skip navigation

More signal. Less noise.

2017 cyberattacks proved more numerous, sophisticated, and ruthless than in years past.

WannaCry, NotPetya, ransomware-as-a-service, and fileless attacks abounded. And, that’s not everything. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. Read The Cylance Threat Report: 2017 Year in Review Report and learn about the threat trends and malware families their customers faced in 2017.

Daily briefing.

As often happens during high-profile events, Finland experienced heightened cyberattack rates during the Russo-American summit. As with earlier US-DPRK meetings in Singapore, IoT devices were particularly targeted. This time the espionage attempts seem to have come largely from China. The Singapore meetings had attracted more Russian attention.

The US Intelligence Community remains convinced that the threat of Russian cyberattacks is real and imminent. The US Department of Justice announced its intention of alerting the public when foreign attempts to influence or interfere with elections are detected.

A large, 18-thousand-strong botnet was swiftly assembled by a malware author who goes by the nom-de-hack "Anarchy.' (Probably the same individual also known as "Wicked.") He exploited routers using the well-known vulnerability CVE-2017-17215. What's disturbing is not the negligible damage, but the ease and speed with which Anarchy pulled the botnet together. 

Criminals are using popular online games to launder money. They purchase in-game currency with dirty money, and then resell the in-game coins for legitimate money in various gamer markets.

You may have received scam emails with dubious attachments that appear to come from British universities. An ongoing criminal campaign spoofs emails from their domains.

User misconfigurations continue to produce data breaches. Amazon is experimenting with two tools it hopes will impel AWS users toward more secure choices.

The UK Government's Huawei Cyber Security Evaluation Centre reports that Huawei products had "underlying engineering issues" that affected national security, but that these seem to have been mitigated. Huawei spins the report as good news.

Notes.

Today's issue includes events affecting Australia, Cambodia, Canada, China, Finland, India, Japan, Democratic Peoples Republic of Korea, Republic of Korea, NATO/OTAN, Russia, United Kingdom, United States.

What do Floppy Disks, Han Solo, and Insider Threats Have in Common?

Visit the ObserveIT booth at Black Hat USA to find out! They’re going back to the 80s to reminisce about throwback technology and show you how to take a 21st-century approach to your insider threat management strategy—so you don’t have to be stuck in the past with your DLP and Flock of Seagulls haircut. And before you head out to Vegas, take ObserveIT’s quiz on which 80’s pop culture icon best represents your insider threat management strategy.

In today's podcast, we talk with our partners at RSA, as  Zulfikar Ranzan talks about quantifying cyber risk. Our guest,  Mark Peters, discusses his book Cashing in on Cyber Power.

XM Cyber is coming to Black Hat (Las Vegas, Nevada, United States, August 4 - 9, 2018) Visit XM Cyber at the Innovation City, booth IC2233, to experience the first fully automated APT simulation platform to Simulate, validate and remediate every hacker’s path to organizational critical assets.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at congress.isc2.org.

Dragos Industrial Security Conference (DISC) 11/5/18 (Hanover, Maryland, United States, November 5, 2018) Reserve your spot now for the Dragos Industrial Security Conference (DISC) on November 5th, 2018. DISC is a free, annual event for our customers, partners, and those from the ICS asset community. Visit https://dragos.com/disc/ for more information.

Cyber Attacks, Threats, and Vulnerabilities

Cyberattacks in Finland Surge During Trump-Putin Summit (Dark Reading) Attackers targeted IoT devices like they did during Trump's June meeting with North Korea's Kim Jong-un, but this time China was the top-attacking nation.

US Company: Evidence Found of Chinese Cyber Attacks on Cambodia (VOA) An American company says it found evidence that a Chinese group has attacked computers belonging to Cambodian government agencies, opposition leaders and media. One of the targeted groups was the National Election Committee.

Transcript: Dan Coats Warns The Lights Are 'Blinking Red' On Russian Cyberattacks (NPR.org) "Today, the digital infrastructure that serves this country is literally under attack," the director of National Intelligence told a D.C. think tank on July 13. Here is the full transcript.

