skip navigation

More signal. Less noise.

What if your security strategy added zeros to your bottom line?

Focusing on response alone is costly. You lose data. You lose infrastructure. You lose human and capital resources that could be productive elsewhere. And you lose your reputation. When you catch threats before they execute, you contain the problem, and the rewards add up. Let Blackberry Cylance help you understand how you can reduce your total cost of security controls, bolster your organization’s security posture, and zero in on what really matters.

Daily briefing.

KrebsOnSecurity reported yesterday that IT outsourcing and consulting firm Wipro had been compromised, and its networks turned against some clients. Computing this morning said the company acknowledged sustaining a successful phishing attack, is investigating, and that the attacker may have been a nation-state.

Ecuador has come under a large number of attacks, AFP reports, most of them apparently distributed denial-of-service attacks, since its revocation last week of asylum for WikiLeaks' Julian Assange.

NBC News says, on the basis of leaked documents, that Facebook's public assertions of commitment to privacy have long been at best an afterthought to the social network's monetization of personal data, at worst entirely disingenuous.

The European Union has ratified its controversial copyright reform law. Critics find Articles 11 and 13 particularly troubling, note VentureBeat and others.The former establishes a link tax to compensate copyright owners; the latter makes platforms legally liable for user infringements.

YouTube yesterday flagged live-streamed video of the tragic Notre Dame fire as possible misinformation, and ran an explanatory box below such streams that offered to hip viewers to the truth by displaying images and information about the 9/11 attacks. According to TechCrunch, YouTube says the algorithm did it, and that they're sorry that the algorithm "made the wrong call." The algorithm was unavailable for comment.

More European governments decline to ban Huawei, although many acknowledge security risks associated with the company's hardware. Bloomberg observes that close regulation of 5G networks seems very likely, and that such regulation will probably significantly encumber Huawei.


Today's issue includes events affecting Australia, Belgium, Brazil, Canada, China, European Union, France, Germany, India, Russia, United Kingdom, United States and Venezuela.

A note to our readers: if you find value in the CyberWire Daily News Briefing, why not encourage your colleagues to sign up as well? They can subscribe here. Thanks for your consideration (and, of course, thanks for reading).

Earn Your Master’s in Cybersecurity from Georgetown

Looking to advance your cybersecurity career? Check out Georgetown University's graduate program in Cybersecurity Risk Management. Ideal for working professionals, our program offers flexible options to take classes online, on campus, or through a combination of both—so you don’t have to interrupt your career to earn your degree. You'll leave the program with the expertise you need to effectively manage risks and navigate today’s increasingly complex cyber threats. Explore the program.

In today's podcast, out later this afternoon, Emily Wilson from our partners at Terbium Labs presents their Fraud Guides 101 report. Our guest is Ed Bellis from Kenna Security, who takes us through Kenna's latest research on vulnerability remediation.

Global Cyber Innovation Summit (Baltimore, Maryland, United States, May 1 - 2, 2019) This unique, invitation-only forum brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. Request an invitation today.

Cyber Attacks, Threats, and Vulnerabilities

Pirates of Brazil: Integrating the Strengths of Russian and Chinese Hacking Communities (Recorded Future) New research from Insikt Group examines the history of Brazil’s cybercriminal underground, including their tactics, techniques, and procedures.

Adblock Plus filters can be abused to execute malicious code in browsing sessions (ZDNet) The vendor was not aware of the problem until public disclosure.

Ecuador says hit by 40 million cyber attacks since Assange arrest (AFP) Ecuador said on Monday it has suffered 40 million cyber attacks on the webpages of public institutions since stripping Wikileaks founder Julian Assange of political asylum.

Microsoft admits hackers were able to access emails (Verge) The security breach was worse for some than others

Bruteforce bot recruitment uses GoBrut malware on content management systems (SC Media) Security researchers have discovered a new GoBrut botnet variant and C2 server being used to mount bruteforce attacks on content management systems to recruit new bots.

A hacker has dumped nearly one billion user records over the past two months (ZDNet) Hacker Gnosticplayers has stolen over 932 million user records from 44 companies.

