skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

Germany's Interior Ministry has said that relatively early detection of intrusion into a sensitive network averted what could have been considerably more extensive damage than the government sustained. The spokesman declined to offer attribution, but unofficial consensus is that the hack was a Russian operation. Russia's Foreign Ministry denies any involvement, and cites the incident as another case of Western governments reflexively (and in bad faith) blaming Moscow for anything that goes wrong in cyberspace.

Russia's President Putin offered a similar response to US concerns about election hacking-he wants to see the evidence. Investigation of Russian influence operations, which aren't seriously in doubt, have become, observers lament, increasingly partisan. Meanwhile leaked documents are thought to provide some insight into the operations of Russian troll farms and their objectives. Those objectives appear as always to include the overarching goal of fomenting mistrust; some think they see more specific economic objectives as well.

McAfee researchers report a new campaign that targets international humanitarian aid organizations. The actor behind the operation is not specified, although McAfee believes it to be a Korean speaker. The malicious documents are baited with news about North Korean relief organizations. McAfee ties one persona, "snoopykiller," to the operation. 

Memcrash distributed denial-of-service attacks have apparently been criminalized. DDoS attackers seek to extort cryptocurrency from victims.

Researchers at LGTM have discovered a vulnerability in the widely use Pivotal Spring web development framework. The issue (which they're calling "Spring Break") is said to be an easily exploitable arbitrary command execution bug.

Notes.

Today's issue includes events affecting Australia, Canada, China, France, Germany, Iceland, Malaysia, Russia, Syria, United Kingdom, United Nations, United States.

A note to our readers: We'll be in Mountain View, California, later this week, covering  SINET's ITSEF conference. Sessions will be held on March 7th and 8th. Watch for summaries, articles, and live tweets beginning Wednesday.

How seamlessly is your data ingested across vendors?

To successfully fend off increasingly sophisticated cyber attacks, organizations need security tools that work effectively and efficiently across vendors. Join LookingGlass’ webinar with IBM and Cisco overviewing how STIX/TAXII2 standards-based technologies support solving those challenges in a new and effective manner. Sign up now!

In today's podcast we speak with our partners at the University of Maryland's Center for Health and Homeland Security, as legal expert Ben Yelin discusses Section 702 reauthorization.

Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) Billington International Cybersecurity Summit, March 21, Washington, D.C. Cybersecurity leaders from Asia, Europe, the Middle and U.S. on global threats and best practices, including Acting DoD CIO and Singapore Cyber Commissioner-designate. Sponsor Opportunities: Sandy Nuwar at 443-994-9832

Cyber Security Summits: Denver on March 22 & May 15 in Dallas (Denver, Colorado, USA, March 22, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350) https://CyberSummitUSA.com

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

Germany says 'acute threat' of hack averted after detection (Fifth Domain) Following a report by news agency dpa on Wednesday, the government acknowledged its network had been infiltrated but downplayed the possible harm done.

Kremlin dismisses allegation Russia behind German cyber attack (Business Insider) Kremlin spokesman Dmitry Peskov on Friday dismissed a suggestion that Russian hackers were behind a cyber attack in Germany, saying that Russia was now being blamed for any such attack and without any proof.

Lamar Smith says Russian bots are trying to cripple US energy production (Ars Technica) Russian bots stirred pipeline trouble. Was it sowing divisions or targeting energy?

Leaked: Secret Documents From Russia’s Election Trolls (The Daily Beast) An online auction gone awry reveals substantial new details on Kremlin-backed troll farm efforts to stir up real protests and target specific Americans to push their propaganda.

Facebook Doesn't Know How Many People Followed Russians on Instagram (WIRED) By leaving Instagram followers off the public record, Columbia researcher Jonathan Albright says Facebook is making the Russians trolls' true audience appear artificially low.

Meet Russia's trolls: From standup comic to a Siberian Jay Z (Fifth Domain) They are the 13 Russians indicted by a grand jury in Washington in a sweeping conspiracy to defraud the United States and its political system, including the 2016 presidential election, via bogus social media posts and other “information warfare.”

McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups (McAfee Blogs) McAfee Advanced Threat Research analysts have discovered a new operation targeting humanitarian aid organizations and using North Korean political topics as bait to lure victims into opening malicious

New LTE attacks open users to eavesdropping, fake messages, location spoofing (Help Net Security) Researchers have uncovered ten new 4G LTE attacks that be used to achieve things like impersonating existing users, spoofing the location of the victim device, delivering fake emergency and warning messages, eavesdropping on SMS communications, and more.

Security researchers identify new vulnerability affecting Pivotal Spring projects (Computing) Researchers imaginatively dub the new vulnerability Spring Break

CERTs warn on botnets, kernel bugs (FCW) Separate cybersecurity alerts from DHS indicate new botnet attack vectors and updates the list of industrial control system vendors facing Spectre and Meltdown vulnerabilities.

Fake DHL Shipment Notification delivers a password stealer keylogger (My Online Security) Following on from this earlier password stealer, keylogger malware campaign we are now seeing a slightly different campaign but looks like the same sort of malware, although not an auto it trojan this time.

Inside a New DDoS Amplification Attack Vector via Memcached Servers (Blog | Imperva) We recently saw a new DDoS amplification attack vector via memcached servers that culminated in two massive DDoS amplification attacks on February 28. Both attacks were mitigated successfully. Here’s how memchached servers work and how the attacks unfolded. Memcached servers Unless updated within the last two days, memcached servers listen on UDP port 11211 by …

DDoS Amplification Attacks are Ransom Notes (KoDDoS Blog) Memcached servers have been exploited in creating the largest ever DDoS attack. Now, researchers say that traffic was embedded with ransom notes, requesting Monero.

Cryptocurrency ransom demands popped up in recent cyberattacks (Mashable) Monero is an appealing form of cryptocurrency for cyberattackers due to the privacy it affords.

North Korea Obtained 11,000 bitcoins in 2017, Expert Says (Bitcoin News) North Korea may have made over $200 million USD from cryptocurrency transactions last year, according to a former NSA official.

The Vulnerability Nobody Wants to Fix (Medium) On the dangers of In Browser Cryptocurrency Mining, and how I got 1000s of computers to mine for me.

Malicious Bash Script with Multiple Features (SANS Internet Storm Center) It’s not common to find a complex malicious bash script. Usually, bash scripts are used to download a malicious executable and start it.

Number of Sites Hosting Cryptocurrency Miners Surges 725% in 4 Months (Dark Reading) The dramatic increase in cryptocurrency prices, especially for Monero, is behind the sudden explosive growth, says Cyren.

Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months (Threatpost) Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business models.

Pay us bitcoin or never see your files again: Inside the highly profitable underworld of ransomware (The Denver Post) Ransomware is one of the most lucrative criminal enterprises in the U.S. and internationally, with the FBI estimating total payments are nearing $1 billion. Experts at Broomfield’s Webroot sh…

Psychology of Ransomware: How Extortionists Use Fear, Anger and Humor to Hold Your Data Hostage (Infosecurity Magazine) Examining the psychology of ransomware attacks and how cyber-criminals prey on our intrinsic human emotions to get what they want.

Amazon scrambles to fix cloud networking issue affecting companies like Atlassian, Twilio (CNBC) The biggest public cloud in the world found itself facing networking issues in its major Virginia region of data centers.

UK charities vulnerable to hackers, says National Cyber Security Centre (Times) Charities who help to carry out government initiatives in foreign countries are susceptible to hackers hired by rogue states, according to the arm of GCHQ which protects against the cyber threat.

One in Eight Open Source Components Contain Flaws (Infosecurity Magazine) One in Eight Open Source Components Contain Flaws. Sonatype research claims number downloaded in UK has soared 120%

Equifax breach could be most expensive hack in history (CRN Australia) Costs expected to grow by another US$275 million this year.

