skip navigation

More signal. Less noise.

Get trending threat insights delivered to your inbox.

Do you want trending information on hackers, exploits, and vulnerabilities every day for free? Subscribe now to the Recorded Future Cyber Daily.

Daily briefing.

Warnings about Russian compromises of the US power grid continue, as do worries about influence operations or direct manipulation of mid-term voting. Senator Shaheen (Democrat of New Hampshire) says that officeholders and political parties are often targets of phishing attacks, and that the experience reported by Senator McCaskill (Democrat of Missouri) isn't an outlier. Other Senators are interested in seeing what can be done about deep fakes—convincing but concocted video, audio, or imagery—that are thought to be the future of influence operations and black propaganda.

The US Army is undergoing one of its periodic rediscoveries of the importance of electronic warfare. This time the precipitating cause is Russian jamming of US forces operating in and around Syria.

Check Point reports that a criminal going by the nom de hack "Master134" is running a successful malvertising campaign across the HiBids advertising platform. Master134 has redirected stolen traffic from more than ten-thousand compromised WordPress sites and resold it to Adsterrra, which in turn sold the traffic to advertising resellers. The malicious advertising carries ransomware, Trojans, and so on.

Proofpoint describes a new version of AZORult it's observed in the wild. AZORult is an information stealer and downloader first noticed in 2016, where Proofpoint found it as a secondary infection of the Chthonic banking Trojan. This version retains the original functionality but seems improved in every respect. Shortly after it appeared on the black market it was seen distributing Hermes ransomware.

KickICO lost $7 million to creative-destructive hacking of its tokens.


Today's issue includes events affecting Australia, Cambodia, Canada, China, Estonia, Russia, Syria, United Kingdom, United States.

What do Floppy Disks, Han Solo, and Insider Threats Have in Common?

Visit the ObserveIT booth at Black Hat USA to find out! They’re going back to the 80s to reminisce about throwback technology and show you how to take a 21st-century approach to your insider threat management strategy—so you don’t have to be stuck in the past with your DLP and Flock of Seagulls haircut. And before you head out to Vegas, take ObserveIT’s quiz on which 80’s pop culture icon best represents your insider threat management strategy.

In today's podcast, we hear from our partners at the SANS Institute as  Johannes Ullrich, Dean of Research and proprietor of the ISC Stormcast podcast, talks about TLS 1.3 implementation. Our guest is Mark Orlando from Raytheon, who shares some thoughts on critical infrastructure security.

Billington Automotive Cybersecurity Summit (Detroit, Michigan, United States, August 3, 2018) Top automotive executives and government representatives will detail the latest cybersecurity threats and best safety practices at the second Billington Automotive Cybersecurity Summit on Aug. 3 at Cobo Center in Detroit. In the age of connected and autonomous cars, cybersecurity is a top priority for automakers and their suppliers.

XM Cyber is coming to Black Hat (Las Vegas, Nevada, United States, August 4 - 9, 2018) Visit XM Cyber at the Innovation City, booth IC2233, to experience the first fully automated APT simulation platform to Simulate, validate and remediate every hacker’s path to organizational critical assets.

Schedule a meeting with Terbium Labs at Black Hat. (Las Vegas, Nevada, United States, August 8 - 9, 2018) Matchlight by Terbium Labs is the world's most comprehensive and only fully private dark web monitoring solution, capable of quickly detecting compromised account data and minimizing the damage caused by a data breach. Book a 1:1 session with Terbium Labs' leadership team to learn how Matchlight can help your organization assess its sensitive data exposure on the dark web.

CyberTexas Job Fair, August 14, San Antonio visit ClearedJobs.Net for details. (San Antonio, Texas, United States, August 14, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the CyberTexas Job Fair, August 14 in San Antonio. Meet leading cyber employers including Bank of America, USCYBERCOM, USAA and more.

