skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

Daily briefing.

Google’s cloud suffered worldwide outages yesterday. Now fixed, they seem to have been more nuisance than disaster ("network congestion" is cited as the cause). But TechCrunch points out that the incident suggests the cloud may not be as reliable as users typically assume.  

Trend Micro describes "BlackSquid," a criminal campaign distributing the XMRig miner. For now the campaign is after Monero cryptocurrency, but there's no reason to think its approach can't (and won't) be used to drop other payloads in the near future.

"All the good things come to an end." The criminal proprietors of GandCrab ransomware say they’ve made enough money ($2.5 billion, if they’re to be believed, BleepingComputer reports) and that they plan to call it a day and retire at the end of June to enjoy a "well-deserved retirement," and advise hold-out victims to pay up soon. They add, "We have proven that by doing evil deeds, retribution does not come." GandCrab appeared in January 2018 and quickly became a black market leader.

NSA denied, in discussions with Maryland Representative Ruppersberger, that the agency’s tools had anything to do with the Baltimore ransomware attack. In particular, NSA said it had no evidence the EternalBlue vulnerability played a role in the incident. Some have read this as a non-denial denial (see examples in the Washington Post) but the general sentiment seems to be that Baltimore is less sinned against than sinning.

The US Justice Department has begun preparing an anti-trust case against Google, the Wall Street Journal reports. 


Today's issue includes events affecting Australia, Canada, Chile, China, Egypt, Germany, Ireland, North Macedonia, Russia, Singapore, South Africa, United Kingdom, United States, and Venezuela.

Bring your own context.

Microsoft has been reminding people to patch for the BlueKeep Remote Desktop Protocol vulnerability. But an awful lot of machines remain unpatched.

"It's just about as bad as it gets, and it's affecting a tremendous amount of Windows machines on the Internet just because it covers so many versions. And unfortunately, much like SMB, while it should really never be exposed to the Internet, it very, very often is, even in organizations that you would hope know better."

Craig Williams, director of Talos Outreach at Cisco, on the CyberWire Daily Podcast, 05.30.19.

So do take it seriously. As Williams added, "deploy some protections."

Get the In-Depth Guide to Operationalizing Threat Intelligence.

Threat intelligence is critical but often difficult to manage, automate, or operationalize. Threat Intelligence Gateways are an exciting, emerging network security technology that take the heavy lifting out of making threat intelligence actionable, operational, and useful. Learn about how this technology is turning threat intelligence into action to block threats at scale in the whitepaper, Operationalizing Threat Intelligence: An In-Depth Guide to Threat Intelligence Gateways.

In today's podcast, out later this afternoon, we speak with our partners at the Johns Hopkins University Information Security Institute, as Joe Carrigan discusses Google's restriction of ad-blocking in upcoming versions of Chrome. Tamika Smith speaks with the Washington Post's Geoffrey Fowler about his recent article “It’s the middle of the night. Do you know who your iPhone is talking to?

Cyber Howard Conference (Columbia, Maryland, United States, June 19, 2019) Join us for our 10th annual cyber conference in Howard County. We will tackle the topic of Cyber Sensemaking which is a fluid and continuous approach for establishing better defenses and best practices as a cyber community.

Cyber Warrior Women Summer Social: Sip and Paint (Columbia, Maryland, United States, August 21, 2019) Join the Cybersecurity Association of Maryland, Inc. (CAMI) for the annual Cyber Warrior Women Summer Social, an all-about-fun-and-networking event! We're adding an artistic element to this year's event with a wine glass painting exercise. No previous art experience required.

Cyber Attacks, Threats, and Vulnerabilities

Google Cloud in worldwide wobble, G Suite, YouTube affected (CRN Australia) High network congestion takes down G Suite, YouTube.

