skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Are you using threat intelligence to its full potential? Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

Palo Alto's Unit 42 thinks the Sofacy Group is quietly changing its tactics. Sofacy, generally regarded as belonging to Russia's GRU (a.k.a. Fancy Bear, Pawn Storm, Sednit, or Tsar Team) had tended to prospect a small number of selected individuals within a targeted organization. They also tended to use the same exploits and malware against those individuals. For all of Fancy Bear's reputation for being noisy, this is a relatively unobtrusive approach. But now Unit 42 sees the group adopting parallel attacks, a "shotgun" approach to many more individuals. They're also using a more diversified set of exploits and malware, presumably to achieve higher infection rates.

Intezer researchers say they've found a backdoor in the wild that's based on Hacking Team tools. 

Guardicore Labs describes Operation Prowli, a campaign that manipulates traffic and mines cryptocurrencies. There are roughly 40 thousand infected machines in a wide range of organizations and sectors.

VPNFilter is not only attempting to reconstitute its botnet of routers, but it's now been found to infect more models than it had formerly captured. Cisco's Talos unit has found infestations in ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE devices.

Retailers pull CloudPets from their physical and virtual shelves. The plush toys share audio messages in a cloud, which is fine, but those messages transit an unsecured MongoDB server.

Seeking to return to American good graces ZTE pays a $1 billion fine and replaces its leadership.

The US Senate wants answers from both Facebook and Google about data-sharing with Huawei.


Today's issue includes events affecting Armenia, China, European Union, Germany, NATO/OTAN, Russia, Ukraine, United Kingdom, United States.

$8.76 million: The average yearly cost of insider threats. Get the report.

Insider threat incidents come with a hefty price tag, according to the “2018 Cost of Insider Threats: Global Organizations” report released by independent research group, The Ponemon Institute. Make sure that you understand the full context (and cost) of these threats by downloading the full report. Get your copy today.

In today's podcast we hear from our partners at Lancaster University, as Daniel Prince discusses the security of industrial control systems. And we have two guests, both from Duo Security. Kyle Lady and Olabode Anise review Duo's annual report on authentication.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at

Cyber Attacks, Threats, and Vulnerabilities

Sponsored: Automate and Orchestrate Your Cybersecurity Processes (ThreatConnect) Join our demo to see how security teams can improve efficiency, manage threat data, and create a system of record for their cybersecurity approach.

Sofacy APT Has Subtly Changed Tactics (BleepingComputer) A well-known Russian cyber-espionage group has subtly changed its modus operandi, moving to what security researchers from Palo Alto Networks are calling "parallel attacks."

Sofacy Group’s Parallel Attacks (Palo Alto Networks Blog) Unit 42’s continued look at the Sofacy Group’s activity reveals the persistent targeting of government, diplomatic and other strategic organizations across North America and Europe.

New Backdoor Based on Hacking Team Tool (ISS Source) A new backdoor created by the Iron attack group has infected at least 2,000 victims so far, researchers said. The backdoor source code comes from the Hacking Team..

Operation Prowli: Monetizing 40,000 Victim Machines (GuardiCore) Guardicore Labs has uncovered a traffic manipulation and cryptocurrency mining campaign infecting a wide number of organizations in industries.

VPNFilter Targets More Devices Than Initially Thought (SecurityWeek) Researchers find new stage 3 modules of VPNFilter malware and determine that devices from ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE are also targeted

VPNFilter Update - VPNFilter exploits endpoints, targets new devices (blogs@Cisco - Cisco Blogs) Cisco Talos, while working with our various intelligence partners, has discovered additional details regarding “VPNFilter.”

New KillDisk Variant Hits Latin American Financial Organizations Again (TrendLabs Security Intelligence Blog) Last May, we uncovered a master boot record (MBR)-wiping malware in the same region. The telltale sign was a problem related to the affected machine’s boot sector. Based on the error message it displayed after our tests, we were able to ascertain that this was another — possibly new — variant of KillDisk.

PageUp Malware Scare Sheds Light On Third Party Risks (Threatpost) The incident is another reminder that third-party software and services are an easy way for attackers to steal sensitive data.

Further Down the Trello Rabbit Hole (KrebsOnSecurity) Last month’s story about organizations exposing passwords and other sensitive data via collaborative online spaces at only scratched the surface of the problem.

The Zip Slip vulnerability – what you need to know (Naked Security) Thousands of projects have been affected by a painful programming lapse.

