skip navigation

More signal. Less noise.

Optimize your security teams with threat intelligence.

At Recorded Future, we believe every security team can benefit from threat intelligence. That's why we've launched our new Threat Intelligence Grader — so you can quickly assess your organization's threat intelligence maturity and get best practices for improving it. Get your Threat Intelligence Score™.

Daily briefing.

Facebook says that so far it's seen no evidence of illicit sign-ons to third-party apps. There have been concerns that the social media platform's Facebook Login feature would expose applications to fraud or hijacking. Irish authorities (the "one-stop shop" for Facebook with respect to GDPR enforcement) are proceeding with their investigation of the breach.

Cofense warns users of the free Zoho Office Suite that they're at risk of data exfiltration attacks. Criminals have opened multiple keylogging campaigns that exploit the product. 

High-profile Instagram users, "influencers," are being subjected to an account hijacking campaign in which criminals are holding the victims' accounts for ransom.

Radware and Qihoo 360 are independently tracking a very large botnet that's intercepting traffic destined for Brazilian banks.

Tenable warns that widely-used TP-Link TL-WR841N consumer routers are susceptible to attacks that concatenate a series of flaws to obtain control over the devices. TP-Link has yet to fix the vulnerable firmware.

Several companies have patched their widely used products. Adobe has fixed eighty-five issues (forty-seven of them critical) in Acrobat and Reader. Google has addressed six critical remote code execution vulnerabilities in the Android operating system. Mountain View has also put measures in place to introduce more privacy and security into app development.

There are Fortnite cheats circulating in instructional videos posted to YouTube. Players who attempt to use them are likely to be infected with malware for their troubles. There's similar stuff on offer through Instagram posts. Don't cheat. (And the cheats wouldn't improve your dance anyway.)


Today's issue includes events affecting Australia, Brazil, Canada, China, European Union, France, Ireland, Israel, New Zealand, Russia, Saudi Arabia, United Kingdom, United States.

Create a culture of cybersecurity awareness with Coachable Moments.

According to The Ponemon Institute, two out of three insider threat incidents are caused by employee or contractor mistakes. The good news is, these mistakes can easily be avoided ... with the right coaching. Just in time for Cybersecurity Awareness Month, the Coachable Moments series from ObserveIT gives cybersecurity teams the tools they need to empower people to understand the policies and best-practices intended to keep them safe. Check out Coachable Moments today to learn more.

In today's podcast, we speak with our partners at Webroot: David Dufour discusses the evolution of online games into social networks, and what that means for security. (We do not address the big question, however, which would be, is the Fortnite dance really just a virtual Charleston?) Our guest, Michael Feieretag from tCell, presents the results from their Q2 incident report.

CyberMaryland Job Fair on October 9 in Baltimore, MD. (Baltimore, Maryland, United States, October 9, 2018) Cleared and non-cleared cybersecurity pros make your next career move at the CyberMaryland Job Fair, October 9 in Baltimore. Meet leading cyber employers including Bank of America, FireEye, NSA, Raytheon, USCYBERCOM and more. Visit ClearedJobs.Net or for more details.

Cyber Security Summits: October 16 in Phoenix and on November 29 in Los Angeles (Phoenix, Arizona, United States, October 16, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, The CIA, Verizon, AT&T, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350)

Cyber Attacks, Threats, and Vulnerabilities

Facebook Login Update (Facebook Newsroom) Our investigation has so far found no evidence that the attackers accessed any apps using Facebook Login.

The Facebook Hack Exposes an Internet-Wide Failure (WIRED) Major sites using Facebook's Single Sign-On don't implement basic security features, potentially making the fallout of last week's hack much worse.

Darktrace commente la faille de sécurité de Facebook (Global Security Mag Online) Suite à l’actualité relative à l’incident de sécurité chez Facebook, Emily Orton, directrice et cofondatrice de Darktrace, commente :

U.S. intelligence officials question Canada’s ability to test China’s Huawei for security breaches (The Globe and Mail) Senior officials reportedly laugh at declaration that Canada possesses sufficient safeguards to address risks posed by telecom giant

Nielsen warns of Chinese influence campaign, but not with midterms (Fifth Domain) US officials warn that China is undergoing a long-term influence campaign, and the country has one of the most invasive signals intelligence capabilities

Government agents likely affiliated with Saudi Arabia spying on dissident in Canada, Citizen Lab alleges (The Globe and Mail) According to the organization, the goal was to capture the iPhone communications of a 27-year-old Quebecker named Omar Abdulaziz , a dissident Saudi activist with a large social-media presence and who is publicly critical of the regime

Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration (Threatpost) The free online office suite software is used by more than 30 million people and is a ripe target for criminals.