Energy industry needs to up cyber defences, warns report  (ComputerWeekly) Cyber threat actors are advanced and persistent, but firms in the energy industry are using outdated systems and technology to save money, putting them at risk of cyber attacks, warns F-Secure report

The State of the Station (F-Secure) A report on attackers in the energy industry

Naval Dome: Industry Should be on Red Alert for Cyber Attack (The Maritime Executive) The maritime sector is being targeted by highly motivated cyber criminals, and the shipping industry...

After Middle East, Russia-backed Triton targeting American enterprises (The National) Malware caused a shutdown of a regional petrochemical plant twice

Outside-the-box malware is getting more common, security researchers warn (CSO Online) Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry.

As China Hacked, U.S. Businesses Turned A Blind Eye (NPR) The U.S. has largely failed to stop Chinese cybertheft of U.S. companies, but the companies themselves led the charge in keeping it under wraps.

Experts: Breach at IT Outsourcing Giant Wipro (KrebsOnSecurity) Indian information technology (IT) outsourcing and consulting giant Wipro Ltd. [NYSE:WIT] is investigating reports that its own IT systems have been hacked and are being used to launch attacks against some of the company’s customers, multiple sources tell KrebsOnSecurity. Wipro has refused to respond to questions about the alleged incident.

Wipro hacked and used to attack customers, says report (CRN Australia) Wipro is probing allegations that it's been breached, big-time.

Wipro investigates security breach believed to be perpetrated by state-sponsored attacker (Computing) Wipro systems compromised following phishing campaign used to target 'at least a dozen' clients, according to insiders

New HawkEye Reborn Variant Emerges Following Ownership Change (Cisco Talos) A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group

Microsoft Outlook Breach Now Impacts MSN And Hotmail Accounts, Report Says (Threatpost) A Microsoft Outlook breach that was disclosed on Friday is thought to be much larger than previously said, a new report found.

Microsoft Email Hack Shows the Lurking Danger of Customer Support (WIRED) Hackers spent months with full access to Outlook, Hotmail, and MSN email accounts—and got in through Microsoft's customer support platform.

Microsoft hack “another case of insider threat” (Verdict) The Microsoft hack that saw accounts accessed between 1 January and 28 March 2019 is the latest example of insider threat.

New Details Emerge on Windows Zero Day (Dark Reading) The CVE-2019-0859 vulnerability, patched last week, is the latest in a string of Windows local privilege escalation bugs discovered at Kaspersky Lab.

Kaspersky Labs Discovers 'Previously Unknown Vulnerability' in Microsoft Windows (Infosecurity Magazine) Kaspersky Labs believes it was an attempt to gain full control over a targeted device.

Sophos Investigates Microsoft Reboot Failures Following Software Update (Infosecurity Magazine) Sophos has been looking into reports of boot-up failures.

Security researcher exposes zero-day WordPress vulnerabilities (TechRadar) 160,000 websites were exposed to potential attacks

Account With Admin Privileges Abused to Install BitPaymer Ransomware via PsExec (TrendLabs Security Intelligence Blog) Ransomware may have experienced a decline in 2018, but it seems to be getting back on track — only this time, attacks are looking to be more targeted. Coming on the heels of news about a ransomware attack against a U.S. beverage company which addressed the company by name in the ransom note, this blog post looks into a BitPaymer ransomware variant (detected by Trend Micro as Ransom.Win32.BITPAYMER.TGACAJ) that hit a U.S. manufacturing company.

Fake Instagram Apps on Google Play Harvest User Logins (Threatpost) The apps, which claim to help users rack up followers, are well-rated and have been downloaded tens of thousands of times.

Scammers With Verified Instagram Accounts Cheating 'Influencers' With Fake Verification Service (Forbes) The scammer promised verification in just 45-60 minutes.

Three apps claiming to improve Instagram exposed as an insta-scam (SC Media) Three Android apps that supposedly helped Instagram users increase likes and followers, plus improve the experience, were actually stealing credentials.