Wombat Wisdom Conference, September 18 to 20, 2018, Pittsburgh, PA. (Pittsburgh, Pennsylvania, United States, September 18 - 20, 2018) Gain expert insights for strengthening your security awareness program at the Wombat Wisdom Conference, Sept. 18-20, 2018. Ideal for CISOs and infosec professionals looking to share ideas and actionable concepts for improving security awareness and training.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at

Cyber Attacks, Threats, and Vulnerabilities

Russia has compromised the US grid this year (Control Global) A US utility was compromised. The IP address and credentials for the cyber asset were posted on a Russian-based media site, and the cyber asset was subsequently infected with ransomware. The NERC CIP standards do not adequately address this problem.

Fake Monitors Endorse Cambodia's Sham Election (Foreign Policy) Dubious electoral endorsements are becoming normal for dictators worldwide.

Russians Are Targeting Private Election Companies, Too — And States Aren’t Doing Much About It (FiveThirtyEight) Regulations are lax on voting machine and election software manufacturers.

Hackers Target Senators, Political Parties Frequently, Shaheen Says (Roll Call) Sen. Jeanne Shaheen, D-N.H., said Sunday that senators and political parties are frequently the targets of phishing attacks by hackers.

Analysis | The Cybersecurity 202: Doctored videos could send fake news crisis into overdrive, lawmakers warn (Washington Post) Sens. Rubio and Warner want to thwart "deepfakes."

What are deepfakes? How and why they work (CSO Online) Deepfakes are fake videos or audio recordings that look and sound just like the real thing. Once the bailiwick of Hollywood special effects studios and intelligence agencies producing propaganda, deepfakes swap celebrities' faces into porn videos and put words in politicians' mouths, but they could do a lot worse.

Russian Jamming Poses a Growing Threat to U.S. Troops in Syria (Foreign Policy) But this type of warfare also gives the United States a chance to learn about the latest Russian technology.

Busting The Green Door: Army SIGINT Refocuses On Russia & China (Breaking Defense) Over 17 years of fighting terrorists and insurgents, “our SIGINT forces mastered the art and science of identifying and tracking individual threats with pinpoint precision," Lt. Gen. Berrier said. "We now face a significant challenge on a much larger scale."

Shadowy Mastermind Plays Online Advertising System to Spread Malware (Computer Business Review) Check Point researchers identify new "malvertising" campaign that abuses the "legitimate" digital infrastructure of the online advertising industry

A Malvertising Campaign of Secrets and Lies (Check Point Research) Check Point Research has uncovered a large Malvertising campaign that starts with thousands of compromised WordPress websites, involves multiple parties in the online advertising chain and ends with distributing malicious content, via multiple Exploit Kits, to online users everywhere. Before explaining the details of this research, and for those who are not familiar with how …

New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign (Proofpoint) Proofpoint researchers detail recent updates to the AZORult information stealer.

This new cryptomining malware targets business PCs and servers (ZDNet) Researchers have uncovered a cryptojacking campaign that looks to spread across infected networks to ensure as much mining profit as possible.

Intel’s chip vulnerabilities don’t bode well for the spread of ransomware (Medium) Traditionally, ransomware security was based on matching viruses to a database of known malware. AI offers a more dynamic approach.

Microsoft Discovers Supply Chain Attack at Unnamed Maker of PDF Software (BleepingComputer) Microsoft said today that hackers compromised a font package installed by a PDF editor app and used it to deploy a cryptocurrency miner on users' computers.

Inside SamSam: A Step Forward for Ransomware? (Infosecurity Magazine) Looking at SamSam after Sophos analysts were able to capture a sample of the targeted ransomware

Hackers find creative way to steal $7.7 million without being detected (Ars Technica) Thieves obtain platform's private key, use it to destroy coins, then create new ones.

Steam Pulled an Indie Game Accused of Being an Elaborate Cryptocurrency Mining Scam (Motherboard) Steam game 'Abstractism' was pulled from the marketplace after users complained that it was hijacking their computers to mine cryptocurrency, and that the game developers were scamming players with in-game assets.

