skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

Daily briefing.

Huawei, which has been working hard to dominate IT markets in Africa, has embedded technicians in the governments of Zambia and Uganda to help those governments organize and operate extensive domestic surveillance programs, the Wall Street Journal reports. Huawei denies any impropriety: the company has “never been engaged in ‘hacking’ activities,” a Huawei spokesman told the Journal in a written statement. “Huawei rejects completely these unfounded and inaccurate allegations against our business operations. Our internal investigation shows clearly that Huawei and its employees have not been engaged in any of the activities alleged. We have neither the contracts, nor the capabilities, to do so.” Others see Huawei as exporting China's proven domestic surveillance template.

Credit cards skimmers on gas pumps can now be spotted with a tool, "Bluetana," soon to be made available to police. KrebsOnSecurity describes the tool's ability to detect Bluetooth card skimmers. Bluetana emerged from joint research by the University of California San Diego and the University of Illinois Urbana-Champaign, with technical input from the US Secret Service, There are legitimate devices that can squawk like card skimmers, so Bluetana helps tell police that they should take a second look.

US prosecutors signal their intention to file more charges against accused Capital One hacker "erratic."

Emsisoft's Fabian Wosar is a fugitive from injustice. He tells the Micky that he has to keep moving to stay clear of the goons who are angry with him for his work on ransomware decryptors. He's cost them a lot of money.

Notes.

Today's issue includes events affecting Bulgaria, Canada, China, European Union, Iran, Democratic Peoples Republic of Korea, Russia, South Africa, Uganda, Ukraine, United Kingdom, United States, and Zambia.

Bring your own context.

A proposed State Department cybersecurity desk, a Bureau of Cyberspace Security and Emerging Technologies, is on hold in Congress right now, but it may not be for much longer.

"You know, if you think about the Trump administration, one of their hallmarks is - one of his hallmarks is let's avoid excessive regulation. Let's avoid big government. So nonetheless, though, we have a new group being created, which, mind you, I think is a good thing. I think both sides of the aisle would agree that getting sort of a uniform approach to these many issues that comprise cybersecurity, the digital economy, et cetera, are all good. The problem is how to make that happen. The proposed new organization would have, as I understand it, 80 employees with only about a $28 million budget. That's not a lot of money to fundamentally impact online activity."

—Michael Overly, partner at Foley & Lardner LLP, on the CyberWire Daily Podcast, 8.13.19.

Skirmishing aside, the issues the bureau would address command broad bipartisan support. The hold is on because a member of the New York delegation thinks the proposed bureau focuses too much on security to the detriment of its other mission, fostering online commerce. It's worth noting that this sort of dual mission is familiar. The Department of Homeland Security's customs mission, for example, includes not only a charge to stop smuggling, but to foster legitimate commerce as well.

What are the best practices and tools for SecOps in 2019?

Read the 2019 SANS Security Operations Survey report for key insights & strategies from principal SANS Instructor Christopher Crowley & SANS Director of Emerging Technologies John Pescatore. Download your copy now.

In today's podcast, out later this afternoon, we speak with our partners from Accenture Labs, as Malek Ben Salem discusses transparency and community standards online. Our guest is Taylor Armerding from Synopsis, talking through the projected employment shortfall in cybersecurity. 

And Hacking Humans is up. In this episode, "Swamping search results for reputation management," Dave shares the story of a small community hospital dealing with a ransomware attack. Joe reviews the different types of extortion emails. The catch of the day is an inheritance scam from Canada. Carole Theriault interviews Craig Silverman from Buzzfeed about online reputation management companies.

CyberTexas Job Fair, August 20, San Antonio. Visit ClearedJobs.Net or CyberSecJobs.com for details. (San Antonio, Texas, United States, August 20, 2019) Cleared and non-cleared cybersecurity pros make your next career move at the free CyberTexas Job Fair, August 20 in San Antonio. Meet face-to-face with leading cyber employers. Visit our site for more details.

Cyber Warrior Women Summer Social: Sip and Paint (Columbia, MD, United States, August 21, 2019) Join the Cybersecurity Association of Maryland, Inc. (CAMI) for the annual Cyber Warrior Women Summer Social, an all-about-fun-and-networking event! We're adding an artistic element to this year's event with a wine glass painting exercise. No previous art experience required.

