skip navigation

More signal. Less noise.

How can industrial organizations stay ahead of ICS adversaries and proliferating threats?

Dragos identified the most dangerous threat to ICS, XENOTIME (the activity group behind TRISIS), has expanded its targeting beyond oil and gas--illustrating a trend that will likely continue for other ICS-targeting adversaries. Learn more about how taking an intelligence-driven approach to ICS cybersecurity can help organizations stay ahead of the latest threats to ICS environments. 

Daily briefing.

US Cyber Command warned that CVE-2017-11774, a Microsoft Office Outlook security bypass vulnerability publicly identified in 2017, is being actively exploited in the wild. The Command posted samples to VirusTotal, which researchers at Chronicle have checked and associated with exploitation of this vulnerability in 2018 by Iran's APT33 and Shamoon2. Users who haven't yet patched are encouraged to do so. The warning comes during a period of heightened US-Iranian tension.

Airline pilots say they've experienced weeks of GPS disruption around Tel Aviv. C4ISRNET reports that Russian jamming is suspected.

Chatham House has published a study of NATO space-based strategic systems' vulnerability to cyberattack.

Cloudflare experienced a widespread outage yesterday morning that affected Internet service worldwide with 502 errors. Cloudflare's CEO Matthew Prince tweeted that a "[m]assive spike in CPU usage caused primary and backup systems to fall over," and that the issue has since been remediated. The company attributed the outage to "a bad software deploy," and says the problem lasted about thirty minutes.

Proofpoint says TA505, the gang responsible for Locky ransomware and the Dridex banking Trojan, is using a new downloader, "AndroMut," that bears code similarities to the Andromeda malware family. AndroMut distributes the FlawedAmmyy remote access Trojan in at least two campaigns: one targeting South Korean users, the other aimed at Singapore, the UAE, and the US. Both campaigns use malicious Microsoft Office files as their infection vector, and both are interested in the banking sector.

Bloomberg reports that Broadcom is in "advanced talks" to acquire Symantec.


Today's issue includes events affecting Australia, China, Ghana, Iran, Ireland, Israel, Libya, NATO/OTAN, Netherlands, Singapore, South Korea, United Arab Emirates, United Kingdom, United States.

Bring your own context.

The people attackers are out to compromise may not be those you think.

"We do see a lot of organizations assuming that those VIPs or the very visible C-level executives - that these are the people that cyberattackers are going to go after. And certainly they are. However, we see attackers looking up and down org charts to find their points of compromise. It's important to really know how your organization specifically is being attacked."

—Gretel Egan, security awareness and training strategist at Proofpoint, on the CyberWire Daily Podcast, 7.1.19.

If you're trying to rummage through an organization's secrets, it's sometimes better to get to the people who empty the bosses' wastebaskets than it is to get to the bosses themselves.

And a pre-holiday reminder to our readers: the CyberWire won't publish or podcast on July 4th, 5th, or 6th. We'll be observing Independence Day. Enjoy the Fourth (as will we). We'll be back on Monday, July 8th, with our usual Briefings and Podcasts.

Are you centralizing all security-related data from across the business?

Is there a challenge with your security data you haven’t been able to wrangle? Devo enabled one their customers – a top five US retail manufacturer – to move fast enough to outpace malicious bots by reducing query time from 5 hours to 5 minutes. That was something they couldn’t do with anyone else.

See how Devo can modernize your approach to security analytics in this report by ESG.

In today's podcast, out later this afternoon, we speak with our partners at CenturyLink, as Mike Benjamin describes Emotet’s C2 behavior. Our guest is Avital Grushcovski from Source Defense, discussing the risk posed by third party web site tools. 

Cyber Security Summits: DC on July 16 and in Chicago on August 27 (Washington, DC, United States, July 16, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, The U.S. DOJ, Verizon, Center for Internet Security, IBM and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today.

RSA Conference 2019 Asia Pacific & Japan (Singapore, Republic of Singapore, July 16 - 18, 2019) Join industry leaders and peers at the region’s leading cybersecurity event. Learn the latest issues and solutions, stay on top of new regulations, demo cutting-edge products, expand your skills and grow your personal network. Register now.

