skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Are you using threat intelligence to its full potential? Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

Now that ISIS has been considerably disrupted, Al Qaeda is working online to regain terrorist mindshare lost to the Caliphate. They're calling from the familiar playbook, but with their own emphasis on inspiring attacks in infidel lands.

Dragos offers details on the CHRYSENE threat group, specialists in hitting industrial control systems. Associated with the 2012 and 2016 Shamoon attacks on Saudi Aramco, CHRYSENE has, Dragos says, developed a sophistication beyond groups like Greenbug (a.k.a. OilRig). CHRYSENE's target list concentrates on the petrochemical, oil, gas, and electric generation sectors. It may be extending that target list beyond the Middle East.

AnonPlus, a hacktivist group believed to be based in Italy, has been attacking US state governments. New Mexico is the latest victim, but Idaho and Connecticut were also recently hit. AnonPlus in its communiqués follows the now familiar anarcho-syndicalist line—they have no leaders, they say—and their principal declared interest is opposition to censorship. It's unclear how defacing a workmen's compensation site (among others) fits AnonPlus's strategy, but the nuisance value is undeniable.

GDPR takes effect a week from tomorrow, and researchers continue to find sensitive data exposed online. Imperva has a useful timeline explaining what organizations will be expected to do within seventy-two hours of detecting a breach.

The US Senate passes a resolution restoring net neutrality. The issue now passes to the House.

The US House wants a full report from the Department of Homeland Security on cybersecurity issues surrounding ZTE.

Serbian police have popped the alleged DarkOverlord.


Today's issue includes events affecting China, Ecuador, France, NATO/OTAN, Russia, Serbia, United Kingdom, United States.

A note to our readers: we'll be at the Jailbreak craft brewery in Laurel, Maryland, tomorrow, covering the latest in their series of cybersecurity symposia. This one's on reverse engineering.

Dragos unveils dashboard of ICS-focused threat groups.

The Dragos Intelligence Team tracks a number of industrial-focused activity groups aimed to exploit, disrupt, and potentially destroy industrial systems globally. Each week in May, Dragos will release new content discussing these adversary details that can be read here.

In today's podcast, we hear from our partners at Virginia Tech's Hume Center as Dr. Charles Clancy discusses how a skills shortage will affect the 5G network buildout. Our guest, Ryan Barnett from Akamai, talks about Drupalgeddon 2.0.

Startup CEO: Managing a Legal Team for Fun & Profit (Fulton, Maryland, United States, May 31, 2018) DataTribe's Al Clark will share his expertise in providing legal counsel to local tech startups. He'll answer questions on how to gain the most out of and what to look for in legal counsel that will lead to a relationship of lowering risk and saving money. Food and beverages are provided.

Cyber Security Summits: Boston on June 5 & June 28 in DC (Boston, Massachusetts, United States, June 5, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, CenturyLink, IBM Security and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

Dateline Cyber Investing Summit

Third Annual Cyber Investing Summit Overview (The CyberWire) Capability gaps indicate opportunities. In cybersecurity, the best way to appreciate those opportunities is to recognize how technological advance also increases cyber risk.

Keynote: Games of inches and games of miles (The CyberWire) Looking for success as an investor or entrepreneur in cybersecurity? Know this: go-to-market is the long game.

Cyber Attacks, Threats, and Vulnerabilities

Sponsored: 2017 Cylance Threat Report (Cylance) Which side of the knowledge gap will your organization be on? Let our knowledge of the past prepare you for the future. Download the report today.

With 'Islamic State' in tatters, al-Qaida renews call for jihad (Deutsche Welle) Al-Qaida's leader has urged sympathizers to wage war against the US for opening an embassy in Jerusalem. Experts say the move is an attempt to capitalize on the demise of its main competitor, the "Islamic State."

CHRYSENE (Dragos) CHRYSENE is an activity group targeting ICS operations.

‘You have the baddest of the bad guys after you’: Cyber threats in the energy sector (Norwich Evening News) The UK’s energy infrastructure is becoming an increasingly common target for hackers, according to cyber security experts.

Hacker Publicly Posts Data Stolen From Government-Linked Cyberespionage Group (Motherboard) Last week, Motherboard obtained data from the so-called ZooPark hacking group, which some suspect is connected to Iran. Now the hacker responsible has seemingly dumped the information after receiving a $1,000 payment.

Ecuador Spied on Assange at London Embassy: Report (SecurityWeek) Ecuador reportedly spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012.

Rash of Italian Cyberattacks Target State Governments (Government Technology) The group known as AnonPlus defaced three New Mexico Workers Compensation websites Wednesday, marking the third such attack on state government in six days.

Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US (Motherboard) A hacker has provided Motherboard with the login details for a company that buys phone location data from major telecom companies and then sells it to law enforcement.

Digital Shadows finds 1.5bn business, consumer files exposed online: one month before businesses face EUR20m fines under GDPR legislation (ITWeb) Vast exposure of data, 4 000 times larger than the Panama Papers, includes documents spanning payroll data, tax return information, medical records, credit card data and intellectual property.

Newly Discovered Malware Targets Telegram Desktop (Dark Reading) Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.

Why Did Email Fraud Attacks Grow 103% Year-Over-Year? (Proofpoint) Email fraud rose to new levels in 2017 and in the first quarter of 2018 and we continue to see an increase in both the size and scope of the problem. These socially engineered attacks, which target people rather than technology, are leveraging many different tactics to successfully lure money and other valuable information away from unsuspecting victims. According to the FBI, business email

Inside an Apple phishing attack (CSO Online) Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take to uncover these attacks in their own environments.

Malicious PDF Leads to Discovery of Adobe Reader, Windows Zero-Days (SecurityWeek) Researchers came across a malicious PDF file that exploited zero-day vulnerabilities in Adobe Reader and Windows

Some Firefox Screenshots End Up Publicly Accessible (SecurityWeek) Firefox screenshots that have been shared publicly end up discoverable via search engines, becoming accessible to everyone.

Efail: What A Disclosure FAIL That Was! (RiskBased Security) Yesterday, news broke of a “critical” vulnerability in OpenPGP and S/MIME, named ‘Efail’ that could lead to an attacker gaining access to plaintext emails.

EFAIL, a weakness in openPGP and S\MIME (SANS Internet Storm Center) The next named security issue has hit mainstream press, EFAIL... You may be asked some questions about it over the next day or so.

RIG EK Still Makes Waves, This Time with a Stealthy Backdoor (Threatpost) The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim's system, in order to drop additional payloads later.

Research Conducted By Comodo Ca Reveals That More Than 1 Million Distrusted Website Certificates From Symantec Remain In Use (Dark Reading) Certificate Authority Aims to Help Businesses and Consumers Worldwide Increase Security of Professional and Personal Internet Usage and Prevent Potential Loss of Business

Google Duplex's gift for gab could be gift for hackers, too (American Banker) Google's new voice assistant technology may be the best right now at imitating human speech. That makes it a potentially powerful tool for bankers — and for cybercrooks.

Security Patches, Mitigations, and Software Updates

Microsoft stops rollout of Windows 10 update for devices with select Intel, Toshiba SSDs (CRN Australia) Following user reports of crashing and reduced battery life.

Android device-makers told to provide more security updates by Google (WeLiveSecurity) Google has announced that they will be requiring Android device-makers to provide more security patches regularly in a bid to increase security within the Android ecosystem

Critical Code Execution Flaws Patched in Advantech WebAccess (SecurityWeek) Nearly a dozen vulnerabilities, including critical code execution flaws, patched in Advantech’s WebAccess HMI/SCADA product

Critical Command Injection Flaw Patched in Red Hat Linux (SecurityWeek) A critical vulnerability in the DHCP client in Red Hat Enterprise Linux could allow an attacker to execute arbitrary commands on impacted systems.

Red Hat admins, patch now – don’t let your servers get pwned! (Naked Security) A command injection bug in Red Hat’s DHCP client could allow an attacker to run any command on your computer. As root.

Cyber Trends

Sponsored: Busting Threat Intelligence Myths: A Guide for Security Professionals (Recorded Future) See how you can begin to augment your cybersecurity skills with powerful and contextualized threat intelligence.

Frequency & Costs of DNS-Based Attacks Soar (Dark Reading) The average cost of a DNS attack in the US has climbed 57% over the last year to $654,000 in 2018, a survey from EfficientIP shows.

How Employees Engage With Company Cybersecurity Policies (Clutch) Our survey reveals that employees generally understand security best practices beyond their engagement with their companies' cybersecurity policies. Companies should emphasize communication and regular security policy training to curb security risks.


Microsoft Wins Lucrative Cloud Deal With Intelligence Community ( Microsoft Corp. said it’s secured a lucrative cloud deal with the intelligence community that marks a rapid expansion by the software giant into a market led by Inc.

RunSafe Security procures $2.4 mln seed (PE Hub) McLean, Virginia-based RunSafe Security, a provider of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, has raised $2.4 million in seed funding. The lead investor was Alsop Louie Partner. 

