skip navigation

More signal. Less noise.

Looking for an introduction to AI for security professionals?

Your wait is over. A new book is out from the Cylance data science team, covering artificial intelligence and machine learning techniques in practical situations to improve the security professional’s ability to thrive in a data driven world. Whether you are reviewing logs or analyzing malware, being able to derive meaningful results and improve productivity is key. Order your free copy today.

Daily briefing.

As tensions between Britain and Russia mount, the UK braces for cyberattacks on critical infrastructure, especially on its power and water supplies. Police in Wiltshire, where the attempted assassination of Sergei Skripal took place, deny reports that their networks came under Russian attack. Expect more false alarms during this period of heightened tension.

The US power industry is similarly preparing itself for attack. The Department of Homeland Security has warned that Russian operators successfully intruded into electrical grid industrial control systems, albeit without working damage in this first stage of their campaign. Unofficial warnings go back to last autumn at least, when Symantec produced research on the activities of Energetic Bear. Some of the operations are thought to go back to 2015.

Social media continue to struggle through their rough patch. Political research firm Cambridge Analytica, which counted the Trump campaign among its clients, is found to have obtained personal information from Facebook on some fifty million individuals during the last US election cycle. Bot-driven fake Twitter accounts may have been used against the Sanders presidential campaign by Democratic operators aligned with Clinton. YouTube is accused of stoking conspiracy theories. And Facebook suffered a brief period where its search autocomplete function inexplicably defaulted to highly specialized adult queries. Congress is barking about new regulation, especially over the Cambridge Analytica affair.

Russia's Central Election Commission says it sustained DDoS attacks over the weekend "from fifteen countries." The attacks didn't affect the outcome of the presidential election. (Nor, perhaps, did the voting.)

Notes.

Today's issue includes events affecting Australia, Austria, China, European Union, Iran, Ireland, New Zealand, Russia, Singapore, Turkey, Ukraine, United Kingdom, United States.

A note to our readers: the CyberWire is happy to have been selected as a finalist for the Maryland Cybersecurity Diversity Award (and the Cybersecurity Association of Maryland's People's Choice Award). You can find out more about the awards (and how to vote for us, if you'd like) here.

Don’t be liable for your third party’s data breach

Third party risk has spiked in the past few years, and with new regulations – GDPR, NY Cyber Regulations, etc. – in place, organizations need to be as informed as possible to arm themselves against a third party breach. However, third party risk exists across a spectrum – and not all vendors require the same level of attention. Read more in our eBook to learn how to match your solution to your third party risk.

In today's podcast, we speak with our partners at Accenture Labs. Malek Ben Salem offers tips on cryptography deployment. Our guest is Paul Brigner from the Security and Software Engineering Research Center (S2ERC) at Georgetown University, who describes S2ERC's research on virtual browsers.

Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) Billington International Cybersecurity Summit, March 21, Washington, D.C. Cybersecurity leaders from Asia, Europe, the Middle and U.S. on global threats and best practices, including Acting DoD CIO and Singapore Cyber Commissioner-designate. Sponsor Opportunities: Sandy Nuwar at 443-994-9832

Cyber Security Summits: Denver on March 22 & May 15 in Dallas (Denver, Colorado, USA, March 22, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350) https://CyberSummitUSA.com

The Startup Journey: From Public Service to Successful Entrepreneurship (Fulton, Maryland, USA, March 22, 2018) At this DataTribe Meetup, Will Grannis, Managing Director Google CTO Office, will discuss his professional experiences spanning across entrepreneurship, public service, and Silicon Valley. Free food & beverages will be provided.

CYBERTACOS San Francisco (San Francisco, California, United States, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

Cyber Attacks, Threats, and Vulnerabilities

Blackout threat to Britain from Russian cyber-attack (Times) Spy chiefs have warned the bosses of Britain’s key power companies to boost their security amid fears of a Russian cyber-attack that could put the lights out.

Threat of Russian cyber reprisal puts UK finance, power and water on high alert (the Guardian) Britain’s infrastructure ready as intelligence service warns of risk of virtual strike by Moscow

Four meals from anarchy: How Britain would collapse in just days if power supply is cut (The Telegraph) British cities would be uninhabitable within days and the country is only a few meals from anarchy if the National Grid was taken down in a cyber attack or solar storm, disaster and security experts have warned.