‘Nasty List’ Phishing Scam Targets Instagram Users (Infosecurity Magazine) Direct messages are spammed out from hijacked accounts

Why you shouldn't buy fake followers and likes on Instagram (Evening Standard) We know we shouldn’t measure our self-worth via Instagram likes or a high follower count but we often can’t help comparing ourselves to friends and peers just a little bit. Unfortunately, if you take measures to improve that count on the sly, say in the form of downloading apps to boost likes or followers, it most certainly will do more harm than good. 

Mobile VPNs Promoted by 'You Are Infected' or 'Hacked' Ads (BleepingComputer) Mobile VPN affiliates are displaying scam ads that state your mobile device is infected, has been hacked, or is being tracked in order to scare visitors into purchasing a subscription.

Flood of exploits targetting ancient WinRAR flaw continues (Naked Security) An ancient WinRAR vulnerability made public in February is now well on its way to becoming one of the most widely and rapidly-exploited security flaws of recent times.

TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids (Threatpost) A popular Australian smartwatch's tracking capabilities expose its user's locations, personal data and more.

Vulnerability Summary for the Week of April 8, 2019 (US-CERT) The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. 

IBM admits its own errors led to multiple cloud crashes (CRN Australia) Issue goes back eight months before actual outage.

Security Patches, Mitigations, and Software Updates

Patched Windows Zero-Day Provided Full Control Over Vulnerable Systems (BleepingComputer) A Windows zero-day vulnerability which got patched by Microsoft as part of the company's April 2019 Patch Tuesday together with 73 other flaws could allow potential attackers to take full control of vulnerable systems.

Cyber Trends

The Daily 202: How the nature of cyberwar is changing (Washington Post) Government systems remain vulnerable as more adversaries play the game.

Kaspersky: 70 percent of attacks now target Office vulnerabilities (ZDNet) That's more than four times the percentage the company was seeing two years before, in Q4 2016.

The Illusive 99.9% (Nyotron) Study of the efficacy of modern antivirus products against known malware

Credential stuffing: Canada’s newest cyber threat (Canadian Underwriter) A new cyber threat called “credential stuffing” is emerging, and Canada is the third-most targeted country in the world, according to a new report. Credential stuffing is when hackers take a stolen username and password and then run it through…

Skating on thin ice - CISOs crack under stess of job insecurity & lack of resources (SC Media) CISOs are turning to drink, drugs & meditation to overcome the inevitability of breaches in the face of inadequate human or financial resources to defend their organisations; as 1 in 5 are available 24/7.

Bad security hygiene still a major risk for enterprise IT networks (Help Net Security) Unpatched vulnerabilities, along with network and app complexity pose an ongoing security risk which could threaten the security of enterprise IT networks.


Thousands of leaked Facebook documents show Mark Zuckerberg as ‘master of leverage’ in plan to trade user data (NBC News) Facebook’s leaders seriously discussed selling access to user data — and privacy was an afterthought.

15 Months of Fresh Hell Inside Facebook (WIRED) Scandals. Backstabbing. Resignations. Record profits. Time Bombs. In early 2018, Mark Zuckerberg set out to fix Facebook. Here's how that turned out.

Behind KKR's Big Bet On Cybersecurity (Fortune) Ninety percent of security flaws still occur at the worker or consumer level

Tufin: The Right Way To IPO (Seeking Alpha) Tufin has an IPO today on the NYSE. Unlike several of the recent IPOs, this one seems fairly priced. I would consider buying at these levels.

Amenity Analytics raises $18 million for AI that parses regulatory filings and earnings calls for key points (VentureBeat) Amenity Analytics has raised $18 million for natural language processing technology that detects sentiment and more in coverage and social media activity.

97% of Gemalto shares have been tendered to the Thales offer (AP NEWS) Reference is made to the joint press release by Thales (Euronext Paris: HO) and Gemalto (Euronext Amsterdam and Paris: GTO) dated 29 March 2019 on the results of the recommended all-cash offer by Thales for all the issued and outstanding shares of Gemalto (the Offer) in which the Offer was declared unconditional and the Post-Closing Acceptance Period was announced.

