skip navigation

More signal. Less noise.

Are you using threat intelligence to its full potential?

Are you using threat intelligence to its full potential? Download this free report via Recorded Future to learn 12 common threat intelligence use cases.

Daily briefing.

The US FBI is generally being credited with having placed a significant impediment in front of a VPNFilter attack. Widely regarded as the work of Fancy Bear (Russia's military intelligence service, GRU), VPNFilter appeared poised for a major campaign against Ukraine. The two suspected triggering events—tomorrow's futbol Champions League match in Kiev (Real Madrid versus Liverpool) and Ukraine's Constitution Day (June 28th)—remain in the future, so we shall see how well the Bureau did. But so far, bravo FBI.

Should such an attack materialize, it's unlikely to be easily contained within Ukraine. The country has been patient zero for other attacks that have gone global, notably NotPetya, also widely regarded as made-in-Russia.

Avast warns it's found a number of discount Android phones that shipped from factory to customer with malware already installed.

Amazon acknowledges that Alexa's Echo was reporting ambient conversations to third-party contacts. The company is working on a fix.

BMW has patched fourteen bugs in its connected car models. They were discovered and disclosed by Tencent’s Keen Security Lab. Some of them could have affected control systems.

GDPR is in effect, today, with its expected worldwide implications. Microsoft, for example, is going to treat essentially everyone in the world as if they're covered by the regulation. And right on cue, the first legal complaints of GDPR violations have been filed.

Three gamers have now been indicted on US Federal charges stemming from a swatting that took the life of an uninvolved and innocent Kansas man.


Today's issue includes events affecting China, European Union, France, Philippines, Russia, Ukraine, United Kingdom, United States.

A note to our readers: On Monday we'll be observing the Memorial Day holiday, and won't be publishing. We'll be back as usual on Tuesday. In the meantime, over the weekend spare a thought for the fallen honored on that day.

Learn four incident response lessons from high-profile breaches.

Most enterprises know that they are constantly under attack but haven’t fully embraced some lessons to be learned from real-world, high-profile security incidents. Watch this free webinar, presented by experts from Coalfire and Arete Advisors, to learn four practical lessons that will help you avoid damaging losses and minimize negative impacts of cybersecurity incidents.

In today's podcast we speak with our partners at the Johns Hopkins University, as Joe Carrigan compares and contrasts iOS and Android security. Our guest is Mischel Kwon from MKACyber on the evolving role of SOCs. 

Startup CEO: Managing a Legal Team for Fun & Profit (Fulton, Maryland, United States, May 31, 2018) DataTribe's Al Clark will share his expertise in providing legal counsel to local tech startups. He'll answer questions on how to gain the most out of and what to look for in legal counsel that will lead to a relationship of lowering risk and saving money. Food and beverages are provided.

Cyber Security Summits: Boston on June 5 & June 28 in DC (Boston, Massachusetts, United States, June 5, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, CenturyLink, IBM Security and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

TU-Automotive Cybersecurity Conference (Detroit, Michigan, United States, June 6 - 7, 2018) Uniting 150+ experts from the connected car and security industries to help automotive to apply technology and best practices to deliver robust security defenses and processes. Co-located with TU-Automotive Detroit, attendees can access the world’s largest automotive technology exhibition. CyberWire audience save $100 off standard and basic passes with code TCW100.

Cyber Attacks, Threats, and Vulnerabilities

Sponsored: Closing the Last Gap in Data Security: Protecting Data in Use (Enveil) Industry analyst firm 451 Research highlights how startup Enveil tackles the encryption-in-use problem with a new take on homomorphic encryption.

FBI acts to stop cyber-attack on Ukraine (BBC News) Malware that could 'kill' home routers has been thwarted by the FBI's action against the malicious site.

FBI Takes Control of APT28's VPNFilter Botnet (BleepingComputer) The US Federal Bureau of Investigation (FBI) has obtained court orders and has taken control of the command and control servers of a massive botnet of over 500,000 devices, known as the VPNFilter botnet.

DOJ Sinkholes VPNFilter Control Servers Found in US (Dark Reading) The US Department of Justice said the move aims to thwart the spread of the botnet as part of its investigation into Russian nation-state hacking group APT28 aka Fancy Bear.

