skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Are you using threat intelligence to its full potential? Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

Banxico (the Bank of Mexico) says that, while its investigation of a series of criminal raids on the Interbanking Electronic Payment System (SPEI) is still in progress, they've concluded that the initial attack came through a small brokerage house.

McAfee researchers are tracking the Sun Team, a DPRK threat group operating a mobile malware campaign ("Red Dawn") against North Korean defectors. They're using Facebook and Google Play to spread spyware under the guise of beta applications. Three bad apps have been found: "Food Ingredients Info" for the health conscious and two bogus security apps, "Fact AppLock," and "AppLock Free," for the rest of you.

FireEye's iSIGHT unit has found a great deal of Japanese personally identifiable information for sale in a Chinese black-market souk, apparently culled largely from earlier big breaches. (The criminal vendor gets low grades from the black market's equivalent of Yelp.)

Two alleged members of the Syrian Electronic Army, Ahmad ‘Umar Agha, 24 (“The Pro”) and Firas Dardar, 29, (“The Shadow”) now face eleven US Federal counts of conspiracy to commit computer fraud, conspiracy to commit wire fraud, and aggravated identity theft. Both men remain at large.

Facebook continues to struggle with content moderation. In one category the company has expressed a desire to purge—terrorist imagery and propaganda—Facebook has met with indifferent success. The Global Intellectual Property Enforcement Center and the Digital Citizens Alliance say it's easy to find jihadist exhortations and imagery of unbelievers' executions. You just have to know which hashtags to follow. 

Notes.

Today's edition of the CyberWire reports events affecting Australia, Canada, China, Germany, Iran, Japan, Democratic Peoples Republic of Korea, Republic of Korea, Malta, Mexico, NATO/OTAN, New Zealand,Russia, Sri Lanka, Syria, Taiwan, Ukraine, United Kingdom, United States.

Learn four incident response lessons from high-profile breaches.

Most enterprises know that they are constantly under attack but haven’t fully embraced some lessons to be learned from real-world, high-profile security incidents. Watch this free webinar, presented by experts from Coalfire and Arete Advisors, to learn four practical lessons that will help you avoid damaging losses and minimize negative impacts of cybersecurity incidents.

In today's podcast we talk with our partners from the University of Maryland's Center for Health and Homeland Security, as Ben Yelin discusses a controversy involving North Carolina police using overly broad warrants to gather location data from Google.

Startup CEO: Managing a Legal Team for Fun & Profit (Fulton, Maryland, United States, May 31, 2018) DataTribe's Al Clark will share his expertise in providing legal counsel to local tech startups. He'll answer questions on how to gain the most out of and what to look for in legal counsel that will lead to a relationship of lowering risk and saving money. Food and beverages are provided.

Cyber Security Summits: Boston on June 5 & June 28 in DC (Boston, Massachusetts, United States, June 5, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, CenturyLink, IBM Security and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com

Cyber Attacks, Threats, and Vulnerabilities

Sponsored: Closing the Last Gap in Data Security: Protecting Data in Use (Enveil) Industry analyst firm 451 Research highlights how startup Enveil tackles the encryption-in-use problem with a new take on homomorphic encryption.

Eelam faction launches cyber-attack on Govt. websites (Hiru News) Several Sri Lankan websites including the website of the Ministry of Tourism Development and Christian Religious Affairs have been hit by a cyber-attack.   The websites have been hacked by a group... . Most visited website in Sri Lanka.

Bank of Mexico says cyber attack originated at brokerage house (Mexico News Today) The governor of the Bank of Mexico (Banxico), Alejandro Díaz de León , announced that the first incident of the cyber attack that…

Manuel Delia’s Blog Cyber-Attacked By Ukrainian Hackers On A Scale 'Rarely Seen On Other Maltese Websites' (Lovin' Malta) "This is no different and no less harrowing than the arson at the Times of Malta building forty years ago"

Gruesome Jihadi Content Still Flourishes on Facebook and Google+ (WIRED) Despite improvements to algorithmic filtering, Facebook and Google+ still host huge amounts of ISIS and ISIS-related content and accounts that sometimes stay up for months.