Wicked6 Cyber Games (Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.

Cyber Attacks, Threats, and Vulnerabilities

Cybersecurity of NATO’s Space-based Strategic Assets (Chatham House ) This paper will introduce the cyber risks to strategic systems, through an evaluation of threats, vulnerabilities and consequences. It aims to frame the

ISIS Threats Leading Up to July 4 Depict New York, White House Attacks (Homeland Security Today) ISIS adherents have been renewing their vows of allegiance to leader Abu Bakr al-Baghdadi, who publicly declared himself caliph on July 4, 2014.

US Cyber Command issues alert about hackers exploiting Outlook vulnerability (ZDNet) Chronicle links the malware samples to Iran's APT33 group, which previously developed the infamous Shamoon malware.

Iran-Linked Hackers Said to Be Ready for Attacks on U.S. Targets (Foreign Policy) Even if real war doesn’t start, a cyberwar may soon be underway, experts say.

China Is Forcing Tourists to Install Text-Stealing Malware at its Border (Vice) The malware downloads a tourist’s text messages, calendar entries, and phone logs, as well as scans the device for over 70,000 different files.

Chinese border guards put secret surveillance app on tourists' phones (the Guardian) Software extracts emails, texts and contacts and could be used to track movements

Why can’t Israeli pilots get a GPS signal? (C4ISRNET) Israeli pilots have reported the loss of a GPS signal near Tel Aviv for nearly three weeks and officials believe Russia could be to blame.

File-storage app 4shared caught serving invisible ads and making purchases without consent (TechCrunch) With more than 100 million installs, file-sharing service 4shared is one of the most popular apps in the Android app store. But security researchers say the app is secretly displaying invisible ads and subscribes users to paid services, racking up charges without the user’s knowledge — or the…

A Cloudflare outage is impacting sites everywhere (TechCrunch) If you’ve been experiencing “502 Bad Gateway” notices all morning, for better or worse, you’re not alone. Cloudflare has been experiencing some major outages this morning, leaving many sites reeling in its wake. In fact, the company’s System Status page, which collects…

Cloudflare outage caused by bad software deploy (updated) (The Cloudflare Blog) Starting at 1342 UTC today we experienced a global outage across our network that resulted in visitors to Cloudflare-proxied domains being shown 502 errors (“Bad Gateway”). The cause of this outage was deployment of a single misconfigured rule within the Cloudflare Web Application Firewall (WAF)

TA505 begins summer campaigns with a new pet malware downloader, AndroMut, in the UAE, South Korea, Singapore, and the United States (Proofpoint) Proofpoint describes a new loader being distributed in the UAE, South Korea, Singapore, and the United States by a prolific threat actor.

Billions of Records Including Passwords Leaked by Smart Home Vendor (BleepingComputer) A publicly accessible ElasticSearch cluster owned by Orvibo, a Chinese smart home solutions provider, leaked more than two billion user logs containing sensitive data of customers from countries all over the world.

Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach (Forbes) Smart IoT devices are increasingly being purchased to bolster home, and business, security. Which is all well and good until a device management company forgets to password protect the user database and leaves 2 billion passwords and other data open to anyone...

Newly reported flaws in cameras, locks add to scrutiny of smart-home security (CyberScoop) Homeowners trying to protect their property with surveillance cameras and smart locks may have actually made their households more vulnerable, according to security flaws unveiled by separate teams of researchers Tuesday.

An Analysis of Arlo (Tenable TechBlog) Netgear Arlo is one of the most popular IoT camera vendors out there.

Security flaws in a popular smart home hub let hackers unlock front doors (TechCrunch) When is a smart home not so smart? When it can be hacked. That’s exactly what security researchers Chase Dardaman and Jason Wheeler did with one of the Zipato smart hubs. In new research published Tuesday and shared with TechCrunch, Dardaman and Wheeler found three security flaws which, when …

Cirque du Soleil app gives attackers same admin rights as operators (ZDNet) The developers of the app did not implement any form of authentication.

