skip navigation

More signal. Less noise.

Who Ya Gonna Call? Threatbusters!

The threat intelligence event of the year is just around the corner—Detect '18! Join team ANOMALI and your fellow professionals at the Gaylord National Resort & Convention Center September 19-21, 2018 in National Harbor, Maryland for timely education and training on today’s most compelling, relevant threat intelligence topics, breakout sessions designed for all levels of experience, and insights from compelling customer presentations highlighting real-world threat intelligence big data issues. Register today!

Daily briefing.

CrowdStrike has confirmed claims by Intrusion Truth that APT 10 (also known as Stone Panda) is operated by the Tianjin Bureau of China's Ministry of State Security. Intrusion Truth, described as "shadowy," represents itself as a hacktivist group dedicated to exposing Chinese intelligence.

Zscaler researchers are tracking a spam campaign that directs users to .tk sites (the national top-level domain for Tokelau) in the service of, for the most part, an ad-fraud campaign. Zscaler estimates the ad fraud brings in more than $20 thousand a month, and other associated scams pull in additional revenue. Tokelau, which allows anyone to register a domain, has a population shy of fifteen hundred but the largest presence on the Internet.

Two implausible scams are circulating. One, a celebrity advance-fee come-on, tells the gullible that Pope Francis wants to give away a small fortune in Bitcoin. The other, crude ransomware, displays the face of former President Obama and represents him as declaring that he's encrypted your files, but that he'll recover them for you in exchange for "a tip." It should be, but isn't, needless to say that neither the current Pope nor the former President are involved in any of this.

Check Point researchers have found, and made available, a decryptor for RansomWarrior ransomware.

On Wednesday the US Congress will hold hearings on the tech industry. They're interested in political influence, privacy, and monopolistic practices. The Senate Intelligence Committee will interrogate Facebook, Twitter, and Google. The House Commerce Committee will confine itself to Twitter.


Today's issue includes events affecting Australia, China, Cuba, European Union, Israel, Republic of Korea, Lebanon, Qatar, Philippines, Russia, Tokelau, United Arab Emirates, United Kingdom, United States.

Leaving trails when you do online research?

Traditional browsers betray you by revealing your identity.  Security teams who use a cloud browser manage attribution and can reduce the time spent investigating cases by more than 50%. Instead of wasting time spinning up a VDI, using Tor or connecting to a jumpbox, get online in seconds with Authentic8 Silo, a secure cloud browser and egress from hundreds of points of presence around the world.

In today's podcast, we speak with our partners at Terbium Labs, as Emily Wilson offers a look back at the effects of last year’s Alpha Bay takedown.

IR18: Don’t Forget to Register for the first and only community-driven IR conference! Built by the community, for the community. (Arlington, Virginia, United States, September 5 - 6, 2018) IR18 is a conference for cybersecurity professionals to learn and develop playbooks to improve incident response processes. Receive 20+ hours of practical training on today’s best practices in IR topics, including 36 breakout sessions designed for all levels of experience.

Rapid Prototyping Event: The Chameleon and the Snake (Columbia, Maryland, United States, September 17 - 20, 2018) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM, is hosting a Rapid Protoyping Event that specifically targets malware signature diversity and signature measurement for Microsoft Windows in a simulated operational environment at a realistic pace. Join us September 17-20, 2018 at UMBC Training Center in Columbia, MD.

The force is stronger when MSPs and MSSPs come together. (Webinar, September 19, 2018) The managed service market has grown tremendously, with the demand for managed security being unprecedented. For managed service providers (MSPs) looking to answer those demands, partnering with a managed security services provider (MSSP) expands access to highly-skilled cyber security analysts and a full suite of security solutions. Join Delta Risk’s webinar, September 19 at 1 PM ET, to learn how the two sides can join forces.

FireEye Cyber Defense Summit 2018 (Washington, DC, United States, October 1 - 4, 2018) Get trained by a FireEye expert at our annual Cyber Defense Summit. Training opportunities at this event offer attendees hands-on, small-group, interactive sessions with some of the most experienced FireEye cyber security experts.

