skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

UK Prime Minister May has demanded an explanation from Russia, by midnight tonight, of the March 4th attempted assassination by nerve agent of former GRU officer Sergei Skripal and his daughter Yulia. Russia will not comply: Foreign Minister Lavrov dismissed any notion of Russian complicity as "nonsense." Essentially no one believes this. The poison used was an unusual nerve agent developed by the Soviet Union during the Cold War's endgame.

The UK has darkly promised some form of retaliation. Home Secretary Rudd said the retaliation may be covert or clandestine, which, taken with last week's Cabinet statement on cyber defense, is being read as hinting at retaliation with some form of cyber attack.

Palo Alto Networks' Unit 42 this morning published a report on HenBox, a family of Android malware that represents itself as legitimate apps available in third-party app stores. HenBox is spyware, an information-stealer that seems designed to target China's Muslim Uyghur minority. Unit 42 doesn't offer attribution, but the target set strongly suggests a Chinese government domestic intelligence operation.

NCC Group reports that a Chinese threat actor, APT15 (also known as Ke3chang, Mirage, Vixen Panda, or Playful Dragon) has been actively prospecting British Government agencies and defense contractors through a series of backdoors.

The US Government has for reasons of national security stopped Broadcom's attempted hostile takeover of Qualcomm.

The AP reports this morning that US President Trump has dismissed Secretary of State Rex Tillerson. Director of Central Intelligence Mike Pompeo is said to be his replacement.


Today's issue includes events affecting Australia, China, European Union, Holy See, Myanmar, Pakistan, Russia, Syria, Turkey, Ukraine, United Kingdom, United States.

Intelligent response to doing more with less

Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. How do you fend off these attacks when you don’t have the budget or resources for everything you need to protect your organization: data feeds, tools, analysis and mitigation? Learn more in our webinar on Wednesday, March 21 @ 2pm ET. Sign up now!

In today's podcast we speak with our partners at the University of Bristol, as Awais Rashid discusses cyber physical systems. Our guest is Tom Badders from Telos who reviews obfuscation as applied to threat intelligence.

How to Sell Your Cyber Startup's Software to Large Fortune 500 Companies (Fulton, Maryland, USA, March 15, 2018) Joe Silva, VP Cyber Threat & Intelligence at TransUnion, will share his perspective on how large Fortune 500 companies approach buying software from cyber start-ups. Early stage founders and technology innovators come to learn, network & enjoy free food & beverages.

Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) Billington International Cybersecurity Summit, March 21, Washington, D.C. Cybersecurity leaders from Asia, Europe, the Middle and U.S. on global threats and best practices, including Acting DoD CIO and Singapore Cyber Commissioner-designate. Sponsor Opportunities: Sandy Nuwar at 443-994-9832

Cyber Security Summits: Denver on March 22 & May 15 in Dallas (Denver, Colorado, USA, March 22, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350)

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.


What makes for resilience? Planning and drill. (The CyberWire) From the military school of life: what are soldiers made of? Planning and drill, all kinds of drill. Industry, take note.

Implications of the Internet-of-things. (The CyberWire) The IoT's vast expansion of enterprise attack surfaces is deeply troubling even when you confine your concerns to consumer-level IoT devices. When you consider the industrial IoT, it can be terrifying.

Emerging threats (and, again, especially those emerging from the IoT) (The CyberWire) Those interested in discerning where the next wave of threats will gather need look no farther than the Internet-of-things.

"Internet Insurrection," and the changing economics of cybercrime (The CyberWire) Cybercrime and government regulation in response to that crime are changing the online economy. Both legitimate and criminal markets are being shaped in new and unfamiliar ways.

Data as endpoint. (The CyberWire) Many things are being called the "new endpoint." Would data be among them?

100 coins: an exercise in trade-offs (The CyberWire) A panel discussion applied the national security strategic planning process "100 Coins," essentially a thought-experiment that facilitates identification of strategic priorities.

SINET Security Conference Summary and Observations March 7-8, 2018 (Control Global) I participated in the 2018 SINET Security Conference in Mt. View, CA. The agenda can be found at There was a dearth of control system cyber discussions and a lack of control system cyber security understanding by many.