Attackers can hide malware in archive files with Zip Slip flaw; here's how to fight it (TechRepublic) A newly revealed vulnerability affecting open source software libraries should have you worried about the security of your coding projects.

Backdoor Uses for Bi-directional Communication (SecurityWeek) A recently discovered remote access Trojan is using a specialized program library that allows operators to interact with the infected machines directly, without an initial “beacon” message.

US Government Probes Airplane Vulnerabilities, Says Airline Hack Is ‘Only a Matter of Time’ (Motherboard) According to DHS and other US government documents obtained by Motherboard, the DHS is continuing to investigate how insecure commercial aircraft are to cyber attacks, with one research lab saying hacking a plane may lead to a "catastrophic disaster."

Hackable CloudPets pulled from Target, Walmart, Amazon and more (Naked Security) The stuffed toys are stuffed with security problems that we’ve known about for over a year.

Another baby monitor camera hacked (CSO Online) The latest baby monitor hacking incident involves a $34 FREDI wireless baby camera monitor. The hacked device was used to spy on a mother and her baby.

Post-Tax Season Spam Campaign Delivers URSNIF to North American Taxpayers (TrendLabs Security Intelligence Blog) Although many tax scams purely rely on social engineering, other campaigns make use of more sophisticated tools and techniques. We found and analyzed one such campaign delivering the notorious banking trojan known as URSNIF to North American targets.

Atlanta officials reveal worsening effects of cyber attack (Reuters) The Atlanta cyber attack has had a more serious impact on the city's ability to deliver basic services than previously understood, a city official said at a public meeting on Wednesday, as she proposed an additional $9.5 million to help pay for recovery costs.

Ukraine says prevented cyber attack on NATO country embassy (Reuters) Ukraine's state security service (SBU) prevented a cyber attack on the embassy of a NATO country in Kiev, it said in a statement on Tuesday, without specifying which one.

Fake lotteries trying to use FIFA World Cup fever to scam people (WeLiveSecurity) The FIFA World Cup is fast approaching and anticipation for the event in Russia is increasing as the countdown continues to kick off on June 14. Unfortunately, the amount of fake lotteries and giveaways trying to abuse the event is also on the rise.

VIDEO:Raytheon: The Hackers’ Playbook (GovCon Wire) When cyber attackers go after a big target like a power

Security Patches, Mitigations, and Software Updates

Cisco Releases Security Updates for Multiple Products (US-CERT) Cisco has released several updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.NCCIC encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:

Critical Vulnerability Addressed in Popular Code Libraries (SecurityWeek) A critical and widespread arbitrary file overwrite vulnerability has been addressed in popular libraries of projects from HP, Amazon, Apache, Pivotal, and more.

Cyber Trends

Sponsored: Busting Threat Intelligence Myths: A Guide for Security Professionals (Recorded Future) See how you can begin to augment your cybersecurity skills with powerful and contextualized threat intelligence.

Are We Headed for a 'Cyber Cuban Missile Crisis' with Russia? (The Cipher Brief) Bottom Line:  The risk posed to U.S. national security by what are believed to be Russian-backed hacking groups, is similar to the October 1962 Cuban Missile Crisis according to Cipher Brief Experts, but different, in that the U.S. has no clear and obvious deterrent this time around. Recent Developments:  The FBI recently forced its way … Continue reading "Are We Headed for a ‘Cyber Cuban Missile Crisis’ with Russia?"

There will be no ‘Cyber Cuban Missile Crisis’ (Fifth Domain) If we truly want to understand cyber war, we need to do better than misapply analogies from past conflicts that do not fit the modern threat profile.

Average IT Hit From Data Breaches Nearly $1 Million: Study (MediaPost) Almost half of all firms have suffered a data breach, a study finds. Worse, almost 10% of the IT leaders did not realize it.

Ransomware is #1 for Cyberinsurance claims! (National Law Review) reported that more “…than one-quarter of cyber insurance claims received by AIG last year were the result of ransomware attacks, the largest percentage of any cyberattack type, according to the insurance giant’s 2017 cyber insurance claim statistics.”

Report: Nearly half of all enterprises were hacked in the last 12 months (Tech Republic) The survey found that organizations that did report a breach in the last year had been hacked an average of 30 times.

The Critical Need to Improve Compliance Processes (KnowBe4) Depending upon one’s perspective, compliance activities are either a fortunate fact of life for most organizations because they can minimize the risk associated with running afoul of various governmental and best practice obligations; or they’re an unfortunate part of doing business because of the cost and effort required to manage them properly.

