skip navigation

More signal. Less noise.

Get the top 10 vulnerabilities used by cybercriminals.

Recorded Future researchers have scoured open web, dark web, and technical sources to discover which vulnerabilities are being actively exploited by cybercriminals. Download the report now.

Daily briefing.

Proofpoint reports criminals are using lightweight downloaders for reconnaissance.

The British Airways data breach, by general consensus attributed to the Magecart gang, is thought likely to result in precedent-setting GDPR enforcement action.

445 million customer records belonging to Veeam were found exposed in a MongoDB database at the end of August. They've since been taken down.

In yesterday's Patch Tuesday Microsoft addressed sixty-one vulnerabilities, at least three of which are under active exploitation in the wild. Adobe also patched, issuing a new version of its Flash Player. SAP has also fixed fourteen bugs in its products.

The European Union passed its long-debated and widely feared copyright law, which incorporates what's been called a "link tax." There are some exemptions for smaller organizations and not-for-profits, but in general the law is very good news for rent-seeking big media companies and moderately bad news for everyone else, where the law is widely seen as opening up considerable possibilities for censorship. At a minimum, the measure seems likely to force YouTube-like content moderation on much of the Internet.

Russia's President Putin says they now know who the two men are the British fingered for the Salisbury nerve agent attacks. He says they're just regular Joes, civilians, and neither criminals nor GRU hoods. (Presumably they got their Novichok, which in the Russian view they of course didn't have, off of their spice rack in the kitchen. Isn't that where you keep yours?) Mr. Putin says he "hopes" the two will tell their story "soon."

Notes.

Today's issue includes events affecting China, European Union, Russia, United Kingdom, United States.

$8.76 million: The average yearly cost of insider threats. Get the report.

Insider threat incidents come with a hefty price tag, according to the “2018 Cost of Insider Threats: Global Organizations” report released by independent research group, The Ponemon Institute. Make sure that you understand the full context (and cost) of these threats by downloading the full report. Get your copy today.

In today's podcast, we talk with our partners at the University of Maryland: Jonathan Katz has a cryptocurrency bug story from the MIT media lab. Our guest is Robert Block from SecureAuth + Core Security, offering best practices for securing Office 365.

Rapid Prototyping Event: The Chameleon and the Snake (Columbia, Maryland, United States, September 17 - 20, 2018) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM, is hosting a Rapid Protoyping Event that specifically targets malware signature diversity and signature measurement for Microsoft Windows in a simulated operational environment at a realistic pace. Join us September 17-20, 2018 at UMBC Training Center in Columbia, MD.

The force is stronger when MSPs and MSSPs come together. (Webinar, September 19, 2018) The managed service market has grown tremendously, with the demand for managed security being unprecedented. For managed service providers (MSPs) looking to answer those demands, partnering with a managed security services provider (MSSP) expands access to highly-skilled cyber security analysts and a full suite of security solutions. Join Delta Risk’s webinar, September 19 at 1 PM ET, to learn how the two sides can join forces.

Cyber Security Summits: September 25 in NYC on October 16 in Phoenix (New York, New York, United States, September 25, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, The NSA, Google, IBM, Darktrace, CenturyLink and more. Register with promo code cyberwire95 for $95 VIP admission (Regular price $350) https://CyberSummitUSA.com

FireEye Cyber Defense Summit 2018 (Washington, DC, United States, October 1 - 4, 2018) Get trained by a FireEye expert at our annual Cyber Defense Summit. Training opportunities at this event offer attendees hands-on, small-group, interactive sessions with some of the most experienced FireEye cyber security experts.

Dragos Industrial Security Conference (DISC) 11/5/18 (Hanover, Maryland, United States, November 5, 2018) Reserve your spot now for the Dragos Industrial Security Conference (DISC) on November 5th, 2018. DISC is a free, annual event for our customers, partners, and those from the ICS asset community. Visit https://dragos.com/disc/ for more information.

Cyber Attacks, Threats, and Vulnerabilities

Bad Actors Sizing Up Systems Via Lightweight Recon Malware (Threatpost) These stealthy downloaders initially infect systems and then only install additional malware on systems of interest.

New modular downloaders fingerprint systems - Part 3: CobInt (Proofpoint) Proofpoint researchers provide new analysis of a downloader called CobInt, associated with the Cobalt Group but following a new trend of small-footprint, modular loaders.