Was A Massive Cyberattack Just Prevented? ( The Federal Bureau of Investigation (FBI) is dismantling a “large network of hacked routers and storage devices” that could have enabled a “massive cyberattack,” according to a report in The Wall Street Journal. The FBI move came after Cisco Systems Inc. and authorities from the United States and the Ukraine warned about the prospect of the […]

Researchers: Malware Surge 'Could Indicate Imminent Attack' (Silicon UK) Another NotPetya? The rapid spread of VPNFilter malware could mean plans for a fresh attack on the Ukraine - where previous worldwide attacks also began

Hacker Group Targeting Industrial Controllers Expands Its Operations (Security Boulevard) The group behind the Triton malware that triggered an emergency shutdown last year at a critical infrastructure organization in the Middle East is still active and has expanded its operations to industrial controllers in facilities in other regions of the world.

Building A Global Nation State SMB Exploit Honeypot Infrastructure With A £50 Budget #EternalPot (Peerlyst) Worthy of note before beginning to read this beauty - Mr. Beaumont predicted that this would happen back in April 2017:

Intel's 'Virtual Fences' Spectre Fix Won't Protect Against Variant 4 (Threatpost | The first stop for security news) The new hardware-based protections Intel announced earlier in March it was embedding into new chips will only protect against Spectre and Meltdown – but not the newly disclosed Variant 4, sources said.

Spectre continues: Did we all trade speed for security? (Security Boulevard) For anyone in the cybersecurity industry, 2018 began on January 3rd — the day a trio of CPU bugs was announced. What trio? You probably recall Meltdown and Spectre, but from our perspective, the latter bug is really two for the price of one. While Meltdown and Spectre both got plenty of coverage in media outlets and security blogs around the globe (yes, that includes us, too), there’s an important distinction to make and more to say on this matter.

HTML5: A Safe Haven for Malware? (Media Trust) Numerous malware incidents which call into question HTML5’s mantle of security.

Hacker Makes Over $18 Million in Double-Spend Attack on Bitcoin Gold Network (BleepingComputer) An unidentified hacker has mounted several "double spend" attacks on the infrastructure of the Bitcoin Gold cryptocurrency and has managed to amass over $18 million worth of BTG (Bitcoin Gold) coins in the process.

Malware Found in the Firmware of 141 Low-Cost Android Devices (BleepingComputer) Two years after being ousted, a criminal operation that has been inserting malware in the firmware of low-cost Android devices is still up and running, and has even expanded its reach.

"Several hundred" budget Android devices shipped with pre-installed malware: Avast (CRN Australia) Some 18,000 devices affected in more than 100 countries.

Amazon confirms that Echo device secretly shared user’s private audio [Updated] (Ars Technica) The call that started it all: "Unplug your Alexa devices right now."

Don’t Freak Out About That Amazon Alexa Eavesdropping Situation (WIRED) You should certainly understand the risks of having a smart speaker in your home, but there’s a perfectly good explanation for how that rogue message might have gotten sent.

Peter Cochrane: Our devices know more about us than we think (Computing) It's not just Big Brother that is watching you - increasingly, it's every electronic device we use, warns Peter Cochrane.

Password Formulas Don't Fool Hackers (Lifehacker Australia) Every time we write about passwords on Lifehacker, a few readers share their secret formula for creating passwords. According to Ryan Merchant, senior manager at the password manager Dashlane, those formulas are easy to hack....

Security Patches, Mitigations, and Software Updates

BMW Fixes 14 Vulnerabilities in Connected Cars (Infosecurity Magazine) BMW Fixes 14 Vulnerabilities in Connected Cars. Bugs could have allowed remote control of vehicle

Cyber Trends

About $1.2 billion in cryptocurrency stolen since 2017 - cybercrime group (Reuters) Criminals have stolen about $1.2 billion (0.9 billion pounds) in cryptocurrencies since the beginning of 2017, as bitcoin's popularity and the emergence of more than 1,500 digital tokens have put the spotlight on the unregulated sector, according to estimates from the Anti-Phishing Working Group released on Thursday.

Microsoft CEO on the rise of A.I.: 'The future we will invent is a choice we make' (CNBC) Nadella gave a philosophical response to the major challenges that are currently being faced by tech companies.