Little progress following Equifax breach fallout (Atlanta Journal Constitution) It's been nearly six months since the Equifax hack was first exposed, and Congress has done little to strengthen

Security Patches, Mitigations, and Software Updates

New stable Tor releases, with security fixes and DoS prevention: 0.3.2.10, 0.3.1.10, 0.2.9.15 () Today, we made several new stable Tor releases.  Together, they fix an issue in directory authorities, and backport a feature to improve relays' resistance denial-of-service attacks. In addition, the 0.3.2.10 release fixes a security bug affecting relays running earlier 0.3.2.x versions.

Red Hat Releases Security Guidance for Memcached (US-CERT) Red Hat has released security recommendations to address potential Distributed Denial of Service attacks using Memcached. This misconfiguration could allow an attacker to exploit Memcached services as a reflection and amplification vector, causing unexpected volumes of traffic to be sent to targeted systems and networks.

Ethereum fixes serious “eclipse” flaw that could be exploited by any kid (Ars Technica) Hole made it possible to trick users into double spending and hack smart contracts.

How Google’s ‘Project Zero’ task force races hackers to snuff out bugs (Yahoo) Project Zero is Google’s task force, given the responsibility of keeping all the internet safe. They may have discovered the Spectre and Meltdown security flaws first, but they aren’t the only people on the hunt for bugs that could be exploited.

Cyber Trends

Acalvio Executive to Moderate Panel on Deception Technology at SINET 2018 (PR Newswire) Acalvio™ Technologies, an innovator in Advanced Threat Defense,...

Marketplace

Telos Corporation Awarded $108M NETCENTS-2 Task Order to Support Air Combat Command (Telos) Cyber operations and infrastructure support to augment defensive cyber operations.

New South Wales government blasted over weak contracts with IT security providers (CRN Australia) Most providers not obliged to report incidents.

Palantir, the company that knows too much (New York Daily News) Am I my cousin’s keeper?

SecuLore Solutions’ Alex Lorello Recognized as a Next-Generation Leade (PRWeb) SecuLore Solutions today announced Alex Lorello, Chief Engineer, has been named to the IWCE Young Professionals Awards list which showcases the next-generation

Smart contract experts Ilya Sergey and Evan Cheng join Zilliqa as advisors (International Business Times UK) Third generation sharded blockchain from University of Singapore has added two of the world's foremost experts in smart contracts to its advisory team.

Products, Services, and Solutions

Cybersecurity Analytics and Insights Helping Government Agencies (Forcepoint) Digital transformation has driven unprecedented connectivity throughout government agencies. Users want to work in dynamic applications that might reside on premises, in the cloud or in a hybrid environment. They also expect to access data, including Controlled Unclassified Information (CUI), from anywhere – and from any type of device.

UK and Australian governments now use Have I Been Pwned (TechCrunch) Troy Hunt is turning Have I Been Pwned into an essential pwning monitoring service. The service monitors security breaches and password leaks so that you and..

New Tools Make Checking for Leaked Passwords a Lot Easier (BleepingComputer) The work that Australian security researcher Troy Hunt has done with the Have I Been Pwned project is yielding useful tools that developers and webmasters can now use to make sure users stop using silly and easy to guess passwords.

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet (Bitcoin News) Mobile cybersecurity firm Sikur has unveiled “the first fully encrypted, hack-proof smartphone that can safely store cryptocurrencies.” The phone’s hardware and software were built from the ground up with a dedicated bitcoin wallet and a custom app store for high-security apps.

Technologies, Techniques, and Standards

A Sneak Peek at the New NIST Cybersecurity Framework (Dark Reading) Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Future Fights (Foreign Affairs) Predicting the future of war is difficult, but history may still have some useful lessons for strategists.

What role does HR play in cybersecurity? (HR Online) Employees are often the weakest link when it comes to security breaches and this is the space where HR plays a part

How to Ditch the News Feed Algorithm and Take Back Facebook (Motherboard) Facebook is better if you completely ignore the News Feed.

#GartnerIAM: Common Privilege Pitfalls Are Easily Overcome (Infosecurity Magazine) There has never been a greater need for PAM

Design and Innovation

Thinking about identity management for the RSA Security Conference (CSO Online) Password elimination, software-defined perimeter, and the need for security to “own” identity should be highlighted at the RSA Conference.