The Unwanted Visitors You’re Letting Into Your Home: How Second-hand Smart Home Technology is Compromising Your Safety (Payments Journal) 27 million smart home units are expected to be sold in the US in 2018, with the global smart home market expected to be worth $53.45 billion by 2022.

Trend Micro Admits That Its Mac Apps Collect User Data (SecurityWeek) Trend Micro has confirmed that some of its applications for macOS systems collect browser history and send it to the security firm’s servers.

Trend Micro blames data collection issue on code library re-use (Cyberscoop) Cybersecurity giant Trend Micro has apologized after researchers discovered that a number of the company’s consumer-facing apps were collecting users’ browser histories.

Apple Removes Top Security Tool for Secretly Stealing Data (Anomali Forum) The top rated paid utility application on the Mac App Store, “Adware Doctor,” has been removed by Apple after security researchers found that the application was surreptitiously stealing browser data. The stolen data was observed being sent to AWS servers that were administered by an individual in China. This discovery is troubling because Adware Doctor, prior to its removal from the App Store...

Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide (Help Net Security) Check Point revealed a significant increase in attacks using the Ramnit banking trojan. Ramnit has doubled its global impact over the past few months,

Advantech WebAccess RCE flaw still exploitable, exploit code available (Help Net Security) A vulnerability (CVE-2017-16720) in Advantech WebAccess allows attackers to remotely executed commands with administrator privileges on vulnerable systems.

LuckyMouse Signs Malicious NDISProxy Driver with Certificate of Chinese IT Company (Anomali Forum) The Advanced Persistent Threat (APT) group “LuckyMouse” (APT27, EmissaryPanda) has been found distributing a previously unknown, in-memory trojan, according to Kaspersky Lab researchers. The malware contains three different modules that include: a custom C++ installer, a network filtering driver (NDISProxy), and a last-stage C++ trojan functioning as an HTTPS server...

445 million customer records found on MongoDB database running on unsecured AWS server (Computing) 200GB database belonging to Veeam indexed on Shodan on 31 August - but was taken down nine days later.

IBM X-Force Delves Into ExoBot's Leaked Source Code (Security Intelligence) IBM X-Force researchers unpacked ExoBot's inner workings to reveal insights into its dynamic mechanisms and the features that help criminals use it in cross-channel bank fraud schemes.

Npower ‘urgently investigating’ personal information breach (ITV News) Npower is "urgently investigating" how the personal details of around 5,000 customers were shared with others by post.The letters included names, addresses and payment amounts — but did not include bank details.The energy giant has apologised to affected customers and said it had informed the Information Commissioner's Office (ICO) of the data breach.

Siemens warnt vor Cyber-Gefahren (Boersen Zeitung) The head of Siemens Germany, Uwe Bartmann, warns against cyber attacks on companies and public infrastructure

TV License website said it was secure. It wasn't (Graham Cluley) The official UK TV licensing website was allowing license purchasers to submit their personal identifiable information and bank details in unsafe, unencrypted plaintext.

Here's what happens during a social engineering cyber-attack (TechRepublic) BioCatch's VP Frances Zelazny explains each step of social engineering hacks, low-tech cyberattacks that have a big impact on business.

Password inadequacy remains a top threat (Help Net Security) WatchGuard's Q2 2018 Internet Security Report uncovers cybercriminals' heightened use of credential-focused attacks, password inadequacy, and more.

Nearly 600 Russia-Linked Accounts Tweeted About the Health Law (Wall Street Journal) Nearly 600 Russia-linked Twitter accounts tweeted about the Affordable Care Act and U.S. health policy from 2014 through this past May, new data show. Most of the nearly 10,000 tweets seem intended to pit one side against the other.

Security Patches, Mitigations, and Software Updates

Patch Tuesday, September 2018 Edition (KrebsOnSecurity) Adobe and Microsoft today each released patches to fix serious security holes in their software.

September 2018 Security Updates (Microsoft) The September security release consists of security updates for the following software

Microsoft Patches Three Actively Exploited Bugs as Part of Patch Tuesday (Threatpost) Microsoft's September Patch Tuesday release tackles three vulnerabilities actively being exploited in the wild.