Eric Schmidt says Elon Musk is ‘exactly wrong’ about AI (TechCrunch) When former Google CEO Eric Schmidt was asked about Elon Musk’s warnings about AI, he had a succinct answer: “I think Elon is exactly wrong.” “He doesn’t understand the benefits that this technology will provide to making every human being smarter,” Schmidt said.…

20 years on, L0pht hackers return to D.C. with dire warnings (The Parallax) Two decades after presenting at the Senate’s first cybersecurity hearing, veteran L0pht hackers Kingpin, Mudge, Weld Pond, and Space Rogue reflect on progress and urge for much more.

Ransomware Attack Worries Healthcare IT Pros the Most (Health IT Security) A ransomware attack is the type of cyberattack that most worries healthcare IT professionals, according to a survey of 102 HIMSS18 attendees by security firm Imperva.

Most Expensive Data Breaches Start with Third Parties: Report (Dark Reading) Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.


Cybersecurity Requires ‘Insatiable’ Problem-Solving Skills; Technical Skills Can Be Taught (Wall Street Journal) Employers on the hunt for excellent cybersecurity analysts don’t necessarily need to look for candidates with technical skills. What’s more important are the problem-solving skills that you can’t learn in a classroom, panelists at WSJ’s Cybersecurity Executive Forum said Thursday.

Ask the Expert: CH Insurance-Cyber Security for Small Businesses (Central New York Business Journal) High-profile cyber attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber crime. Recent surveys conducted by the Small Business Administration, Symantec, Kaspersky Lab and the National Cybersecurity Alliance suggest that many small-business owners are still operating under a false sense of cyber security.

Malwarebytes acquires Romanian start up Binisoft (SC Media US) Malwarebytes has acquired the privately held Romanian-based security firm Binisoft as part of an overall effort to boost Malwarebytes ability to enhance endpoint security.

WISeKey completes the remaining 15% acquisition of Cybersecurity Company QuoVadis and renames the service WISekey QuoVadis with headquarters in St Gallen, Switzerland (GlobeNewswire News Room) WISeKey International Holding Ltd (SIX: WIHN) (OTCQX: WIKYY), a leading Swiss cybersecurity and IoT company, whose Class B Shares are listed on the SIX Swiss Exchange, announced today that it has completed the full acquisition of the remaining 15% of QuoVadis Holdings Ltd ("QuoVadis"), a leading cybersecurity company with strong focus in next generation Public Key Infrastructure ("PKI"), Certification Authority ("CA") and electronic signature services ("eID"), with operating activities in Switzerland, Germany, the Netherlands, Belgium, the United Kingdom and Bermuda.

Symantec Announces New Privacy & Data Protection Lab in Germany (ReadITQuik) The new location's focus is to provide consumers enhanced control over their personal data and their online

Dave DeWalt Bolsters NightDragon Security Investment Firm with Addition of Industry Veteran Ken Gonzalez as Managing Director (BusinessWire) NightDragon Security, a dedicated cybersecurity investment firm, today announced the appointment of Ken Gonzalez as Managing Director. NightDragon Sec

Products, Services, and Solutions

New infosec products of the week​: May 25, 2018 (Help Net Security) WhiteSource launched its next-generation Software Composition Analysis solutions – Effective Usage Analysis. The technology provides details beyond simply which components are present in the application, delving deeper with actionable insights on how components are being used, highlighting their impact on the security of the application.

Carbon Black, Fortinet unveil joint solution (IT-Online) Next-generation endpoint security provider Carbon Black and Fortinet, which secures enterprise, service provider, and government organisations around the world, have joined forces to provide clients with automated protection against advanced threats and previously unknown malware.

Microsoft will extend GDPR rights to customers worldwide (Help Net Security) Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide.

European users can request a copy of the data Apple keeps on them (Help Net Secuity) Apple has set up a Data and Privacy portal where users can make a request to download all the data Apple has on them, correct their personal information, deactivate or delete their account.