Obama cyber chief: Iran may ramp up cyberattacks after Trump ditched nuclear deal (Yahoo Entertainment) “I think we should expect to see an increase in Iranian cyberactivity against us,” said Michael Daniel, the former White House cyber coordinator, in an interview on the Yahoo News podcast "Skullduggery."

Pathology of a soft war with Iran in cyberspace (Modern Diplomacy) The soft -war against Iran is a fact that all the scholars acknowledge. In fact, the main and hidden purpose of the soft -war is to disrupt the information system of the countries and to influence the public opinion of the countries.

RedDawn Espionage Campaign Shows Mobile APTs on the Rise (Threatpost) The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors.

200 Million Sets of Japanese PII Emerge on Underground Forums (SecurityWeek) A dataset allegedly containing 200 million unique sets of personally identifiable information (PII) exfiltrated from several popular Japanese website databases emerged on underground forums

ZipperDown catches 170,000 iOS apps with their pants down (Naked Security) It’s got a name, a logo and some very big numbers, but does it deserve its star billing?

Mirai botnet adds three new attacks to target IoT devices (ZDNet) This new version of the botnet uses exploits instead of brute force attacks to gain control of unpatched devices.

Chrome users warned of new malware that steals passwords and credit card details (Thai Tech by Thaivisa.com) Security researchers have discovered a new strain of malware that can steal passwords and credit card details from Google Chrome.

Ex-Intel security expert: This new Spectre attack can even reveal firmware secrets (ZDNet) A new variant of Spectre can expose the contents of memory that normally can't be accessed by the OS kernel.

New Spectre Attack Recovers Data From a CPU's Protected SMM Mode (BleepingComputer) Security researchers from Eclypsium have detailed yesterday a new variation of the Spectre attack that can recover data stored inside a secure CPU area named the System Management Mode (SMM).

Misconfigured CalAmp Server Enabled Vehicle Takeover (SecurityWeek) A misconfigured server operated by CalAmp, a company offering the backend for a broad range of well-known car alarm systems, provided anyone with access to data and even allowed for account and vehicle takeover.

DrayTek Router Zero-Day Under Attack (BleepingComputer) DrayTek, a Taiwan-based manufacturer of broadband CPE (Customer Premises Equipment) such as routers, switches, firewalls, and VPN devices, announced today that hackers are exploiting a zero-day vulnerability to change DNS settings on some of its routers.

The Facebook Android App Is Asking for Superuser Privileges and Users Are Freaking Out (BleepingComputer) The Facebook Android app is asking for superuser permissions, and a bunch of users are freaking out about granting the Facebook app full access to their device, an understandable reaction following the fallout from the Cambridge Analytica privacy scandal.

Phishing Roundup: Caracal, Stealth Mango, Tangelo, Apple, DHL, eFax & More (BleepingComputer) Phishing threats are currently targeting your credentials for Apple, Facebook, Gmail, and more. In this roundup we detail some of the current Phishing threats active on the Internet.

Siemen’s Denial Of Service Vulnerability (Information Security Buzz) Siemen’s has sent out an alert on a Denial of Service vulnerability that could affect its SIMATIC S7-400, a family of programmable logic controllers (PLCs) designed for process control in industrial environments. Andrew Lloyd, President at Corero Network Security commented below. Andrew Lloyd, President at Corero Network Security: “As we’ve been discussing in relation to …

New Malicious Monero Miner Crashes Computers When Attempting to Remove it (The Merkle) It has been a while since cryptocurrency malware was worth paying much attention to. With cryptocurrency mining having become more common, criminals are once again taking notice. WinstarNssmMiner may

Security: Bad Bots Use Increasingly Sophisticated Techniques to Impersonate Humans (Formtek Blog) Malicious bots are on the prowl on the internet. A report from Distil estimates that more than one-fifth of internet traffic is from “bad bots.” Up nearly 10 percent over last year. “Good bots” also account for another fifth of traffic.

Atlanta’s network almost recovered from cyber attack, cost still unknown (Atlanta Journal Constitution) Cost and damage of City of Atlanta ransomware event still being calculated

Roseburg schools dealing with aftermath of cyber attack (KPIC) The FBI is now investigating a ransomware attack that is affecting the Rosebug Public School's computer system. The cyber attack happened earlier this month, freezing access to the district's email system, website and buisiness and account

A Location-Sharing Disaster Shows How Exposed You Really Are (WIRED) The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.