Microsoft details for the first time how it classifies Windows security bugs (ZDNet) The Microsoft Security Response Center publishes two documents detailing internal procedures used by its staff to prioritize and classify security bugs.

SAP Patches Critical Vulnerability in Business Client (SecurityWeek) SAP's September 2018 patches fix a total of 14 security vulnerabilities in its products, including a critical bug in SAP Business Client.

OpenSSL 1.1.1 Released With TLS 1.3, Security Improvements (SecurityWeek) OpenSSL 1.1.1 has been released. The new Long Term Support (LTS) version brings TLS 1.3 and significant security improvements

Adobe Patches Vulnerabilities in Flash Player, ColdFusion (SecurityWeek) Adobe patches a total of 10 vulnerabilities in Flash Player and ColdFusion, but none of the flaws appear too serious

Cyber Trends

Half of US mobile traffic will be scam calls by 2019 (BetaNews) Unwanted and scam phone calls are an increasing problem. Analysis by call management company First Orion predicts that nearly half of all calls to mobile phones in the US will be fraudulent in 2019 unless the industry adopts and implements more effective call protection solutions.

Nexusguard research reveals 500 percent increase in average DDoS attack size (BusinessWire) The average DDoS attack quintupled in size to more than 26 Gbps in Q2 2018 compared to the same period last year, according to Nexusguard.

DDoS Trends Report | Half Year 2018 (Corero) The frequency of DDoS attacks is rising but the duration of these attacks is decreasing. Learn more about the current DDoS threat landscape in Corero’s Half Year 2018 DDoS Trends Report.

The Risk of Triangulation: You May Just be a Piece of the Puzzle (SecurityWeek) You have to be thinking about how your data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.

Action1 Research: Top 7 Cybersecurity Challenges in 2018 (Action1) This report highlights the results of a study of what cybersecurity professionals perceive as their main challenges; which types of threats they are mostly concerned about, based on their past experience; what plans do they have to solve these challenges.

Marketplace

More Enterprise-Tech Ventures Going Public (Wall Street Journal) High valuations and rising IT budgets this year are prompting a surge in initial public offerings by business-to-business tech startups, 451 Research says.

White House Workforce Summit Aims to Future-Proof Tech Talent (Nextgov.com) The administration plans to reskill more than 300,000 employees over the next three years, including the IT workforce.

Bitdefender takes over Australian partner SMS eTech in global expansion move (Business Review) Bitdefender has announced on Tuesday the takeover of its Australian partner SMS eTech, as part of its global business expansion strategy. The acquisition

Is FireEye, Inc. a Buy? (The Motley Fool) Will this cybersecurity underdog ever rally?

PeopleSoft Security/UX Leader, GreyHeller, Announces Name Change To Appsian (PRNewswire) GreyHeller, a leading PeopleSoft application security and UX/UI solutions provider has announced today the launch of a new corporate identity, name, and website. The organization will now be known as Appsian

Meet Matthew Goodman, a 2018 CIO of the Year honoree (Tampa Bay Business Journal) Matthew Goodman, chief information officer, Digital Media Solutions

Bromium Appoints Kevin Mosher as Chief Revenue Officer (GlobeNewswire News Room) Industry veteran to orchestrate rapid growth and customer success, while expanding revenue opportunities for partners in the burgeoning Application Isolation and Containment security market

DFLabs Names Security Veteran Tito Avila Vice President of Global Sales and Business Development (BusinessWire) Tito Avila's international and domain experience will help DFLabs aggressively grow its market share, enter new markets and build a global sales team.

World-renowned Cybersecurity Veteran Richard Bejtlich Joins Corelight as Principal Security Strategist (GlobeNewswire News Room) Bejtlich brings key industry perspectives and insights on network visibility and data-centric security that will help Corelight customers, and drive sales and product development strategy

Telstra security execs Neil Campbell and Jacqui McNamara exit (CRN Australia) In line with first round of Telstra2022 cuts.

Products, Services, and Solutions

Varonis Announces Interoperability with RSA Identity Governance and Lifecycle to Detect and Mitigate Security Risks by Providing Centralized Management and Control of Sensitive Data (Varonis Systems) Varonis Systems, Inc. (NASDAQ: VRNS), a pioneer in data security and analytics, announces interoperability between Varonis DataPrivilege with RSA® Identity Governance and Lifecycle.