Cyber Attacks, Threats, and Vulnerabilities

HenBox: The Chickens Come Home to Roost (Palo Alto Networks Blog) Unit 42 discovers HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores.

CCleaner Attackers Intended To Deploy Keylogger In Third Stage (Threatpost) As investigations continue about the backdoor that was planted in CCleaner, Avast said it has found that the actors behind the attack were planning to install a third round of malware on compromised computers.

APT15 hacking group linked to Chinese intelligence accused of hacking UK government contractor and stealing military secrets (Computing) Google Cloud used by Chinese hackers as part of command and control infrastructure for nation-state attack, claims NCC Group

China-Linked Spies Used New Malware in U.K. Government Attack (SecurityWeek) A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government

Report highlights how deep packet inspection could be subverted by cybercriminals (Fierce Wireless) DPI middleboxes developed by Sandvine PacketLogic are apparently being misused by state-sponsored cybercriminals.

Olympic Destroyer: A False Flag Confusion Bomb (Threatpost) Researchers say the case of Olympic Destroyer malware show how threat actors can manipulate “geopolitical agenda” with false flags.

Winter Olympics Gold Medal for False Flag Goes to ... ? (BankInfo Security) Whoever unleashed malware designed to disrupt last month's Winter Olympics in Pyeongchang, South Korea, designed it to look like it had been executed by a group of

Russia Didn’t Abuse Facebook—It Simply Used It As Intended (WIRED) Opinion: When ISIS uses Twitter to recruit or a landlord uses Airbnb to discriminate, that’s not exploiting the platforms' glitches—that’s using their features.

UN says Facebook is accelerating ethnic violence in Myanmar (TechCrunch) The United Nations has warned that Facebook's platform is contributing to the spread of hate speech and ethnic violence in crisis hit Myanmar.

Vehicle Ramming, from the Middle East to Charlottesville: How do Tactics Spread? (Modern War Institute) Abdelrahman al-Shaludi was from Silwan in East Jerusalem. James Fields was from Ohio. One was associated with Hamas and the other with white supremacists.  The two have very little in common, except one thing: both chose to turn a car into a weapon. Despite their differences, their decisions to weaponize their vehicles bookended the spread …

Peter Cochrane: Escaping the comfortable rabbit hole of social-media agreement (Computing) Has social media killed reasoned debate? And, if so, how do we re-inject civility back into public discourse, asks Peter Cochrane

Fake Fortnite Mobile iOS Invites Being Pushed On Social Sites (BleepingComputer) Whenever something newsworthy comes out there will always be people who try to take advantage of it. A perfect example of this is the Fortnite iOS mobile invite that launched today, where people are impatiently waiting for the invite codes to be released, while others try to trick them into purchasing fake ones.

Cortana vulnerability allows hackers to bypass Windows passwords (CRN Australia) Security risk allows hackers to install malware.

How did it all start? Early Memcached DDoS Attack Precursors and Ransom Notes (SANS Internet Storm Center) The past weeks we’ve seen several large DDoS attacks taking advantage of public accessible memcached instances.

Payload delivery via SMB (SANS Internet Storm Center) This weekend, while reviewing the collected data for the last days, I found an interesting way to drop a payload to the victim.

Exclusive: Cyber-criminals are selling victim's selfies on the dark web (The Next Web) You can buy almost anything on the dark web. The shrouded underbelly of the Internet is most known for its clandestine markets that make a brisk trade in the sale of drugs, weapons, and the details and identities of millions of people. It’s the latter category that’s taken an interesting turn, with some cyber-criminals now …

Life is cheap! Well it is on Dark Web where your entire identity is for sale (HackRead) Your Entire Identity Is Up for Sale at the Dark Web - Startling Revelations by UK’s top VPN Comparison Service.

