzing user behavior is crucial for building a better cyber defense (CIOL) Soma Tah Have you ever left your house keys in the front-door lock? Silly, isn’t it? But, just take a look at the major data breaches from the past few years. It

6 steps to protect your business from ID theft ( Attention to security issues is often lacking among the self-employed and micro-business owners. But protecting your company's and your clients' financial data is critical to avoiding a disaster that could tank your business dreams

10 tips for protecting your customers (CRN) Security is always a multi-layered discipline that evolves over time and with protection requirements changing regularly, protecting enterprise customers isn't easy.

Design and Innovation

Quantum “Tunneling” Away from Cyber Criminals (QuintessenceLabs) Australian quantum cybersecurity company leverages known “flaw” in diode to measure quantum noise to build stronger cryptographic keys San Jose, ...

This Game Teaches the History of Cryptography (Motherboard) Make sure you’ve got paper and the internet handy.

Quantum Computing is a Threat to Blockchain Security, Study Says (Finance Magnates) The report explores various vulnerabilities and provides solutions to them.

Think fast – this system watches you answer questions to make sure you’re human (TechCrunch) The machines are getting smarter and facial recognition may not be enough to tell you're a human. Machines can make faces, too, but they're not so good at..


UK’s Top Uni Students to Compete in Ethical Hacking Challenge (Infosecurity Magazine) UK’s Top Uni Students to Compete in Ethical Hacking Challenge. Inter-ACE competition returns as government launches skills fund

Legislation, Policy, and Regulation

Assigning Blame for Russia’s Election Meddling (The New Yorker) Trump has accused Obama of doing nothing, but former officials say Trump is the one who has ignored the threat.

SECURITY: White House report warns of fallout from grid cyberattack (E&E News) A cyberattack on the power grid could erode trust in key U.S. institutions and cause billions of dollars in damage, a top White House advisory group said Friday.

The Cost of Malicious Cyber Activity to the US Economy (The Council of Economic Advisers) This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy.

Growth of AI could boost cybercrime and security threats, report warns (the Guardian) Experts say action must be taken to control artificial intelligence tech

The “Black Mirror” scenarios that are leading some experts to call for more secrecy on AI (MIT Technology Review) Artificial intelligence could sway elections, help Big Brother, and make hackers way more dangerous, suggests a new report.

Afraid of AI? We should be (Help Net Security) Afraid of AI? We should be. Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious goals.

Homeland Security chief touts effort on election cybersecurity (TheHill) Officials briefed state, local election officials on cyber threats in meetings late last week.

State officials get classified briefings on election security (FCW) National intelligence and homeland security officials briefed state officials and private-sector stakeholders about election cybersecurity threats.

DOJ forms cyber task force to investigate election meddling (The Daily Dot) Midterms are just around the corner.

Litigation, Investigation, and Law Enforcement

Microsoft (Ireland) and the Federal Rules of Criminal Procedure (Just Security) The Supreme Court can engage in rulemaking to resolve the issues in Microsoft Ireland.

Why the case for banning Kaspersky Lab could be in trouble ( Kaspersky Lab seeks to overturn the provision in the 2018 NDAA that prohibits agencies from using the company’s products or services.

Intel vows to 'defend itself rigorously' as lawsuits fly in (CRN) Vendor facing backlash over Spectre and Meltdown vulnerabilities

Facebook told to stop tracking users that aren’t logged in (Naked Security) If Facebook doesn’t stop tracking users across the web, it could face a fine of €250,000 ($315,000) per day, says Belgian court.

Former Skadden Associate Charged in Mueller Probe (New York Law Journal) Alex van der Zwaan the son-in-law of a Russian oligarch is accused of lying to investigators.

Russia Case: Read Ex-Skadden Associate's Plea Agreement, Statement of Offense (New York Law Journal) Special Counsel Robert Mueller's team just filed the plea agreement and statement of offense in the case against former Skadden associate Alex van der Zwaan accused of lying to investigators.

Border Bouncers Don't Need Big Brother Spying Powers Over Americans ( ICE and border patrol agents want access to NSA intel obtained without warrants.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

Upcoming Events

Security Titans (Scottsdale, Arizona, USA, February 23, 2018) Security Titans is a ground-breaking event, bringing the biggest names in Information Security together - all in one day, on a single stage to give the nation's cyber security industry access to the very...

CyberThreat 18 (Westminster, England, UK, February 27 - 28, 2018) Hosted by the UK’s National Cyber Security Centre, a part of GCHQ, and the SANS Institute, CyberThreat18 brings together a packed schedule of talks on a broad range of familiar and less familiar topics...

Midlands Cyber: US Cyber Market Workshop (Lutterworth, England, UK, February 27, 2018) We are delighted to announce that we will be running two workshops, led by Andy Williams, the International Director of the iCyber Centre @bwtech, Maryland. The workshops have been tailored by the team...

European Cybersecurity Forum – CYBERSEC Brussels (Brussels, Belgium, February 27, 2018) CYBERSEC Forum is an unique opportunity to meet and discuss the current issues of cyber disruption and ever-changing landscape of cybersecurity related threats. Our mission is to foster the building of...

The Cyber Security Summit: Atlanta (Atlanta, Georgia, USA, February 28, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

PrivacyCon 2018 (Washington, DC, USA, February 28, 2018) The 2018 PrivacyCon will expand collaboration among leading privacy and security researchers, academics, industry representatives, consumer advocates, and the government. As part of this initiative, the...

NITSIG Meeting: Protecting Controlled Unclassified Information On U.S. Government Contractor Information Systems (Laurel, Maryland, USA, March 2, 2018) This meeting will discuss the security control requirements for the protection of Controlled Unclassified Information (CUI), for contractor information systems upon which CUI is processed, stored on, or...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, March 6 - 7, 2018) The course will cover current regulations like National Insider Threat Policy NITP and NISPOM Conforming Change 2, and more. The course will provide the ITP Manager and Facility Security Officer with the...

SINET ITSEF 2018 (Silicon Valley, California, USA, March 7 - 8, 2018) Bridging the gap between Silicon Valley and the Beltway. SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment...

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes...

SecureWorld Boston (Boston, Massachussetts, USA, March 14 - 15, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.