Blue Hexagon bets on deep learning AI in cybersecurity (SearchSecurity) Network security provider Blue Hexagon is using deep learning to detect network threats. Learn what security experts have to say about using AI in cybersecurity.

Corero Network sets sights on profitability as cyber attacks grew (Proactiveinvestors UK) Corero Network Security PLC (LON:CNS) - Corero Network Security PLC specialises in cyber-security software

Rapid7: A New leader in Cybersecurity? (MoneyShow) Cybersecurity is one of the leading sectors of this new bull market, but the best performers in that space have been lesser-known names that are bu

The Women's Society of Cyberjutsu Announces the Wicked6 Cyber Games (PR Newswire) Today, the Women's Society of Cyberjutsu announces the Wicked6 Cyber Games, a cybersecurity exhibition and...

Products, Services, and Solutions

VirtualArmour Wins $300,000 Cybersecurity Contract with Subsidiary of Major Pharmaceutical Company (West) VirtualArmour International Inc. (CSE:VAI) (OTCQB:VTLR), a premier cybersecurity managed services provider, has won a new managed and professional services contract with a subsidiary of a Fortune Global 2000 pharmaceutical manufacturing company headquartered in California.

CIS Hardened Images Launched on Google Cloud Shielded VMs (PR Newswire) CIS® (Center for Internet Security, Inc.) today announced the availability of its CIS Hardened Images™ on...

After hackers access Microsoft's email service Centrify makes a case for enterprise Zero Trust Privilege (Techaeris) According to Microsoft, the hack occurred between January 1st and March 28th of this year.

Verizon strengthens commercial messaging platform ( After providing call filtering features for free, Verizon is going to update its commercial messaging platform to better protect customers.

Maintech IT Support Solutions with a Focus on Security (PR Newswire) Maintech, Incorporated, a global leader in IT Infrastructure Services, provides multi-platform Hardware...

Technologies, Techniques, and Standards

Security Think Tank: Seven steps to manage risk of catastrophic cyber attack (ComputerWeekly) How should businesses plan to survive a potential cyber attack extinction event?

The cyber teams that helped stop Russian election interference (Fifth Domain) Cyber forces were given the mission to deter Russian attempts to influence the 2018 midterm election.

How an annual ‘Cyber Shield’ drill helps the National Guard secure elections (CyberScoop) Prior to the 2018 midterm elections, multiple states activated their National Guard forces to protect the vote from cyberthreats.

Census Bureau counts on new cybersecurity concerns (Fifth Domain) The U.S. Census Bureau identified more than 1,100 census system security weaknesses last year, according to a March report from the Government Accountability Office. Now, the Bureau is working to keep its data safe from hacks.

Can Private Coalitions Ensure Internet Safety? (Newsmax) The old playbook has been tech behemoths determining how best to safeguard ensure consumer privacy and security. This overreliance on a few to protect the many is plainly not working.

Challenges and benefits of using the Mitre ATT&CK framework (SearchSecurity) Not all cybersecurity frameworks are equal. Getting started using the Mitre ATT&CK security framework means putting in some work -- but the benefits should make the effort worthwhile.

How Palo Alto Networks fends off its cyber adversaries (ComputerWeekly) Palo Alto Networks CIO Naveen Zutshi talks up the company’s approach in keeping threat actors at bay.

Is your DDos Mitigation Strategy Terabit-Proof? (Infosecurity Magazine) Larger and stronger DDoS attacks require a new approach to mitigate them

AI in Cybersecurity: Why Do Cyber-Hacks Still Succeed? (Ziften Endpoint Security) This is my 3rd blog on artificial intelligence (AI) in cybersecurity, coming in the wake of our recent announcement that Ziften Zenith has added Advanced anti-virus (AV) built on a foundation of AI. Previously, we took a look at how machine learning-based cybersecurity systems operate differently from traditional, signature-based antivirus software. We also discussed the …