Someone hacked California's live congressional debate to run gay porn (HackRead) An online forum designated for California's First Congressional District debate was hacked by unknown hackers (or call them pranksters) right after opening statements.

You are not alone; The Pirate Bay is down around the world (HackRead) You are not alone, The Pirate Bay is down for everyone around the world. Those visiting The Pirate Bay right now can see error 502 message powered by Cloudflare.

T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account (KrebsOnSecurity) T-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username.

Misconfigured Reverse Proxy Servers Spill Credentials (Threatpost) Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.

Hacks turn Amazon Alexa and Google Home into secret eavesdroppers (CSO Online) Researchers devise new two new attacks -- voice squatting and voice masquerading -- on Amazon Alexa and Google Home, allowing adversaries to steal personal information or silently eavesdrop.

This CMU researcher hacked cellphone location data in just 15 minutes (TribLIVE.com) A researcher at Carnegie Mellon University and member of its elite hacking team exposed a bug in a cellphone tracking service that allowed him — ...

Aussie businesses lost $22.1 million to email scams last year (ARN) Email scams cost Australian businesses losses of $22.1 million in 2017, according to scams reported to both the ACCC and ACORN.

Believing your data is “probably” secure means it’s not secure at all (CSO) Many companies are being caught out when their “probabilistic” data security measures prove inadequate in the face of a breach, a CSIRO data scientist has noted in arguing for a more concrete, numbers-based method for evaluating the effectiveness of corporate security policies.

58% of Botnet Malware Infections Last Under a Day (BleepingComputer) The vast majority of botnet malware infections last under a day, according to a Fortinet report released last week —the Q1 2018 Threat Landscape Report.

People Are Making Fake Facebook Profiles of the Santa Fe Shooter to Fit Their Political Narratives (Motherboard) People are rushing to push the shooter into the opposite political camp.

Latin American 'Biñeros' Bond Over Fraudulent Purchase Scheme (Threatpost) A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.

Security Patches, Mitigations, and Software Updates

Chrome to dynamically point out "Not secure" HTTP sites (Help Net Security) Google expects HTTPS to become the default, and is preparing users for it by slowly moving Chrome towards showing only negative security indicators.

Cyber Trends

Are you ready for the GDPR deadline? (Help Net Security) Are you ready for the ready GDPR deadline? Not only are most unprepared for the deadline, but only around half of the companies surveyed (52 percent) expect to be compliant by end-of-year 2018, and 31 percent do not know when they will be fully compliant.

Cyber Saturday: Would You Buy Cybersecurity from a Witch Doctor? (Fortune) The late scientist Richard Feynman certainly wouldn't.

The risks of over-reliance on quantifiable data (C4ISRNET) The risk for grave errors in decision-making, escalation, and avoidable human suffering and destruction, is embedded in our future use of artificial intelligence if we do not pay attention to the data that feed the algorithms.

The Amish understand a life-changing truth about technology the rest of us don’t (Quartz) The Amish don't always reject a technology, but they have very specific rules about how it is to be used.

Cyber subversives beware: the battle for our democracy starts here (The Telegraph) We have reached a tipping point.

Australian consumers demand trust on data usage (WARC) Trust and transparency play a vital role in determining the strength of any relationship between a brand and its customers, yet it appears only 15% of Australian companies explicitly indicate they share consumer data with third parties.

Marketplace

Blockchain Consolidation Phase Is Imminent, Hyperledger Chief Says (Wall Street Journal) Blockchain technology is enterprise-ready, says Brian Behlendorf, executive director of the Hyperledger project. Governance has a way to go, however. "Getting multiple parties to agree on anything -- like a time of day for a meeting, let alone a common application -- will end up being a bigger challenge," he says.

Syncsort Acquires Townsend's IBM i Encryption Software (IT Jungle) Syncsort has acquired the bulk of Townsend Security’s products in a bid to bolster its burgeoning suite of security software for IBM i. The big get for Syncsort (formerly Vision Solutions) is AES/400, Townsend’s well-respected database encryption software for the IBM i platform. Meanwhile, Townsend Security will continue developing and selling encryption key management software

Microsoft makes inroads with U.S. spy agencies as tech giants face off over cloud contract (Washington Post) The company’s full cloud-computing service has been made available to 17 intelligence agencies for the first time.