DanaBot Gains Popularity and Targets US Organizations in Large Campaigns (Proofpoint) Proofpoint researchers describe new campaigns using the DanaBot banking Trojan.

Torii makes botnet watchers look twice and think plenty about IoT security (TechExplore) A botnet of a special nature is alive and well. Type of damage? Exfiltration of information; commands and executables via "multiple layers of encrypted communication."

Popular TP-Link wireless home router open to remote hijacking (Help Net Security) By concatenating a known authentication flaw with a newly discovered CSRF vulnerability, attackers can take over TP-Link TL-WRN841N wireless home routers.

Gigantic 100,000-strong botnet used to hijack traffic meant for Brazilian banks (ZDNet) Botnet redirects hijacked traffic to over 50 active phishing sites.

BlackVue dashcams share cars' mapped GPS locations, stream video feeds (CSO Online) Thanks to default cloud settings, BlackVue dashcam customers may be live-streaming video and audio from their vehicles, as well as having their location mapped.

Fortnite Cheaters Tempted with Data-Stealing Malware (Infosecurity Magazine) Fortnite Cheaters Tempted with Data-Stealing Malware. Researcher warns of booby-trapped YouTube vid

Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram (Naked Security) The gaming and hacking communities overlap: Some of the hacker accounts are offering botnet access as well as Fortnite accounts.

Hackers demand ransom from hijacked Instagram influencers (Naked Security) Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, revealed reports this week.

Lock screen bypass already discovered for Apple’s iOS 12 (Naked Security) Apple’s iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a device’s contents.

When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference? (KrebsOnSecurity) A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it.

Canadian restaurant chain suffers country-wide outage after malware outbreak (ZDNet) Some restaurant locations were temporarily shut down due to the IT outage, others continued to serve customers.

Cisco’s WebEx Teams still wobbling, a week after wipeout (CRN Australia) Bright Sparks still trying to fix it all, but the flame is sputtering.

Midland back to normal operations following cyber attack (Barrie) Operations have been restored in the town of Midland one month after a sophisticated cyber-attack froze the town’s financial processing systems.

Security Patches, Mitigations, and Software Updates

Google Patches Critical Vulnerabilities in Android OS (Threatpost) The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.

Google to make Chrome extensions safer and privacy-preserving (Help Net Security) Google has announced security changes in the Chrome extensions system that will definitely make Chrome extensions safer in the near future.

Google’s new rules for developers make Chrome extensions safer for all (Naked Security) Google has announced a range of security changes to its Chrome browser that will make the use of extensions more secure.

Update now: Adobe fixes 85 serious flaws in Acrobat and Reader (Naked Security) Adobe has released updates fixing a long list of security vulnerabilities discovered in the Mac and Windows versions of Acrobat and Reader.

Adobe fixes 47 critical flaws in Acrobat and Reader (Help Net Security) Adobe security updates October 2018 have been released. They fix a prodigious amount of critical (47) and important (39) vulnerabilities.

Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws (Threatpost) Foxit users should update to Reader 9.3 and Foxit PhantomPDF 9.3 to fix the more than 100 vulnerabilities.

Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader (Help Net Security) Cisco Talos researcher Aleksandar Nikolic discovered 23 vulnerabilities in Foxit PDF Reader, a popular, free program for viewing, creating and editing PDFs.

Some Apple laptops shipped with Intel chips in "manufacturing mode" (ZDNet) Apple fixed issue with an update released in June but other OEMs may also be affected.

Cyber Trends

The Future of War Will Be 'Liked' (Foreign Policy) In the social media age, what you share is deciding what happens on the battlefield.

New study finds 5 of every 6 routers are inadequately updated for security flaws (ZDNet) Consumer group blames open source libraries and the lack of auto-update mechanisms.

Network Security Threat Assessment (BluVector) In July of 2017, The ABC CO Health Group’s information security team requested a Network Threat Assessment provided by BluVector.