Russian Cyberattacks on Critical Infrastructure - What You Need to Know (Nozomi Networks) The U.S. government has just released an important cybersecurity alert that confirms Russian government cyberattacks targeting energy and other critical infrastructure sectors.

Five things to know about Russian attacks on the energy grid (TheHill) Trump administration officials on Thursday accused the Russian government of staging a multi-year cyberattack campaign against the energy grid and other elements of critical infrastructure in the United States.

Russian Cyber Threat Actors Have Gained Access to Power Plant ICS Systems (POWER Magazine) Russian cyber threat actors have infiltrated corporate networks and accessed data output from power plant industrial control systems (ICS), DHS has warned.

US Intelligence Has Known Russian Hackers Infiltrated Power Grids For Months (Geek.com) While suspicions have been floating for years, the US has officially accused the Russian Federation of launching a massive series of cyber attacks targeting critical infrastructure and utilities like power and water services …

US Says Russian Hack Did Not Compromise Power Grid, Plants (US News and World Report) A Russian government hacking operation aimed at the U.S. power grid did not compromise operations at any of the nation's power plants.

In Light Of The Russian Attack, Utilities Seek New Defenses To Protect Critical Infrastructure (Forbes) Now that the Department of Homeland Security and the FBI have formally accused of Russia of penetrating this nation’s cyber defenses and threatening our critical infrastructure, what can be done?

How An Entire Nation Became Russia's Test Lab for Cyberwar (WIRED) Blackouts in Ukraine were just a trial run. Russian hackers are learning to sabotage infrastructure--and the US could be next.

Wiltshire Police denies reports it suffered cyber attack by 'Russian hackers' (The Independent) Wiltshire Police has denied reports it suffered a cyber attack in the aftermath of the Salisbury nerve agent incident.

House Intel Russia head's nightmare: a "cyber bomb" on Election Day (Axios) "So when the people went to the polls to vote, it's like, 'Whoop. No, you're not registered. We don't have your name.'"

Russian Central Election Commission comes under cyberattack (RT International) There is an ongoing cyberattack on Russia’s Central Election Commission, targeting its information center, the body’s secretary has said. The commission’s website earlier came under a DDoS attack from 15 countries.

Russia’s Interior Ministry says cyber attack against vote counting system thwarted (TASS) The collapse of the system has been prevented, First Deputy Interior Minister Alexander Gorovoy said

Ireland on the front line in Russia's new hacking war (Independent) The use of a rare military grade nerve agent in the attempted assassination of Sergei Skripal in England was a deliberately provocative move by Moscow.

Energy Sector Under Threat From Deadly Cyberattacks (OilPrice.com) Investigators are warning that hackers could attempt to replicate Saudi Arabia’s deadly energy infrastructure attack if cybersecurity efforts are not prioritized

A pro-Erdoğan Turkish hacker team is behind cyber attacks in Europe (Ahval) A Turkish hacker, Arslan A. (alias Osman T., aka General Osman), living in Kentucky, U.S. and a member of Turkish nationalist group Lion Soldiers Team (ANT) was behind in a string of cyber attacks on the Vienna Airport, Austrian National Bank, the Ministry of Foreign Affairs, the Ministry of Foreign Defense, and the Federal Army in Fall 2016 according to Austrian Intelligence.

Cambridge Analytica Under Fire for Data Harvesting (Infosecurity Magazine) Data analytics firm accused of harvesting millions of Facebook profiles of US voters

Cambridge Analytica Took 50M Facebook Users' Data—And Both Companies Owe Answers (WIRED) New reports indicate that the data team behind Trump's 2016 presidential campaign harvested data from 50 million Facebook users—and Facebook failed to stop them.

The Cambridge Analytica Debacle is not a Facebook “Data Breach.” Maybe It Should Be. (TechCrunch) If it talks like a government and acts like a government, it must be a tech giant…

Facebook has suspended the account of the whistleblower who exposed Cambridge Analytica (TechCrunch) Tech hath no fury like a multi-billion dollar social media giant scorned. In the latest turn of the developing scandal around how Facebook’s user data wound up in the hands of Cambridge Analytica — for use in the in development in psychographic profiles that may or may not have played a…

Facebook and the endless string of worst-case scenarios (TechCrunch) Facebook has naively put its faith in humanity and repeatedly been abused, exploited, and proven either negligent or complicit. The company routinely ignores or downplays the worst-case scenarios, idealistically building products without the necessary safeguards, and then drags its feet to admit th…

How A Twitter Fight Over Bernie Sanders Revealed A Network Of Fake Accounts (HuffPost) One Democratic Party consultant said an unnamed client controlled many of these accounts.