Machine learning self defence: how to not shoot yourself in the foot (Naked Security) Our machine learning series starts with arguably the biggest threat you face: yourself.

A $5 Billion Cryptocurrency Has Enraged Cryptographers (Motherboard) Leaked emails between IOTA developers and researchers have landed the cryptocurrency in hot water.

Uber co-founder Garrett Camp is creating a new cryptocurrency (TechCrunch) Garrett Camp, best known for being a co-founder of Uber and founder of the accelerator/venture fund Expa, is launching his own cryptocurrency. The currency..

Experts: stealing ideas is key to government IT (Federal Times) Replicating and adapting ideas from other agencies means that feds won't be repeating work and mistakes while developing innovative IT, according to government officials at the AFCEA Bethesda Innovation in Technology Symposium.

From SpankChain to Bigb[00]bscoin, Startups Keep Trying to Get People to Pay for Sex on the Blockchain (Motherboard) I reviewed the cryptocurrencies that want you to buy sex toys and "dates."

Research and Development

Microsoft's co-founder wants to teach AI common sense (TechWorm) Paul Allen wants to make AI more sensible by teaching them common sense Microsoft co-founder, Paul Allen, who had founded the Allen Institute for Artificial Intelligence (AI2) in 2014 on Wednesday pledged an additional $125 million into his Seattle-based nonprofit research lab to teach “artificial intelligence” some

Academia

PhishLabs Launches Future of Cybersecurity Scholarship Program (Security Boulevard) Today, PhishLabs is proud to announce the launch of our new annual scholarship program that is focused on furthering professionals interested in the growing world of cybersecurity. Dubbed the Future of Cybersecurity Scholarship Program, we will be able to help fuel student’s growth into one of the most in-demand industries.

Legislation, Policy, and Regulation

Will OECD cybersecurity initiative be successful? (New Times) Following last year’s worldwide worst cyber-attack that hit nearly 150 countries, the momentum to look for international cybersecurity regulation has been a mind-boggling issue.

International Law and Cyberspace: Evolving Views (Lawfare) Perspectives on cyber operations outside of the context of armed conflict and the applicability of international law.

US Cyber Command: An Assiduous Actor, Not a Warmongering Bully (The Cipher Brief) My take away from the U.S. Cyber Command symposium was somewhat different from Jason Healey's, recently published in The Cipher Brief.

China ratchets up online censorship with AI tools to remove posts using subtle code words and images to send political messages (V3) China is using AI-driven censorship tools to remove posts subtle code words and images used to oppose its government,Privacy,Security,Communications,Social Networking ,State censorship,China,censorship,WeChat,AI,social network,Johannes Ullrich,Sans Institute

Hyperbole won’t help us address cyberthreats (The Globe and Mail) It’s a serious and growing problem. We need to focus on concrete goals and objectives, balancing our need for risk-taking for innovation with securing our critical systems.

Canada in ‘pretty good shape’ against cyber infrastructure attacks: Goodale (IT World Canada) Canada is in “pretty good shape” to withstand a major attack on its infrastructure, Public Safety Minister Ralph Goodale has told a

State Dept. Was Granted $120 Million to Fight Russian Meddling. It Has Spent $0. (New York Times) The delay reflects President Trump’s largely passive response to the interference and doubts by Secretary of State Rex W. Tillerson in his department’s ability to spend its money wisely.

Officials support cyber battalion (The Republic) Indiana’s federal lawmakers are urging the Army National Guard to award a cyber battalion to the Hoosier state to aid in the protection of the U.S. from computer-generated threats. U.S. Sens. Todd Young, R-Ind., and Joe Donnelly, D-Ind., and the state’s nine members of the U.S. House of Representatives signed a letter of support for

SEC's new cybersecurity guidance falls short (CSO Online) Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

Litigation, Investigation, and Law Enforcement

Putin tells U.S. to send evidence of vote meddling (Reuters) Russian President Vladimir Putin told Washington to send him hard evidence that his citizens meddled in U.S. elections, mocking accusations to date as "yelling and hollering in the United States Congress".