Digital Defense, Inc. Achieves Certified Integration with McAfee ePoli (PRWeb) Digital Defense, Inc., an industry recognized provider of security assessment solutions, today announced that it has achieved certified technical int

ThreatConnect Now Integrates with Dragos WorldView Intelligence (BusinessWire) ThreatConnect, Inc.®, provider of the industry's only extensible, intelligence-driven security platform, is proud to announce its integration with Dra

Digital Defense, Inc. Achieves Certified Integration with McAfee ePoli (PRWeb) Digital Defense, Inc., an industry recognized provider of security assessment solutions, today announced that it has achieved certified technical int

Prey Remote Installation Helps Retrieve Valuable Laptops (GlobeNewswire News Room) Ability to deploy tracking software after a device has gone missing enables companies to produce solid evidence of property theft for police action

Introducing the Hacker101 CTF (HackerOne) Capture flags all day and night in our newly launched CTF, available 24/7 at ctf.hacker101.com.

Darktrace Launches Antigena Version 2 (Darktrace) More Organizations Fight Back with Autonomous Response AI as Antigena v2 Announced

Beating the OWASP benchmark (Security Boulevard) Tl;dr; Today, we present the results of evaluating ShiftLeft’s static analysis pipeline on the OWASP benchmark, where we achieve a true positive rate of 100% at 25% false positives.

Cypaw: Risk management and data compromise prevention tool (Help Net Security) Cypaw is a risk management tool, bringing visibility and control to organisation’s digital footprint while reducing the likelihood of phishing attacks.

Project VAST Security Tool Now Rolling Out to Microsoft Premier Customers (Redmondmag) Microsoft's Project VAST is now a supported product that's offered to Microsoft Premier customers, Microsoft announced last week.

MITRE Adds Appthority as CVE Numbering Authority (CNA) (Security Boulevard) On Sep 7, 2018, MITRE announced that Appthority has joined 89 other organizations as a CVE Numbering Authority (CNA). Appthority is the first CNA that is focused on enterprise mobile threat research, and we’re proud of this designation. We look forward to participating in and supporting the CVE project and ecosystem for the benefit of

KnowBe4 Completes Rigorous SOC 2 Type 2 Data Security Exam (GlobeNewswire News Room) Company demonstrates ongoing dedication to protection of client data

KnowBe4 Boost's Training Offering to Include Privacy Focused Video Series (Markets Insider) Restricted Intelligence series on privacy and GDPR added to arsenal to fight social engineeringLONDON, Sept. 11, 2018 /PRNewswire/ -- KnowBe4, the world's l...

Technologies, Techniques, and Standards

Should DHS do more with DMARC data? (FCW) A 2017 cybersecurity directive is providing DHS with a flood of data on hackers attempting to penetrate federal systems through fake emails, but thus far the agency has not articulated a plan for using the information.

DHS wants input on threats from information-sharing organizations, promises more 'context' (Inside Cybersecurity) The Department of Homeland Security is encouraging information sharing and analysis organizations to share threat indicators with them, with an official saying today the department wants to be “more transactional and operational” with these groups and is pushing for further automation of sharing.

5G is attractive but security issues loom large, say experts (Techgoondu) A 5G connected ecosystem will have more devices, connections and data flows linked together, leading to higher security risks, experts have warned.

GDPR requires Certified Data Erasing According to Common Criteria EAL3+ (UNN) Secure Data Erasing With EU Cloud-Based Management

Google Knows Where You’ve Been, but Does It Know Who You Are? (New York Times) How looking at the location data that the company collects about you lets you see yourself in a whole new way.

Essential Elements Needed for a Successful Threat Hunt (Infosecurity Magazine) Threat hunting is vital to reduce the spread and effectiveness of attacks.

Hidden in Plain Sight: File System Protection With Cyber Deception (Security Intelligence) Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs.

Design and Innovation

Email security crisis... What email security crisis? (Register) Let them eat phish

Going Beyond a 'Walled-Garden' Approach (BankInfo Security) Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that

How the industry expects to secure information in a quantum world (ZDNet) With all of the good a quantum computer promises, one of the side effects is that it will be able to break the mechanisms currently used to secure information. But the industry is onto it, and Australia's QuintessenceLabs is playing a key role.