Crypto Mining: Google’s Play Store Joins Apple in Banning Mining Apps (CoinCentral) Google has just updated its Play Store developer policy and included a quote that it does not allow crypto mining apps. This is according to the BBC. The last time a significant update occurred, fake ID apps were targeted regardless of their intent.

Activist Publishes 11,000 Private DMs Between Wikileaks and Its Supporters (Motherboard) Emma Best, a freedom of information activist, has published a large cache of Twitter direct messages between Wikileaks and some of its most fervent supporters, including ones showing antisemitic sentiment from Wikileaks.

Dixons Carphone breach: 10 times as many victims as first thought (Computing) Dixons says that the stolen records do not contain personal information

Cyber attack: UnityPoint says 1.4 million affected in phishing scam (Waterloo Cedar Falls Courier) More than a million patients of UnityPoint Health might have had health or personal information exposed, including Social Security and financial information, during a recent email phishing scam,

1.3 million online fashion shoppers exposed after data breach at UK ecommerce provider (Graham Cluley) Up to 1.4 million customers of a number of UK clothing and accessories websites have had their personal information exposed following a security breach at an IT services provider that they were sharing.

F Secure Oyj : Spam Is Still the Choice of Online Criminals, 40 Years Later (4-Traders) Online criminals have gotten savvier but they're still relying on the same old tricks they've been using for decades. F-Secure research shows spam... | juillet 31, 2018

Analysis: Reported data breaches in Australia (Help Net Security) The Office of the Australian Information Commissioner has published the first report on data breaches that fall under Notifiable Data Breaches scheme.

Cyber Trends

Symantec: Financial cyberattacks are on the rise (Fifth Domain) Hackers targeting both large financial institutions and individuals for profit have increased over the past year, according to security software company Symantec.

Where Did the Concept of 'Shadow Banning' Come From? (Motherboard) It's been called shadow banning, toading, being "sent to coventry," and ghost banning—but where did it actually start?

Managed security: a big gamble for Aussie IT providers (CRN Australia) Not an easy transition to make.

The Western Illusion of Chinese Innovation (Project Syndicate) Many Western observers – in media, academia, and government – now portray China as a fierce competitor for global technological supremacy, with top-down industrial policies that are enabling it to stand virtually shoulder-to-shoulder with Europe and the US. This is a serious misrepresentation.

US retailers lead world in data breaches (Retail Dive) Despite big spending by U.S. retailers, data breaches continue to grow, according to a study, with half reporting a breach in the last year.


Security Industry Association Seeks Nominations for 2018 George R. Lippert Award | Security Industry Association (Security Industry Association) SIA is now seeking nominations for the George R. Lippert Memorial Award, an honor recognizing long-term, selfless service to the security industry and SIA.

How to Get the Most Out of DEF CON and Black Hat 2018 (Security Intelligence) The IBM X-Force Red team is well-represented at DEF CON and Black Hat 2018, hosting sessions and panels about smart city security, vulnerability management and more.

Why trust is the biggest selling point for cybersecurity companies (IT Pro Portal) Companies that lose the trust of their customers will have a hard time finding new clients.

CEO guidance: Handling dynamic change in the cybersecurity industry (Help Net Security) In a little over 18 months since SonicWall split from Dell, the company has become operationally and financially independent. "In fact, while achieving

How Canada can close the cybersecurity talent gap (The Globe and Mail) Building a world-class pool of talent in Canada will not only avoid the potential costs of cyberattacks, it positions the country for economic success in the 21st century.

Tenable: Tempting And Able But Not Quite Yet (Seeking Alpha) Tenable is the most recent cybersecurity IPO following the highly anticipated offerings from both Zscaler and Carbon Black earlier this year.

Leading SOAR Provider D3 Security Closes FY2018 with Record Growth; Doubles Revenue and Employee Count (BusinessWire) D3 Security today announced record-breaking growth in both revenue and active enterprise customers.