The Exabeam 2018 State of the SOC Report (Exabeam) The Exabeam 2018 State of the SOC Report is based on the results of an April 2018 survey of US and UK security professionals who are involved in the management of Security Operations Centers (SOC) across CISO, CIO, analyst, and management roles.

Crowdsourced security trends: Payouts to hackers increase (Help Net Security) Bugcrowd has released the 2018 Bugcrowd State of Bug Bounty Report, which analyzes proprietary platform data collected from more than 700 crowdsourced security programs managed by the organization.

Some 37 percent of devices in Armenia exposed to infection attempts (ARKA Telecom) About 37% of devices used by Internet users in Armenia in January, February and March 2018, faced  attempts of infection with malicious software , making Armenia the 7th country in this respect, according to the data of Kaspersky Lab, obtained with the help of Kaspersky Security Network (KSN).


Tech Data: The security market has to change (MicroscopeUK) The distributor is looking to gain more of a foothold in the market and is coming with a different message for resellers

Chinese phone maker ZTE saved from brink after deal with U.S. (Reuters) U.S. Commerce Secretary Wilbur Ross said on Thursday the government has reached a deal with ZTE Corp that reverses a ban on its buying parts from U.S. suppliers, allowing China's No. 2 telecommunications equipment maker to get back into business.

Palo Alto Networks Inc.: Can the $128 Million Man Invigorate PANW Stock? (InvestorPlace) Palo Alto Networks is betting $128 million per year that Nikesh Arora can enhance its cloud security leadership, which bodes well for PANW stock.

Jim Cramer Reveals His Favorite Cyber Security Stocks (TheStreet) TheStreet's founder and Action Alerts PLUS Portfolio Manager Jim Cramer's favorite cyber security stocks are Proofpoint, followed by Palo Alto Networks.

Lockheed Martin sees an appetite for startup investments (C4ISRNET) Lockheed is doubling down on its venture capital investments. Here's the tech it's interested in.

CounterTack Buys GoSecure to Take On CrowdStrike, Carbon Black (Channel Partners) CounterTack said its acquisition of GoSecure expands its previous partnership with the company to a MDR platform-as-a-service for its domestic and international customers, and it will enhance its offerings for enterprises of all sizes, whether deployed on-premise, hosted or managed in the cloud.

Reason Software Acquires Filelock to Provide Consumers with the Most Comprehensive Cyber Protection Against Existing and Emerging Threats (PR Newswire) Reason Software, a leading cybersecurity software company focused on...

Frontier Announces Majority Investment in MediaPro and CEO Appointment (Frontier Capital) We are pleased to announce our majority growth equity investment in MediaPRO Holdings, a SaaS-based provider of security, privacy, and compliance awareness training solutions. In addition, we are excited to welcome Tyler Winkler to lead the company as CEO.

ALTR Emerges From Stealth With Blockchain-Based Data Security Solution (SecurityWeek) Austin, Texas-based ALTR emerged from stealth mode on Wednesday with a blockchain-based data security solution and $15 million in funding

HP Discloses Up To 1,000 Additional Job Cuts By Next Year (CRN) The company's restructuring plan, which runs through fiscal 2019, now includes between 4,500 and 5,000 job cuts in total.

Fran Rosch Named ForgeRock Chief Executive Officer (GlobeNewswire News Room) Former Executive Vice President of Symantec to Lead the Company Through Next Growth Phase

Products, Services, and Solutions

Comodo Cybersecurity Unveils New Visual Identity and Website, Positioning Centers on Enabling Customers to Render Attacks Useless (PR Newswire) Comodo Cybersecurity, a global...

Gemalto Launches Virtualized Network Encryption Platform to Help Customers Address Evolving Data Security Needs (BusinessWire) Gemalto, the world leader in digital security, today announced the launch of a new virtualized network encryption platform, SafeNet Virtual Encryptor

Smartphone Security Scanner 'Sees' Concealed Weapons and Explosives on a Person, Non-Invasively and in Real Time (Officer) From a distance of up to 40 feet, security agents or law enforcement personnel can scan individuals in a crowd or an approaching person of interest simply by pointing their smartphone at them with the SWORD device attached.