Alert Logic Report Sheds Light on Evolving Attack Methods Against Small and Midsize Businesses (Yahoo) Alert Logic, the SIEMless Threat Management™ company, today released the research, "Critical Watch Report: SMB Threatscape 2019." This report, specifically focused on challenges small and midsize businesses (SMBs) face, reveals a steady increase in attacks

Phishing-as-a-service threats abusing cloud services (SearchSecurity) New research from cybersecurity vendor Cyren claims the phishing-as-a-service industry is increasingly abusing popular cloud services to host their malicious links and avoid detection.

Supply chain attacks on the rise as the supply chain evolves (Software Integrity Blog) Supply chain attacks are not new. But as the supply chain grows longer and more complex, the attacks are evolving to keep up. Is your supply chain secure?

Schneider Electric Modicon Controllers (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Schneider Electric Equipment: Modicon Controllers Vulnerability: Improper Check for Unusual or Exceptional Conditions 2. RISK EVALUATION Successful exploitation of this vulnerability could result in a denial-of-service condition.

Quest KACE Systems Management Appliance (CISA) 1. EXECUTIVE SUMMARY CVSS v3 2.7 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Quest Equipment: KACE Systems Management Appliance (SMA) Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an administrative user unintentional access to the underlying operating system of the device.

Should you be concerned about your phone becoming a 'hot mic'? (Campaigns & Elections) Practitioners struggling to keep up with the growing list of cybersecurity protocols can add another concern to the list: a hacker turning their phone into a “hot mic.”

A Quick and Efficient Method For Locating the main() function of Linux ELF Malware Variants (TrendLabs Security Intelligence Blog) We constantly work on developing methods to address concerns pertaining to attacks against Linux systems, for example, by looking for ways to conduct quick and efficient analysis of malware samples that leads to their eventual detection and blocking.

New MacOS Malware Discovered (Dark Reading) A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

Facebook Removes Accounts Used to Infect Thousands With Malware (Threatpost) A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links.

US election security official highlights email threat (Washington Post) An election security official with the U.S. Department of Homeland Security has warned top state election officials nationwide to safeguard against fraudulent emails targeting state and local election workers

Hacking, Glitches, Disinformation: Why Experts Are Worried About the 2020 Census (New York Times) The government plans to deploy new technology for next year’s head count, but risks abound.

Riviera Beach pays massive ransom to hackers, official says (WPTV) A spokesperson confirms the City of Riviera Beach has paid a massive ransom to computer hackers following a costly cyber attack in May.

The Simple Way Apple and Google Let Domestic Abusers Stalk Victims (WIRED) To prove a point about common location-sharing apps, I asked my wife to use them to spy on me.

Helping survivors of domestic abuse: What to do when you find stalkerware (Malwarebytes Labs) As Malwarebytes works to improve its detection of stalkerware, we're also working to better protect the victims of this nefarious type of software. Here are some tips for survivors of domestic abuse who suspect they are being watched through stalkerware.

Security Patches, Mitigations, and Software Updates

Malwarebytes fixes Windows Defender deactivation bug in Windows 10 1903 (gHacks Technology News) Malwarebytes users who upgraded machines to Windows 10 version 1903 may have noticed that Windows Defender got deactivated after the upgrade automatically.

Cyber Trends

14 Reasons Professionals Give for Why Network Security is Getting Harder (Bricata) A survey found most cybersecurity professionals think the function of network security is getting harder. The survey also asked them "Why?" and here are their answers.

Trend Micro Global Survey Finds Internal Communication Falls Short Between Security and Developer Teams in the Move to DevOps (Trend Micro Newsroom) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced results from a recent survey that shows despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders polled believe communication between IT security and software development must

Superannuation accounts a rich target for cyber-crime (Investment Magazine)  Superannuation funds present unique opportunities for cyber-criminals to attack

Air travel needs cybersecurity, now tighter than ever (The Financial Express) Cybersecurity topics should not be considered only at a technical layer: even if these attacks are mainly performed on the IT infrastructure

Uncharted territory: why consumers are still wary about adopting cryptocurrency (Kaspersky) Cryptocurrency has rapidly become one of the most exciting technologies in recent years. The most popular of them all – Bitcoin – soared in value in 2017, leading to millions to purchase the currency and set up their own mining farms.