ZTE Has to Change Management for U.S. Reprieve, Kudlow Says (Bloomberg.com) Chinese telecom company ZTE will have to change its management to win a reprieve from U.S. sanctions, said the director of the White House National Economic Council.

ThreatQuotient takes on APAC channel with Cisco security talent (ARN) ThreatQuotient is making a play for the local channel landscape after appointing Cisco A/NZ's Anthony Stitt as its new Asia Pacific regional director.

How Queenslander Greg Clark became leader of the world's largest cyber sec firm Symantec (Financial Review) Greg Clark grew up in the Queensland coastal town of Yeppoon, but now he's leading the world's largest cyber security firm.

Products, Services, and Solutions

Sprint Launches Groundbreaking IoT Factory to Make Everyday Business Easier (PR Newswire) Sprint (NYSE: S) today announced the launch of the Sprint IoT...

F-Secure Unveils New Endpoint Detection & Response Solution (SecurityWeek) F-Secure announced on Thursday the launch of a new endpoint detection and response (EDR) solution named Rapid Detection & Response

CrowdStrike Advances Cyber-Security Automation to Aid Forensics (eWEEK) VIDEO: Dmitri Alperovitch, co-founder and CTO of CrowdStrike, discusses his company's latest products and explains why automation is about augmenting humans, not replacing them.

Fast-Growing Startup Cybrary Helps Bring Cybersecurity Training to the Masses (DC Inno) When DC Inno last checked in with online cybersecurity training company Cybrary in 2015, it was just celebrating its debut and unveiling a program to help teach D.C.-based Iraqi refugees cybersecurity techniques.

How Thales Cyber Hub will create a collaborative ecosystem (Tahawul Tech) Gary Miller, vice president, Cyber Security, Middle East, Thales, on strengthening its recently announced Cyber Hub in Dubai.

Technologies, Techniques, and Standards

PCI Security Standards Council publishes PCI DSS 3.2.1 (Help Net Security) The minor changes in PCI DSS 3.2.1 reflect how existing requirements are affected once the effective dates and SSL/TLS migration deadlines have passed so that organizations can accurately report how their implementations meet these existing requirements after 30 June.

How a new cyber cell is protecting DoD networks (Fifth Domain) Officials tout progress one year after standing up a cyber intelligence/operations fusion cell.

Cyber Shield 18 Culminates in Exercise Week (DVIDS) Members of the Army National Guard, Air National Guard, Army Reserve and partner civilian agencies carried out mock cyber attacks in a Red Cell versus Blue Cell exercise as part of Cyber Shield 18 at Camp Atterbury, Ind., May 14-18.

DHS, DoT team up to secure federal vehicle fleets (SC Media US) The DHS and the DoT joined forces to create a cybersecurity implementation and operational primer to secure federal vehicle fleets.

Banks Adopt Military-Style Tactics to Fight Cybercrime (New York Times) Financial institutions are using military tools and techniques, like “fusion centers” and combat drills, to battle cybercrime.

Don't let attackers worm their way in: Increase password security (Help Net Security) Passwords are inherently the weakest form of authentication, yet they remain the most prevalent. Many organizations realize that moving beyond this single point of vulnerability is required but replacing passwords or adding multi-factor authentication (MFA) to all use cases can be daunting if not impossible. As such,

Mattis expected to tighten cellphone restrictions within Pentagon building (CNN) Defense Secretary James Mattis is expected Friday to order a tightening of security policy governing military and civilian personnel bringing cellphones into classified workspaces in the Pentagon, according to two US defense officials.

Seriously, Stop Using Flash (Motherboard) It's day five of our digital security tuneup and it's time to banish this internet relic.

Design and Innovation

Why the Adoption of Edge Computing Demands a New Approach to Data Security (Infosecurity Magazine) Edge computing allows for faster response times and consistent data collection.

Research and Development

As cyber security needs become an overriding concern, China works on an impenetrable shield (Global Times) China is developing an innovative system to strengthen its cyber defence, testing the mechanism by making scores of white-hat hackers launch hundreds of thousands of attacks.