Insiders cause more than 50% of data breaches, reveals Netwrix IT Risks Report (Netwrix) In terms of main threat actors, expectation rarely matches reality, because most incidents were caused by insider mistakes rather than hacker attacks, as assumed by most respondents.

2018 Cybersecurity Trends Research (CompTIA) Free download of CompTIA's official industry analysis on 2018 trends in Cybersecurity. Learn about the new innovations and opportunities happening this year.

New Trends Take Off in the Cybermarket (Government Technology) New technologies have emerged to help fortify cyberdefenses. Will they work for government?

Students swap data for coffee at cashless cafe (Naked Security) In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.

How to Make This the Summer of Missing Out (New York Times) What’s happening? Who cares. Meet JOMO, FOMO’s benevolent younger cousin.

Most people suffer from ‘phantom vibration syndrome’ (The Independent) The syndrome is said to be caused by 'learned bodily habits' and anxiety caused by daily technologies

Microsoft report reveals top 3 cyberthreats in Saudi Arabia (Arab News) DUBAI: Digital transformation will generate an extra $16.9 billion in revenue each year for the Middle East between now and 2021, according to Microsoft. Because of this, Saudi Arabia has become an enticing target for cybercriminals because of insecure consumer habits and inadequate security measures, the company’s cybersecurity study has revealed. The study highlights top three kinds of cyberthreats the Kingdom faces.

Cyberattacks Are Becoming A Greater Challenge For The Energy Industry (Forbes) Cyber adversaries have increasing incentives and opportunities to target critical energy infrastructure. Shoring up infrastructure industries is critical not just because cyber adversaries have more and more motives for attacks, but today’s expanding attack landscape, adds urgency to the situation.


Huawei begs FCC for 5G role, claiming delayed deployment and higher prices (VentureBeat) Huawei is lobbying the FCC to reconsider its opposition, claiming that 5G deployments will be delayed and prices will be higher without its participation.

Security startup Tanium raises another $200M at a $6.5B valuation (TechCrunch) Security continues to remain top of mind for organizations and consumers, as each day seems to bring another high-profile network breach. One of the faster-growing startups in the space is capitalising on that by raising some significant funding to fuel its growth. Tanium today said that it has rai…

Palo Alto Networks to acquire RedLock for $173 M to beef up cloud security (TechCrunch) Palo Alto Networks launched in 2005 in the age of firewalls. As we all know by now, the enterprise expanded beyond the cozy confines of a firewall long ago and vendors like Palo Alto have moved to securing data in the cloud now too. To that end, the company announced its intent to pay $173 [&hellip…

Hysolate Secures $18M Series B Round for Disruptive Cybersecurity Isolation Platform (Hysolate) Revolutionizing the Endpoint

CloudKnox Launches Cloud Security Platform to Control the Most Significant Risk for Hybrid-Cloud Environments – Overprivileged Identities (BusinessWire) CloudKnox Security today launched with $10.75 million in funding led by ClearSky Security with participation from Dell Technologies Capital and Founda

Exostar acquires Pirean to simplify data, clinical application access (Outsourcing Pharma) The identity and access management firm Exostar has acquired UK-headquartered Pirean Limited to provide the pharma industry with simplicity, speed, and security, says VP.

Cisco closes on $2.35 billion acquisition of Duo Security (Crain's Detroit Business) Experts expect the deal announced in August to have cascading, ripple effects in the burgeoning tech startup hub of Ann Arbor and the wider region.

Raytheon announces partnerships to bring advanced technology to critical infrastructure cybersecurity (PR Newswire) Raytheon Company's (NYSE: RTN) Intelligence, Information and Services business announced two partnerships to enhance...

R9B Expands International Operations into Canada (R9B) The move will deepen existing relationships with Canadian government and private industry.

Products, Services, and Solutions

Twitter bans distribution of hacked materials ahead of US midterm elections (ZDNet) Twitter announces three new major rule changes to its site rules and policies.

Denim Group Recognized as a Trusted Election Security Advisor to Help States Prepare for the Prospect of Nation-State Interference (BusinessWire) As the mid-term elections draw near, Denim Group continues outreach and advising of state and local officials, helping them outline the steps they sho

Humio Powers New Syntax Managed Cloud Security Solution With Real-Time Ability To Monitor, Alert And Investigate Compromises (PR Newswire) Humio, the only log management solution offering real-time, limitless logging capabilities with instant accessibility to...