Auth0 Secures $55 Million in New Funding Round (SecurityWeek) Identity-as-a-Service (IDaaS) company Auth0 has raised $55 million in Series D funding led by Sapphire Ventures.

A DC Think Tank Is Using Fake Twitter Accounts And A Shady Expert To Reach The NSA, FBI And White House (BuzzFeed) ICIT bills itself as "America's Cybersecurity Think Tank." But BuzzFeed News found it's running fake Twitter accounts and its top expert has questionable credentials.

Apple reportedly looks to Virginia for another US campus (TechCrunch) It seems Virginia is for tech lovers. According to a report in The Washington Post, Apple has been searching for places to put hubs as it contemplates how to spend the $30 billion it has committed for new facilities and 20,000 new employees in the U.S. over the next five years — and it looks …

Products, Services, and Solutions

RunSafe Security Announces Availability of Software Guardian to Cyberh (PRWeb) RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, today announced the

Coinbase’s first investment, Compound, earns you interest on crypto (TechCrunch) Compound wants to let you borrow cryptocurrency, or lend it and earn an interest rate. Most cryptocurrency is shoved in a wallet or metaphorically hidden under a mattress, failing to generate interest the way traditionally banked assets do. But Compound wants to create liquid money markets for cryp…

Kingston Encrypted USB Drives are Key Component of Impending GDPR Compliance (BusinessWire) Kingston's encrypted USB drives are a key component of impending GDPR compliance and cyber security regulations.

EY launches a global IoT/OT Security Lab to help clients stay ahead of emerging threats (PR Newswire) The Warsaw-located lab focuses on prototyping cyber risk defense for critical infrastructures

RunSafe Security Announces Availability of Software Guardian to Cyberharden Vulnerable Embedded Systems and Devices (PRWeb) RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, today announced the

F-Secure Packs Best of Man and Machine Into New Security Offering (PR Newswire) Security perimeters are no longer enough to protect organizations from...

Technologies, Techniques, and Standards

72 Hours: Understanding the GDPR Data Breach Reporting Timeline (Blog | Imperva) We're down to the wire with respect to the General Data Protection Regulation (GDPR) compliance deadline of May 25, 2018.

Companies ditch data as GDPR deadline approaches (Help Net Security) To reduce their exposure, the majority of companies are being more selective in the data they collect and manage, with 70 percent disposing of data ahead of the deadline for compliance.

FIDO Alliance Appoints Facebook to Board of Directors (Dark Reading) Facebook joins Google, Microsoft, Amazon, and Intel, all among major influential tech companies backing FIDO authentication.

Using Marketing Strategies to Influence Security Behaviour (Infosecurity Magazine) When it comes to influencing security behavior, it’s helpful to first look at effective marketing strategies.

You Should Be Using Two-Factor Authentication on Everything (Motherboard) Day three of our personal security tuneup: turn on that 2FA!

10 Security Behaviors That Anger Us (SecurityWeek) We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".

Bitcoin Could Account for 0.5% of Total Global Energy Consumption By the End of the Year (Motherboard) New research suggests that Bitcoin will account for 0.5 percent of the world’s electricity demand by the end of this year. But one researcher says he still isn't getting the whole picture.

The Army is grooming an elite tier of electronic warriors (C4ISRNET) The service wants its approach to a cyber/EW workforce to mirror the relationship between special operations forces and the high-end special operators in Joint Special Operations Command.

Army realigns digital ‘hunters’ for rising electronic warfare (C4ISRNET) The directorate was re-aligned to increase test efficiency for ISR, EW, biometrics and counter IED systems.

Design and Innovation

The SEC creates an educational ‘token’ to stop scammers (TechCrunch) “Travel is expensive, but we are at the cusp of a revolution that will democratize travel and leisure for everyone,” reads the breathless whitepaper for HoweyCoins. “The Internet was the first part of the revolution. The other part is blockchain technology and cryptocurrencies.…

Forget scanning license plates; cops will soon ID you via your roof rack (Ars Technica) ELSAG LPR upgrade can ID "spare tire, bumper sticker, or a ride-sharing company decal."

Research and Development

Navy Cyber War Breakthrough - AI Finds Malware in Encrypted Traffic (Warrior Maven) Pentagon searches for malware buried in encrypted web traffic

Uncrackable encryption could be on the horizon (GCN) Recent experiments have shown it’s possible to transmit photons over long distances, major strides toward the goal of quantum cryptography.