5th Annual Cyber Security Conference for Executives (Baltimore, Maryland, United States, October 2, 2018) The 5th Annual Cyber Security Conference for Executives, hosted this year by The Johns Hopkins University Information Security Institute and Ankura, will be held on Tuesday, October 2nd, in Baltimore, Maryland. This year’s theme is cybersecurity compliance and regulatory trends, and the conference will feature discussions with thought leaders across a variety of sectors. Join the discussion and learn about current and emerging cyber security threats to organizations, and how executives can better protect their enterprises. To receive the early-bird rate, register now!

Dragos Industrial Security Conference (DISC) 11/5/18 (Hanover, Maryland, United States, November 5, 2018) Reserve your spot now for the Dragos Industrial Security Conference (DISC) on November 5th, 2018. DISC is a free, annual event for our customers, partners, and those from the ICS asset community. Visit for more information.

Cyber Attacks, Threats, and Vulnerabilities

Chinese hacker group targets tech supply chain, report says (FCW) New evidence of a Chinese hacking group's links to Beijing could give U.S. investigators new ammunition to crack down on economic espionage and threats to the technology supply chain.

CrowdStrike verifies portions of report linking APT10 activity to Chinese government actors (SC Media US) Researchers with CrowdStrike yesterday partially confirmed reports from the mysterious APT-hunting group Intrusion Truth, verifying several findings that a

China’s Muslim Crackdown Extends to Those Living Abroad (Wall Street Journal) Chinese Uighurs living overseas have become a focus of one of government’s largest mass incarcerations in decades. Beijing is concerned that radical Islamic militants are behind a sporadically violent Uighur separatist movement in Xinjiang.

As elections approach, what is the risk of Russian meddling? ( Nearly a year after Russian government hackers meddled in the 2016 U.S. election, researchers at cybersecurity firm Trend Micro zeroed in on a new sign of trouble: a group of

Tech Giants Now Share Details on Political Ads. What Does That Mean For You? (New York Times) We tried out new tools from Facebook, Google and Twitter that let you look up campaign ads. Here’s what the databases can — and cannot — do.

Perspective | I’m teaching email security to Democratic campaigns. It’s as bad as 2016. (Washington Post) Someone — the government or Silicon Valley — needs to step in to help.

Hackers Are Exposing An Apple Mac Weakness In Middle East Espionage (Forbes) Apple Mac weakness affects all users, but has been used in limited attacks affecting the Middle East.

Spam campaigns leveraging .tk domains (Zscaler) Compromised sites leading to .tk campaign to spread Ads and fake alerts, .tk spam campaign, fake tech support

Spooky Theory on Ills of U.S. Diplomats in Cuba (New York Times) Doctors and scientists say microwave strikes may have caused sonic delusions and very real brain damage among embassy staff and family members.

I am invisible - Monero (XMR) Miner (Quick Heal Blog) From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many...

The malware that conquered the world has reinvented itself (New York Post) The RIG Exploit kit that infected 1.3 million devices a few years ago is back and it’s up to no good again. The RIG Exploit kit was responsible for infecting computers globally at a rate, on averag…

Tech-Support Scams Prompt Google to Act (Wall Street Journal) Google is taking action to weed out scam artists who advertise on its platform aiming to defraud customers seeking technical support by masquerading as authorized service agents for companies such as Apple.

Fear mongers forced to eat shorts over spam swamping claims (Register) GDPR and no Whois hasn't caused catastrophe

Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy (CP Blog) Today I’d like to share a full path analysis including a KickBack attack which took me to gain full access to an entire Ursniff/Gozi botnet. In other words:  from a simple “Malware Sample” to “Pwn the Attacker Infrastructure”. NB: Federal Police have already been alerted on such a topic as well as National and International … The post Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy appeared first on Security Affairs.