Second Annual DataTribe Challenge (Online, October 1, 2019) Register now for a chance to be DataTribe's next world-class company. Finalists will split a $20,000 prize, and the winner may receive $2m in funding from DataTribe. Contestants have until October 1st to apply at www.datatribe.com/challenge­.

Cyber Attacks, Threats, and Vulnerabilities

Huawei Technicians Helped African Governments Spy on Political Opponents (Wall Street Journal) Employees embedded with cybersecurity forces in Uganda and Zambia intercepted encrypted communications and used cell data to track opponents, according to a Wall Street Journal investigation. Huawei said it “rejects completely the unfounded and inaccurate allegations.”

Analysis | The Cybersecurity 202: How Huawei helped extend China's repressive view of Internet freedom to African nations (Washington Post) U.S. officials argue there's a global battle for web freedom.

Lazarus group behind recent cyberattack on South Africa - Kaspersky (Fin24) A recent North Korean cyberattack in which South Africa was apparently among 17 countries targeted, relates to the activity of the so-called Lazarus group, says a Kaspersky expert.

Use-After-Free (UAF) Vulnerability CVE-2019-1199 in Microsoft Outlook (Lares) How Lares R&D discovered the CVE-2019-1199 vulnerability in Microsoft Outlook recently patched in the August 2019 Security Update.

Back-to-Back Campaigns: Neko, Mirai, and Bashlite Malware Variants Use Various Exploits to Target Several Routers, Devices (TrendLabs Security Intelligence Blog) We uncovered three malware variants of Neko, Mirai, and Bashlite, which enlist infected routers to botnets that are capable of launching DDoS attacks.

Review of a Danabot Infection (H3 Collective) Proofpoint first identified DanaBot in May of 2018. Armed with basic Trojan and info stealing functionality, DanaBot works to gather sensitive banking information from unsuspecting users for fraud and other criminal activity. Since its inception, the Trojan has worked on adding affiliates, increasing its geotargeting, and expanding its functionality through modularity. In this blog, I’m …

New Malware Norman Uses Your PC to Secretly Mine Cryptocurrency (Tom's Hardware) Varonis security firm found a unique new strain of cryptoming malware that deploys sophisticated evading techniques to avoid getting caught.

Financial hacking teams FIN7, Cobalt Group update tactics to haunt banks and retail (CyberScoop) It’s starting to look like the global private sector might have a real problem on its hands. Despite international media attention and a series of high-profile arrests, some of the world’s most prolific cybercriminals only seem to be accelerating their hacking sprees.

Stronger Defenses Force Cybercriminals to Rethink Strategy (Dark Reading) Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.

APIs are 'rich targets' for hackers, warn security researchers (Computing) Researchers at F5 Labs claim that APIs have become an easy target for hackers.

Credit Karma glitch exposed users to other people’s accounts (TechCrunch) Users of credit monitoring site Credit Karma have complained that they were served other people’s account information when they logged in. Many took to a Reddit thread and complained on Twitter about the apparent security lapse. “First time logging in it gave me my information, but as s…

TikTok Scammers Cash In On Adult Dating, Impersonation Tricks (Threatpost) Scammers are profiting from TikTok's younger audience with adult dating and account impersonation tricks.

Unsolicited Blank Emails Could Portend BEC Attacks (Infosecurity Magazine) Agari warns organizations to be on the lookout for reconnaissance efforts

New Potential Phishing Domains Targeting Top 50 Banks Rise 14% in First Half of 2019, New NormShield Research Finds (PR Newswire) Cyber criminals continue to use phishing to lure bank customers and steal personal and financial information,...

New Siemens Switch Vulnerability Discovered by Nozomi Networks Labs (Nozomi Networks) On August 13, 2019, the Siemens CERT Team, in collaboration with Nozomi Networks Labs, issued an Advisory concerning a vulnerability in Siemens SCALANCE switch devices.

Sophisticated Dropper Masqueraded as Fake DHL Invoice to Distribute Ursnif Malware (Security Intelligence) Digital attackers took a sophisticated dropper and disguised it as a fake DHL shipping invoice to distribute Ursnif malware.

Exit Scams Swindled $3.1 Billion From Crypto Investors in 2019: Report (CoinDesk) In total, investors, users, and exchanges have lost some $4.3 billion from illicit activity.