Research and Development

Penn State scientists build quantum version of Maxwell’s demon (Ars Technica) 3D grids of super-cooled atoms could one day form the basis for a quantum computer.

High-speed quantum cryptographic communications with key distribution speeds exceeding 10 Mbps (Phys.org) Toshiba and the Tohoku Medical Megabank Organization at Tohoku University have successfully applied high-speed quantum cryptographic communications technologies developed at Toshiba and Toshiba Research Europe's Cambridge Research Laboratory to achieve world-first quantum cryptography communication at one-month-average key distribution speeds exceeding 10 Mbps over installed optical fiber lines.

DARPA Wants to Find Botnets Before They Attack (Nextgov.com) The defense agency awarded a contract to develop a tool that scours the internet for dormant online armies.

Academia

RIT cybersecurity lab named for partnership with Eaton Corp. (Monroe County Post) A penetration testing laboratory at Rochester Institute of Technology is being named the Eaton Cybersecurity SAFE Lab to recognize the university’s

Legislation, Policy, and Regulation

EU Passes Controversial Copyright Law With ‘Link Taxes’ (Motherboard) Lawmakers exempted non-commercial and smaller platforms from the directive, but opponents of the law still worry that it will lead to greater censorship on the internet.

An EU copyright bill could force YouTube-style filtering across the Web (Ars Technica) Wednesday's vote by the EU parliament has big stakes for the Internet's future.

U.S. Silently Enters New Age of Cyberwarfare (New York Magazine) Buried beneath a mound of political scandal, the Trump administration silently rescinded key regulations limiting the use of destructive cyberweapons.

Has a cyberattack constituted an act of war? Probably not yet (Fifth Domain) No NATO nation has suffered a cyber attack big enough to be an act of war -- yet.

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks (Just Security) We’re not still waiting for a Cyber 9/11: It’s already unfolding.

Now we'll know less Russia is about to ban soldiers from posting about themselves on social media (Meduza) The Russian government has drafted legislation that would prohibit members of the armed forces from sharing on the Internet any information about themselves, their fellow soldiers, or the military itself.

Exclusive: Trump to target foreign meddling in U.S. elections with sanctions order (Reuters) President Donald Trump plans to sign an executive order as soon as Wednesday that will slap sanctions on any foreign companies or people who interfere in U.S. elections, based on intelligence agency findings, two sources familiar with the matter said.

White House drafting sanctions order to punish foreign interference in U.S. elections (Washington Post) The move is seen as an effort to quiet criticism of President Trump’s reluctance to blame Russia for targeting American democracy.

Cyberattacks are a constant fear 17 years after 9/11 (The Hill) Seventeen years after the 9/11 terror attacks, lawmakers are stepping up their warnings about how the next assault on the U.S. could be a cyberattack.

Understanding Cybersecurity Threats to America’s Aviation Sector (House Committee on Homeland Security) The purpose of this joint hearing is to examine the current cybersecurity threats facing the aviation sector, and to explore ways in which the aviation industry is looking at cybersecurity in general. The hearing will feature individuals from the private sector who are able to paint a clear picture of the threat landscape, and provide …

Analysis | The Cybersecurity 202: Lawmakers slam State Department for failing to meet basic cybersecurity standards (Washington Post) "Two-factor authentication is cybersecurity 101,” said Sen. Ron Wyden.

What election security funding means for state and local CIOs (GCN) State and local governments must make informed decisions about how to improve the security of their voting processes.

In a Few Days, Credit Freezes Will Be Fee-Free (KrebsOnSecurity) Later this month, all of the three major consumer credit bureaus will be required to offer free credit freezes to all Americans and their dependents.

Litigation, Investigation, and Law Enforcement

Skripal suspects 'civilians, not criminals' (BBC News) Vladimir Putin says there's "nothing special" about the men and suggests they will tell their story soon.

British Airways Data Hack a Test Case for GDPR (PYMNTS.com) GDPR compliance has yet to be fully embraced by firms on a global scale, yet headlines from this past week show just what the repercussions might be against a new regulatory landscape. As noted late last week, a data breach at British Airways was revealed – one that affected more than 380,000 transactions done over […]

Google’s location privacy practices are under investigation in Arizona (Washington Post) The probe focuses on Google's alleged practice of recording location data about Android device owners even when they believe they have opted out of such tracking.