Cisco and EfficientIP Join Forces to Tackle ‘DNS-deep’ Cyber Threats (PRWeb) EfficientIP, a leading provider of network security and automation solutions, specializing in DDI (DNS-DHCP-IPAM), today announced it is combining its techno

FireEye Helix Moves Toward Automating Security Operations « FireEye Helix Moves Toward Automating Security Operations (FireEye) Next-generation security information and event management (SIEM) capabilities will now be native features in FireEye Helix.

FireEye to launch marketplace for tools and apps (CRN Australia) FireEye Market to launch in the second half of 2018.

RANK Software Delivers New Capabilities to Hunt for Cyber Attacks in Real-Time (GlobeNewswire News Room) New Support for Third Party Tools and Techniques Increases Speed and Accuracy of Preventing Attacks

Detect, Investigate and Act on All Threats Faster with Splunk Security Solutions (MarketWatch) Splunk Ecosystem Puts the Operations Back in the Security Operations Center

Lockpath Introduces Keylight 5.1 Platform (PR Newswire) Lockpath, a leading provider of integrated risk management solutions, today announced the release of Keylight ...

Splunk channel to sprout OEM and SI program (CRN Australia) The rest of you get a mobile app and new products to play with.

Aerohive introduces Client 360, machine-learning, client-comparative analytics (Help Net Security) Aerohive Networks' Client 360 provides IT with client-comparative analytics to verify or troubleshoot the client experience.

Waratek Secure Provides Fast and Accurate Protection Against Common Attacks and Zero Days (PR Newswire) Waratek, the compiler-based application security company, has announced a new, stand-alone lightweight runtime ...

AdaptiveMobile Security Introduces Commercial Traffic Management (ReadITQuik) The company noted that the A2P SMS market is expected to be worth $26.61 billion in 2022, which translates into an opportunity for carriers and aggregators to introduce supplementary management and analytics to these messages to make sure that A2P messages are distinguished as well as priced appropriately on the basis of their value to the sender.

Dashlane password manager adds VPN protection for total online security (Cult of Mac) The powerful Dashlane password manager just got a security boost. A newly added VPN feature makes sure all your online sessions are safe.

NYC Launches First-Of-Its-Kind Mobile Threat Detection App (BusinessWire) New York City Cyber Command announced today that it has launched NYC Secure, a free mobile threat protection app for New Yorkers.

EclecticIQ delivers curated and structured intelligence with Fusion Center Intelligence Bundles (PR Newswire) EclecticIQ, which empowers cyber defenses with Threat Intelligence, today announced at FS-ISAC European Summit the...

Ziften Enters United Kingdom (UK) and Ireland with Endpoint Protection Platform; Partners with Microsoft Windows Defender ATP Specialist Threatscape (PR Newswire) Ziften, a leader in endpoint protection plus visibility and hardening, today announced its entry into the UK and Irish...

Google’s cyber unit Jigsaw introduces Intra, a new security app dedicated to busting censorship (TechCrunch) Jigsaw, the division owned by Google parent Alphabet, has revealed Intra, a new app aimed at protecting users from state-sponsored censorship. Intra is a new app that aims to prevent DNS manipulation attacks. Whenever you visit a website, the easy-to-remember web address is converted to a less-than…

Anti-spam service Truecaller is now a messaging app too (TechCrunch) Truecaller, the app that helps screen spam calls and messages, is becoming a chat app as it continues to develop into a social service. The company announced today that it is introducing a chat feature to its Android and iOS apps, although it is already live for Android beta users. The move follows…

Technologies, Techniques, and Standards

Infrastructure providers should re-examine their contracts under the lens of NIS (Computing) Companies must inform the ICO of incidents, but that doesn't apply to their cloud providers,Cloud and Infrastructure ,Cloud and Infrastructure,Infrastructure provider,Cloud and Infrastructure Summit,Kuan Hon,Notification

FDA Reveals Steps to Bolster Medical Device Cybersecurity (GovInfo Security) In its ongoing quest to improve the state of medical device cybersecurity, the FDA has announced a number of key moves - including the release of a security

Latest Building Security In Maturity Model reflects software security initiatives of 120 firms (Help Net Security) BSIMM9 highlights impact of cloud transformation and growth of software security community. It reflects data collected of real-world SSIs across 120 firms.

You gotta fight, for your right, to erasure (Help Net Security) The right to erasure grants any user or customer the right to request that an organization deletes all data related or associated to them without delay.