Coinbase explains background to June zero-day Firefox attack (Naked Security) A recent, highly targeted attack on cryptocurrency exchange Coinbase offers a glimpse into how sophisticated phishing attacks can be.

Password Spraying Hacker Attacks: Department of Homeland Security Warning (MSSP Alert) Password spraying attacks remain major cybersecurity issue, the Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) warns.

How hackers could turn everyday objects into deadly cyber weapons  (The Telegraph) It may seem like something straight out of a thriller:

This Counterfeit iPhone Is Riddled With Backdoors and Malware (Vice) Fake devices look real but are rife with unpatched operated systems, outdated kernels, and a universe of dodgy backdoors and malware, researchers have found.

The Underground Economy (Trustwave) The seeds of cybercrime grow in the anonymized depths of the dark web...

Cyberchology: the Human Factor (ESET) Every organisation is now a digital business. Driven by developments in technology, companies have digitised their services and offerings to meet the ever-growing demand from consumers. However, evolution also comes with its own risk, and in this case, it is a significant rise in cybercrime that is extremely diverse and unpredictable.

Sun of a breach: Don’t bring cyber risks back to work from the beach, urge cybersecurity experts - VanillaPlus - The global voice of Telecoms IT (VanillaPlus - The global voice of Telecoms IT) As people go on their annual holidays, could they be risking the cybersecurity of their workplaces? A new finding from the Palo Alto Networks Trust in the

Security Patches, Mitigations, and Software Updates

Serious flaws in six printer brands discovered, fixed (Naked Security) There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer.

Adobe security patch update tackles Photoshop, Acrobat, Reader, and more (ZDNet) A wide range of software and critical security issues are included this month.

Microsoft warns Windows 10 users to update immediately (CNN Business) Microsoft is warning Windows 10 users to update their operating system immediately because of two "critical" vulnerabilities.

Patch Tuesday, August 2019 Edition (KrebsOnSecurity) Most Microsoft Windows (ab)users probably welcome the monthly ritual of applying security updates about as much as they look forward to going to the dentist: It always seems like you were there just yesterday, and you never quite know how it’s all going to turn out.

Microsoft Patches 93 CVEs But No Zero-Days in August (Infosecurity Magazine) Admins urged to prioritize wormable bugs

August Patch Tuesday: Update Fixes ‘Wormable’ Flaws in Remote Desktop Services, VBScript Gets Disabled by Default (TrendLabs Security Intelligence Blog) While none of the vulnerabilities were listed as under active attack at the time of August Patch Tuesday release, a few of the bugs addressed this month fall under the “wormable” category, namely remote code execution (RCE) vulnerabilities in the Remote Desktop Services. This month's Patch Tuesday also disables the scripting language VBScript by default on Internet Explorer on Windows 7, 8, and 8.1.

Intel: Listen up, you NUC-leheads! Mini PCs and compute sticks just got a major security fix (Register) Chipzilla patches firmware, drivers, SDKs

Cyber Trends

The Economic Value of DNS Security (Global Cyber Alliance) Our research has shown that DNS firewalls could have mitigated one-third of the incidents we studied and could have prevented $10 billion in losses in those incidents.

Spear Phishing: Top Threats and Trends Vol. 2 (Barracuda Networks) Email account takeover and defending against lateral phishing attacks

Accenture Report Reveals New Cybercrime Operating Model Among High-Profile Threat Groups (BusinessWire) An Accenture report reveals a new cybercrime operating model among high-profile threat groups.

2019 Cyber Threatscape Report Executive Summary (Accenture) Learn five factors to improve your cybersecurity investment and defend against threat actors using ransomware and new technologies to commit cybercrime.

The changing face of DDoS attacks: Degraded performance instead of total takedown (Help Net Security) DDoS attacks in Q2 2019: The number of DDoS attacks might be getting higher, but they are not all massive nor do they always trigger DDoS defenses.

Security by Sector: Cyber-Attackers Targeting the Education System (Infosecurity Magazine) Education sector under threat from Adware, Trojans, ransomware and backdoors

Marketplace

Cyber Insurance: A Study In Fine Print (Forbes) The economic damage from cybercrime doesn’t always come in the form of bits and bytes.