YouTube is reportedly introducing your kids to conspiracy theories, too (TechCrunch) In a recent appearance by YouTube CEO Susan Wojcicki at the South by Southwest Festival, she suggested that YouTube is countering the conspiracy-related videos that have been spreading like wildfire on the platform — including videos telling viewers that high school senior and Parkland, Fl. s…

Everything is terrible: an explanation (TechCrunch) Facebook is a breeding ground for fake news and polarized outrage, accused of corrupting democracy and spurring genocide. Twitter knows it has become a seething battleground of widespread, targeted abuse — but has no solution. YouTube videos are messing with the minds of children and adults a…

Firefox Master Password System Has Been Poorly Secured for the Past 9 Years (BleepingComputer) For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.

Researchers Discover Security Issue on Chrome RDP (Infosecurity Magazine) Bug discovered that allows a guest user full access to an administer’s machine using Chrome Remote Desktop

DocuTrac medical software is a breach risk, warns Rapid7 (ComputerWeekly) Security researchers have issued a security warning about medical billing and documentation software they say puts patients at risk of data breach.

GandCrab Ransomware Crooks Take Agile Development Approach (Threatpost) Despite setbacks hackers behind GandCrab malware are pushing ahead with lucrative new ransomware strain thanks to quick-and-dirty agile development approach.

Pre-installed malware on Android devices made $115k revenue in 10 days (HackRead) The pre-installed malware called RottenSys has infected 5 million Android devices to create botnets and made $115,000 revenue in just ten days.

Combating W-2 Fraud, An Avalanche of False Positives and Wasted Time (Security Boulevard) Year over year, the number of IRS-related phishing scams related to W-2 fraud targeting individuals and companies continues to grow, putting organizations at risk of a data breach.

Vulnerability Discovered in MikroTik RouterOS (Infosecurity Magazine) Software sold across the globe found to have vulnerability by security researchers

Smart home devices can be hacked within minutes through Google search (HackRead) Smart home devices can be easily hacked using simple Google search and secretly spy on unsuspecting users.

Hackers continue to exploit hijacked MailChimp accounts in... (HOTforSecurity) MailChimp, a service that millions of people around the world use to send out email newsletters, is being abused by hackers to spam out malware. A typical attack involves hackers either compromising an existing MailChimp account, or setting up a...

Hackers Hide Monero Cryptominer in Scarlett Johansson’s Picture (HackRead) Security researchers have identified a new but unusually distributed Monero cryptominer scam campaign involving the face of Scarlett Johansson.

Meltdown, Spectre, and the Costs of Unchecked Innovation (WIRED) Spectre fixes forced browsers to break the compatibility covenant of the web. Other unchecked technologies could cause even deeper damage.

DADI ICO Investors Become Targets of Phishing Scams Amid Reports of Data Leak (Bitcoinist) In January 2018, DADI launched an ICO that required investors to verify their identities (KYC). Now reports are emerging that investors' personal data has been leaked and is being used in phishing scams.

Modern yachts have routers that allow root access and may be vulnerable to hackers (The Verge) Hackable, just like many other IoT devices

Security Patches, Mitigations, and Software Updates

Google Rolls Out New Security Features for Chrome Enterprise (Dark Reading) The business-friendly browser now includes new admin controls, EMM partnerships, and additions to help manage Active Directory.

PS4 Firmware 4.55 Modified to Be Compatible with Firmware 5.50 (HackRead) A PS4 hacker going by the online handle of qwertyoruiop has used a technique to run Linux on PS4 Firmware 5.50.

Cyber Trends

A Rubicon (Hoover Institution) We state as an axiom that cybersecurity and the future of humanity are now conjoined, and that that conjoining makes the scope of a full analysis of the situation too broad and too subtle for an essay as short as this one.

Have you evaluated the cost of a cloud outage? (Help Net Security) Most have not fully evaluated the cost of a cloud outage to their business and are therefore ill prepared to deal with the impact of an outage.

Marketplace

Lloyd’s Register buys cyber security specialist Nettitude (Seatrade Maritime) Read the latest maritime & shipping news from Europe. Including coverage of key shipping markets: London, Hamburg, Rotterdam, Athens, Oslo and Copenhagen

AMD: Investor Implications Of The Security Flaws Identified By CTS Labs (Seeking Alpha) Are the security flaws disclosed by CTS labs yesterday real? We look at the vulnerabilities and impacts. We review what this disclosure means for investors.