How Many Daily Cybersecurity Alerts does the SOC Really Receive? (Bricata) The security operations center (SOC) is drowning in cybersecurity alerts.

How to minimize the negative effect of mobile device loss or theft (Help Net Security) When it comes to personal devices, you must react quickly, especially if you made the critical mistake of not securing your device with a strong passphrase.

How to have that difficult “stay safe online” conversation with your kids (Naked Security) As your children start using the internet with greater independence, help keep them – and their data – safe with these simple tips.

The Army is working toward a cyber domain doctrine (Fifth Domain) Cyber demands rules of engagement and concepts of operations just like those that exist for the other domains, and the Army is leading the way to establish the needed doctrine.

Jargon Buster Guide to Post Quantum Cryptography ( This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

Cybercriminals are using blockchain to improve security. Should you? (CSO Online) Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

Design and Innovation

Honda to Invest in GM’s Self-Driving Car Unit GM Cruise (Wall Street Journal) Honda is investing $2.75 billion in General Motors’s self-driving car unit, a move that comes as the transportation landscape is swiftly being reshaped by technology.

Research and Development

An eminent mathematician claims to have solved one of math's greatest mysteries — and it's one of 6 problems with a $1 million prize (Business Insider) In 2000, the Clay Mathematics Institute released a set of seven of the most important problems in modern mathematics, with a million dollar prize attached to each. Six remain unsolved.

Existence and Smoothness of Navier-Stokes Equations (ArXiv) In this paper we propose new method for proving of global solutions for 3D Navier-Stokes equations. This complies an application to the Clay Institute Millennium Prize Navier Stokes Problem. The proposed method can be applied for investigation of global solutions for other classes of PDEs.

Legislation, Policy, and Regulation

Europe is drawing fresh battle lines around the ethics of big data (TechCrunch) It’s been just over four months since Europe’s tough new privacy framework came into force. You might believe that little of substance has changed for big tech’s data-hungry smooth operators since then — beyond firing out a wave of privacy policy update spam, and putting up …

U.S., Montenegro conduct groundbreaking cyber defense cooperation (U.S. Cyber Command) U.S. service members worked alongside cyber defenders within the Government of Montenegro over the past few weeks to build cyber defense capabilities. U.S. Cyber Command Airmen, in cooperation with

How Russia and China Undermine Democracy (Foreign Affairs) Both Russia and China view weakening Western democracy as a means of enhancing their own standing.

Is the U.S. Using Sanctions Too Aggressively? (Foreign Affairs) The United States’ use of sanctions has exploded over the past decade. An analysis by the law firm Gibson Dunn found that President Donald Trump’s administration added nearly 1,000 people, companies, and entities to U.S. sanctions lists during 2017, nearly 30 percent more than the number added during former President Barack Obama’s last year in office.

How the US cyber force is maturing (Fifth Domain) U.S. Cyber Command is moving past building to operational readiness.

The Five Eyes Statement on Encryption: Things Are Seldom What They Seem (Lawfare) The statement is an effort by the intelligence alliance to show support for a new Australian proposal on lawful access to encrypted devices. But it ignores technical realities—and certain important signatures are missing.

Bill Text - SB-1001 Bots: disclosure.SB1001:v92#DOCUMENT (California Legislative Information) An act to add Chapter 6 (commencing with Section 17940) to Part 3 of Division 7 of the Business and Professions Code, relating to bots.

The Army has a new deputy for information and networks (C4ISRNET) The U.S. Army announced Gregory L. Garcia as the service’s new deputy chief information officer/G-6, a move that fills the Army’s highest civilian IT position

Litigation, Investigation, and Law Enforcement

Un policier de la DGSI écroué pour vente d’informations confidentielles (Le Parisien) Sur le Darknet, le gardien de la paix était notamment en contact avec des membres du crime organisé.

French police officer caught selling confidential police data on the dark web (ZDNet) Police officer also advertised a system to track the location of buyers' gang rivals or spouses based on the telephone numbers.

Facebook could face $1.63bn fine under GDPR over latest data breach (ZDNet) Facebook was fined £500,000 under the Data Protection Act for the Cambridge Analytica scandal but may not get away so lightly this time.