Biz Talk: Acquisitions in Arlington’s Cybersecurity Space (ARLnow.com) This week's Biz Talk discusses the recent acquisitions of cybersecurity companies.

Pivotal Software stock spikes 72% on VMware acquisition plans (Silicon Valley Business Journal) VMware plans to acquire Pivotal, which has struggled since its 2018 IPO, for an 81 percent premium over its recent stock price.

Microsoft Admits Humans Listen to Skype and Cortana in Privacy Policy Update (Vice) The change comes after Motherboard found that Microsoft hired contractors to listen to some Skype phone calls.

Working on Microsoft’s Cortana Is Laborious and Poorly Paid (Vice) Leaked documents show that Microsoft’s contractors are paid between $12 and $14 an hour and are asked to transcribe as many as 200 audio clips per hour to train the Cortana virtual assistant.

Why chipmaker Broadcom is spending big bucks for aging enterprise software companies (TechCrunch) Last year Broadcom, a chipmaker, raised eyebrows when it acquired CA Technologies, an enterprise software company with a broad portfolio of products, including a sizable mainframe software tools business. It paid close to $19 billion for the privilege. Then last week, the company opened up its wall…

Five tech companies that split in half (and a big one that was nearly forced to) (CRN) After Symantec announced it would be splitting up its consumer and enterprise arms, we assess how other tech companies taking a similar approach have fared

Demand for Secure Access, Hybrid IT and Zero Trust Drive Pulse Secure to Double-Digit Growth (Pulse Secure) Pulse Secure, the leading provider of software defined Secure Access solutions, today announced that growing demand for hybrid IT and Zero Trust Secure Access, resulted in double digit deal volume growth in the first half of 2019.

The Startups Safeguarding Real Estate Against Schemers and Scammers (Wall Street Journal) Wire-transfer fraud cost 11,300 victims nearly $150 million last year, according to the FBI. These firms want to do something about it.

SAIC Wins $14 Million U.S. Marine Corps Cyberspace Operations Contract (Yahoo) Science Applications International Corp. (SAIC) won a $14 million contract with Naval Information Warfare Center Pacific supporting the U.S. Marine Corps Forces Cyberspace Command to provide full spectrum cyberspace support. “We are proud to continue our partnership with and help ensure our Marines

Nucleus Cyber Joins Microsoft Intelligent Security Association (WBOC TV 16) Validates integrations for more flexible conditional access and data protection.

Black Hat USA 2019 Closes Out Another Record-Breaking Event in Las Vegas (Yahoo) SAN FRANCISCO, Aug. 14, 2019 -- Black Hat, the world’s leading producer of information security events, today highlights the 2019 programming and new initiatives that helped.

Ransomware fighter on the run after costing hacker gangs millions (Micky) Security expert Fabian Wosar is in hiding after costing ransomware gangs hundreds of millions of dollars since 2012.

Programming Language Pioneer Gilad Bracha Joins Shape Security (PR Newswire) Shape Security, maker of the leading platform for bot and fraud mitigation for the world's largest...

PAS Welcomes Matthew Selheimer as Chief Marketing Officer (PAS) Leadership Team Addition Brings Two Decades of Experience in Cybersecurity and IT Operations

Products, Services, and Solutions

Cofense and CNA Strengthen Security Awareness Within Cyber Insurance I (PRWeb) Cofense™, the global leader in intelligent phishing defense solutions, announced its strategic relationship with CNA, one of the largest commercial property

ZeroFOX Launches Groundbreaking Election Protection Offering (Yahoo) AI-powered solution provides continuous protection across digital and social media channels; safeguards candidates, campaigns, and political organizations from threats targeting el

Carbon Black Open-Source Binary Emulator Eases Malware Analysis (MSSP Alert) Carbon Black, the endpoint protection software provider, unveils the Binee open-source binary emulator for real-time malware analysis at DEF CON 27.

SYNNEX Ties Up With Sophos to Strengthen Endpoint Security (Yahoo) SYNNEX (SNX) looks to boost its cybersecurity portfolio via partnership with Sophos.