Broadcom-Qualcomm: What's the fallout of epic takeover battle? (San Diego Union Tribune) The dramatic battle for control of Qualcomm raises questions about free trade, national security, critical technology and company performance for shareholders.

Qualcomm’s war may be over, but the casualties are just starting to be calculated (TechCrunch) The epic battle between Qualcomm and Broadcom seems to have reached its armistice, with President Trump using the power of CFIUS to block the transaction this past week, ending what would have been the largest tech M&A transaction of all time. It may be all quiet on the semiconductor front, but…

World Economic Forum Announces Fintech Cyber Security ‘Consortium’ (Cyber Security Hub) It was announced last week that major players in the financial technology (fintech) space have come together to convene a cyber security consortium – poised to centralize best practices, encourage collaboration and shed light on the widening scope of security as a whole.

FireEye's Innovation Engine Just Got Better (NASDAQ.com) With security breaches in the news , company boards and customers are demanding that companies have a plan for protecting customer and proprietary.

When China hoards its hackers everyone loses (Engadget) They say you don't notice something good until it's gone. With China's decision to restrict its information security researchers from participating in global ha...

Products, Services, and Solutions

New infosec products of the week​: March 16, 2018 (Help Net Security) DFLabs launches new security incident response platform DFLabs announced a new version of its IncMan Security Orchestration, Automation and Response (SOAR) platform for enterprise SOC and MSSPs. IncMan R3 Rapid Response Runbooks now support ‘User Choice’ conditions that allow more granular flow control compared to

Technologies, Techniques, and Standards

What you need to know about defending critical infrastructure (CSO Online) Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

The great attribution debate: Why we should focus on HOW not WHO (Help Net Security) As analysts we are essentially trying to identify an actor's signature; some uniquely identifiable component of their activities online which gives their identity away. Attribution can rarely be 100% accurate.

Why PKI will secure the Internet of Things for years to come (Help Net Security) Several PKI vendors have shown how you could scale up a PKI ecosystem to issue and manage billions of device certificates.

Beyond passwords: Companies use fingerprints and digital behavior to ID employees (CNNMoney) Biometrics are coming to the workplace.

Advanced Phishing Threat Protection Requires Security at the Mailbox Level (Infosecurity Magazine) Because it is inevitable that phishing messages will land in employees’ inboxes, it is essential that every employee have mailbox-level detection.

Design and Innovation

Ausdroid visits Huawei’s R&D Centre in Beijing where new ideas are created and devices are tested (Ausdroid) Just over an hour north-west of China's capital city, Beijing, is Huawei's Exhibition and Research

Use tech to help fight false information, suggest cybersecurity experts (Channel NewsAsia) Technology, which [has] been identified as a key contributor to the speed and scale of how false information is spread, can also help to counter the threat, according to experts from IT security company Trend Micro.

Five cybersecurity trends to watch (RCR Wireless News) Demand for cybersecurity has been growing due to reports of data breaches and cyber attacks. Find out what sort of trends are taking hold within the realm of cybersecurity, from the rise of botnets to...

Research and Development

Quantum computing’s future is almost semi-here—are we ready for it? (Ars Technica) As we approach useful hardware, human elements of computing are becoming critical.

COMPASS to Filter Areas of Gray (SIGNAL) Program will seek clues in the hazy space between war and peace.

US spy lab hopes to geotag every outdoor photo on social media (Ars Technica) "Finder" will geotag images by terrain, sky features.

Legislation, Policy, and Regulation

Putin Wins Election: Six More Years Of Criminal Cyber Attacks On The West (KnowBe4) Russian President Vladimir Putin won re-election by a wide margin Sunday, strengthening his hand amid an escalating confrontation with the West.

Russia threatens to ban all UK media if RT loses license (CNNMoney) UK regulators could revoke the license of Russian state-backed television network RT after Moscow was linked with the attempted murder of former double agent Sergei Skripal.

Resolute U.S. response needed after Russian spy poisoning incident (The Blade) 'Collateral damage’ makes most recent attack unprecedented.

Russian Cyber Attacks Call for Stringent Security Standards at US Nuclear Plants, But Plant Owners Want Them Weakened (Union of Concerned Scientists) Yesterday, the Department of Homeland Security and the Federal Bureau of Investigation officially confirmed that Russian hackers have been targeting US nuclear power plants...

