skip navigation

More signal. Less noise.

Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

Daily briefing.

It's unsurprising but worth noting: FireEye says more nation-states are acquiring effective cyber capabilities and using them for espionage and other disruptive operations. Vietnam in particular is mentioned in dispatches.

North Korea has had its own homegrown anti-virus product, SiliVaccine, for some time. Upon inspection it seems less homegrown than thought. Researchers at Check Point obtained a sample sent to a journalist as apparent phishbait. They concluded that SiliVaccine is built around a decade-old version of Trend Micro's scan engine, modified to ignore certain virus signatures, effectively whitelisting some DPRK attack tools. The sample was also bundled with malware from North Korean threat actor Jaku. 

The pirated AV product is associated with two concerns: Pyongyang Gwangmyong Information Technology and STS Tech-Service. Trend Micro points out, correctly, that the pirated code in no way affects their current products' security or reliability. The producers of SiliVaccine are thought to have obtained the old Trend Micro code from some third party.

Widespread concern about credential stuffing attacks has brought the problem of password reuse to the fore. But reuse continues unabated, according to a LastPass study: people reuse passwords because they're afraid they'll forget them.

The GravityRAT Trojan, which has troubled India for months, has become more evasive, using CPU temperature changes to detect virtual machines used for sandboxing. Its origins are unknown, but some think signs point to Pakistan.

Amazon threatens to end Open Whisper Systems' CloudFront services.

Some loser in Arizona hacked a digital highway sign to display "Hail [sic] Hitler."

Notes.

Today's issue includes events affecting Australia, China, European Union, India, Iran, Ireland, Japan, Democratic Peoples Republic of Korea, Pakistan, Russia, United Kingdom, United States, and Vietnam.

There's a better way to stop data loss. Learn more!

Data loss is a big problem. Every organization that deals with electronic data needs to have a data loss prevention strategy in place. ObserveIT’s white paper, Building a Strategy for the Post-DLP World, explores how organizations have been dealing with data loss to date, why these strategies are failing, and what a better path forward looks like. Get information you need to build a data loss prevention strategy that works for the modern organization. Download your free copy.

In today's podcast, we hear from our partners at Accenture, as Justin Harvey describes the uptick in credential harvesting Accenture is seeing. Our guest,  Piero DePaoli from Service Now, shares some results from their recently published report on patching. 

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

Cyber Security Summits: May 15 in Dallas & Boston on June 5 (Dallas, Texas, United States, May 15, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, CenturyLink, IBM Security and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com

Third Annual Cyber Investing Summit 5/15/18 (Dallas, Texas, United States, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Cyber Attacks, Threats, and Vulnerabilities

Rise of the Rest: APT Groups No Longer from Just China and Russia (FireEye) While Russia and China remain atop the list of the most sophisticated cyber adversaries, FireEye has been observing an uptick in the number of state-sponsored cyber espionage campaigns from other countries.

Trend Micro Scan Engine Used by North Korea's SiliVaccine Antivirus (SecurityWeek) Researchers analyze North Korea’s SiliVaccine antivirus and discover that it uses a 10-year-old scan engine from Japanese company Trend Micro

Samples of SiliVaccine Offer Rare Peek Inside North Korea’s Antivirus Software (Threatpost) Samples of North Korean antivirus software called SiliVaccine crib software code from a competitor and come loaded with malware and a backdoor.

New Hacking Tool Lets Users Access a Bunch of DVRs and Their Video Feeds (BleepingComputer) An Argentinian security researcher named Ezequiel Fernandez has published a powerful new tool yesterday that can easily extract plaintext credentials for various DVR brands and grant attackers access to those systems, and inherently the video feeds they're supposed to record.

Bitdefender Researcher Demonstrates USB Stick That Can BSOD Any Windows 10 Device Even If Locked (HotHardware) Marius Tivadar's proof-of-concept showed that he can force a BSOD even if a Windows 10 machine is locked

Google Maps open redirect flaw abused by scammers (Naked Security) A bug in Google Maps has turned it into a better URL shortener for crooks than goo.gl

SamSam Ransomware Attacks Focus on Victims Who Will Pay Up (HealthITSecurity) SamSam ransomware attackers are focusing on victims that are most likely to pay to get their data back, like hospitals, said Sophos.