'Network congestion' blamed for Google Cloud outage that affected YouTube, Snapchat and G Suite (Computing) Google Cloud outage lasted more than four hours on Sunday and affected Snapchat, Discord, Shopify, Vimeo and Pokemon Go as well as Google's own services

Google’s Cloud outage is resolved, but it reveals the holes in cloud computing’s atmosphere (TechCrunch) Five hours after Google publicly announced that it was working to resolve an outage in its Cloud computing network that had taken out a large chunk of Google services as well as Shopify, Snap, Discord and other popular apps, the problem seems to be resolved. The outage hit everything from the abili…

BlackSquid Slithers Into Servers and Drives With 8 Notorious Exploits to Drop XMRig Miner (TrendLabs Security Intelligence Blog) We found a new wormable malware we've named BlackSquid targeting web servers, network and removable drives using evasion, anti-virtualization, anti-debugging, and anti-sandboxing techniques to drop a Monero miner.

TA505 Suspected in Chilean Financial Institutions Malware Attacks (Infosecurity Magazine) CyberInt Research has identified further activities by cyber-gang TA505.

The shady world of Russian data theft (BBC News) Sales of hacked personal data are booming in Russia as the penalties are rarely heavy.

DDoS Botnets are Back and Poised to Do Damage (Infosecurity Magazine) To lessen the threat of botnets, it's critical for users to be more conscious of their own security

‘I was a Macedonian fake news writer’ (BBC) In North Macedonia, there’s a small industry of websites publishing misleading and inflammatory political articles targeted at US readers. Simon Oxenham meets a woman who worked there.

US Companies Help Censor the Internet in China, Too (WIRED) The 30th anniversary of the end of the Tiananmen uprising highlights how Chinese, and Western, companies filter what Chinese internet users can see.

GandCrab ransomware operation says it's shutting down (ZDNet) GandCrab crew says it made enough money and plans to retire within a month.

GandCrab Ransomware Shutting Down After Claiming to Earn $2.5 Billion (BleepingComputer) After almost a year and a half, the operators behind the GandCrab Ransomware are shutting down their operation and affiliates are being told to stop distributing the ransomware.

GandCrab ransomware group announces 'well-deserved retirement' (Computing) So long and thanks for all the cash.

Another MacOS Bug Lets Hackers Invisibly Click Security Prompts (WIRED) Yet again, a bug in Apple's safeguards against "synthetic clicks" allows hackers to slip past Mojave's security restrictions on apps.

Apple macOS security protections can easily bypassed with ‘synthetic’ clicks, researcher finds (TechCrunch) A security researcher has disclosed a new flaw that undermines a core macOS security feature designed to prevent apps — or malware — from accessing a user’s private data, webcam or microphone without their explicit permission. The privacy protections, recently expanded in macOS Mojave, were m…

Wave of SIM swapping attacks hit US cryptocurrency users (ZDNet) Something strange happened last week, with tens of US-based cryptocurrency users seeing SIM swapping attacks.

Public SAP exploits could enable attacks against thousands of companies (CSO Online) A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do.

Realtek SDK Exploits on the Rise from Egypt (NETSCOUT) Executive Summary  ASERT’s IoT honeypot network continuously monitors known exploit vectors and we recently detected a spike in exploit attempts targeting the Realtek SDK miniigd SOAP vulnerability in consumer-based routers from the end of April 2019 until the first half of May 2019.

Microsoft Azure Being Used to Host Malware and C2 Servers (BleepingComputer) Microsoft's Azure cloud services have become an attractive option for cybercriminals to store malicious content. From phishing templates to malware and command and control services, it seems that crooks found a new place for them.

Microsoft users at the mercy of hackers after flaw revealed (Cybersec Innovation Partners) Microsoft users worldwide are at risk of fraud, identity theft, malicious surveillance and remote access as a result of a significant flaw embedded in its operating system.