FINRA takes down an unregistered cryptocurrency security (TechCrunch) FINRA, the non-profit organization that tasks itself with policing the securities industry, is charging Timothy Tilton Ayre of Agawam, Mass. with fraud and unlawful distribution of unregistered cryptocurrency securities. Ayre claimed that users could buy equity in his company, Rocky Mountain Ayre, …

AT&T Users Lack Standing In NSA Spying Suit, Court Told (Law360) The National Security Agency is pressing a California federal judge to ax a long-running putative class action accusing the agency of illegal spying, arguing that the AT&T customers leading the dispute lack standing because they have failed to offer any “competent evidence” that their communications were scooped up by the challenged surveillance.

Ex-NSA chief says he never discussed collusion with Trump (CBS News) In rare public remarks, ex-National Security Agency Director and Cyber Command chief Adm. Mike Rogers rejects reports Trump asked him to deny Russian collusion

Former NSA chief breaks with other ex-intel officials over Brennan letter (The Hill) A former director of the National Security Agency (NSA) on Tuesday split with other former intelligence officials who signed a letter condemning President Trump’s decision to revoke former CIA Director John Brennan’s security clearance.

Dealers remain on Instagram as it pushes drug searchers to treatment (TechCrunch) You don’t have to search too hard to find Xanax and Fentanyl dealers posting their phone numbers all over Instagram, but at least it’s starting to push people towards addiction recovery resources. Backlash led Instagram to perform a cursory blocking of exact drug name hashtag searches i…

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

2019 Georgetown Cybersecurity Law Institute (Washington, DC, USA, May 22 - 23, 2019) It is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity.Those lawyers who ignore cyber threats are risking millions...

Upcoming Events

2018 International Information Sharing Conference (Tysons Corner, Virginia, USA, September 11 - 12, 2018) Join representatives from fellow information sharing groups with all levels of expertise, security practitioners, major technology innovators, and well-established cybersecurity organizations, as they...

SecureWorld Detroit (Detroit, MIchigan, USA, September 12 - 13, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

Cybersecurity for Small & Medium Sized Businesses (Gaithersburg, Maryland, USA, September 13, 2018) Learn about technical, legal, cultural and policy cybersecurity issues facing small and medium sized businesses. Panelists include: Markus Rauschecker, J.D. University of MD. Center for Health and Homeland...

International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference (Atlanta, Georgia, USA, September 17 - 19, 2018) The International Consortium of Minority Cybersecurity Professionals (ICMCP) 3rd Annual National Conference continues to elevate the national dialogue on the very necessary strategic, tactical and operational...

Air Space & Cyber Conference (National Harbor, Maryland, USA, September 17 - 19, 2018) Gain new insights and skills to advance your career. Be among the first to see the latest innovations in airpower, space, and cyber capabilities all the while bonding with your fellow Airmen. Inspiring...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security...

SINET Global Cybersecurity Innovation Summit (London, England, UK, September 18 - 19, 2018) SINET, an organization focused on advancing cybersecurity innovation through public-private collaboration, today announced that its annual Global Cybersecurity Innovation Summit (GCIS), will take place...

5th Annual Industrial Control Cyber Security USA (Sacramento, California, USA, September 18 - 19, 2018) Now in its 5th year, this two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges...

Security in our Connected World (Beijing, China, September 19, 2018) This year’s seminar will not only examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), but will also delve into their associated business and...

Detect 18 (National Harbor, Maryland, USA, September 19 - 21, 2018) Detect '18 is the single largest conference dedicated to threat intelligence. This year we're calling on fellow "Threatbusters" to wage a high-tech battle against apparitions (aka bad actors) and learn...

Cyber Beacon (Washington, DC, USA, September 20, 2018) Cyber Beacon is the flagship event of the National Defense University's College of Information and Cyberspace (NDU CIC). The conference brings together cyber experts from across the national security community,...

IT Security Leadership Exchange (Phoenix, Arizona, USA, September 23 - 25, 2018) IT Security Leadership Exchange is an invitation-only, strategic business summit that gathers Chief Information Security Officers (CISOs), senior decision-makers, and industry experts to address the unique...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.