Why Enterprise Anti-Virus Isn’t Working (Ziften Endpoint Security) Most headline-grabbing enterprise cyber attacks repeat the same sad story: Enterprise anti-virus products were deployed across the endpoint population, the most targeted asset class in the enterprise The anti-virus products did not prevent the attack or sound the alarm Attackers prowled across the victim cyber landscape undetected for weeks or months or even years Can …

Design and Innovation

Notre Dame: YouTube's New Fact-Check Tool Attached An Article About 9/11 To Videos Of The Fire (BuzzFeed News) The widget showing information about the Sept. 11 terror attacks appears to have been triggered by a new feature YouTube is testing to provide "topical context" around videos that might contain misinformation.

YouTube’s algorithm added 9/11 facts to a live stream of the Notre-Dame Cathedral fire (TechCrunch) Some viewers following live coverage of the Notre-Dame Cathedral broadcast on YouTube were met with a strangely out of place info box offering facts about the September 11 attacks. BuzzFeed first reported the appearance of the misplaced fact-check box on at least three live streams from major news …

A computerized YouTube fact-checking tool goes very wrong: In flaming Notre Dame, it somehow sees Sept. 11 tragedy (Washington Post) As images of the iconic spire falling to the streets played on YouTube, “information panels” appeared below the videos appearing to link it to the terrorist attack on Sept. 11.

Notre Dame fire: YouTube slammed after live footage appears with link to 9/11 info (Fox News) YouTube was slammed Monday after live footage of the devastating Notre Dame blaze appeared above a link to information on the 9/11 terrorist attacks.

Twitter blocks EFF tweet that criticized bogus takedown of a previous tweet (Ars Technica) Starz filed bogus takedown requests—Twitter eventually restored blocked tweets.

Starz Apologizes for Taking Down Tweets to Torrentfreak Article Following Security Breach (Variety) Updated. Facing a backlash over overzealous copyright enforcement, Starz issued an apology on Monday for inadvertently taking down tweets to articles about TV show piracy. The TV network said in a …

Dstl launches new game to recruit brightest minds for cyber work (GOV.UK) The Defence Science and Technology Laboratory (Dstl) has launched an online game to recruit more than 60 staff to work in Cyber and Information Systems.

Legislation, Policy, and Regulation

Pentagon developing military options to deter Russian, Chinese influence in Venezuela (CNN) The Pentagon is developing new military options for Venezuela aimed at deterring Russian, Cuban and Chinese influence inside the regime of President Nicolas Maduro, but stopping short of any kinetic military actions, according to a defense official familiar with the effort.

US Knows It Must Do 'Something Quite Dramatic' to Overthrow Maduro - Analyst (Sputnik) According to an exclusive report by the Grayzone project, 40 top military advisors and strategists met during an event at the Center for Strategic and International Studies in Washington, D.C., to discuss possible US military intervention in Venezuela.

EU countries give final approval to copyright reform aimed at Google and Facebook (VentureBeat) The European Union approved a controversial, sweeping reform of copyright rules that includes provisions which critics argue will reduce free speech online.

Huawei should not be banned in Germany, says telecoms regulator (NS Tech) The head of the German telecoms regulator has suggested that Huawei will be allowed to participate in the roll out of the country's 5G infrastructure, dealing a blow to US efforts to curb the Chinese

Huawei Poses 'No Threat' According to Belgium, Trump Not Convinced (Infosecurity Magazine) The Belgian Centre for Cybersecurity won't issue

Huawei Has Skirted Outright Bans in Europe. But Not 5G Regulations (Bloomberg) Germany, France, U.K. have tightened regulatory standards. Huawei’s battle for piece of European pie enters key period.

U.S. to press allies to keep Huawei out of 5G in Prague meeting:... (Reuters) The United States will push its allies at a meeting in Prague next month to adop...

Analysis | The Cybersecurity 202: Nielsen’s departure will hurt DHS cybersecurity mission, experts say (Washington Post) They fear cybersecurity will struggle for attention as Trump focuses on the border.