Industrial group warns Congress of gas pipeline threat (Midland Reporter-Telegram) Lobbyists representing U.S. manufacturing and chemical companies are urging Congress to secure natural gas pipelines against physical and cyber attack. In letter sent to the Senate Energy and Natural Resources Committee and the House Energy and Commerce Committee this week, Industrial Energy Consumers of America President Paul Cicio said Congress should create mandatory security standards similar to those required of electric utilities.

Crypto Twitter Scams Strike Again as Fake Pope Francis Bitcoin Giveaways Populate the Platform (BitcoinExchangeGuide) Fake Pope Francis Twitter Account Promotes Bitcoin Giveaway, One More to List of Scams The next face of crypto scam on a social media platform is that of Pope Francis. As per CCN’s report, Duo Secu…

Meet ransomware which wears the face of former president Barack Obama (ZDNet) The peculiar malware asks victims for a "tip" in return for a decryption key.

This hard-to-spot online scam makes you think you’re getting free airline tickets (MarketWatch) Phishing scams are on the rise.

Hackers favor using vulnerable Web apps to beat security perimeters (Health Data Management) About three-quarters of successful perimeter breaches in 2017 were achieved using vulnerable Web applications.

Security Patches, Mitigations, and Software Updates

0patch releases micropatch for Windows Task Scheduler zero-day (Help Net Security) 0patch has released a micropatch for the Windows Task Scheduler zero-day flaw, the PoC for which was released earlier this week by SandboxEscaper.

Phillips plugs security flaws in e-Alert tool (Help Net Security) Dutch tech company Phillips has fixed several serious security vulnerabilities in Philips e-Alert, a tool that helps MRI systems work as intended.

Firefox to start blocking ad-tracking by default (Naked Security) Mozilla has announced plans to tweak Firefox’s privacy controls so that advertising trackers will be blocked by default.

Chrome: Flash is almost, almost, almost dead (Naked Security) If you use Google’s Chrome browser, after 4 September, the latest update will make it even harder to use in-browser Adobe Flash.

Linux Kernel Developer Criticizes Intel for Meltdown, Spectre Response (eWEEK) At the Open Source Summit North America, Linux kernel maintainer Greg Kroah-Hartman took issue with Intel's initial disclosure of the Meltdown and Spectre CPU vulnerabilities.

Cyber Trends

While Data May Be Worth Trillions, It Is Not The New Oil (Forbes) The world faces a data conundrum where likening data to the new oil misses the many shortfalls of this comparison. The main one being that there is no universally accepted accounting method showing the enterprise value of data.

The State of IoT Security (Dark Cubed) It's Time for Action. And We've Proven It.

Data breach reports to Information Commissioner increase by 75% (Help Net Security) The number of reports of data security incidents received by the ICO has increased by 75% over the past two years, according to new analysis by Kroll.

Regulate to Liberate (Foreign Affairs) In an world increasingly driven by the ability of private companies and governments to collect vast amounts of personal data online, the European Union's ambitious new data rules enshrine data privacy as a fundamental right rather than a luxury.

Tech doesn't need regulation - it needs a conscience (Computing) There are better ways to control an industry that government intervention

The Tech Industry Knows It Has a Liberal-Bias Problem (Commentary Magazine) The social media and technology industry in Silicon Valley is treating its liberal bias problem like a public relations crisis, and it is.


Google quietly bought Mastercard credit and debit card records (Naked Security) The multimillion dollar data buy allows Google to link what we buy in brick-and-mortar stores to what ads we clicked online.

China's ZTE falls to worst ever loss after global security row (The Telegraph) ZTE, the Chinese telecoms giant that almost collapsed when it found itself at the centre of an international cybersecurity storm, suffered its worst ever financial loss in the first half of the year.

Infinite IO Closes $10.3 Million Funding Round (CRN) Infinite IO co-founder and CEO Mark Cree talks with CRN about the company’s technology, which transparently moves data to the cloud while increasing existing storage system performance.