AXA Partners With SecurityScorecard to Set Cyber Insurance Premiums (SecurityWeek) AXA has entered an agreement with SecurityScorecard to have access to security ratings, which will be used to help set the premium for its insurance agreements.

enSilo's Endpoint Security Platform Introduces Multi-tenancy Features Helping Managed Security Service Providers Capitalize on New Security Markets (PR Newswire) enSilo, the automated endpoint security company protecting endpoints pre-...

Atos and Merlin International Join Forces to Offer Managed Cybersecurity Services (BusinessWire) Atos and Merlin International, Inc. today announced they will partner together to offer quality managed security services

Lockpath and Digital Shadows Partner to Advance Digital Risk Management (PR Newswire) Lockpath, a leading provider of...

Hikvision UK and Eagle Eye Networks Announce Preferred Technology Partnership (News Anyway) London, UK and Amsterdam, NL – Hikvision UK & Ireland, the world’s largest manufacturer of video surveillance products and solutions, ...

Kaspersky: Products Address Needs of ‘Very Small Business to Large Enterprise’ (Channel Partners) In this edition of the New Exhibitor News Desk at the 2018 Channel Partners Conference & Expo in Las Vegas, Kaspersky Lab's Bundit Boonchareon discusses how SMBs can implement his company's security services and what companies can do to prevent security risks created by their own employees.

Technologies, Techniques, and Standards

Using Insights From DefPloreX-NG to Thwart Web Defacement Attacks (TrendLabs Security Intelligence Blog) The ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS) is an avenue for cybersecurity research breakthroughs, techniques, and tools.

DISA, worried about cyberattacks, looks to the cloud (Fifth Domain) In an era of increased cyber risk, how do you protect millions of users needing to access the web from the most targeted network in the world?

The Diminishing Returns of Our Constantly Growing Security Stacks (SecurityWeek) It may be time to couple ‘defense-in-depth’ with the understanding that when it comes to security stacks, less actually can be more.

Bouncing Back from Cyber Attack (Infosecurity Magazine) Knowing where to get started a cyber-attack specific disaster recovery plan is always half the battle..

US Navy Launches Inspection Program for Cyber Operations Preparedness - Executive Gov (Executive Gov) The U.S. Navy debuted early this year a program that allows the service branch to conduct and direct

Why creativity is key to security (Help Net Security) Security teams are under tremendous pressure today, and are often times not thought of as innovative or creative. Yet that’s precisely what needs to happen.

Balancing Modernization and Cybersecurity (MeriTalk) The digital transformation in government IT is driving modernization but also expanding the attack surface Federal agencies have to protect. The traditional perimeter no longer exists. Today, there is no “inside” or “outside” the network when it comes to detecting, defending, and deterring cyber attacks.

Six years since World IPv6 Launch: entering the majority phases (Security Boulevard) As reported in an ISOC report last year, IPv6 adoption is now solidly in the "early majority phase" of the technology adoption life cycle by many metrics (well past "innovators" and "early adopters"), with progress beyond that in some areas....

Design and Innovation

Sponsored: Closing the Last Gap in Data Security: Protecting Data in Use (Enveil) Industry analyst firm 451 Research highlights how startup Enveil tackles the encryption-in-use problem with a new take on homomorphic encryption.

Encyclopædia Britannica Wants to Fix False Google Results (WIRED) The 250-year-old publication released a Chrome extension designed to fix Google's sometimes inaccurate "featured snippets."

Internal Documents Show How Facebook Decides When a Poop Emoji Is Hate Speech (Motherboard) Facebook trains its moderators to recognize when emojis violate the social network site’s policies as well, including for sexual solicitation, hate speech, and bullying.

Research and Development

In Pursuit of Cryptography's Holy Grail (Dark Reading) Homomorphic encryption eliminates the need for data exposure at any point - something that certainly would be welcome these days.

Blocking facial recognition surveillance using AI (Naked Security) If AI is increasingly able to recognise and classify faces, then the only way to counter this creeping surveillance is to use another AI to defeat it. Thanks to the University of Toronto, this may …


The divide over China’s Confucius Institutes on US campuses (South China Morning Post) The debate over the language and culture centres has become a testing ground for the American response to China’s growing global reach

Virginia Tech team tops in cyber capture-the-flag (VT News) Seven computer engineering students took first place in MITRE’s Embedded Capture-the-Flag contest, which tasked them with designing a secure ATM banking system and then attacking the designs of 10 other universities.

Legislation, Policy, and Regulation

Germany could dispatch armed forces in response to cyberattacks (Handelsblatt Global Edition) Germany could use its armed forces in response to cyberattacks. That’s tough talk from a country notoriously shy about joining foreign military missions.