Scammers spoof UK university domains as part of massive fraud campaign (Security Brief) Action Fraud UK is warning people to be wary of any emails they receive that look like they belong to UK university email addresses.

Criminals Are Using Clash Of Clans To Launder Money, New Report Claims (Kotaku) Online criminals are reportedly laundering hundreds of thousands of dollars using blockbuster mobile games like Clash of Clans, Clash Royale and Marvel Contest of Champions, according to a new report by German cybersecurity firm Kromtech.

Hackers automate the laundering of money via Clash of Clans (The State of Security) Popular smartphone games such as Clash of Clans are being used to launder hundreds of thousands of dollars on behalf of credit card thieves.

Open MongoDB Database Exposes Mobile Games Money Laundering Operation (BleepingComputer) The US Department of Justice, Apple, and game maker Supercell, have been warned of a money laundering ring that uses fake Apple accounts and gaming profiles to make transactions with stolen credit/debit cards and then sells these game premiums on online sites for the group's profit.

Who's leaving Amazon S3 buckets open online now? Cybercroooks, US election autodialers (Register) Hundreds of thousands of voter records and contact info spilled

Roblox says hacker injected code that led to avatar’s gang rape (Naked Security) Roblox was moving some older, user-generated games to a newer, more secure system when the attack took place, it says.

Ever heard of ‘deep fake’ technology? The phony audio and video tech could be used to blackmail US troops (Military Times) The ability to distort the truth is expected to reach new heights with the development of so-called “deep fake

Rome Wasn’t Built in a Day, but This Botnet Was, Using CVE-2017-17215 (Security Boulevard) A new botnet has been detected by security researchers at NewSky security, with their discovery being confirmed by researchers from Qihoo 360 Netlab, Rapid7, and Greynoise. The botnet in question has compromised more than 18,000 routers in a single day,...

Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day (BleepingComputer) A malware author has built a huge botnet comprised of over 18,000 routers in the span of only one day.

Calisto Trojan for macOS: the first member of the Proton malware family? (Securelist) As researchers we interesting in developmental prototypes of malware that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that we named Calisto.

Cryptomining replaces ransomware as most prevalent threat (Computing) Awareness of ransomware and rise in price of cryptocurrencies has caused the change, says Skybox Security

MalwareBytes Report Says CryptoJacking Cases Are "Plateauing" (Ethereum World News) A MalwareBytes report mentioned that the presence of cryptojacking has become quite apparent, as it currently dominates the cyber threat landscape.

Stealthy Malware Hidden in Images Takes to GoogleUserContent (Threatpost) Hackers are embedding malicious code within compromised, uploaded images on trusted Google sites – weaponizing the website and staying under the radar.

The 3 riskiest apps found in the enterprise (TechRepublic) The Appthority Pulse Report for Q2 2018 found that messaging apps were risky across Android and iOS.

Drupal, Phishing and A New Cryptomining Botnet (Security Boulevard) It’s a well-known fact that security solutions must quickly adapt to new attack methods. There are several ways to achieve this goal, regularly applying security patches and updates, relying on threat intelligence and more. At Imperva, we use pattern anomaly detection as one of the tools to identify emerging threats and build new defenses. Our

Onslaught of botnets hounds hospitality industry — Akamai (Back End News) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open …

Hackers Targeting Online Retailers Can Cost Businesses Billions Of Dollars (Fortune) 90% of login attempts at online retailers come from hackers, a study says

Hackers account for 90% of login attempts at online retailers (Quartz) Hackers apply stolen data in a flood of login attempts, called "credential stuffing." They target bank accounts, airline miles, and even online grocery sites.

Inside look at lifecycle of stolen credentials and extent of data breach damage (Help Net Security) Shape Security's Credential Spill Report sheds light on the extent to which industries are impacted by credential stuffing attacks and account takeover.

Sizing Up The Scourge of Credential Stuffing (Threatpost) Over two billion credential were stolen in 2017 and contributed to the complex problem of credential spills, credential stuffing and account takeover fraud.