GE Puts Digital Assets on the Block (Wall Street Journal) General Electric is seeking a buyer for key parts of its digital business as the beleaguered industrial conglomerate unwinds a signature initiative of former Chief Executive Jeff Immelt.

Alibaba Shares Remain Out of Reach in China, For Now (Wall Street Journal) China’s ambitious plan to lure technology giants back home is languishing, with companies and regulator blaming each other and a weaker stock market.

Banking Industry Veteran and Tech Investor Jay Mandelbaum Joins BioCatch Board of Directors (BioCatch) Banking Industry Veteran and Tech Investor Jay Mandelbaum Joins BioCatch Board of Directors

Caveonix Appoints Seasoned Cybersecurity Veterans Tom Noonan and Tom McDonough to its Board of Directors (PRNewswire) Industry Gurus Join Hybrid Cloud Security Provider's Board to Further Bolster Solution

Products, Services, and Solutions

How Endgame Protects Against Phishing from Macro-Enabled Documents (Endgame) Phishing continues to be one of the most effective methods of compromise according to Verizon’s Data Breach Investigations Report.  Adversaries often use crafted documents containing malicious macros and a deceptive lure to achieve initial access to target users and networks.  These macro-based attacks remain difficult to stop for numerous reasons. Adversaries are becoming more clever with their phishing schemes, and mail filtering will never stop a determined adversary from delivering payloads to inboxes.

Cofense SOARs Above Existing Security Orchestration and Automation Offerings Leveraging Human-Intelligence to Stop Active Cyber Attacks - Cofense (Cofense) Global human-phishing defense leader introduces new phishing SOAR platform to quickly stop phishing attacks in progress more efficiently

Securing Industrial Control System OT Networks (Tripwire) Industrial control system (ICS) environments pose unique security challenges. Tripwire Data Collector is a simple, cost-effective solution for maintaining system hardening and continual proof of compliance.

LogMeIn Unveils Secure Federated Login to LastPass with Active Directory (LogMeIn) New integration provides effortless password security for employees by removing the need to create or remember a separate master password

CompTIA PenTest+ Certification Available Worldwide (PRNewswire) Leading tech industry association expands portfolio of cybersecurity skills certifications

Threat Intelligence Transforms Security Automation Landscape with Launch of Its New Cloud Platform Evolve (BusinessWire) Threat Intelligence today launched Evolve, a new cloud-based all-in-one security automation platform.

Varonis Announces Upcoming Integration with Box to Secure Enterprise Content in the Cloud (GlobeNewswire News Room) Varonis Systems, Inc. (NASDAQ:VRNS), a pioneer in data security and analytics, is announcing an upcoming integration with Box, a leader in cloud content management, that will enable customers to secure and manage their data across their cloud data stores, including Box.

Financial institutions fight cybercrime with intelligent platform from Fiserv and BlueVoyant (Help Net Security) New cybersecurity platform designed for financial institutions orchestrates cybersecurity modules, enables threat remediation and simplifies reporting.

Pulse Secure Updates Network Access Control Platform for IoT (eWEEK) Pulse Secure is set to announce its new Pulse Policy Secure 9 network access control technology, bringing new capabilities to help identify and secure IoT devices.

Windows Defender (Finally) Earns Top Antivirus Marks (Tom's Guide) The free, built-in antivirus software in Windows 10 performs just as well as -- or even better than -- many of its paid competitors.

Technologies, Techniques, and Standards

MUD: The Solution to Our Messy Enterprise IoT Security Problems? (Dark Reading) The 'Manufacturer Usage Description' proposal from IETF offers a promising route for bolstering security across the industry.

Counties focus on vote security (The Villages Daily Sun) Sumter, Lake and Marion counties are bulking up on election security this year, aiming to fend off attempts to tamper with the voting process.