Legislation, Policy, and Regulation

Facebook’s Zuckerberg to Meet European Officials Next Week (Wall Street Journal) Facebook CEO Mark Zuckerberg will meet with French President Emmanuel Macron and other European officials next week, as the Silicon Valley giant tries to calm tension with regulators and policy makers on both sides of the Atlantic.

Who is Winning the Global Competition for Protecting Citizens' Data? (PR Newswire) Webroot, the Smarter Cybersecurity® company, revealed results from...

More Attention Needs to be on Cyber Crime, Not Cyber Espionage (TechNative) Much has been made in the news by governments identifying the serious threats of state-sponsored or directed actors, also known as advanced persistent threats (APT)...

MI5 Chief: Russia Risks Becoming An 'Isolated Pariah' (RadioFreeEurope/RadioLiberty) Russia is seeking to undermine European democracies and sow doubt in the West through malign activities and a "fog of lies," the head of Britain's domestic spy agency has told European intelligence chiefs.

How would NATO respond to a cyberattack? ¯\_(ツ)_/¯ (Fifth Domain) NATO Secretary General Jens Stoltenberg said it's hard to know exactly what a response could include but listed a range of possibilities.

Speech by NATO Secretary General Jens Stoltenberg at the Cyber Defence Pledge Conference (NATO/OTAN) Minister Parly, Ambassadors, Ladies and gentlemen. May I start by thanking France for hosting us today.

Senate Votes to Reinstate Obama-Era Net Neutrality Rules (Wall Street Journal) The Senate voted Wednesday to reinstate Obama-era open-internet rules, handing a symbolic defeat to the Trump administration over its efforts to roll back those regulations.

After Senate victory, House announces plans to force its own vote on net neutrality (TechCrunch) Hot on the heels of a surprising 52-47 Senate disapproval of the FCC's new, weaker net neutrality rules, the House of Representatives will soon attempt to force a similar vote. Representative Mike Doyle (D-PA) announced in a statement and at a press conference following the Senate vote that he will…

This Is Ajit Pai, Nemesis of Net Neutrality (WIRED) Star Wars references. Dorky tweets. Goofy videos. The FCC chair just wants to be one of the tech nerds, but he seems to be trying to destroy everything they believe in.

Trump eliminates national cyber-coordinator job, gives Bolton keys to the cybers (Ars Technica) Reps Lieu and Langevin introduce bill to restore job; IT industry asks White House to reconsider.

Trump's decision to eliminate role of cybersecurity czar rattles experts. Here's why. (NBC News) "This is definitely not the signal you want to send to your allies and your adversaries," a former cyber czar says.

DOE Multiyear Plan for Energy Sector Cybersecurity (US Department of Energy) Protecting America’s energy systems from cyber attacks and other risks is a top national priority.

Trump's CIA nominee wins Senate panel backing, confirmation expected (NBC News) The confirmation vote by the full Senate could occur before the end of the week.

Litigation, Investigation, and Law Enforcement

Cambridge Analytica Shared Data With Russia: Whistleblower (SecurityWeek) Cambridge Analytica used Russian researchers and shared data with companies linked to Russian intelligence, a whistleblower told a congressional hearing.

Senators Grill Whistleblower on Cambridge Analytica's Inner Workings (WIRED) Christopher Wylie testified before the Senate Judiciary Committee Wednesday that Cambridge Analytica specialized in "disinformation, spreading rumors, kompromat, and propaganda."

Senate intelligence leaders: Russians schemed to help Trump (POLITICO) It's a powerful bipartisan endorsement of a conclusion that had been called into question by Republicans on the House Intelligence Committee.

FBI chief 'deeply concerned’ about companies like ZTE (POLITICO) Wray was facing pointed questions stemming from an out-of-left-field Trump tweet on Sunday about ZTE, which is floundering financially after U.S. regulators barred American companies from buying or selling ZTE products for seven years after it violated sanctions against doing business with Iran and North Korea.

House measure asks DHS to share info on potential ZTE cyberthreat (Cyberscoop) A resolution would task DHS with giving an assessment of cyber risks introduced by any use of ZTE products on federal, state, and local government networks.

What makes ZTE a cybersecurity threat? Congress wants to know (CNET) A proposed resolution would require the Homeland Security Department to hand over info on the Chinese phone maker.

Democrats call for firing of VA’s top technology official (Military Times) Camilo Sandoval, the former data operations director for Trump’s presidential campaign, took over the role last month.