The Russia Investigations: Is 'FISA Abuse' Out Of Steam? Intel Committees On Edge? (NPR.org) President Trump may have lost his patience with the "FISA abuse" defense, leading him to spar publicly with Attorney General Jeff Sessions, who is definitely Team DOJ. And big cyber-questions remain.

'This is off the charts': Intelligence veterans sound the alarm over the House Intelligence Committee's partisan war (Business Insider) The House Intelligence Committee has devolved into an unprecedented level of partisan bickering, and the national security apparatus is worried.

Special counsel wants documents on Trump, numerous campaign associates (NBC News) In addition to the president, the subpoena seeks documents involving Corey Lewandowski, Steve Bannon, Hope Hicks and Paul Manafort, among others.

Editorial: We must clarify all this Russian subterfuge (Sarasota Herald) Ambrose Bierce, in his work “The Devil’s Dictionary,” defined the vote, when used as a noun, as the “instrument and symbol of a

McDonough blames McConnell for inaction on 2016 meddling response (CNN) Former White House chief of staff Denis McDonough on Sunday defended the Obama administration's response to suspected Russian interference in the 2016 election, blaming Senate Majority Leader Mitch McConnell for what he called a "dramatically watered down" joint statement on election security in September 2016.

Denis McDonough says Mitch McConnell ‘watered down’ Russia election meddling response (The Washington Times) Denis McDonough, President Obama’s former chief of staff, on Sunday blamed Senate Majority Leader Mitch McConnell for a ‘watered down’ congressional response to reports of foreign election interference in September 2016.

SEC Issues Subpoenas to Crypto-Currency Firms (Infosecurity Magazine) SEC Issues Subpoenas to Crypto-Currency Firms. US regulator getting serious about nascent industry

Google and Facebook among giants ‘making profits’ from pop‑up brothels (Times) Internet giants were accused of profiting from sex trafficking in Britain last night as security chiefs warned of a new wave of “pop-up brothels” sweeping the country. The National Crime Agency...

Chinese Police Are Demanding Personal Information From Uighurs in France (Foreign Policy) Officials have threatened to detain relatives of those who don’t comply.

Isis extremist trained army of children for terror attacks (London) An Islamic State extremist found guilty of grooming an “army of children” to carry out terrorist attacks was able to infiltrate the schools system despite having no qualifications. Umar Ahmed Haque...

Stolen: 600 Bitcoin Mining Computers in Iceland & 153 from Malaysia (HackRead) Everyone wants Bitcoin but it is difficult and expensive to mine so why not steal Bitcoin mining computers? That's what happened in Iceland and Malaysia.

Bitcoin heist: 600 powerful computers stolen in Iceland (NBC News) Some 11 people were arrested, including a security guard, in what Icelandic media have dubbed the "Big Bitcoin Heist."

Should we permit child grooming, asks Facebook (Times) Facebook has been criticised over a “stupid and irresponsible” survey in which it asked whether child grooming should be allowed on its site. The social network asked several thousand users what...

Why the roots of patent trolling may be in the patent office (Ars Technica) Trolls love patents from examiners who are “lenient” about patent vetting.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, March 6 - 7, 2018) The course will cover current regulations like National Insider Threat Policy NITP and NISPOM Conforming Change 2, and more. The course will provide the ITP Manager and Facility Security Officer with the...

SINET ITSEF 2018 (Silicon Valley, California, USA, March 7 - 8, 2018) Bridging the gap between Silicon Valley and the Beltway. SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment...

AFFIRM and USCC 5th Annual Cybersecurity Summit (Arlington, Virginia, USA, March 8, 2018) The 5th Annual Cybersecurity Summit is a place for important discussions about the challenges with cyber-security and is also a significant benefit both for the AFFIRM scholarship program, which helps...

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes...

SecureWorld Boston (Boston, Massachussetts, USA, March 14 - 15, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

Northeast Regional Security Education Symposium (Jersey City, New Jersey, USA, March 23, 2018) The Professional Security Studies Department at New Jersey City University (NJCU) will hold its Northeast Regional Security Education Symposium on Friday, March 23, 2018, from 8 am to 2 pm. The symposium...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.