Instapaper on pause in Europe to fix GDPR compliance “issue” (TechCrunch) Remember Instapaper? The Pinterest-owned, read-it-later bookmarking service is taking a break in Europe — apparently while it works on achieving compliance with the region’s updated privacy framework, GDPR, which will start being applied from tomorrow. Instapaper’s notification do…

Pulse Secure Simplifies and Extends Secure Access to Applications and Services in Cloud and Hybrid IT Environments (GlobeNewswire News Room) Pulse Connect Secure 9.0 simplifies multi-cloud connectivity intelligence and protection, extends Secure Access to Amazon AWS and enhances MacOS and Android support

autoGraph Connect Gives Mobile Operators the Tech they Need to Manage GDPR's Stringent Data Privacy Regulations (PR Newswire) autoGraph Inc., a leading provider of privacy compliance and opt-in technology,...

Layered Insight Protects India's Largest Internet Network (PRNewswire) Times Internet, the largest Indian Internet Network, selects Layered Insight to protect it's container applications

Technologies, Techniques, and Standards

NIST Updates Cyber Framework (MeriTalk) The flagship model for organizational cybersecurity policies just got a new coat of paint. The National Institute of Standards and Technology (NIST) on April 16 released version 1.1 of its Framework for Improving Critical Infrastructure Cybersecurity , which updates the agency’s original voluntary cybersecurity framework for critical infrastructure sectors issued in 2014.

Army leaders need more payoff from cyber (Fifth Domain) As the military seeks to better integrate capabilities across the five domains of warfare more seamlessly, operational vignettes provide concrete examples that progress has been made, but more work is required.

How redefining Army intel can help fight high-end adversaries (C4ISRNET) Many senior leaders admit the Army divested a lot of its electronic warfare capability over the last decade-plus, so the service is currently undergoing efforts aimed at injecting capability back into formations.

AF calling for higher standard with cybersecurity (DVIDS) Airman 1st class Belinda Mykham remembers how worried she was when she received the ominous phone call. Then a high-schooler, she was lazily sitting on her black leather couch watching TV when the phone rang.


GDPR and Data Privacy - Now a PhD Subject (Infosecurity Magazine) Infosecurity met with some PhD Students, for whom data protection and the GDPR has become a major part of their research.

Legislation, Policy, and Regulation

GDPR: Today is the day (Help Net Security) We sat down with Jerry Caponera, VP Cyber Risk Strategy, Nehemiah Security, to talk about this important regulation and its wide-ranging impact.

Data protection legislation on the eve of change as GDPR is here (WeLiveSecurity) After years of build-up and countless articles on GDPR and the impact it will have on people and businesses globally we find ourselves on the eve of a major change to data protection legislation.

GDPR is now in force! Read the best resources to prepare (Computing) GDPR is now online and firms need to comply or risk heavy fines. Here are the details you need to ensure you're ready.

GDPR is Here, So What’s Next for Cybersecurity Professionals? (Infosecurity Magazine) The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.

EU’s new data-privacy rule will be felt in the US, too ( Many companies, including those in the US, may find it easier to use European data rules that take effect Friday for all of their customers.

GDPR, WHOIS & the Impact on Merchant Risk Security Monitoring (Dark Reading) The EU's General Data Protection Regulation will make it harder for law enforcement, forensic investigators, and others to track down everything from credit card fraud to child porn rings.

GDPR confusion: it's about direction of travel not hard deadlines (Computing) The 'how to' element is missing from GDPR and this is the cause of much of the angst

'Cyberwarfare is just a reaction’ - Putin 's CHILLING MESSAGE to rest of the world (Express) Vladmir Putin has sent a chilling warning on cyber attacks, telling nations they should set “rules” for international cyberspace behaviour, or face the consequences of their “actions”.

Memo to POTUS: Responding to Cyber Attacks and PPD-20 (The Cipher Brief) Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary … Continue reading "Memo to POTUS: Responding to Cyber Attacks and PPD-20"

Macron defends the European way of tech regulation (TechCrunch) French President Emmanuel Macron gave a speech at VivaTech in Paris, alternating between French and English. He defended a third way to regulate tech companies, which is different from the U.S. and from China. Macron thinks Europe should have a say when it comes to regulation — and it shouldn’t be …

National ID system infringes on right to privacy – solons (Inquirer) Leftist lawmakers on Thursday again warned that the passage of the national identification system bill would pose threats to the country’s security and infringe on people’s privacy rights.

This administration must lead on cyber (TheHill) The recent departure of Tom Bossert, coupled with the announcement that Rob Joyce would be returning to the NSA, leaves a major void in the White House that cannot go unattended.