China told ex-CIA officer: ‘We’ll take care of you for life’, say court papers (South China Morning Post) The Hong Kong-born Lee, suspected of being at the centre of one of the largest US intelligence breaches in decades, is expected to plead not guilty 

Alleged CIA Leaker Tweeted That Chelsea Manning ‘Should Be Executed’ (Motherboard) Joshua Schulte posted a a series of tweets criticizing Chelsea Manning in 2010, when he was working at the CIA, and she had been identified as the source of WikiLeaks’ Afghanistan and Iraq War Logs.

Facebook faces fresh criticism over ad targeting of sensitive interests (TechCrunch) Is Facebook trampling over laws that regulate the processing of sensitive categories of personal data by failing to ask people for their explicit consent before it makes sensitive inferences about their sex life, religion or political beliefs? Or is the company merely treading uncomfortably and une…

WannaCry hero charged with creating Kronos banking malware (HackRead) The WannaCry ransomware hero and malware expert Marcus Hutchins (@Malwaretech on Twitter) has been charged with creating Kronos banking malware that stole banking data from users around the world.

Suspected Member of TheDarkOverlord Hacking Group Arrested in Serbia (BleepingComputer) Serbian police have arrested a 38-year-old man from Belgrade on suspicion of being part of the infamous The Dark Overlord (TDO) hacking crew.

Cybercrime now affecting more people than any other crime (Security Brief) The UK's National Crime Agency has reported organised criminals have exploited technology to make it the number one security threat

Europol and BT sign agreement to exchange threat intelligence data (Government Europa) Europol has signed a memorandum of understanding with communications company BT to exchange threat intelligence data and reinforce cybersecurity across Europe.

Serbia Arrests FBI-sought Cybercrime Suspect (SecurityWeek) Serbian police said they had arrested a man sought by the FBI under suspicion of being part of a group of cybercriminals who called themselves "The Dark Overlord".

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Cyber:Secured Forum (Denver, Colorado, USA, June 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively...

Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, June 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

New York State Cybersecurity Conference (Albany, New York, USA, June 5 - 7, 2018) June 2018 marks the 21st annual New York State Cyber Security Conference and 13th Annual Symposium on Information Assurance (ASIA). Hosted by the New York State Office of Information Technology Services,...

The Cyber Security Summit: Boston (Boston, Massachusetts, USA, June 5, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

SecureWorld Chicago (Chicago, Illinois, USA, June 5, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

NSA 2018 Enterprise Discovery Conference (Ft. Meade, Maryland, USA, June 5 - 6, 2018) Hosted by the National Security Agency and the Federal Business Council (FBC). The EDC is the largest event held at NSA with over 1500 attendees from around the world. EDC provides a collaborative learning...

Cyber//2018 (Columbia, Maryland, USA, June 6, 2018) Cyber touches all aspects of our life from the myriad of devices we have brought into our homes to those we employ on the job to increase and improve our productivity. Please join us for our 9th annual...

TU-Automotive Cybersecurity (Novi, MIchigan, USA, June 6 - 7, 2018) Co-located with the world's largest automotive technology conference & exhibition. The conference unites players from research labs, automakers, tier 1’s, security researchers, and the complete supply...

SINET Innovation Summit 2018 (New York, New York, USA, June 7, 2018) Connecting Wall Street, Silicon Valley and the Beltway. SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration...

Transport Security and Safety Expo (Washington, DC, USA, June 11 - 12, 2018) Security incidents are expected to cost the world $6 trillion annually by 2021, making now the time to find out more at the 2018 Transport Security and Safety Expo. The transportation industry is rapidly...

Transport Security & Safety Expo (Washington, DC, USA, June 11 - 12, 2018) The conference is devoted to the challenges and opportunities surrounding ensuring the safety and security of passengers and cargo in the digital age.

Dynamic Connections 2018 (Palm Springs, California, USA, June 12 - 14, 2018) Together with you, our customers and partners, we’ll come together for 2 ½ days to learn, explore and create the possible at Dynamic Connections 2018 (DC18). To get ahead of the most critical, most pervasive...

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 18 - 20, 2018) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the second annual Cyber Security Summit in June 2018. The summit, presented in a continuing education format,...

Insider Threat Program Management With Legal Guidance Training Course (Tyson's Corner, Virginia, USA, June 19 - 20, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

GovSummit (Washington, DC, USA, June 27 - 28, 2018) GovSummit -- the government security conference hosted annually by the Security Industry Association -- brings together government security leaders with private industry technologists for top-quality information...

The Cyber Security Summit: DC Metro (Tysons Corner, Virginia, USA, June 28, 2018) Learn from cyber security experts from The U.S. Department of Justice, The NSA, Pulse Secure, CenturyLink and more as they brief you on the latest security threats facing your business. This event is...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.