Cosco’s pre-cyber attack efforts protected network (Journal of Commerce) Cosco Shipping Lines was able to contain the damage from last week’s cyber attack to its operations in the Americas, and cargo handling in the US, Canada, and South America at its marine terminals was largely unaffected because Cosco isolated its internal networks across its global operations.

What the DoD can learn from the DHS CDM program (Fifth Domain) The ability to make determinations in real time — and to automate action based on what’s discovered at the federal level — is a game-changer.

Six best practices to follow in access control (Help Net Security) In this article, Bernhard Mehl, CEO at Kisi, offers his view on the six essential access control best practices you can use today.

The Need for Managed Detection and Response: Persistent and Prevalent Threats in North America’s Security Landscape (TrendLabs Security Intelligence Blog) The prevalent threats in North America's security landscape highlight the need for managed detection and response.

Understanding digital clues key in cyber breaches: LogRhythm exec (KrASIA) In light of the recent SingHealth attack, Matthew Winter of LogRhythm discusses how such breaches can be prevented.

Four-Time CEO Says Corporate Culture is the Most Important Defense... (Bricata) Corporate culture is an imperative in cybersecurity, according to a four-time CEO. Ben Levitan breaks down key cybersecurity issues every CEO needs to know.

Advanced Persistent Agony: Fixing the Broken Data Breach Response Template (Infosecurity Magazine) Why we need to change the cycle around data breach response.

Remain several steps ahead to prevent a data breach before it hits ( In the world of cyber and information security, the changing nature of attacks is the only thing that’s certain

Design and Innovation

Automating Kernel Exploitation for Better Flaw Remediation (Dark Reading) Black Hat researchers plan on open sourcing a new framework they say can help organizations get a better rein on vulnerability fixes for kernel bugs.

Everything bad about Facebook is bad for the same reason (Quartz) The philosophy of Hannah Arendt points to the banal evil beneath Facebook's many mistakes.

BurnBox Makes Hidden Files Look Like You've Deleted Them (WIRED) Cryptographers have developed a new technology designed to protect your secrets at the border.

Research and Development

Minister announces $650k for DST cyber tech research (Defence Connect) The Defence Science Technology Group (DST) is seeking applications from the cyber community across Australia to develop cyber solutions of high relevance to the country's national security, with appli

Beijing turns to artificial intelligence for diplomatic advantage (Times) Inspired by the ability of artificial intelligence to excel at complex board games, China is working towards harnessing the technology to plot foreign policy. The country’s foreign ministry is...


Certiport Partners with EC-Council to Validate Cybersecurity Skills in (PRWeb) Certiport, a Pearson VUE business, today announces a certification program for secondary schools and higher education in partnership with EC-Council, a global

Legislation, Policy, and Regulation

Canadian Prime Minister Justin Trudeau Reportedly Alarmed by Huawei’s Threat to National Security (Epoch Times) Canadian Prime Minister Justin Trudeau is alarmed about the national security threat posed by Chinese telecommunication giant Huawei, according to a Globe and Mail article citing an unnamed senior government official. The article said Trudeau has been hearing about the risks directly from U.S. President Donald Trump’s national security adviser John Bolton, and has also …

Russia’s Tiny Neighbor Prepares Its Cyber Revenge ( Estonia, the tiny eastern European nation that says it was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back.

Will the Senate Get Tough on Russia? (The New Yorker) Senator Chris Van Hollen explains the bipartisan support for his bill, the DETER Act, which would impose crippling sanctions on Russia in response to its election meddling.

As cyber-attacks on the US rise, is the answer to hack back? ( Some security experts want the US government, and even private companies and individuals, to go on the offensive.

DHS Forms New Cyber Hub to Protect Critical U.S. Infrastructure (Wall Street Journal) The Department of Homeland Security will announce on Tuesday the creation of a center aimed at guarding the nation’s banks, energy companies and other industries from major cyberattacks, agency officials said.