CircleCI Adds Security Orbs to CI/CD Platform (DevOps.com) CircleCI has extended the reach of its automated package manager, known as orbs, to cybersecurity software that can be integrated into a pipeline

BlackBerry’s AI Intelligent Security Has Broad Implications (TechSpective) I’ve been working in and out of security and law enforcement for much of my life. The biggest exposures I’ve run into and the easiest ways through

A Novel Platform for Cybersecurity Assessments for Marketplaces (CIOReview) A Novel Platform for Cybersecurity Assessments for Marketplaces By CIOReview - Bugcrowd for Secure Marketplaces enables bulk adoption of crowdsourced security for marketplace and app store owners....

Technologies, Techniques, and Standards

Global Cyber Alliance Launches Cybersecurity Development Platform for Internet of Things (IoT) Devices (Yahoo) New AIDE Platform Enables IoT Device Manufacturers to Test Security, Identify and Mitigate Global Attack Risks, and Identify Vulnerabilities

More than One-third of Security Professionals’ Defensive Blue Teams Fail to Catch Offensive Red Teams, According to Exabeam Study (BusinessWire) A new study from Exabeam revealed that more than one-third of security professionals’ defensive blue teams fail to catch offensive red teams.

Meet Bluetana, the Scourge of Pump Skimmers (KrebsOnSecurity) “Bluetana,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests.

Are federal agencies prepared for the end of free Windows 7 support? (Federal Times) Some federal agencies with older operating systems still have a way to go to mitigate potential risk exposure.

Why Managed Service Providers Need to Help with Passwords (Infosecurity Magazine) Bad password habits directly pose a threat to the defense of networks, devices and users

Developing personal OPSEC plans: 10 tips for protecting high-value targets (CSO Online) Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans.

Design and Innovation

AT&T and T-Mobile will now verify phone calls between their networks (Engadget) AT&T and T-Mobile are rolling out cross-network call verification.

AI Startup Boom Raises Questions of Exaggerated Tech Savvy (Wall Street Journal) Engineer.ai says it uses artificial intelligence to help automate app-development. Current and former staffers say the company inflates its technical prowess to attract customers and investors.

‘Private’ and ‘hidden’ mean different things to Facebook (TechCrunch) Facebook’s leadership made a pretty heavy-handed indications this year that it believes Facebook Groups are the future of the app, they announced all of this alongside their odd declaration that “The future is private.” Now, Facebook is changing the language describing the visibil…

Amazon's tool that 'detects' fear in humans shows its on an irreversible path to dystopian surveillance (The Telegraph) In June 2018, a group of disgruntled Amazon workers - or Amazonians, as they referred to themselves - wrote a letter criticising their employer for selling of facial recognition technology to US law enforcement.

Research and Development

AI researchers launch SuperGLUE, a rigorous benchmark for language understanding (VentureBeat) Facebook AI Research, together with Google’s DeepMind, University of Washington, and New York University, today introduced SuperGLUE, a series of benchmark tasks to measure the performance of modern, high performance language-understanding AI.

Academia

Why the United States needs more cybersecurity experts — badly (EdScoop) Alan Paller, founder of the SANS Institute, says a “cyber pandemic” threatens national security and the only solution is to train more professionals.

Students learn about cybersecurity at Harford Community College’s GenCyber Camps (Baltimore Sun) Through a recently awarded National Science Foundation and National Security Agency grant, Harford Community College launched its first GenCyber Smart Camp for middle school students.

Hacking off the hackers: WVU programmed to fill cybersecurity jobs with NSF award (My Buckhannon) When West Virginia University first offered cybersecurity classes in 2003, the gravest fear of a casual Internet user might have been opening an infected email attachment that erased computer files or reset their homepage. And who could forget landing on some dodgy website that would generate a never-ending array of pesky popup windows Those problems …

University of Pennsylvania Launches Cybersecurity Boot Camp For Adults (Diverse) The University of Pennsylvania is launching a new cybersecurity...

DarkMatter teams up with UAE university to foster cybersecurity innovation (TahawulTech.com) DarkMatter Group has announced the Cybersecurity Research Award (CRA) – an award focused on innovative ideas against the cybersecurity threats.

Legislation, Policy, and Regulation

Canada Launches Small Business Cybersecurity Certification Program (Infosecurity Magazine) Cyber-savvy businesses in Canada could get certification to prove they take care of customer data.

Task Force Takes On Russian Election Interference (NPR.org) In an exclusive interview with NPR, the head of the National Security Agency talks about how the online battle waged against ISIS is informing the fight against Russia ahead of the 2020 elections.