Former LinkedIn, Yahoo, Cisco Execs Target Cloud Security at Avid (SDxCentral) Cloud security startup Avid Secure boasts a founding team of exec from LinkedIn, Yahoo, McAfee, Cisco, VMware, ForeScout, and Atlassian.

Column: Tool used in space race can help Augusta win cyber race (The Augusta Chronicle) Send a letter to the editor The Army is ramping up its efforts to tap into cutting-edge technologies developed beyond Silicon Valley to thwart fast-moving

Resecurity names Ian Cook as Strategic Adviser (Markets Insider) Ian Cook is an internationally recognized industry veteran and respected leader in cybersecurity. A true innovato...

Products, Services, and Solutions

Sprint and Ericsson Reveal Ground Breaking IoT-Dedicated Core and Operating System (MarketWatch) Fully dedicated, distributed and virtualized IoT core network works in tandem with the operating system to turn sensor data into immediate intelligence at the network edge; 5G-ready and primed for AI, robotics and more

Elbit Systems of Australia to Help Train ADF Cyber Warriors (Global Security Mag Online) Elbit Systems of Australia has been selected by the Australian Defence Force to boost Australia’s Cyber Security capability.

'I run a team of hackers': A look inside IBM Cybersecurity HQ in Austin (KVUE) "Companies hire us to break into systems and tell them how we did it. The key is that we're hired to break into those systems before criminals have a chance to," said Charles Henderson, the head of X Force Red, a special cybersecurity team within IBM.

What Happens When Facebook Mistakenly Blocks Local News Stories (WIRED) The social network says stories from The Winchester Star, a daily newspaper in Virginia, were erroneously censored and that a fix has now been issued.

Resecurity will introduce next-generation endpoint protection and cyber threat intelligence solutions at Beijing's ISC 2018 (PRNewswire) Headquartered in US, California, Resecurity is set to introduce the launch of its next-generation Endpoint Protection Platform (EPP) and CONTEXT™ a Cyber Threat Intelligence solution into China and Asia-Pacific markets at the Internet Security Conference (ISC) 2018 in Beijing on September 4th 2018.

Technologies, Techniques, and Standards

Cracking ransomware: RansomWarrior victims can now retrieve files for free (ZDNet) Researchers at Check Point examined this recent form of ransomware and found it relatively easy to crack.

Japanese Police Adopt Cybersecurity Software to Trace Bitcoin Transactions (CryptoSlate) Japan’s National Police Agency (NPA) revealed it would launch a crypto-tracking software to trace digital currency transactions in the country.

FBI Takes Measures to Protect the U.S. Elections and Public From Foreign Influence (The Scope Weekly magazine) FBI's two webpages aim to educate the public about foreign influence, disinformation campaigns, cyber attacks, and stolen identity with videos and news updates.

A cyber attack could force you to close your business. Here’s how to prevent it. (Lexington Herald Leader) What you can’t see can hurt your business.

Design and Innovation

Customer Reports: "GSuite Makes Phishing Training Unnecessarily Hard..." (KnowBe4) Customers report to KnowBe4 that they have issues with gmail and their security awareness training program. I am stepping onto my soapbox here, because this is an industry-wide problem, not just with KnowBe4 customers.

Just like a hull breach, a cyberattack should take seconds to detect (Fifth Domain) Like shipboard damage control the cybersecurity continuum is broken into three main objectives representing before during and after an incident.

Research and Development

German Cabinet approves new cybersecurity agency (Fifth Domain) Officials in Berlin hope that a new organization devoted to all things cyber can make up for years of neglecting a growing threat.