Lawmakers Unveil Plans for Agency Telework and Cloud Security ( Plus the annual defense authorization bill is poised to pass.

Litigation, Investigation, and Law Enforcement

NSA Statement on Semi-Annual Office of the Inspector General Report to Congress (IC on the Record) NSA welcomes the semi-annual report of the Office of the Inspector General (OIG) and OIG’s efforts to make the unclassified version as complete and transparent as possible for the public.

UK Group Threatens to Sue Facebook Over Cambridge Analytica (WIRED) Lawyers have served Facebook with a letter before claim, the first step for filing a class action lawsuit in the UK.

House GOP intends to seek Comey interview after August recess (TheHill) House Republicans are planning to seek an interview with former FBI Director James Comey in September to discuss his decisionmaking during the 2016 election, The Hill has learned.

Russian National Sentenced to 70 Months For $4 Million Debit Card Fraud (Dark Reading) Mikhail Malykhin's actions drove one company out business.

‘TELL YOUR DAD TO GIVE US BITCOIN:’ How a Hacker Allegedly Stole Millions by Hijacking Phone Numbers (Motherboard) California authorities say a 20-year-old college student hijacked more than 40 phone numbers and stole $5 million, including some from cryptocurrency investors at a blockchain conference Consensus.

Florida High School Football Team Improperly Accessed Rivals' Training Videos (BleepingComputer) The Braden River High School football program is in trouble after it was caught accessing the training videos of four of its rivals.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

Retail Cyber Intelligence Summit (Denver, Colorado, USA, October 2 - 3, 2018) Network with 250+ CISOs and their teams from retail and consumer facing industries: restaurants, hospitality, gaming, convenience, grocery and more. Share best practices, gain insights, network. This conference...

Upcoming Events

SINET61 2018 (Melbourne, Victoria, Australia, July 31 - August 1, 2018) Promoting cybersecurity on a global scale. SINET – Melbourne provides a venue where international solution providers can engage with leaders of government, business and the investment community to advance...

Community College Cyber Summit (3CS) (Gresham, Oregon, USA, August 2 - 4, 2018) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Who should attend 3CS? College faculty and administrators, IT faculty who are involved or who would...

2018 Community College Cyber Summit (3CS) (Gresham and Portland, Oregon, USA, August 2 - 4, 2018) 3CS is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), and Broadening Advanced Technological...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

2nd Billington Automotive Cybersecurity Summit (Detroit, Michigan, USA, August 3, 2018) The 2nd summit on August 3 in Detroit, MI will be the top leadership summit on auto cybersecurity convening a who’s who of speakers in the automotive cybersecurity ecosystem. The inaugural summit included,...

Black Hat USA 2018 (Las Vegas, Nevada, USA, August 4 - 9, 2018) Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days...

Audit Your Digital Risk (Washington, DC, USA, August 7 - 8, 2018) Recent reports indicate that manufacturing is the most heavily targeted industry for cyber attacks in the past year. According to a study released by NTT Security, 34% of all documented cyber attacks in...

DefCon 26 (Las Vegas, Nevada, USA, August 9 - 12, 2018) DEF CON has been a part of the hacker community for over two decades. $280.00 USD, cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script...

CyberTexas 2018 (San Antonio, Texas, USA, August 14 - 15, 2018) The 2018 CyberTexas Conference will bring members of the CyberUSA community together with industry and government members of Texas to create long-term values for the cybersecurity ecosystem in San Antonio...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

The Air Force Information Technology & Cyberpower Conference (Montgomery, Alabama, USA, August 27 - 29, 2018) As the premiere Air Force cyber security annual event, the Air Force Information Technology & Cyberpower Conference (AFITC) returns to Montgomery, Alabama in August of 2018. As a critical intersection...

The Cyber Security Summit: Chicago (Chicago, Illinois, USA, August 29, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) An opportunity to hear, meet, and interact with cybersecurity leaders from Government and industry.

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.