MoneyTaker Grabs $1m from PIR Bank (Infosecurity Magazine) Hacker group stole $1m and transferred money to 17 accounts at major Russian banks

Human Resources Firm ComplyRight Breached (KrebsOnSecurity) Cloud-based human resources company ComplyRight said this week that a security breach of its Web site may have jeopardized sensitive consumer information — including names, addresses, phone numbers, email addresses and Social Security numbers — from tax forms submitted by the company’s thousands of clients on behalf of employees.

Samsam infected thousands of LabCorp systems via brute force RDP (CSO Online) LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and didn't result in a data breach. However, in the brief time between detection and mitigation, the ransomware was able to encrypt thousands of systems and several hundred production servers.

Will this biz be poutine up the cash? Hackers demand dosh to not leak stolen patient records (Register) Tens of thousands of Canadian medical files, healthcare worker details snatched

Hackers hold 80,000 healthcare records to ransom (Naked Security) CarePartners said its forensic investigation identified 1500 affected records – the hackers say they took 80,000.

Navi Mumbai hospital under cyber attack, hackers demand bitcoins (NewsBytes) A private hospital in Navi Mumbai became the latest prey of hackers after its computer systems came under a malware attack. Cops said today that the attackers are demanding ransom in Bitcoins, a typ

Robotic Vacuums May Hoover Your Data (Dark Reading) Researchers have discovered a pair of vulnerabilities that allow unauthorized code execution in a robotic vacuum.

This Bot Tweets Photos and Names of People Who Bought 'Drugs' on Venmo (Motherboard) Venmo transaction data is public by default. But a programmer has taken that data stream and is tweeting the username and photos of users who buy 'drugs'.

Google Cloud outage caused by networking issue (CRN Australia) Outage affected Snapchat, Spotify, Discord, among others.

Security Patches, Mitigations, and Software Updates

Amazon Tests Out Two Tools to Help Keep Its Cloud Secure (WIRED) Amid frequent customer data exposures, Amazon Web Services is pushing to spot errors and promote access control.

WhatsApp limits message forwarding in bid to reduce spam and misinformation (TechCrunch) In a bid to cut down on the spread of false information and spam, WhatsApp recently added labels that indicate when a message has been forwarded. Now the company is sharpening that strategy by imposing limits on how many groups a message can be sent on to. Originally, users could forward messages o…

So long and thanks for all the fixes: ERPScan left out of credits on Oracle bug-bash list (Register) App security firm sanctioned in US over ties with Russia

Cyber Trends

Surprise! Top sites still fail at encouraging non-terrible passwords (TechCrunch) You would think that Amazon, Reddit, Wikipedia and other highly popular websites would by now tell you that "password1" or "hunter2" is a terrible password — just terrible. But they don't. A research project that has kept tabs on the top sites and their password habits for the last 11 years shows t…

Cybercrime drops in second quarter but makes up in severity (International Business Times, India Edition) Cryptomining tops as the most popular cybercrime for the quarter followed by ransomware and exploits.

Cybersecurity no longer top risk for telecom industry (Help Net Security) Telecommunications executives have relegated disruption from new technologies to third place in their risk top 5: the number one risk identified by 60

Cyber-Attacks by Vertical: Battle of the Sectors (Infosecurity Magazine) It’s not just banks and other financial businesses that are at risk, but every type of institution.

Capturing the conscience of the computing profession (Help Net Security) The ACM Code of Ethics and Professional Conduct is considered the standard for the computing profession, and has been adopted around the world.

Marketplace

Why Security Startups Fly - And Why They Crash (Dark Reading) What makes startups stand out in a market flooded with thousands of vendors? Funding experts and former founders share their thoughts.

Five Things To Mull In Taking Profits Or Going Long On Cybersecurity (Investor's Business Daily) Cybersecurity software stocks such as Palo Alto Networks, Proofpoint and Zscaler have had a big run, with analysts divided on whether it's time to take profits or go long ahead of earnings reports.

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility (Just Security) The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise.