GitHub Accidentally Recorded Some Plaintext Passwords in Its Internal Logs (BleepingComputer) In an email sent out today, GitHub has warned a select number of users that a bug in its password reset functionality has recorded users' passwords in plaintext format inside the company's internal logs.

Thanatos Ransomware Emerges as First to Demand Bitcoin Cash to Pad Hacker Cryptocurrency Accounts (Enigma Software) Among the most dangerous types of malware, ransomware continues to be the master of destruction on computers worldwide.

WannaCry & NotPetya Ransomware Attacks – One Year Later (Data Security Blog | Thales e-Security) The cyber community is often reminded of past events such as large-scale data breaches and vicious cyberattacks that caused mass...

WannaCry Dominates as Ransomware Declines in 2017 (Infosecurity Magazine) WannaCry Dominates as Ransomware Declines in 2017. F-Secure says the “gold rush” is over

LoJack Attack Finds False C2 Servers (Dark Reading) A new attack uses compromised LoJack endpoint software to take root on enterprise networks.

Millions of Home Fiber Routers Vulnerable to Complete Takeover (Threatpost) Exploitation can result in hackers gaining access to full browsing histories and all of the user's internet activities.

GravityRAT malware evades detection and targets users in India (HackRead) The updated version of GravityRAT malware evades detection by checking the current CPU temperature - It is believed that the malware could be sent out from Pakistan.

Convincing fake Netflix page phishing for victims’ credit cards (ESET Ireland) ESET Ireland warns users to look out for a well made fake Netflix page, that includes a security certificate, but collects’ victims’ credit card numbers for the cybercriminals. A genuine-looking em…

Five Ways Cyber-Criminals are Trying to Cash in on Crypto-Currency (eWEEK) Cyber-criminals have often used crypto-currencies for money laundering and as a way to monetize their diverse illicit schemes. Now they are increasingly using various cyber-attacks to mine and steal crypto-currency.

Facebook Is Investigating a Claim That an Employee Used His Position to Stalk Women (Motherboard) On Monday, a member of the information security community said they passed Facebook details concerning a security engineer allegedly using their work position to stalk women.

School District Pays $10,000 Bitcoin Ransom To Hackers After Cyberattack (CBS Boston) Leominster Schools Superintendent Paula Deacon said that a "negotiated ransom" was paid to hackers after a cyberattack on the school system.

Knox County election hit by cyber attack (WRCB) The election results do not appear to have been impacted by cyber attack.

Someone hacked this highway sign & defaced it with “Hail Hitler” text (HackRead) On Friday at 2:30 am Arizona highway sign was hacked as in illegally accessed by unknown culprits who defaced it with “Hail Hitler” text.

Security Patches, Mitigations, and Software Updates

Amazon Boosts Domain Protections in CloudFront (SecurityWeek) Amazon Web Services (AWS) has unveiled a series of enhancements for the domain protections available in CloudFront.

Microsoft unexpectedly pushes Win10 1803 through Windows Update (Computerworld) Most of us were expecting the big push to 1803 to start May 8, but many Win10 1709 users are getting upgraded now. The only trigger? They clicked on Check for Updates.

Facebook Will Let You Stop It From Collecting Your Internet Browsing Habits (Motherboard) Mark Zuckerberg announced a new tool that will let Facebook users clear their web browsing history, and opt out of future tracking.

Starting Today, Google Chrome Will Show Warnings for Non-Logged SSL Certificates (BleepingComputer) Starting today, the Google Chrome browser will show a full-page warning whenever users are accessing an HTTPS website that's using an SSL certificate that has not been logged in a public Certificate Transparency (CT) log.

USN-3627-2: Apache HTTP Server vulnerabilities (Ubuntu security notices) USN-3627-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 18.04 LTS.

Escalating Privileges with CylancePROTECT (Atredis Partners) CylancePROTECT contains a privilege escalation vulnerability due to the update service granting Users Modify permissions on the log folder, as well as any log file it writes.

Cyber Trends

LastPass Psychology of Passwords Report Highlights Password Behavior Unchanged Even as Cyber Threats Rise (GlobeNewswire News Room) Data Breaches and Hacking Cause Fear, But Only 55% Would Update Passwords If Hacked

What do Meltdown, Spectre and RyzenFall mean for the future of cybersecurity? (TechCrunch) The security community is still reeling from the discoveries of the Meltdown and Spectre computer vulnerabilities, and now it seems that a rash of new hardware vulnerabilities called MasterKey, RyzenFall, Fallout and Chimera have been found in the past few months too.