You Can Send Invisible Messages With Subtle Font Tweaks (WIRED) Researchers have developed a new technique called FontCode that hides secrets in plain sight.

Legislation, Policy, and Regulation

What Is GDPR and What Can America Learn From it? (Motherboard) After four years of debate, the General Data Protection Regulation is finally going into effect later this month. Personal privacy is of particular concern, but GDPR effect on consumers and Silicon Valley is still shaking out.

Why Europe's New Privacy Laws Are Causing Some Online Games to Shut Down (Motherboard) The cost to comply with the new GDPR regulations is too much for games like 'Loadout,' 'Super Monday Night Combat,' and 'Ragnarok Online'

Trump pressed to put hacking on North Korean summit agenda (POLITICO) North Korea’s prowess could evolve into one of the more pernicious threats facing the U.S., some national security specialists warn.

NATO To Announce Nearly $1 Billion In New Defense Work, Cyber Agreements At Berlin Conference (Defense Daily Network) NATO is set to preview nearly $1 billion in new contract opportunities and sign four bilateral cyber threat information sharing agreements with internation

Britain warned it must be prepared to launch cyber attacks on enemies or risk 'falling behind' in modern warfare (The Independent) Britain must be prepared to launch cyber attacks on enemies or risk “falling behind” in modern warfare, the head of defence intelligence has warned.

As Britain reveals its first-ever cyberattack against ISIS, experts ask if Canada will be as open (CBC) This spring in Britain the Government Communications Headquarters (GCHQ) revealed that Britain had launched its first-ever military-style cyber campaign against the Islamic State. But will Canada make similar announcements in the days to come?

The Untold Story of Japan’s Secret Spy Agency (The Intercept) Sources reveal a hidden spy center in Tokyo and an internet surveillance program that sweeps up data from satellites.

US anti-ISIS office gets reprieve as Syria pullout accelerates (Military Times) The State Department unit overseeing the fight against the Islamic State group will stay in business for at least six more months, reversing an administration plan for the unit’s imminent downgrade even as President Donald Trump presses ahead with a speedy U.S. exit from Syria.

Progressive advocacy groups call on the FTC to “make Facebook safe for democracy” (TechCrunch) A team of progressive advocacy groups, including MoveOn and Demand Progress, are asking the Federal Trade Commission to “make Facebook safe for democracy.” According to Axios, the campaign, called Freedom From Facebook, is set to launch a six-figure ad campaign on Monday that will run o…

Hurdles Remain After Senate Votes To Restore Net Neutrality (Threatpost) The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.

Net Neutrality Is Just a Gateway to the Real Issue: Internet Freedom (WIRED) The Senate vote wasn't about net neutrality. It was about making world class internet, in all its forms, a powerful political issue—with rippling effects come 2020.

A simple solution to end the encryption debate (TechCrunch) David Gurle Contributor Share on Twitter David Gurle is the founder and chief executive of Symphony Comunication. Bill Harrington Contributor Bill Harrington is a former federal prosecutor and a partner at the law firm Goodwin Procter. Criminals and terrorists, like millions of others, rely on smar…

U.S. Suspends Tariffs on China, Stoking Fears of a Loss of Leverage (New York Times) A temporary cease-fire has calmed fears of a trade war, but the Trump administration now faces criticism it is backing down from striking a tough deal.

ZTE rescue dubious call (Times-Tribune) Even before President Donald Trump had imposed about $150 billion worth of tariffs on Chinese products, the Commerce Department had moved to sanction a major Chinese electronics manufacturer for serious trade and national security violations.

Maj. Gen. Loretta Reynolds Nominated as USMC Deputy Commandant for Information, MARFORSTRAT Commander (Executive Gov) Maj. Gen. Loretta Reynolds, commander of the U.S. Marine Corps Forces Cyber Command, has been nomina

Litigation, Investigation, and Law Enforcement

Trump says he’ll demand the Justice Department probe whether the FBI spied on his campaign (Vox) The president of the United States has had quite a day on Twitter.

U.S. Justice Dept to check for political motivations in FBI Russia probe (Jerusalem Post) The US Justice Department asked its inspector general to expand a review of the National Security Agency's surveillance application process to determine if political motivations affected the FBI's probe of Russian interference in the 2016 presidential election, an agency spokeswoman said on Sunday.