Symantec finds over 50% of enterprises 'believe security can't keep up with cloud adoption' (ITWire) Symantec has released its latest "Cloud Security Threat Report" which finds "cloud security exacerbated by immature security practices, overtaxed IT staff and risky end-user behaviour".

Cloud Security Threat Report (Symantec) Seventy-three percent of firms had cloud incidents due to immature security.

Top 3 Cybersecurity Trends that Modern Businesses Should Look out For (CIOReview) Top 3 Cybersecurity Trends that Modern Businesses Should Look out For By CIOReview - Cybersecurity is laced with highest security systems, playing a prominent role in curbing cyber theft from businesses....

The human factor and its role in cybersecurity breaches (Essential Retail) We take a look at the threat landscape facing retailers, and what companies can do to boost cyber security


Security-as-a-service soars, says Canalys (CRN Australia) 46 percent growth year on year heralds security transition.

What to Pay for Cybersecurity Professionals? (Cyber Defense Magazine) The increase in salaries is more dramatic this year, as companies fight each other for talent

Supply isn't keeping up with the demand to fill cybersecurity jobs in Ireland ( A jump in demand for suitable candidates has increased Ireland’s skills gap in the area.

TrapX Security raises $18 million to thwart cyberattacks with decoy assets (VentureBeat) San Jose-based cybersecurity solutions provider TrapX has raised $18 million in venture capital from a raft of investors.

Gryphon Expands Industrial Cyber Capabilities through Acquisition of PGFM (Yahoo) Gryphon Technologies, Inc. ("Gryphon" or the "Company"), a premier defense engineering and technical services provider supporting national ...

Broadcom Is in Advanced Talks to Acquire Symantec (Bloomberg) CEO Tan has branched out into software already with CA deal. Chipmaker led wave of deals that reshaped the industry.

Raytheon United Technologies merger (Military & Aerospace Electronics) Speculation merger may not happen, President worries it could cut competition, Air Force calls it a security concern, and investors question its logic.

The company you keep (SC Media) A new take on the old adage “you’re known by the company you keep,” might aptly apply to women in security who’ve found success, progress and

Don't tell Alice and Bob: Security maven Bruce Schneier is leaving IBM (Register) Says bye to Big Blue

Products, Services, and Solutions

Qualys Expands Global Cloud Platform to the Canadian Market (PR Newswire) Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud-based security and compliance solutions, ...

Sepio Systems Partners with Distribution Giants Tech Data and SHI to Tackle Hardware-Based Cyber-Attacks (APN) The partnership will allow Tech Data’s and SHI’s customers to benefit from easy deployment of Sepio Prime and Sepio Agents for managing the security risk coming from uncontrolled peripheral devices and accessories in their network

Elbit : Subsidiary Selected to Supply a Cyber Intelligence System to the Dutch National Police | MarketScreener (Market Screener) Following an extensive and competitive evaluation process Cyber Intelligence Ltd, a subsidiary of Elbit Systems, was selected to provide the Dutch National Police...

5 Years of Fighting DDoS with the Power of Akamai (Akamai) Earlier this year, Akamai celebrated the fifth anniversary of the Prolexic acquisition. The merger was officially completed in February of 2014, and a lot has happened since then. In this post, we want to spend a moment reflecting on the last five years and look at what's ahead.