Hacking WhatsApp – has a line been crossed? (IT Pro Portal) The commercialisation of cyber weapons - private companies are developing and selling to governments is alarming.

iPhone Privacy Is Broken…and Apps Are to Blame (Wall Street Journal) Don’t be too confident in those privacy controls. Our test of 80 apps in Apple’s App Store reveals most apps are tracking you in ways you cannot avoid

People Inc. reports data security breach involving clients' personal info (The Buffalo News) People Inc. said it was the target of a data security breach that involved protected health information of some of its current and former...

Baltimore's Ransomware Mess Is Its Own Fault—Cyber Saturday (Fortune) But NSA isn't blame-free.

Analysis | The Cybersecurity 202: Why the NSA is pushing back against Baltimore ransomware link (Washington Post) The optics of a government tool forcing offline a major American city are especially bad.

Ransomware isn’t just a big city problem (Malwarebytes Labs) The city of Baltimore has experienced a very public ransomware attack. But in a season of increasing ransomware detections among organizations, they're not alone. See which cites have been most impacted by ransomware and what organizations can do to develop resilience against attacks.

Ex with benefits: A third of employees still have access to files from former workplace (Manila Standard) Manila Standard | Defining The News

A Small Business With No Working Website, Felled by a Cyberattack (Wall Street Journal) Small businesses are increasingly battling costly cyberattacks. Jessie Daniels and Polly Thistlethwaite found that sometimes the pain is enough to put a company out of business.

Security Patches, Mitigations, and Software Updates

Apple Just Patched a Modem Bug That's Been in Macs Since 1999 (WIRED) A researcher found the 20-year-old flaw by drawing on tricks from a childhood spent tinkering with his parents’ Mac Performa.

Chrome Extensions Policy Hits Deceptive Installation Tactics (SecurityWeek) Google announced a new policy that aims at eliminating the use of deceptive installation tactics among Chrome browser extensions.

Apple will reportedly limit third-party tracking in kids apps (Engadget) Beginning next week, Apple will reportedly limit third-party tracking on apps in the kids category.

Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamers (Threatpost) Nvidia is urging gamers to update its GeForce Experience software after patching two high-severity vulnerabilities.

Cyber Trends

Tripwire 2019 Vulnerability Management Survey (Tripwire) Unpatched vulnerabilities remain the root cause of today’s most serious data breaches. To understand how organizations are addressing vulnerabilities today, in May 2019, Tripwire partnered with Dimensional Research to survey 340 infosecurity professionals on vulnerability management trends.

5G Security Challenges: A Vendor’s POV (Threatpost) How will 5G vendors deal with the issues of security? Nokia's head of end-to-end security solutions discusses during the GSMA Mobile 360 conference.

IoT Cyber Attacks Percentages are Insanely High (Digital Overload) A new piece of research has revealed that cyber attacks are happening more often and are more numerous than ever before. As the endorsement of Internet of Things (IoT) devices...

Decoding the global economy of cybercrime (Economist) Conservative estimates show cyber-criminal revenue worldwide of at least US$1.5trn to date— equal to the entire GDP of Russia.

Third party failures: a problem for the majority of organisations (Information Age) Third party failures are causing major financial and reputational damage to organisations. Can anything be done to secure the supply chain?

Confusion Reigns as C-Suite Bemoan Lack of Security Resources (Infosecurity Magazine) Nominet research finds 90% of organizations are missing something

Much @Stake: The Band of Hackers That Defined an Era (WIRED) Today's cybersecurity superstars share a common thread—one that leads back to early hacking group Cult of the Dead Cow.

Vendors Need to Stop Fear Selling, it’s Damaging the Whole Industry (Infosecurity Magazine) FUD selling is frustrating, unhelpful and damaging


Huawei: China's State Hackers 'Rigging 5G Tests' Against Nokia And Ericsson (Forbes) A Sunday newspaper has alleged that China's state hackers are secretly testing security vulnerabilities in Nokia and Ericsson equipment and feeding the information to "independent" testers to cheat the results in favor of Huawei.