Time is running out, yet many US companies are not GDPR-ready (Help Net Security) A full 52 percent of 400 US companies surveyed are either still exploring the applicability of GDPR to their business; have determined that GDPR is not a requirement for their business; or are unsure.

Do public clouds make it more difficult to get visibility into data traffic? (Help Net Security) Data shows that over 90% of enterprises are concerned about data and application security in public clouds, while nearly 60% of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic.

The leisure industry and Cyber attack? (Blooloop) Theme Parks, Zoos, Aquaria, FECs and Indoor Play all have a significant cyber exposure. Cyber insurance is vital re a cyber attack on your attraction.

A Quarter of UK CNI Firms Suffered Cyber-Attack Outages (Infosecurity Magazine) FOI request from Corero Network Security reveals service disruption over past two years

Data Breaches Stress Americans, Canadians Out (PYMNTS.com) Kaspersky Lab, the cybersecurity company, revealed in a new survey on Tuesday (May 1) that 81 percent of Americans and 72 percent of Canadians are stressed out about the recent rash of data breaches...

2018 Travel Website Password Power Rankings™ (PR Newswire) Dashlane, one of the world's most trusted digital security companies, today...

Marketplace

Mark Zuckerberg Says it will Take 3 Years to Fix Facebook (WIRED) Mark Zuckerberg knew his keynote speech at F8 this year would not be like any other.

Pentagon Asking Stores on Military Bases to Remove Huawei, ZTE Phones (Wall Street Journal) The Pentagon is moving to halt the sale of phones made by Huawei and ZTE in retail outlets on U.S. military bases around the world, citing potential security threats they say the gadgets could pose.

ForgePoint Capital Is The New Name For Trident Capital Cybersecurity (PRNewswire) Early Stage Venture Firm Investing In Cybersecurity Maintains Mission And Focus--To Forge Innovation and Success With Next-Generation Entrepreneurs

Regulus Cyber Raises $6.3M to Ensure Security & Mission Reliability for Autonomous Cars & Trucks, Robots, and Drones (BusinessWire) Regulus Cyber announced $6.3 million in Seed and Series A funding from Sierra Ventures, Canaan Partners Israel, the Technion and F2 Capital.

Purchase of Portland cybersecurity firm expands Tyler Technologies’ presence in Maine (Press Herald) Sage Data Security and its 45 workers will join the Texas-based company, which has more than 700 employees in Yarmouth, Falmouth and Bangor.

Cisco Acquires 'Relationship Intelligence' Company (No Jitter) Founder and CEO Amy Chang to become SVP of Cisco’s Collaboration Technology group.

Ptolemy joins cybersecurity initiative (Sheridan Press) Local IT company Ptolemy Data Systems has signed on to be one of the founding members of Made Safe in Wyoming, an initiative to bolster cybersecurity for small to mid-sized businesses throughout the state.

NHS to spend £150m toward cybersecurity (CISO MAG) The National Healthcare Services (NHS) of United Kingdom is set to spend £150 million ($206 million) to safeguard its cyber infrastructure. Jeremy Hunt, the health secretary, said: “We know cyber attacks are a growing threat, so it is vital our health and care organisations have secure systems which patients trust. We have been building the …

Virginia announces managed security contract, turns off Northrop Grumman messaging (StateScoop) The state's technology agency has announced two major breakthroughs in a new IT sourcing model: a new managed security services contract and a two-year-old messaging project that has finally broken free from legal delays.

This Somerville Startup Scans Web’s Dark Corners for Looming Threats (BostInno) The idea of recording the future sounds like something from a science fiction flick, but that’s, in a way, what one Somerville-based company is working toward.

CBRE Secures 20,000 SF Lease for Cyber Security Company in Roseland (RE Business) CBRE has secured a 20,000-square-foot lease at 5 Becker Farm Road in Roseland for Comodo CA, a global leader in cyber security.

Northrop Grumman opens cybersecurity center in SA (San Antonio Business Journal) East Coast defense contractor Northrop Grumman Corp. is building a cybersecurity center on San Antonio's South Side.

Thales names new VP of cybersecurity in Mideast (Trade Arabia) Thales, a French multinational technology company, has announced the executive appointment of Gary Miller as vice president, Cybersecurity in the Middle East.