The ethical and legal dilemmas of threat researchers (Help Net Security) What happens when a security researcher uncovers stolen data? Do they have the right to search through it? Analyze it? How much of it should they publish it? What if the data was from a public figure?

More Charges Against 'Syrian Electronic Army' Hackers (SecurityWeek) US Justice Department announces more charges against two Syrians believed to be members of the Syrian Electronic Army hacker group

Man Sentenced to 15 Years in Prison for DDoS Attacks, Firearm Charges (SecurityWeek) A 55-year-old man from New Mexico was sentenced to 15 years in prison for DDoS attacks on dozens of organizations and firearms charges

Our Robocall Hell Is a Result of Inconsistent Enforcement and Carrier Apathy (Motherboard) Despite endless government initiatives, updated regulations and a laundry list of promises from industry, the problem is worse than ever.

Statute expires for pension body cyber-attack (NHK WORLD) Tokyo police have ended their investigation into a massive leak of personal data from a public pension body after the statute of limitations expired before they could identify who was behind the cyber-attack.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative...

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for...

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will...

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018...

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Cyber:Secured Forum (Denver, Colorado, USA, June 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively...

Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, June 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

New York State Cybersecurity Conference (Albany, New York, USA, June 5 - 7, 2018) June 2018 marks the 21st annual New York State Cyber Security Conference and 13th Annual Symposium on Information Assurance (ASIA). Hosted by the New York State Office of Information Technology Services,...

The Cyber Security Summit: Boston (Boston, Massachusetts, USA, June 5, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

SecureWorld Chicago (Chicago, Illinois, USA, June 5, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

NSA 2018 Enterprise Discovery Conference (Ft. Meade, Maryland, USA, June 5 - 6, 2018) Hosted by the National Security Agency and the Federal Business Council (FBC). The EDC is the largest event held at NSA with over 1500 attendees from around the world. EDC provides a collaborative learning...

Cyber//2018 (Columbia, Maryland, USA, June 6, 2018) Cyber touches all aspects of our life from the myriad of devices we have brought into our homes to those we employ on the job to increase and improve our productivity. Please join us for our 9th annual...

TU-Automotive Cybersecurity (Novi, MIchigan, USA, June 6 - 7, 2018) Co-located with the world's largest automotive technology conference & exhibition. The conference unites players from research labs, automakers, tier 1’s, security researchers, and the complete supply...

SINET Innovation Summit 2018 (New York, New York, USA, June 7, 2018) Connecting Wall Street, Silicon Valley and the Beltway. SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration...

Transport Security and Safety Expo (Washington, DC, USA, June 11 - 12, 2018) Security incidents are expected to cost the world $6 trillion annually by 2021, making now the time to find out more at the 2018 Transport Security and Safety Expo. The transportation industry is rapidly...

Transport Security & Safety Expo (Washington, DC, USA, June 11 - 12, 2018) The conference is devoted to the challenges and opportunities surrounding ensuring the safety and security of passengers and cargo in the digital age.

Dynamic Connections 2018 (Palm Springs, California, USA, June 12 - 14, 2018) Together with you, our customers and partners, we’ll come together for 2 ½ days to learn, explore and create the possible at Dynamic Connections 2018 (DC18). To get ahead of the most critical, most pervasive...

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 18 - 20, 2018) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the second annual Cyber Security Summit in June 2018. The summit, presented in a continuing education format,...

Insider Threat Program Management With Legal Guidance Training Course (Tyson's Corner, Virginia, USA, June 19 - 20, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

GovSummit (Washington, DC, USA, June 27 - 28, 2018) GovSummit -- the government security conference hosted annually by the Security Industry Association -- brings together government security leaders with private industry technologists for top-quality information...

The Cyber Security Summit: DC Metro (Tysons Corner, Virginia, USA, June 28, 2018) Learn from cyber security experts from The U.S. Department of Justice, The NSA, Pulse Secure, CenturyLink and more as they brief you on the latest security threats facing your business. This event is...

Impact Optimize2018 (Rosemont, Illinois, USA, June 28, 2018) Impact Optimize2018, the first-ever IT and Business Security Summit hosted by Impact, will provide attendees with actionable steps that enable the betterment of information, network and cybersecurity.

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.