House Homeland Committee wants more cyber funding for DHS (FCW) Twenty-eight of 31 members signed a letter to congressional appropriators arguing that the cyber mission at DHS is rising without a corresponding bump in resources.

Air Force hopes new organization can boost electronic warfare (C4ISRNET) Air Force leaders are touting the creation of a new information warfare organization earlier this month as a way to show the increasing importance of cyber and electronic warfare capabilities.

How America Plans to Stop the Next Inside Threat (The National Interest) The government has big plans to reform its security clearance process.

Litigation, Investigation, and Law Enforcement

Unsealed docs reveal new details in case against Assange (TheHill) A federal judge on Monday ordered the release of previously sealed documents filed in the case against Julian Assange, offering up new details about the U.S. government's allegations against the WikiLeaks founder.

Criminal complaint details case against Julian Assange (Washington Post) Investigators relied on his and Chelsea Manning’s online chats.

Affidavit in Support of a Criminal Complaint and Arrest Warrant (United States Magistrate Judge, Alexandria, Virginia) Source document contributed to DocumentCloud by Kadhim Shubber (Financial Times).

Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong. (New York Times) Citing a rarely used ‘war exemption,’ insurers say they aren’t responsible for the 2017 NotPetya attack.

Woman arrested at Mar-a-Lago will remain jailed. She was ‘up to something nefarious,’ judge says. (Washington Post) Yujing Zhang, who bypassed security at President Trump’s Florida resort, appears to be a flight risk, a magistrate judge said.

What Happened When The DEA Demanded Passwords From LastPass (Forbes) LastPass could only hand over IP addresses, billing information and details on how the suspected dark web drug dealer used the password manager.

ACCC teams with FBI for cartel probes (CRN Australia) Market-fixers face new trans-Pacific squeeze.

ICE Now Aided by ‘Enhanced’ Spy Powers (The Daily Beast) DHS’ intel chief says the immigration enforcement agency is now reaping the benefits of extra intelligence ‘collection’—and civil libertarians are concerned.

Is there a link between videogaming and cybercrime? Police think so (Naked Security) UK police are planning to issue online warnings to young gamers hoping to deter them from a life of cybercrime, they revealed last week.

Ghaziabad: It’s only April, but cyber fraud cases already half of those registered last year (The Times of India) The number of cases related to cyber fraud, cloning of ATM cards and theft of identity cards that are used in financial scams have spiked r.

Pregnancy Club Fined £400K After Illegally Sharing Data on Millions (Infosecurity Magazine) UK firm Bounty lucky to escape with pre-GDPR penalty

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Atlanta Cybersecurity Conference (Atlanta, Georgia, USA, September 12, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Phoenix Cybersecurity Conference (Phoenix, Arizona, USA, September 19, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Little Rock Cybersecurity Conference (Little Rock, Arkansas, USA, September 26, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Kansas City Cybersecurity Conference (Kansas City, Missouri, USA, October 3, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Toronto Cybersecurity Conference (Toronto, Ontario, Canada, October 17, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Upcoming Events

IMPACT ’19 (Chantilly, Virginia, USA, April 15 - 17, 2019) Prepare for the changes ahead and get out in front of the compliance curve by attending the 34th annual NSI IMPACT Forum on April 15-17 at the Westfields Marriott in Chantilly, VA. The theme of this year’s...

San Antonio Cybersecurity Conference (San Antonio, Texas, USA, April 16, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

2019 Industrial Control Systems (ICS) Cyber Security Conference (Singapore, April 16 - 18, 2019) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other...

Cybersecurity: 5th Generation Threats- What we know, should know, and don't know. (Santa Barbara, California, USA, April 17, 2019) Cyber threats capable of massive economic and social disruption are poorly understood and vastly underestimated. Cybersecurity is a continuing arms race. This panel/presentation will review the state...

Insider Threat Summit 2019 (ITS5) (Monterey Bay, California, USA, April 17 - 18, 2019) ITS5 brings Government and Industry organizations and cybersecurity leaders together to better understand the type of threats that impact infrastructure and overall operations. Our two-day summit will...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.