Culture issues creating open season for phishing (Channelnomics) Customer gaps in instilling security in daily culture is leaving the channel continuously tangled in phishing lines

Two-Fifths of NHS Staff Break Policy Via WhatsApp Use: Report (Infosecurity Magazine) Two-Fifths of NHS Staff Break Policy Via WhatsApp Use: Report. Shadow IT challenge exposes patient data to risk, says CommonTime

Security Patches, Mitigations, and Software Updates

Microsoft forced upgrades on Windows 10 machines set to block updates (Computerworld) For the third time in the past four months, Microsoft 'accidentally' upgraded Windows 10 1703 machines to version 1709 in spite of explicit, correctly applied, deferral settings.

Cyber Trends

20 Percent Say IoT Is Chief Mobile Security Concern, According to Verizon Report (Sourcing Journal) It’s funny how companies that aren’t acting on mobile security just so happen to be more likely to suffer a cyber incident or significant downtime as a result.


US blocks Broadcom acquisition of Qualcomm citing national security (Computing) President Trump follows CFIUS recommendation and blocks Broadcom's mega-bid for Qualcomm

Legislators react: 'The national security aspect of this cannot be overstated.' (San Diego Union Tribune) President Trump quashed Broadcom's hostile takeover bid of San Diego-based tech giant Qualcomm.

EclecticIQ grows customer base by 100 percent, establishes North American Headquarters and continues expanding to strategic regions (EclecticIQ) Series-B investment unlocks additional growth of customer base. Optimized product portfolio for jumpstarting and advancing threat intelligence practice

Zscaler IPO: A (Good) Sign of Things to Come? (SharesPost) Zscaler will be the first unicorn to hit Wall Street this year so investors are naturally playing close attention to the San Jose-based cybersecurity firm’s IPO, tentatively planned for March 16. The company plans to sell up 11.5 million shares at $10 to $12 per share. Zscaler, which will operate under the ticker ZS, could raise up to $112 million.

Sedulo Group Strengthens Position in Cybertechnology Space with Addition of Industry Vets (PR Newswire) Sedulo Group today announced that Alysse Nockels, former Director of...

Products, Services, and Solutions

The Next Gen Infection Monkey is Here (GuardiCore Labs) GuardiCore labs are pleased to announce a new version of our Infection Monkey open source attack simulation tool with several significant enhancements.

Equinix Enhances Its Global Platform with New Cloud Security Service to Manage Encryption Keys (PR Newswire) Equinix, Inc. (Nasdaq: EQIX), the global interconnection and...

Ann Arbor's Duo Security launches cybersecurity website called Decipher ( "We're trying to help educate and inspire people around security and privacy and get people who might not be as well versed or think they don't need to know as much about it to make better choices."

Maryland cybersecurity company SecuLore Solutions is helping to assess the state's 911 system ( Baltimore) The Anne Arundel County company is joining with Mission Critical Partners to document assets and potential vulnerabilities.

Aryaka Unveils Security Platform with Radware, Zscaler, Palo Alto (Channel Partners) Aryaka, the software-defined wide area networking (SD-WAN provider), introduced a security platform and ecosystem The vendor has partnered with Radware, Palo Alto Networks and Zscaler to provide industrial-grade security measures.

Technologies, Techniques, and Standards

IIC Publishes Best Practices for Securing Industrial Endpoints (SecurityWeek) The Industrial Internet Consortium (IIC) has published a new paper designed to provide a concise overview of the countermeasures necessary to secure industrial endpoints; that is, the industrial internet of things (IIoT).

Energy Joins in Collaborative Cybersecurity EffortEnergy Joins in Collaborative Cybersecurity Effort (Automation World) With energy discussions at CERAWeek as the backdrop, three additional companies signed on to the Charter of Trust, a cooperation initiated by...

If War Comes, Russia Could Disconnect from the Internet. Yes, the Entire Country ( Robust internal networks will keep the military and government operating, says Putin’s top IT advisor.

The Army’s new tool in firing back? Cyber (Fifth Domain) The Army is continuing to experiment with cyber capabilities on the battlefield.

Are Spectre and Meltdown just hype? (CSO) Often, it’s the dramatic things that get our attention and what we see as a risk. We’re more scared of flying than of driving, and terrified of snakes and spiders when we’re more at risk from the common cold. So, do our fears lie in the right place?