McAfee Reorganization Apparently Triggers Channel Team Changes, Layoffs (ChannelE2E) Amid a McAfee reorganization, the cybersecurity company remains committed to channel partners, a spokesperson says. Still, there are unconfirmed reports of some McAfee layoffs & channel staff departures.

IBM Security: Covering Every Cybersecurity Base for M&E (Media & Entertainment Services Alliance) IBM Security’s portfolio of enterprise security products and services runs the gamut, covering applications, mobile, networks, data, the cloud, you name it, a

Products, Services, and Solutions

New TRITON Analysis Tool: Wireshark Dissector for TriStation Protocol (Nozomi Networks) In 2017, TRITON malware was used to attack a gas facility, directly interacting with its Safety Instrumented System (SIS). Given the significance of this attack, Nozomi Networks conducted research to better understand how TRITON works. Today we released a Wireshark dissector for the TriStation protocol on GitHub to help the ICS community understand SIS communications. Our complete TRITON analysis will be presented at Black Hat USA 2018.

Vaccine Available for GandCrab Ransomware v4.1.2 (BleepingComputer) AhnLab, a South Korea-based cyber-security firm, has released today a vaccine app that blocks the GandCrab ransomware from taking root and encrypting users' files.

70 US Election Jurisdictions Adopt Free Website Security Service (Dark Reading) Hawaii, Idaho, North Carolina, and Rhode Island are among states now using gratis DDoS mitigation, firewall, and user access control service from Cloudflare.

Free New Scanner Aims to Protect Home Networks (Dark Reading) Free software pinpoints vulnerabilities and offers suggestions for remediation.

Diffy: A triage tool for cloud-centric incident response (Help Net Security) Diffy is an open source triage tool that allows incident response teams to quickly pinpoint compromised hosts during a cloud-centric security incident.

Proofpoint, Mimecast, And Imperva: Leaders Of Protecting My Email (Seeking Alpha) Email continues to be the main vector hackers use to infiltrate an enterprises' network security. Pure Storage claims their TAM is ~$12B with email protection c

How Microsoft 365 Security integrates with the broader security ecosystem—part 1 (Security Boulevard) First in a three part series that provides an in-depth look at how Microsoft 365 Security integrates into the broader cybersecurity industry.

Utimaco HSM protects digital wallets and cryptocurrencies - Help Net Security (Help Net Security) Utimaco partners with ThothTrust to protect digital wallets and their cryptocurrency assets with Utimaco HSMs and the CryptoScript Software Development Kit.

3 tools for cybersecurity guidance (Business Management Daily) What’s bugging you? Where do you look for the truth about cyberthreats?

Technologies, Techniques, and Standards

Why is America so bad at information wars? (Financial Times) ‘Russian-backed groups began populating US social media from the autumn of 2015 onwards’

How political campaigns can avoid cyberattacks (Fifth Domain) Tips for how political campaigns can change a broken cybersecurity culture.

Security Lessons to Learn From Tactics of Indicted Russian Hackers (eWEEK) The federal indictments of multiple Russian hackers that penetrated the Democratic National Committee’s describes in detail the tactics used to steal sensitive email and other information used to influence the 2016 U.S. presidential election.

The Fundamental Flaw in Security Awareness Programs (Dark Reading) It's a ridiculous business decision to rely on the discretion of a minimally trained user to thwart a highly skilled sociopath, financially motivated criminal, or nation-state.

6 Ways to Tell an Insider Has Gone Rogue (Dark Reading) Malicious activity by trusted users can be very hard to catch, so look for these red flags.

Reporting Malicious Websites in 2018 (SANS Internet Storm Center) Back in 2010 I wrote up a quick diary on how to report malicious websites at the end of your incident response process ... John C, a reader, asked for an update. Let's see how munch has changed in the past 8 years...

Engineering expertise is needed to secure control systems (Control Global) Network cyber security (IT and OT) is necessary, but NOT sufficient to secure control systems. Securing control systems require an engineering understanding of the systems and their impact, yet the engineers have not been adequately involved. There was a desire expressed by several key individuals about NSPE talking a more active role in control system.