DARPA seeks transparency in cyber battle (Jane's 360) Key Points DARPA's Transparent Computing programme aims to detect cyber threats through linking together a system's activities It is particularly difficult to spot 'Advanced Persistent Threats', where adversaries can appear to be legitimate users The US Defense Advanced Research Projects Agency


Belfast-based unit aims to reduce vulnerability to cyber threats (The Irish Times) New unit at Queen’s University aims to improve internet-connected hardware security

Applications now being accepted for the CyberCorps Scholarship for Service program (The University of Alabama in Huntsville) UAH, a National Center of Academic Excellence in Information Assurance Education, is requesting student applications for full scholarships to study cybersecurity through its renewed five-year, $5 million National Science Foundation (NSF) CyberCorpsⓇ Scholarships for Service (SFS) program.

Legislation, Policy, and Regulation

Korea right to be cautious about Huawei as security threat: experts (Korea Times) The United States, Britain, Australia and now Japan. Huawei, a Chinese telecoms equipment maker, is facing severe restrictions over its ties to the Chinese government.

Rules on reporting cyber attacks, IT glitches out soon: BSP (BusinessMirror) A circular that will require banks to report as soon as possible any cyber attack and other information technology (IT)-related incidents in their systems is expected to be released in September, a ranking Bangko Sentral ng Pilipinas (BSP) official said.BSP Deputy Governor Chuchi Fonacier told r

Europe should counter Iran’s cyber espionage, infiltration, terrorism ( The more discord persists in the West over the means of responding to Iranian covert operations, the more impact these operations will have, writes Alejo Vidal-Quadras.

Cyber Civil-Military Relations: Balancing Interests on the Digital Frontier (War on the Rocks) In an era of persistent cyber conflict, how can the United States respond to cyber-attacks in a manner that ensures sufficient civilian oversight to

Mark Warner on securing elections, combating disinformation: "We're not there yet" (CBS News) On "Intelligence Matters" this week, the Senate Intelligence Committee's top Democrat, Sen. Mark Warner, said the executive branch is still not up to the task of protecting the country from information operations

Free Speech Is Not the Same As Free Reach (WIRED) Bad faith politicking about the way search algorithms work makes it harder for tech companies to solve the real problems.

From headquarters to combat, Air Force looks to restructure cyber forces ( Air Force chief says the service is likely to restructure its Pentagon offices and numbered forces to combine cyber, ISR and electronic warfare.

Our back-to-school cheat sheet for federal cyber (Fifth Domain) Here is a cheat sheet of three things to make you cyber smart this fall.

Infographic: A Look At Data Breach Laws By State (Benzinga) A data breach is “the unauthorized acquisition of covered information that compromises security, integrity or confidentiality," according to software company Digital...

Litigation, Investigation, and Law Enforcement

Lawmakers Are Set to Start Tech Industry Hearings (Wall Street Journal) Executives from Facebook, Twitter and Google are likely to face questions about political content, antitrust concerns and consumer privacy at hearings that begin Wednesday.

Inside Twitter’s Long, Slow Struggle to Police Bad Actors (Wall Street Journal) When Twitter CEO Jack Dorsey testifies before Congress this week, he’ll likely be asked about an issue that has been hovering over the company: Just who decides whether a user gets kicked off the site?

Facebook’s Private Groups Offer Refuge to Fringe Figures (New York Times) Many private groups reviewed by The Times contained content and behavior that appeared to violate Facebook rules, like those against hate speech.

Analysis | The Cybersecurity 202: Privacy advocates are back in court fighting NSA surveillance. It's an uphill battle. (Washington Post) The government has prevailed in every other case so far.

Insurer Premera Accused Of Wiping Evidence In Breach Case (Law360) Health insurer Premera Blue Cross has been accused in Oregon federal court of destroying a key computer and software logs that may have shown evidence of a 2015 data breach that affected 11 million people.

Hacking a Prince, an Emir and a Journalist to Impress a Client (New York Times) The NSO Group, a spyware maker, targeted the phones of powerful figures to show off its product, emails show. It’s now accused of illegal spying in lawsuits.