GDPR Questions Answered: Where do I Learn to be a DPO? (Infosecurity Magazine) How to learn and train to be a data protection officer, and how your organization matters.

Internal Audit's Growing Engagement in Cyber Management (PR Newswire) Internal auditors are increasingly adapting to the new cybersecurity...

Are We Aware Yet? (Infosecurity Magazine) We’re just not human centric. If you want better results, let people be people, and design accordingly.

Expert Roundup: The Impact of Software Monocultures on Security Across Organizations (Heimdal Security Blog) We asked cybersecurity experts about the impact of software monocultures on security and their answers provided great insights. They talked about the risks of using it in the organizations and why a multi-vendor approach is a better option.

Inside the Vatican's First-Ever Hackathon (WIRED) This is the Holy See of the 21st century.

Legislation, Policy, and Regulation

Theresa May gives Putin deadline to explain Sergei Skripal poisoning (TImes) Theresa May has cleared the way for a cyberattack on Russia as she challenged President Putin to explain how a powerful Russian nerve agent came to be used in an assassination attempt on British soil.

Cyber-attacks against Russia may follow attempted nerve agent killing in UK (SC Media UK) Offensive cyber-attacks against Russia among options under consideration by the UK if it is dissatisfied with Russia’s explanation of the UK use of Novichok .

Putin to stoke patriotic fervour with Crimea rally ahead of Russian election (Times) President Putin will hold a defiant rally in Crimea tomorrow, shrugging off EU sanctions against Russia that were extended yesterday over its continued occupation of the peninsula. The Russian...

The Banality of Putin’s Potemkin Elections (Foreign Policy) The tremendous effort that goes into producing a fake vote.

Is the U.S. Hypocritical to Criticize Russian Election Meddling? (Foreign Affairs) The United States is simply not engaging in electoral meddling in a manner comparable to Russia’s approach.

To defend against hostile nations, America needs fierce cyberpower (TheHill) The government needs a clear strategy cyberstrategy to defend against threats like Russia.

Trump: Rex Tillerson out as secretary of state, to be replaced by CIA Director Mike Pompeo ( Trump: Rex Tillerson out as secretary of state, to be replaced by CIA Director Mike Pompeo

Govt to monitor extremists, criminals in cyberspace (Pakistan Today) Interior minister says terrorism screening system to be established to protect CPEC route

10 Takeaways From the Fight Against the Islamic State (War on the Rocks) Nearly three years on from the Islamic State’s high water mark in the summer of 2015, there are several lessons that the United States and its allies can discern from the terrorist group’s meteoric rise to control large parts of Iraq and Syria to the loss of its physical caliphate late last year. The steady decline

Canadian Intelligence Reform Proposal: An ‘Intelligence Commissioner’ for the Communications Security Establishment (Lawfare) In this second post in our series about Canada’s national security law reform, we begin a discussion of changes proposed for the Communications Security Establishment (CSE), Canada’s primary signals intelligence and cybersecurity agency.

How to Improve Federal Cybersecurity Efforts ( The public sector can, and should, play a larger role in helping ensure massive breaches don’t happen again.

There Are No Guardrails on Our Privacy Dystopia (Motherboard) If tech is going to infiltrate, influence, and shape all of society, it is unacceptable for tech and pure market forces to decide the limits of the surveillance state.

Time limits for children hooked on social media (Times) Teenagers face being cut off from social media sites after a few hours’ browsing under proposals being drawn up to tame the “wild west” of the internet. Ministers are looking at imposing a limit on...

Could tech giants be controlled through anti-monopoly and merger regulations? (Public Finance) Last week members of the House of Lords International Relations Committee concluded tech firms were negatively affecting our society and questioned whether a ‘different regulatory approach’ was needed to control them. Could incoming monopoly and merger regulation provide the solution? asks Respublica's Joe Cowen.