Unisys Stealth Integrates With Dell EMC Cyber Recovery Software (PAGEONE) Global IT company Unisys has integrated its award-winning software security system Unisys Stealth with Dell EMC Cyber Recovery software for improved cyber resilience and business continuity. This will allow quicker and more secured cyber recovery

Unisys Joins the Cyber Security Coalition to Help Fight Cyber Crime in Belgium (Yahoo) Unisys Corporation (UIS) today announced it has joined the Cyber Security Coalition – a partnership among more than 60 organizations from the academic world and the public and private sectors that have joined forces in the fight against cyber

Chrome OS Gets Its Own Cybersecurity Solution - Deep Instinct (Android Headlines) Deep Instinct has now unveiled a new update to its deep learning AI-driven cybersecurity solution that adds support for Chrome OS, make Chromebooks even more secure than before for enterprise and similar organizations.

ThreatConnect Releases Its Latest Version of CAL to Make Threat Intelligence More Easily Quantifiable (Yahoo) ThreatConnect®, provider of the industry’s only intelligence-driven security operations platform, announces its latest version of CAL™ (Collective Analytics Layer), its cloud-based analytics engine which offers immediate insight into the relevance and pervasiveness of threats and indicators of compromise

Technologies, Techniques, and Standards

Cybersecurity crisis communication: How to do it well (Help Net Security) Riviera Beach is one of the several cities and towns in Florida which have recently been hit with ransomware. Its local government, like that of Lake City

What businesses can learn from a classic movie (nCipher Security) They say that if you haven’t got your health, you haven’t got anything. At least that’s what Christopher Guest said in his role as Count Tyrone Rugen in the movie The Princess Bride.

The art and science of password hashing (Help Net Security) Password hashing is a one-way cryptographic transformation on a password, turning it into another string, called the hashed password.

How cyber security can tackle cyber bullying (The New Paper) Access to online learning exposes students to a wealth of information. However, it can also expose them to the darker side of the Internet. Cyber bullies use Internet-based platforms to torment others, even when attending school. And cyber bullying is a serious political,...

Design and Innovation

Facebook News Feed changes downrank misleading health info and dangerous ‘cures’ (TechCrunch) No, drinking bleach is not a miracle cure for diseases and other conditions — but that’s the sort of bogus health claim that’s floating around the web these days, getting blocked by sites like Amazon and YouTube. Now you can add Facebook to that list of sites taking action —…

Addressing Sensational Health Claims (Facebook Newsroom) In order to help people get accurate health information and the support they need, it’s imperative that we minimize health content that is sensational or misleading. 

Facebook Is Censoring Posts That Could Save Opioid Users' Lives (Vice) Facebook appears to be blocking people who warn users about poisonous batches of drugs or who supply materials used to test for fentanyl.

Legislation, Policy, and Regulation

Why the US cyber attack on Iran was 'game changing' (CNBC) Haiyan Song of Splunk says cyber attacks could be a "new way" for countries and nation states to think about their competitiveness in the military world.

Iran Isn’t Trying to Build a Bomb Tomorrow. It Wants Sanctions Relief. (Foreign Policy) Iran’s decision to surpass uranium enrichment limits isn’t a dangerous provocation. It’s a calculated effort to get European leaders to reinforce the nuclear deal and…

Europeans urge Iran to abide by nuclear pact; Israel says preparing... (Reuters) European signatories to a nuclear pact with Iran said on Tuesday they were "..

U.S. government staff told to treat Huawei as blacklisted (Reuters) A senior U.S. official told the Commerce Department's enforcement staff thi...

How U.S. Chipmakers Pressed Trump to Ease China's Huawei Ban (Bloomberg) Trump’s easing up on entity list comes after lobbying campaign. American firms say current restrictions harm national security.

Big Tech attacks UK plan to hold firms liable for harmful content (Financial Times) Online harms regulations says platform have duty of care to protect users.

Is Your VPN Provider in a 14 Eyes Country? (What is 14 Eyes?) (HackRead) The reason people have Virtual private networks (VPNs) is that they protect our online privacy, however, privacy is essentially non-existent if you live in a place where the government is allowed to track your online activities.

DOD's cyber policy deputy clarifies homeland support role (FCW) A senior defense official explained that DOD can provide information sharing and technical expertise to respond to ongoing cyber threats against the homeland.