For better electronic warfare, the Army and Marine Corps work together (C4ISRNET) The Army and Marines are conducting more cooperative exercises in electronic warfare.

The Army wants to build a better signals intelligence force (C4ISRNET) The Army is moving forward with integrating SIGINT, EW and cyber.

Accenture's Justin Harvey explains why cyber attribution isn't important (SearchSecurity) At RSA Conference 2018, Justin Harvey, managing director and lead of Accenture's FusionX Global Incident Response team, spoke about the declining importance of cyber attribution and the incident response challenges facing enterprises today.

Singapore to bolster threat intelligence sharing in financial sector (ComputerWeekly.com) Singapore’s Cyber Security Agency has partnered the Financial Services Information Sharing and Analysis Centre to glean cyber threat intelligence for the country’s financial industry

A step-by-step guide to disappear from the internet - Panda Security (Panda Security Mediacenter) Before you delete yourself from the internet, make sure that this is what you want. And if you are not 100% sure, create a backup of the information that you may need in the future.

Declassified files reveal how pre-WW2 Brits smashed Russian crypto (Register) Moscow's agents used one-time pads, er, two times – ой!

You’ve Just Attended a Security Conference: Now What? (Impact Networking) Attending a conference focused around business and IT security can be a very rewarding experience

Design and Innovation

The Two Biggest Disruptions To Cybersecurity Since The Invention Of The Firewall (Forbes) Two changes have had an enormous impact on cybersecurity.

Research and Development

Mitre is helping cyber vendors strengthen their products (Washington Business Journal) “If we can work far upstream directly with the vendors and improve them, we’re maximizing the impact Mitre can have,” says a cyber engineer at the McLean nonprofit research organization.

DARPA Awards GrammaTech $6.2M for Autonomous Botnet Neutralization Research (PRNewswire) GrammaTech has been working on this contract since April 2018 together with Assured Information Security (AIS), which is headquartered in Rome, New York...

Academia

Comodo Cybersecurity and Pittsburgh Technical College Empower Future IT Leaders (Markets Insider) Comodo Cybersecurity, a global innovator of cybersecurity solutions and a division of Comodo Security Solutions...

UWF cybersecurity student wins prestigious scholarship to encourage women in technology (Pensacola News Journal) UWF's Megan Morton placed second in an international scholarship competition that recognizes her drive to expand the cybersecurity field to women.

Legislation, Policy, and Regulation

NATO’s Real Spending Emergency Is in Cyberspace (Bloomberg.com) The alliance is all geared for a Russian troop invasion, but Putin is thinking digital.

Japan’s New Cybersecurity Strategy: Plugging The IoT Gap – Analysis (Eurasia Review) Japan should craft a new Cybersecurity Strategy to encourage risk-averse business leadership to tackle shadow IT and bring visibility and control on two key fronts: first, endpoint security to prot…

UK Gov Launches Consultation to Speed-Up Cybersecurity Strategy (Infosecurity Magazine) The DCMS launches a consultation to develop the cybersecurity profession in the UK

South Korea says sanctions shrank North Korean economy at sharpest... (Reuters) North Korea’s economy contracted at the sharpest rate in two decades in 2017, South Korea’s central bank estimated on Friday, as international sanctions and drought hit growth hard, with signs living conditions were beginning to deteriorate.

Australian govt urged to abandon decryption legislation (CRN Australia) Letter sent to MPs warns against 'risky' precedent.

Justice Department plans to alert public to foreign operations targeting U.S. democracy (Washington Post) The effort is designed to foil covert operations such as the one Russia undertook in 2016 to disrupt the presidential election.

White House names Grand Schneider to top cyber post (Federal Times) Grant Schneider was officially named the federal chief information security officer, a position he'd previously held in an acting capacity.

Why self-regulation is better than legislative regulation (TechCrunch) Self-imposed third-party algorithm audits should become the norm to prevent overly restrictive government regulations.