The Future of GDPR - Dead, Diluted, Detested or Accepted? (SecurityWeek) European Data Protection Regulation (GDPR) will either become dead, diluted, detested or accepted, as other regulations before it.

Senate defense bill would authorize spying on Russians engaged in disinformation, hacking (TheHill) The Senate Armed Services Committee’s version of an annual defense bill would authorize the Pentagon to conduct surveillance on individuals conducting hacking or disinformation campaigns on behalf of the Russian government — a clear reference to Moscow’s interference in the 2016 presidential election.

Confirmed: ZTE to reopen after $1 billion fine, new leadership [Updated] (Ars Technica) Deal follows terms outlined by Donald Trump in a May tweet.

ZTE fined $1 billion (TechCrunch) After much negotiation with the Trump Administration, Secretary of Commerce Wilbur Ross confirmed this morning that ZTE, the Chinese telecommunications giant, has agreed to a $1 billion fine. That penalty was assessed following an investigation showing that ZTE had violated U.S. sanctions by sellin…

Trump flouts national security advice in bid to save ZTE (POLITICO) His push to rescue the Chinese telecom giant puts him on a collision course with Congress, as well as members of his own administration.

House panel votes down measure to force DHS to detail ZTE threat (TheHill) The House Homeland Security Committee on Wednesday voted down a Democratic resolution that would have forced the Department of Homeland Security (DHS) to provide lawmakers with more information about the threat posed by Chinese telecommunications firm ZTE.

House panel approves bill to secure industrial systems from hacks (TheHill) The House Homeland Security Committee has advanced legislation designed to boost security around systems used to power the electric grid and other critical services in the United States.

White House ‘Game of Thrones’ Elevates Newbie to Run Cybersecurity (The Daily Beast) A West Wing power struggle has elevated an inexperienced official who’s angered the agencies tasked with securing federal networks.

SEC chairman: Cryptocurrencies like bitcoin are not securities (CNBC) SEC Chairman Jay Clayton speaks with CNBC's Bob Pisani about what he sees for the future of blockchain, cryptocurrencies and initial coin offerings (ICO).

The sweeping surveillance of American lives (Orange County Register) Civil liberties groups are correctly demanding the release of more information on a reported surge in U.S. call records collected by the National Security Agency.

Army cyber program accepts only the best MI officers and the return investment is paramount to the Cyber Branch and the Army (DVIDS) When Maj. Brooks Jarnagin, who is a Military Intelligence (MI) officer, graduated from the two-year Army Intelligence Development Program – Cyber (AIDP-Cyber) course in a ceremony at the National Cryptologic Museum here on June 1 he became a trend sett

What is the New York Cybersecurity Regulation? What you need to do to comply (CSO Online) Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan.

New Colorado Breach Notification Rules Signed Into Law (Dark Reading) Colorado has enacted a new data breach notification law that contains some of the most stringent requirements in the US.

New law forces Google to suspend political ads in Washington state (Ars Technica) Google says its systems are not yet able to comply with the disclosure rules.

Litigation, Investigation, and Law Enforcement

ZTE Pays $1 Billion Fine in Settlement With U.S. (Wall Street Journal) The U.S. and China have reached a deal that will allow telecom company ZTE to continue to do business, requiring it to pay a $1 billion fine and place U.S. enforcement officers in the company to monitor its actions.

Senator wants Mark Zuckerberg to testify on Huawei data sharing (Engadget) Brace yourself for another Facebook hearing.

Facebook Deals With Chinese Firm Draw Ire From U.S. Lawmakers (SecurityWeek) Lawmakers expressed outrage that Chinese firms were given access to Facebook user data at a time when officials were trying to block their access to the US market over national security concerns.

PACIFIC • Is Facebook a security threat? (CNNMoney) Zuckerberg Takes TV • Instagram Goes Long • Elon Musk

After Scrutinizing Facebook, Congress Turns to Google Deal With Huawei (Wall Street Journal) Members of Congress have begun scrutinizing Google’s relationship with China’s Huawei Technologies, according to people familiar with the matter—roping another Silicon Valley giant into Washington’s escalating digital cold war with Beijing.

Former Cambridge Analytica CEO Faces His Ghosts in Parliament (WIRED) Alexander Nix returned to Parliament, but provided more bluster than answers.