Irish regulator set to probe Facebook over cyber attack under GDPR (Financial Times) Facebook disclosed on Friday that hackers had stolen keys that allowed them to access up to 50m user accounts © PA

Data protection watchdog criticises Facebook as investigation continues (The Telegraph) A data protection watchdog has criticised Facebook for failing to provide adequate information about a security breach that has compromised the personal details of millions of people.

High Court Rules in Favour of Glasswall in Defence of the Validity of its Core Patent in an Action Brought by Clearswift (Glasswall Solutions) The High Court, has dismissed the challenge brought by Clearswift, a subsidiary of RUAG, against the first-family patent of Glasswall, a leading UK and global cyber security company. The specialist Patents Court endorsed Glasswall’s case, ruling the patent valid and …

Suspect forced to unlock iPhone with his face (Naked Security) The order so far hasn’t raised Fifth Amendment objections either, your face being something you are, rather than something you know.

CEO who sold phones with “totally unbreakable encryption” takes plea deal (Ars Technica) Phantom Secure's Vincent Ramos to be sentenced soon; colleagues remain at large.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

COSAC & SABSA World Congress (Kildare, Ireland, September 30 - October 4, 2018) For 25 years COSAC has delivered a trusted environment in which to deliver information security value from shared experience and intensive, productive, participative debate and development. Sales content...

Cyber Defense Summit 2018 (Washington, DC, USA, October 1 - 4, 2018) FireEye's annual Cyber Defense Summit will feature both training and an opportunity to hear from the experts. Introductory, intermediate and advanced training courses will be provided during the first...

Retail Cyber Intelligence Summit (Denver, Colorado, USA, October 2 - 3, 2018) Network with 250+ CISOs and their teams from retail and consumer facing industries: restaurants, hospitality, gaming, convenience, grocery and more. Share best practices, gain insights, network. This conference...

IP Expo Europe (London, England, UK, October 3 - 4, 2018) IP EXPO Europe is Europe's number ONE IT event for those looking to find out how the latest IT innovations can drive their business forward. IP EXPO Europe is co-located at Digital Transformation EXPO...

Borderless Cyber USA 2018 (Washington, DC, USA, October 3 - 5, 2018) How do you future proof your cybersecurity strategy? Can you identify and report cyber incidences so you can respond quickly to manage consequences? Public and private sector cyber experts from across...

Borderless Cyber USA (Washington, DC, USA, October 3 - 5, 2018) Automation, people, information sharing, intelligence, risk and the economics of risk have been identified as key cybersecurity strategy measures to focus on in order to keep pace with modern threats.

MSPWorld® Peer Group & Data Analytics Summit (Las Vegas, Nevada, USA, October 4 - 5, 2018) The MSPWorld® Peer Group & Data Analytics Summit is a revolutionary new concept for the managed services executive. Accessible only by MSPs, this conference will focus on small, peer lead groups exchanging...

4th International Cybersecurity Forum, HackIT 4.0: Exploit Blockchain (Kiev, Ukraine, October 8, 2018) The 4th International Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 – 11, CEC Parkovy, Kyiv, Ukraine. The annual Hacken Cup – the onsite bug bounty marathon – happens on October...

4th European Cybersecurity Forum – CYBERSEC (Krakow, Poland, October 8 - 9, 2018) CYBERSEC Forum is an unique opportunity to meet and discuss the current issues of cyber disruption and ever-changing landscape of cybersecurity related threats. Our mission is to foster the building of...

4th European Cybersecurity Forum – CYBERSEC (Krakow, Poland, October 8 - 9, 2018) CYBERSEC is a public policy conference dedicated to strategic aspects of cyberspace and cybersecurity. CYBERSEC 2017 brought together record-breaking 150 speakers and more than 1,000 delegates from all...

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, USA, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices,...

CyberMaryland 2018 (Baltimore, Maryland, USA, October 9 - 10, 2018) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private...

HoshoCon 2018 (Las Vegas, Nevada, USA, October 9 - 11, 2018) Over 3 days, attendees will gain firsthand knowledge about blockchain security. You are invited to converse with technologists working on blockchain and cryptocurrency projects, hear key insights from...

U.S. Department of Transportation Cybersecurity Symposium (Washington, DC, USA, October 9 - 10, 2018) The U.S. Department of Transportation (DOT) Cybersecurity Symposium is 2 days of training sessions and educational seminars focused on the mission of protecting government networks and privacy. Hosted...

SecureWorld Dallas (Dallas, Texas, USA, October 10 - 11, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.