House lawmakers officially ask Facebook to put Libra cryptocurrency project on hold (The Verge) ‘These vulnerabilities could be exploited and obscured by bad actors’

Analysis | The Cybersecurity 202: Time’s running out if Congress wants to boost 2020 election security (Washington Post) 'It takes time to plan, to do assessments,' says Vermont's top election official.

Thailand Fortifies Cybersecurity for a Seamless ASEAN Connected to the World (Yahoo) "Seamlessly connected" is how ASEAN aspires to facilitate and expand people-to-people interactions among its diverse population and build a common community with a shared sense of ownership.

France Moves Toward U.S. Model By Endorsing Corporate-Led Investigations (Wall Street Journal) Guidance explaining how internal investigations can help companies secure negotiated settlements to resolve allegations of certain financial crimes signals a significant shift in the country’s approach to corporate crime.

Spies fear a consulting firm helped hobble U.S. intelligence (POLITICO) Insiders say a multimillion dollar McKinsey-fueled overhaul of the country’s intelligence community has left it less effective.

New law brings big change to IRS in IT, cyber (FCW) A new law will implement a raft of technology and cybersecurity reforms at the IRS while also restoring hiring authorities that officials say are key to attracting qualified IT talent.

Litigation, Investigation, and Law Enforcement

Transnational Organized Crime and National Security: Hezbollah, Hackers and Corruption (Lawfare) Hezbollah has adapted to the American crackdown on its money laundering operations by bringing in new front-men and shell companies. In the U.S., municipalities across the country have suffered ransomware attacks. And, new corruption investigations demonstrate the vulnerability of Central and South American governments to drug cartels.

Senate committee details cyber deficiencies at 8 agencies, but is that the whole story? (Federal News Network) The HSGAC Subcommittee on Investigations’ report on the cybersecurity at eight agencies highlights systemic problems over the last decade.

Border-surveillance subcontractor suspended after cyberattack revealed sensitive monitoring details (Washington Post) The suspension is a crushing blow to one of the central cogs of the U.S. border-surveillance machine.

D-Link agrees to new security monitoring to settle FTC charges (Ars Technica) Agreement settles charges D-Link left users open to critical and widespread threats.

Kamala Harris campaign lawyer hired Fusion GPS for Hillary Clinton (Washington Examiner) The former top lawyer for Hillary Clinton’s failed presidential campaign who hired Fusion GPS to carry out controversial opposition research against then-candidate Donald Trump in 2016 is now working for a top 2020 Democratic presidential hopeful.

TikTok now faces a data privacy investigation in the UK, too (Engadget) The popular short-form video app may have violated the GDPR.

Why did the NCA in Ghana acquire Israeli company NSO’s Pegasus? (Ghana Business News) There is something ominous about the entire transaction. It’s a chilling reality, but Ghanaians are

An online vigilante group that targets sexual predators may have contributed to a sailor’s death (Task & Purpose) Officials confirmed to Task & Purpose that the sailor had been interviewed by the Naval Criminal Investigative Service about the incident caught on video prior to his death.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Smoky Mountain Bigfoot Conference (Gaitlinsburg, Tennessee, USA, July 27, 2019) Join us for the first ever Smoky Mountain Bigfoot Conference. We have some of America's most experienced Bigfoot researchers and investigators including Cliff Barackman, Bigfoot Field Researcher and co-host...

Upcoming Events

INTERPOL World 2019 (Singapore, July 2 - 4, 2019) INTERPOL World is a global co-creation opportunity which engages the public and private sectors in dialogue, and fosters collaboration to counter future security and policing challenges. INTERPOL World...

Minneapolis Cybersecurity Conference (Minneapolis, Minnesota, USA, July 11, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Insider Threat Program Development - Management Training Course (Mountain View, California, USA, July 15 - 16, 2019) The Insider Threat Defense Group will hold our highly sought after Insider Threat Program (ITP) Development - Management Training Course, in Mountain View, California, on July 15-16, 2019. This comprehensive...

Raleigh Cybersecurity Conference (Raleigh, North Carolina, USA, July 18, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, July 24 - 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.