Products, Services, and Solutions

Signal loses anti-censorship tool as Amazon blocks domain fronting (My Broadband) Amazon has sent Open Whisper Systems an email threatening to terminate its CloudFront services.

Amazon pushes Signal creators to change their anti-censorship tool (Engadget) Amazon has told the makers of Signal to change their anti-censorship system after learning that the app masquerades as one of Amazon's own sites.

Trustonic secures PlayCoin cryptocurrency for GameHub - Trustonic (Trustonic) Online gaming platform provider turns to device security leader Trustonic to provide protection

Slack Releases Open Source Secure Development Lifecycle Tool (SecurityWeek) Slack releases goSDL, an open source secure development lifecycle (SDL) tool designed to provide developers a tailored security checklist for their projects

New DNS encryption tools accelerate privacy online (Help Net Security) Cloudflare, Google and Apple announced that they will start encrypting DNS traffic. What does that mean for the internet privacy?

Guy Carpenter Licenses First-of-its-Kind Cyber Risk Modeling Platform from CyberCube Following Strategic Alliance (PR Newswire) Guy Carpenter & Company, LLC, a leading global risk and reinsurance...

Swimlane Augments Security Orchestration, Automation and Response With Vmray Integration (GlobeNewswire News Room) Swimlane expands its capabilities in security orchestration, automation and response by integrating with VMRay Analyzer, an industry-leading threat analysis and detection platform

Technologies, Techniques, and Standards

NATO Exercise Tests Skills of National Cyber Defenders (SecurityWeek) NATO’s Locked Shields 2018 exercise tested the skills of cyber defenders from 30 countries in protecting IT systems and critical infrastructure

What you need to know before you launch a bug bounty program (IDG Connect) What you should know about launching your own bug bounty programs

Maritime Cybersecurity: Securing Assets at Sea (SecurityWeek) ICS Security Consultant, Jalal Bouhdada, discusses how the maritime industry can overcome cybersecurity challenges and facilitate the next generation of shipping.

Think like a hacker by mapping all your application vulnerabilities – not just the critical ones (CSO) With nearly 20,000 new application vulnerabilities discovered in 2017 alone, triage has become a necessary part of CISOs’ remediation strategies – but with many attackers now aiming for the less-patrolled middle ground, one security expert warns, taking a more visual approach can help head them off before they get into their target network.

Ransomware: How to Predict, Prevent, Detect & Respond (F-Secure) Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure. We recommend a more robust, iterative approach, which can be broken down into four phases [1] — Predict, Prevent, Detect, and Respond

#cyberwars: why and how you get phished, and how not to get phished (The Overspill) This is the first of a series of posts illustrating points from my book Cyber Wars, published May 3 2018 in the UK (and a couple of weeks later in the US), which investigates hacking incidents such…

Palo Alto Networks’ Rick Howard: Agencies Should Consider DevOps’ Role in Adaptive Cyber Strategies (GovCon Wire) Rick Howard, chief security officer at Palo Alto Networks (NYSE: PANW), has said agencies that aim t

In Network Defense, Time Is of the Essence (SIGNAL) Information warfare has raised the stakes for securing cyberspace.

Building a Culture of Cyber Awareness (Security Intelligence) The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

For better cybersecurity, be nice to your CFO (FCW) Instead of looking for the new hire or the next great tech to protect federal networks, agency cybersecurity officials could get more done by befriending their financial counterparts.

5 Useful Benchmarks on Threat Hunting for the Security Operations... (Bricata) Threat hunting is one of the hottest trends in cybersecurity because threats are slipping past defenses and hiding inside the enterprise.

Design and Innovation

Here’s how intelligence will take advantage of machine learning and AI (C4ISRNET) With greater interest in artificial intelligence and machine learning, industry officials offer greater clarity on how those technologies will work for the national security community.

The 'Holy Grail' of Cryptocurrency Looks Like the Banks We Already Know and Hate (Motherboard) Intangible Labs raised $133 million from established investors to create a stable coin with an "algorithmic central bank."

Feds Must Bake Security in to Counter Threats, Cisco Says (FedTech) Agencies face cybersecurity threats from encrypted malicious traffic, cloud services that can be abused and phishing scams, according to a Cisco report.