Litigation, Investigation, and Law Enforcement

'Russian spy' Guccifer 2.0 had steamy online affair with former Playboy model and Bond girl (The Sun) A FORMER Playboy model and Bond girl had a steamy online affair with an alleged Russian spy accused of tampering with the US election, Sun Online can reveal. Brunette Robbin Young said she “f…

The Russians Who Allegedly Hacked the DNC Sexted a Playboy Model and 'Bond Girl' (Motherboard) “All I want to do now is look at u again and again.”

UK Puts Huawei on the Naughty Step for Security Issues (Infosecurity Magazine) Report finds Huawei's products have underlying engineering issues

UK government panel issues inconclusive Huawei security report (TechCrunch) Huawei’s had a rough go of it here in the States, after concerns around ties to the Chinese government have left the company scrambling to gain a commercial toehold. Over the past several years, top U.K. security officials have also put the company under the microscope over potential security conce…

Huawei Cyber Security Evaluation Centre (Hcsec) Oversight Board Annual Report 2018 (HCSEC) This is the fourth annual report from the Huawei Cyber Security Evaluation Centre (HCSEC) Oversight Board.

We need a new law to punish the Skripal poisoners (Times) Russia has spun a dozen toxic fairytales in the wake of the Salisbury poisoning in March. Here are a few: Novichok was stored in Ukraine; it was a British attempt to divert attention from a...

S. Korean ex-leader sentenced to 8 more years in prison (AP News) A South Korean court on Friday sentenced former South Korean President Park Geun-hye to an additional eight years for abusing state funds and violating e

GP ‘sought web hitman to murder financial adviser’ (Times) A retired family doctor tried to hire a hitman from a “Chechen Mob” website to kill a financial adviser, a court was told yesterday. David Crichton, 64, is alleged to have had a vendetta against...

Ex-Apple employee pleads not guilty in trade secret case (CRN Australia) Accused of stealing 25-page blueprint for autonomous vehicle component.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Global Security Exchange (Las Vegas, Nevada, USA, September 23 - 27, 2018) Global Security Exchange—formerly the ASIS Annual Seminar and Exhibits—delivers new opportunities to exchange key ideas and best practices, expand global connections, and experience innovations. The GSX...

MSPWorld® Peer Group & Data Analytics Summit (Las Vegas, Nevada, USA, October 4 - 5, 2018) The MSPWorld® Peer Group & Data Analytics Summit is a revolutionary new concept for the managed services executive. Accessible only by MSPs, this conference will focus on small, peer lead groups exchanging...

Upcoming Events

Cyber Security Summit 2018 (Newport, Rhode Island, USA, July 18 - 20, 2018) Join us for Opal Group’s Cyber Security Summit – set in Newport, RI, this premier event will gather C-Level & Senior Executives responsible for defending their companies’ critical infrastructures together...

Health Cybersecurity Summit 2018 (Santa Clara, California, USA, July 20, 2018) Worried about being hacked? Not sure how to respond to a cyber incursion? The first line of defense is a cyber threat preparedness strategy that includes coordination with critical infrastructure and emergency...

Global Cyber Security Summit (Kathmandu, Nepal, July 27 - 28, 2018) Information Security Response Team Nepal (NPCERT) is all set to host a Global Cyber Security Summit (GCSS) on July 27 with the theme “Building Global Alliance for Cyber Resilience”. The two-day event aims...

SINET61 2018 (Melbourne, Victoria, Australia, July 31 - August 1, 2018) Promoting cybersecurity on a global scale. SINET – Melbourne provides a venue where international solution providers can engage with leaders of government, business and the investment community to advance...

Community College Cyber Summit (3CS) (Gresham, Oregon, USA, August 2 - 4, 2018) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Who should attend 3CS? College faculty and administrators, IT faculty who are involved or who would...

2018 Community College Cyber Summit (3CS) (Gresham and Portland, Oregon, USA, August 2 - 4, 2018) 3CS is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), and Broadening Advanced Technological...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

Audit Your Digital Risk (Washington, DC, USA, August 7 - 8, 2018) Recent reports indicate that manufacturing is the most heavily targeted industry for cyber attacks in the past year. According to a study released by NTT Security, 34% of all documented cyber attacks in...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.