Region needs rules, norms to tackle cyber threats: PM (The Straits Times) It is essential for the region to develop new rules and norms to deal with cyber security threats, Prime Minister Lee Hsien Loong said, as he called for Asean and Australia to work more closely together on issues ranging from Internet crimes to fake news.. Read more at straitstimes.com.

Ombudsman forces release of defence spending on spy software (NZ Herald) After a year of wrangling the New Zealand Defence Force has been forced to reveal how much it pays for software from Peter Thiel's secretive firm Palantir.

Facebook’s latest privacy debacle stirs up more regulatory interest from lawmakers (TechCrunch) Facebook’s late Friday disclosure that a data analytics company with ties to the Trump campaign improperly obtained — and then failed to destroy — the private data of 50 million users is generating more unwanted attention from politicians, some of whom were already beating the drums of regula…

Trump's NSA nominee promises to 'follow the law' in 2nd confirmation hearing (Cyberscoop) Lt. Gen. Paul Nakasone, the current head of Army Cyber Command, took another step Thursday toward taking over the National Security Agency and U.S. Cyber Command.

Illinois primary puts focus on security of state voter rolls (Spokesman.com) With the Illinois primary just days away, state election officials are beefing up cyber defenses and scanning for possible intrusions into voting systems and voter registration rolls.

New York power companies can now charge Bitcoin miners more (Ars Technica) With few community benefits, power authorities are cracking down.

The City That Banned Bitcoin Mining (Motherboard) Plattsburgh, NY voted to place an 18-month moratorium on new commercial cryptocurrency mines in the city on Thursday. Here's why, and what comes next for cities that have had a Bitcoin gold rush.

Litigation, Investigation, and Law Enforcement

Voice Chat App Zello Turned a Blind Eye to Jihadis for Years (WIRED) Despite warnings and flagged accounts, Zello left accounts with ISIS flag avatars and jihadist descriptions live on its service.

Judge eases feds' case against NSA hoarder (POLITICO) The judge suggested that he might require prosecutors to prove the NSA contractor knew he had 20 specific documents, out of the millions he collected.

Ether plunges after SEC says “dozens” of ICO investigations underway (Ars Technica) The Ethereum cryptocurrency is below $500 for the first time since 2017.

FTC shuts down crypto Ponzi schemers (TechCrunch) The FTC has announced that they’ve issued temporary restraining orders and frozen the assets of a team of three defendants who pitched investment advice as the Bitcoin Funding Team and My7Network. The FTC claims that the defendants “promised big rewards for a small payment of bitcoin or…

Phantom Secure 'Uncrackable Phone' Execs Indicted for RICO Crimes (Dark Reading) Executives of Phantom Secure have been indicted on federal RICO charges for encrypting communications among criminals.

Four Alleged Associates of Sinaloa Cartel-Linked Encrypted Phone Company Are On the Run (Motherboard) Authorities have already arrested Vincent Ramos, Phantom Secure’s CEO. But the Department of Justice has indicted four other alleged Phantom associates, who are currently fugitives.

Cybercriminals launder money through mansions, private islands and crypto currency (Help Net Security) Many cybercriminals are using virtual currency to make property purchases which convert illegal proceeds into legitimate cash and assets.

Hacker Adrian Lamo dies at 37 (ZDNet) The coroner confirmed Lamo's death, but the circumstances of his passing are not yet known.

Adrian Lamo, ‘Homeless Hacker’ Who Turned in Chelsea Manning, Dead at 37 (KrebsOnSecurity) Adrian Lamo, the hacker probably best known for breaking into The New York Times‘s network and for reporting Chelsea Manning‘s theft of classified documents to the FBI, was found dead in a Kansas apartment on Wednesday.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought...

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and...

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as...

Northeast Regional Security Education Symposium (Jersey City, New Jersey, USA, March 23, 2018) The Professional Security Studies Department at New Jersey City University (NJCU) will hold its Northeast Regional Security Education Symposium on Friday, March 23, 2018, from 8 am to 2 pm. The symposium...

KNOW Identity Conference 2018 (Washington, DC, USA, March 26 - 28, 2018) The premier global event for the identity industry, the KNOW Identity Conference is the nexus for identity innovation, offering a uniquely differentiated, powerful, and immersive event that convenes the...

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit...

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled...

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable...

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing...

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made...

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings...

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions.

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect...

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster...

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.