Research and Development

BMW, GM, Ford and Renault launch blockchain research group for automotive industry (TechCrunch) Car makers BMW, General Motors, Ford and Renault are the big names behind a new group announced today to explore the potential of the blockchain in the automotive and mobility space. MOBI — the Mobility Open Blockchain Initiative — launches today with over 30 founding members that also …

If quantum computers threaten blockchains, quantum blockchains could be the defense (MIT Technology Review) Quantum computers could break the cryptography that conventional blockchains rely on. Now physicists say a way of entangling the present with the past could foil this type of attack.

Tel Aviv University's smart artificial intelligence program (The Jerusalem Post) Scientists and other researchers are working on several machine learning (ML) and artificial intelligence (AI) projects.

Academia

Virginia Tech graduate students team up with D.C. transit to help enhance customer service (VT News) The study, a project in the UrbComp certificate program administered by the Discovery Analytics Center, is one of the first steps in connecting WMATA’s Rush Hour Promise to underlying service disruptions.

Legislation, Policy, and Regulation

Are Google and Facebook Undermining Europe's Privacy Rules? (WIRED) Regulators, publishers, and privacy watchdogs say moves by the tech giants may leave European internet users no better off.

China’s long game in techno-nationalism (First Monday) China’s long game in techno-nationalism

The National Security State of the Future (The American Interest) How economic competition with China could cause the United States to resemble its adversary.

Why China no longer trusts Australia (NewsComAu) OUR relations with China are under increasing strain and a former Australian ambassador to Beijing has given a brutal explanation of the tension.

NCSC Joins Secure Chorus to Promote End-to-End Secure Communications (SecurityWeek) The UK's National Cyber Security Center (NCSC) has become the first government agency to join Secure Chorus, a not-for-profit private company limited by guarantee, whose ownership rests with its members.

Are We Really Ready for a Cyberattack? (Bloomberg.com) Threats are growing by the day. And yet the U.S. has no master plan for responding.

Litigation, Investigation, and Law Enforcement

The UK Is Pushing Zuckerberg to Testify With Extremely British, Probably Meaningless Threats (Motherboard) A British think tank posits that in most cases a formal summons 'is sufficient to embarrass a potential witness into appearing.'

Sit down with Mueller or risk grand jury, Trump told (Times) President Trump may be compelled to face a grand jury if he declines to be interviewed about potential ties between his campaign and Russia. The special counsel Robert Mueller told the president’s...

The Questions Mueller Wants to Ask Trump About Obstruction, and What They Mean (New York Times) The questions show the special counsel’s focus on obstruction of justice and touch on some surprising other areas.

Robert Mueller Likely Knows How This All Ends (WIRED) Nearly a year since his appointment as special counsel, Robert Mueller has accelerated the pace of his investigation.

Pro-Brexit think tank founder ‘suspected of working for Russia’ (Tmes) The billionaire behind a pro-Brexit think tank was accused in the House of Commons yesterday of being a suspected Russian agent with links to money-laundering. Christopher Chandler was said to be...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Cyber Security Dallas (Dallas, Texas, USA, October 31 - November 1, 2018) Cyber Security Dallas will bring top speakers and industry experts to the Dallas-Fort Worth (DFW) metroplex, which boasts one of the largest concentrations of corporate headquarters in the United States.

Upcoming Events

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will...

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring...

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (New York, New York, USA, May 3, 2018) This event brings together technologists and leading policymakers, lawyers, and journalists to bridge the gap between non-technical and technical cyber professionals and features Lisa Monaco, former Assistant...

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to...

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience...

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cyber Ready 2018 Cybersecurity/Intel Conference (MacDill Air Force Base, Florida, USA, May 14, 2018) Major General Mike Ennis (USMC, ret), CIA National Clandestine Service's first Deputy Director for Community Human Intelligence (HUMINT), will deliver the keynote. The conference will also feature an all-audience...

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products...

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial...

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and...

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Cyber:Secured Forum (Denver, Colorado, USA, June 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively...

Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, June 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

New York State Cybersecurity Conference (Albany, New York, USA, June 5 - 7, 2018) June 2018 marks the 21st annual New York State Cyber Security Conference and 13th Annual Symposium on Information Assurance (ASIA). Hosted by the New York State Office of Information Technology Services,...

The Cyber Security Summit: Boston (Boston, Massachusetts, USA, June 5, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.