UAE used Israeli spyware to gather intel on Qatari royals, lawsuits claim (Haaretz) Lawsuits filed against the Israeli-based NSO Group allege its software was used to spy on political agitators locally and overseas and that the Emirates asked to track Lebanon's PM and a Saudi prince, the New York Times reports

The SEC charged a cloud executive with insider trading after he allegedly saved his brothers from $600,000 in losses (Business Insider) The SEC says that Qualys executive Amer Deeba allegedly tipped his family off to poor financial results at the company.

NSA leaker asks Trump for pardon (Niagara Gazette) An ex-National Security Agency contractor sentenced to five years and three months in prison for leaking classified information will ask President Donald Trump to pardon her in

Democrats accuse Republicans of leaking sensitive communications that could put confidential source at risk (Washington Post) The material in question involves emails and texts between Justice Department official Bruce Ohr and British ex-spy Christopher Steele.

Roger Stone, former Trump adviser, claims DNC contractor more likely behind hack than Russians (The Washington Times) President Trump’s former campaign adviser Roger Stone pushed back Wednesday against a key finding reached by federal law enforcement and intelligence officials investigating Russian involvement in the 2016 general election, casting doubt on the origin of Guccifer 2.0, the suspected state-sponsored internet persona he admittedly communicated with during Moscow’s alleged multi-pronged interference campaign.

Lucy McHugh murder suspect jailed for refusing to reveal Facebook password to police (The Telegraph) The man suspected of murdering schoolgirl Lucy McHugh has been jailed for refusing to provide his Facebook password to police investigating her death.

Mother of murdered schoolgirl Lucy McHugh urges Facebook to release murder suspects password  (The Telegraph) The mother of schoolgirl Lucy McHugh has urged Facebook to give police access to an account belonging to the man suspected of murdering the 13-year-old.

‘Sick sadist’ admits to trolling dead people on social media (Naked Security) He was intoxicated while posting about high-profile tragedies involving the death of young people, adding torment to families’ grief.

Hollywood accuses itself of piracy (Naked Security) As the EFF puts it, the makers of buggy bots (there are two so far) are poster children for the failure of automated takedown processes.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

National Cyber League Fall Season (Chevy Chase, Maryland, USA, December 15, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against...

Intelligence & National Security Summit (National Harbor, Maryland, USA, September 4 - 5, 2018) The Intelligence & National Security Summit is the premier forum for unclassified, public dialogue between the U.S. Government and its partners in the private and academic sectors. The 2018 Summit will...

Cyber Resilience & Infosec Conference (Abu Dhabi, UAE, September 5 - 6, 2018) Interact with the top-notch cyber security specialists, learn new strategies and protect your company's future efficiently

Incident Response 18 (Arlington, Virginia, USA, September 5 - 6, 2018) If you work for a vendor or product company, please understand this is not a sales event. IR18 is a community-driven event that aims to disrupt the traditional approach and is more focused on community,...

9th Annual Billington CyberSecurity Summit (Washington, DC, USA, September 6, 2018) The mission of Billington CyberSecurity is to bring together thought leaders from all sectors to examine the state of cybersecurity and highlight ways to enhance best practices and strengthen cyber defenses...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, September 6, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

CornCon IV: Quad Cities Cybersecurity Conference & Kids' Hacker Camp (Davenport, Iowa, USA, September 7 - 8, 2018) CornCon is a 2-day conference held in Davenport, Iowa including a professional development workshop on Friday and a full-day cybersecurity conference on Saturday. The workshop covers enterprise risk, privacy...

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

FutureTech Expo (Dallas, Texas, USA, September 14 - 16, 2018) With over 2,000 expected attendees, 70 top-notch speakers and 100+ exhibitors from the Blockchain & Bitcoin, Artificial Intelligence, Cyber Security / Hacking, Quantum Computing, 3D Printing, and Virtual...

Insider Threat Program Development-Management Training Course (San Antonio, Texas, USA, September 17 - 18, 2018) Insider Threat Defense will hold its highly sought-after Insider Threat Program Development-Management Training Course, in San Antonio, Texas, on September 17-18, 2018. This two-day training course will...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.