History Doesn't Repeat Itself in Cyberspace (Dark Reading) The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.

The Fight Over Section 230—and the Internet as We Know It (WIRED) Mass shootings and executive orders have dragged the web's most consequential law back into the spotlight.

Has US security adviser John Bolton killed Huawei’s UK ambitions? (South China Morning Post) Bolton says British officials may order a full review of Chinese telecoms giant 5G role but US to wait until ‘after Brexit’ before exerting real pressure.

Huawei Covertly to Sell Smartphones in U.S. (Washington Free Beacon) China's Huawei Technologies, the world's No. 2 smartphone maker, covertly planned to sell its smartphones in the U.S. disguised as non-Huawei devices.

MICROCHIPS Act (The Office of US Senator Mike Crapo) The U.S. is involved in asymmetric warfare and what amounts to a technological space race with China, which is seeking to dominate an over $1.5 trillion electronics industry through state investment, subsidies and intellectual property (IP) theft.

A BILL To require a plan for strengthening the supply chain intelligence function, to establish a National Supply Chain Intelligence Center, and for other purposes. (US Senate) Mr. CRAPO introduced the following bill; which was read twice and referred to the Committee...

The question of 'patriotism' in U.S.-China tech collaboration (Los Angeles Times) Should "patriotism" play a role in the ethics of US-China tech collaboration?

Cybersecurity Letter to National Parties (Washington Post) [A letter from Senator Wyden, Democrat of Oregon, to officials of the Republican and Democrat Parties.]

Ex-CIA chief worries campaigns falling short on cybersecurity (TheHill) Democratic 2020 presidential campaigns say they are working to boost their cybersecurity, but experts worry those efforts may not be enough.

Time for a Cyber-Attack Exception to the Foreign Sovereign Immunities Act (Just Security) Only civil liability for sovereign cyberattacks can impose monetary costs - that requires a new exception to the Foreign Sovereign Immunities Act.

Opinion | They Stole Your Files, You Don’t Have to Pay the Ransom (New York Times) The F.B.I. should follow the example of European law enforcement and help victims of ransomware decrypt their data.

NYC has hired hackers to hit back at stalkerware (MIT Technology Review) A New York City government pilot program is bringing technologists and domestic abuse victims together for good.

Litigation, Investigation, and Law Enforcement

Capital One hacker took data from more than 30 companies, new court docs reveal (ZDNet) New court documents reveal the government is investigating the Capital One hacker for 30+ other breaches.

Prosecutors say accused Capital One hacker had stolen data from 30 other companies in her bedroom (Washington Post) Thompson is likely to face new charges related to the additional alleged data thefts, prosecutors said in the motion filed in federal court in Washington state.

Russia Suspected by Some in Giant Bulgaria Hack (New York Times) Whoever was responsible, experts say, the episode raised serious concerns about the state of Bulgaria’s cybersecurity.

4 ‘despicables’ jailed for running hidden worldwide child abuse forums (Naked Security) So much for trusting the Tor network to hide their tracks.

Did Zuckerberg Lie Under Oath About Facebook Eavesdropping On You? (The Federalist) Last April, Mark Zuckerberg told Congress that Facebook was not collecting user information over device microphones, but now the story is changing.

Action Fraud investigation: victims misled and mocked as police fail to investigate (Times) Call handlers working for the police insult victims of fraud and have been trained to mislead them into thinking their cases will be investigated when most are never looked at again. An undercover...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

AcceleRISE (Minneapolis, Minnesota, USA, August 14 - 16, 2019) Prepare for your future. Designed for young industry professionals like yourself, and presented by SIA, AcceleRISE brings together tomorrow’s security leaders for two-plus days of idea sharing, coaching, The conference, hosted by SIA’s RISE community for young professionals and those new to the industry, will present blended learning sessions featuring a mix of keynotes, panel sessions, team building exercises, peer networking and workshops.

PCI Security Standards 2019 Latin America Forum (São Paulo, Brazil, August 15, 2019) Don’t miss the data security event of the year for the payment card industry. We provide you with the information and tools to help secure payment data. We lead a global, cross industry effort to increase...

Austin Cybersecurity Conference (Austin, Texas, USA, August 15, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

Pittsburgh Cybersecurity Conference (Pittsburgh, Pennsylvania, USA, August 22, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.