Dutch Finance Minister Advises Government on Cryptocurrency (Bitcoin Magazine) In a six-page letter to the Dutch senate and house, Finance Minister Wopke Hoekstra has outlined his concerns over the rapid and dramatic growth in cryptocurrencies.Hoekstra emphasized that there has been little time to understand and react to the changing landscape and that the current supervision and regulatory ...

"No Right Without a Remedy": Why NSA Whistleblower Protections Are Lacking | Whistleblower Protection Blog (Whistleblower Protection Blog) Earlier this month Stephen M. Kohn, executive director of the National Whistleblower Center, attended a roundtable discussion with the National Security Ag

Litigation, Investigation, and Law Enforcement

Sergei Skripal attack: Salisbury poison novichok is so secret, it has never been detected before (Times) The nerve agent that contaminated the victims of the Salisbury attack is a lethal chemical weapon developed in Russia in the 1970s and 1980s and never known to have been used until now. Novichok...

Homeland Security Sees No ‘Nefarious Activity’ Threatening Cybersecurity Ahead of Midterms (The Daily Beast) In the months since the 2016 election, DHS officials have had ‘a little bit of a crash course on what it means to run an election.’

Republicans on House panel, excluding Democrats’ input, say there’s no evidence of Russia collusion (Washington Post) A draft report from the GOP is expected to face backlash from Democrats, who believe there is evidence the Trump team coordinated with the Kremlin.

Democrats demand Trump force 13 indicted Russians to stand trial (Washington Examiner) Top Democrats on Monday demanded that President Trump force the 13 Russian nationals who have been indicted as part of special counsel Robert Mueller's probe to stand trial in the U.S. for their alleged interference in the 2016 presidential election.

Google Is Back In Canadian Court to Fight Global Search Censorship (Motherboard) A California court said the 2014 Canadian order “threatens free speech on the global internet.”

Data breach victims can sue Yahoo in the United States: judge (Reuters) Yahoo has been ordered by a federal judge to face much of a lawsuit in the United States claiming that the personal information of all 3 billion users was compromised in a series of data breaches.

How the Government’s Cyber Agency Rates on Cybersecurity ( The annual FISMA report shows where the Homeland Security Department—the government’s point agency on cyber issues—can improve its own information security.

$250k bounty for anyone exposing hackers behind Binance attempted attack (HackRead) Binance cryptocurrency exchange is offering $250,000 to anyone who can provide conclusive evidence against hackers and lead to prosecution and jail for attempting to hack the exchange.

Lawyers can contribute to the rise of blockchain by understanding it (ABA Journal) Blockchain technology can make legal services more efficient and less costly by establishing automated smart contracts that don’t have to rely on human intermediaries to be enacted. According to David Fisher, founder and CEO at Integra Ledger, lawyers need to first understand how blockchain functions before it can be effectively used in the legal industry.

Feds Bust CEO Allegedly Selling Custom BlackBerry Phones to Sinaloa Drug Cartel (Motherboard) Phantom Secure is one of the most infamous companies in the secure phone industry. Sources and court documents detail that its owner has been arrested for allegedly helping criminal organizations.

TSA accused of searching domestic travelers’ devices with no warrant (Ars Technica) TSA has failed to fully respond to FOIA requests from the ACLU.

Matthew Keys, now freed from prison, is ready to get back to journalism (Ars Technica) "I work hard, and I’m smart, but I do have an uphill battle going forward."

Surveillance reseller Streamax beats NSW Police in court (CRN Australia) Tribunal reinstates security licence.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

Upcoming Events

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes...

SecureWorld Boston (Boston, Massachussetts, USA, March 14 - 15, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges...

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

Northeast Regional Security Education Symposium (Jersey City, New Jersey, USA, March 23, 2018) The Professional Security Studies Department at New Jersey City University (NJCU) will hold its Northeast Regional Security Education Symposium on Friday, March 23, 2018, from 8 am to 2 pm. The symposium...

KNOW Identity Conference 2018 (Washington, DC, USA, March 26 - 28, 2018) The premier global event for the identity industry, the KNOW Identity Conference is the nexus for identity innovation, offering a uniquely differentiated, powerful, and immersive event that convenes the...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.