Putting pressure on Trump, House passes bill barring government from doing business with ZTE (TheHill) The House on Thursday voted to cut off Chinese telecommunications company ZTE from U.S. business dealings, putting pressure on the firm and President Trump.

Huawei, ZTE Get the Boot in House-Passed Defense Bill ( The bill gives federal agencies until 2021 to scrub the Chinese telecoms from their networks.

US considering placing compliance officers inside China's ZTE: Commerce Secretary Ross (CNBC) The U.S. is looking at alternatives to the crippling sanctions threatening Chinese telecom giant ZTE, Commerce Secretary Wilbur Ross says.

Congress Passes Bill to Reduce Synthetic Identity Fraud (Infosecurity Magazine) Congress moves to protect the privacy of minors and other vulnerable consumers.

Tech companies to disclose foreign software probes under US Bill: Report (ZDNet) New source code disclosure rules could force US tech companies to reveal whether they allowed Chinese or Russian examination of software sold to the US military, Reuters has reported.

Litigation, Investigation, and Law Enforcement

Gamers involved in December’s “swatting” death just got indicted (Ars Technica) Gamers charged with obstruction for deleting possibly incriminating messages.

3 Charged In Fatal Kansas ‘Swatting’ Attack (KrebsOnSecurity) Federal prosecutors have charged three men with carrying out a deadly hoax known as “swatting,” in which perpetrators call or message a target’s local 911 operators claiming a fake hostage situation or a bomb threat in progress at the target’s address — with the expectation that local police may respond to the scene with deadly force.

Barriss, at center of fatal Wichita 'swatting,' also charged with D.C. bomb threats ( On Thursday, a federal court unsealed an indictment against Tyler Barriss of Los Angeles, accusing him of making threats against government buildings in Washington, D.C.

Facebook, Google face first GDPR complaints over “forced consent” (TechCrunch) After two years coming down the pipe at tech giants, Europe’s new privacy framework, the General Data Protection Regulation (GDPR), is now being applied — and long time Facebook privacy critic, Max Schrems, has wasted no time in filing four complaints relating to (certain) companiesR…

Privacy International Launches GDPR Probe into Data Companies (Infosecurity Magazine) Privacy International Launches GDPR Probe into Data Companies. Group believes behind-the-scenes data hoarders could be breaking the new law

Federal Judge Obliterates Fusion GPS' Attempt To Hide Info (The Federalist) In Fusion GPS' vague telling, they've been nothing but forthright with congressional investigative committees, which came as news to those committees.

Don't Lose Sight of the Russian Threat to American Democracy (The Cipher Brief) It has now been 18 months since the November 2016 presidential election, during which the U.S. intelligence community believes Russia acted not only to interfere with U.S. elections, but with clear preference for one of the candidates. However, Washington and many of America’s leaders are still not on the same page regarding both the facts …

Leaked Documents Show Facebook’s Post-Charlottesville Reckoning with American Nazis (Motherboard) After a white supremacist killed a protester in Charlottesville in 2017, Facebook pushed to re-educate its moderators about hate speech groups in the US, and spell out the distinction from nationalism and separatism, documents obtained by Motherboard show

Twitter unveils new political ad guidelines set to go into effect this summer (TechCrunch) Following the unrelenting wave of controversy around Russian interference in the 2016 presidential election, Twitter announced new guidelines today for political advertisements on the social networking site. The policy, which will go into effect this summer ahead of midterm elections, will look tow…

2 million stolen identities used to make fake net neutrality comments (Naked Security) Most crucially, two of those identities were senators who are now demanding the FCC find out who’s behind the bots and the identity theft.

U.S. Launches Criminal Probe into Bitcoin Price Manipulation (Bloomberg) The Justice Department has opened a criminal probe into whether traders are manipulating the price of Bitcoin and other digital currencies, dramatically ratcheting up U.S. scrutiny of red-hot markets that critics say are rife with misconduct, according to four people familiar with the matter.