McCabe seeks immunity for testimony in congressional hearing over FBI handling of Clinton email probe (CNN) Former FBI Deputy Director Andrew McCabe has requested the Senate Judiciary Committee provide him with immunity from prosecution in exchange for testifying at an upcoming congressional hearing focused on how senior officials at the FBI and Justice Department handled the investigation of Hillary Clinton's private email server, according to a letter obtained by CNN.

Mueller checks witnesses’ phones for secure messaging apps, per report (Ars Technica) CNBC: Mueller has been checking for improper conversations by Trump associates.

Marcus Hutchins faces new charges over malware creation and lying to the FBI (Computing) Hutchins calls 'bullshit' on new charges that 'reset the clock' in legal case

China Targets Defense Contractors in Its Ramped Up Spy Games - ClearanceJobs (ClearanceJobs) Yet another counterintelligence success from the FBI - the arrest of Ron Rockwell Hansen, defense contractor and former Defense Intelligence Agency officer for espionage on behalf of China. Every FSO should be briefing their personnel on the China espionage threat.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Health Cybersecurity Summit 2018 (Santa Clara, California, USA, July 20, 2018) Worried about being hacked? Not sure how to respond to a cyber incursion? The first line of defense is a cyber threat preparedness strategy that includes coordination with critical infrastructure and emergency...

Upcoming Events

SINET Innovation Summit 2018 (New York, New York, USA, June 7, 2018) Connecting Wall Street, Silicon Valley and the Beltway. SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration...

CYCON: Cyber for the Community (Reston, Virginia, USA, June 9, 2018) Join us for a day of Cyber Security talks on privacy, lock picking, the Dark Web, cyber education, building attack machines, phishing attacks, malware analysis, Internet of Things security, threat monitoring...

Transport Security and Safety Expo (Washington, DC, USA, June 11 - 12, 2018) Security incidents are expected to cost the world $6 trillion annually by 2021, making now the time to find out more at the 2018 Transport Security and Safety Expo. The transportation industry is rapidly...

Transport Security & Safety Expo (Washington, DC, USA, June 11 - 12, 2018) The conference is devoted to the challenges and opportunities surrounding ensuring the safety and security of passengers and cargo in the digital age.

Dynamic Connections 2018 (Palm Springs, California, USA, June 12 - 14, 2018) Together with you, our customers and partners, we’ll come together for 2 ½ days to learn, explore and create the possible at Dynamic Connections 2018 (DC18). To get ahead of the most critical, most pervasive...

Social Engineering—Rhode Island (Newport, Rhode Island, USA, June 16, 2018) Welcome to the first ever social engineering conference in Rhode Island!

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 18 - 20, 2018) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the second annual Cyber Security Summit in June 2018. The summit, presented in a continuing education format,...

NITSIG Meeting: Protecting Controlled Unclassified Information On U.S. Government Contractor Information Systems (Herndon, Virginia, USA, June 18, 2018) This meeting will discuss the security control requirements for the protection of Controlled Unclassified Information (CUI), for contractor information systems upon which CUI is processed, stored on, or...

Insider Threat Program Management With Legal Guidance Training Course (Tyson's Corner, Virginia, USA, June 19 - 20, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

GovSummit (Washington, DC, USA, June 27 - 28, 2018) GovSummit -- the government security conference hosted annually by the Security Industry Association -- brings together government security leaders with private industry technologists for top-quality information...

The Cyber Security Summit: DC Metro (Tysons Corner, Virginia, USA, June 28, 2018) Learn from cyber security experts from The U.S. Department of Justice, The NSA, Pulse Secure, CenturyLink and more as they brief you on the latest security threats facing your business. This event is...

Impact Optimize2018 (Rosemont, Illinois, USA, June 28, 2018) Impact Optimize2018, the first-ever IT and Business Security Summit hosted by Impact, will provide attendees with actionable steps that enable the betterment of information, network and cybersecurity.

Nuclear Asset Information Monitoring and Maintenance (Warrington, England, UK, July 3 - 4, 2018) On July 3rd and 4th in Warrington United Kingdom, nuclear industry leaders will meet for the IoE Events Nuclear Asset Information, Monitoring and Maintenance conference to further develop the sector’s...

The Cyber Security Summit: Seattle (Seattle, Washington, USA, July 19, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Cyber Security Summit 2018 (Newport, Rhode Island, USA, July 18 - 20, 2018) Join us for Opal Group’s Cyber Security Summit – set in Newport, RI, this premier event will gather C-Level & Senior Executives responsible for defending their companies’ critical infrastructures together...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.