The ICO has only collected half of data breach fines since 2010 (Computing) Companies have gone into liquidation to avoid big penalties, and the ICO has no power to stop them

Uber Self-Driving Car That Struck, Killed Pedestrian Wasn’t Set to Stop in an Emergency (Wall Street Journal) An Uber self-driving car involved in a fatal crash in Arizona identified an object on the road six seconds before impact and didn’t determine the need for emergency braking until nearly five seconds later.

FBI Taps Private Industry to Bring Down Hacker Clearinghouse (Voice of America) The takedown of malware scanning service Scan4You shows how the FBI and private cybersecurity firms have started teaming up in major cybercrime investigations

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations...

Cyber:Secured Forum (Denver, Colorado, USA, June 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively...

Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, June 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign...

Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, June 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience...

Securing Federal Identity (Washington, DC, USA, June 5 - 6, 2018) Securing Federal Identity 2018, a highly focused and high-energy event, will feature an in-depth view of the future of federal government policies and technology developments for securing federal identity...

New York State Cybersecurity Conference (Albany, New York, USA, June 5 - 7, 2018) June 2018 marks the 21st annual New York State Cyber Security Conference and 13th Annual Symposium on Information Assurance (ASIA). Hosted by the New York State Office of Information Technology Services,...

The Cyber Security Summit: Boston (Boston, Massachusetts, USA, June 5, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts.

SecureWorld Chicago (Chicago, Illinois, USA, June 5, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

NSA 2018 Enterprise Discovery Conference (Ft. Meade, Maryland, USA, June 5 - 6, 2018) Hosted by the National Security Agency and the Federal Business Council (FBC). The EDC is the largest event held at NSA with over 1500 attendees from around the world. EDC provides a collaborative learning...

Cyber//2018 (Columbia, Maryland, USA, June 6, 2018) Cyber touches all aspects of our life from the myriad of devices we have brought into our homes to those we employ on the job to increase and improve our productivity. Please join us for our 9th annual...

TU-Automotive Cybersecurity (Novi, MIchigan, USA, June 6 - 7, 2018) Co-located with the world's largest automotive technology conference & exhibition. The conference unites players from research labs, automakers, tier 1’s, security researchers, and the complete supply...

SINET Innovation Summit 2018 (New York, New York, USA, June 7, 2018) Connecting Wall Street, Silicon Valley and the Beltway. SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration...

Transport Security and Safety Expo (Washington, DC, USA, June 11 - 12, 2018) Security incidents are expected to cost the world $6 trillion annually by 2021, making now the time to find out more at the 2018 Transport Security and Safety Expo. The transportation industry is rapidly...

Transport Security & Safety Expo (Washington, DC, USA, June 11 - 12, 2018) The conference is devoted to the challenges and opportunities surrounding ensuring the safety and security of passengers and cargo in the digital age.

Dynamic Connections 2018 (Palm Springs, California, USA, June 12 - 14, 2018) Together with you, our customers and partners, we’ll come together for 2 ½ days to learn, explore and create the possible at Dynamic Connections 2018 (DC18). To get ahead of the most critical, most pervasive...

Norwich University Cyber Security Summit (Northfield, Vermont, USA, June 18 - 20, 2018) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the second annual Cyber Security Summit in June 2018. The summit, presented in a continuing education format,...

Insider Threat Program Management With Legal Guidance Training Course (Tyson's Corner, Virginia, USA, June 19 - 20, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance...

GovSummit (Washington, DC, USA, June 27 - 28, 2018) GovSummit -- the government security conference hosted annually by the Security Industry Association -- brings together government security leaders with private industry technologists for top-quality information...

The Cyber Security Summit: DC Metro (Tysons Corner, Virginia, USA, June 28, 2018) Learn from cyber security experts from The U.S. Department of Justice, The NSA, Pulse Secure, CenturyLink and more as they brief you on the latest security threats facing your business. This event is...

Impact Optimize2018 (Rosemont, Illinois, USA, June 28, 2018) Impact Optimize2018, the first-ever IT and Business Security Summit hosted by Impact, will provide attendees with actionable steps that enable the betterment of information, network and cybersecurity.

Nuclear Asset Information Monitoring and Maintenance (Warrington, England, UK, July 3 - 4, 2018) On July 3rd and 4th in Warrington United Kingdom, nuclear industry leaders will meet for the IoE Events Nuclear Asset Information, Monitoring and Maintenance conference to further develop the sector’s...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.