American Threat to Huawei’s Chip Maker Shows Chinese Tech Isn’t Self-Sufficient (Wall Street Journal) Huawei has spent 15 years and billions of dollars building an advanced semiconductor maker, with the goal of making the Chinese telecom giant self-sufficient. A U.S. blacklisting stands to set it back years in that goal.

Science publisher IEEE lifts ban on Huawei reviewers (TechCrunch) After a temporary ban, the Institute of Electrical and Electronics Engineers, commonly known as the IEEE, announced on Monday it has lifted curbs on editors and peer-reviewers that work for Huawei and the Chinese firm’s affiliates. The reversal is yet another example of the regulatory murkine…

Another Ripple From the Huawei Ban: Scientific Peer Review (WIRED) IEEE, an engineering organization that publishes several scientific journals, bans Huawei employees from prepublication peer reviews.

How Zuckerberg’s Billionaires Club Can Atone for Facebook (The Hive) The Facebook co-founder has made enemies—very rich enemies—of many of his former partners, who are now speaking out. Chris Hughes and the others should put their money where their mouth is.

Report: Hundreds of engineers laid off at Oracle amid cloud infighting (Silicon Valley Business Journal) Oracle Corp. has spent months quietly cutting jobs across the U.S., with some employees worrying that as much as 10 percent of the company’s 138,000 employees could be out of a job by the time the cuts are complete, according to a new report.

Cybersecurity sector continues to heat up (Washington Post) Two D.C.-area companies announced deals recently.

Baltimore software startup TrackOFF purchased by global cybersecurity firm (Baltimore Sun) Trackoff, a Baltimore software startup that protects consumers' privacy online, was acquired by multi-national cybersecurity firm Avast.

Fluree grabs $4.7M seed round to build blockchain-based database (TechCrunch) Fluree, a North Carolina startup that wants to bring the immutability of blockchain to the database, announced a $4.7 million seed round today led by ​4490 Ventures​ with participation from Revolution’s Rise of the Rest Seed Fund​. As CEO and co-founder Brian Platz explains, the database combines b…

CrowdStrike may top these 6 biggest-ever U.S. security IPOs next month (Silicon Valley Business Journal) The Suynnyvale could be valued as high as $4.5 billion and would be only the seventh venture-backed U.S. cybersecurity business to be valued at more than $1 billion in its Wall Street debut.

Kaspersky Lab North American Leader Maxim Frolov Leaves Firm (CRN) Maxim Frolov has departed Kaspersky Lab just five months after assuming responsibility for the company's North American sales, marketing and business development functions.

Dashlane Hires Joy Howard as Chief Marketing Officer (MarTech Advisor) In her new role, she will oversee the global marketing function as well as all policy-related initiatives

Products, Services, and Solutions

FIME disrupts payments testing with industry’s first digital platform (FIME) FIME continues innovation and adapts testing in line with the rapid digital transformation of the global payments industry.

BlackBerry Cylance, NordVPN, and LastPass team up to offer security bundle! ( For a limited time, you can get BlackBerry Cyalnce, NordVPN, and LastPass for up to six devices in one subscription package.

Three major Irish banks pilot Deloitte blockchain solution (FinTech) Three major banks in Ireland are using blockchain to verify staff credentials in a drive for security and compliance. The Bank of Ireland, AIB and Ulster Bank are using Deloitte’s blockchain solution for a pilot initiative, is has been revealed. The solution, which uses Ethereum and was built by Deloitte’s Blockchain Lab in Dublin, verifies and tracks staff credentials and qualifications data.

IBM And Thomson Reuters Announce AI Collaboration (e3zine) IBM and Thomson Reuters announced a joint collaboration to help banks through the powerful combination of AI and real-time regulatory insights.

Siemens LOGO!, a PLC for small automation projects, open to attack (Help Net Security) Siemens LOGO, a PLC manufactured by Siemens, sports vulnerabilities that could allow attackers to reconfigure the device, access project files, etc.

SailPoint launches 'Predictive Identity' (Security Document News) SailPoint Technologies, a developer of enterprise identity governance, today unveiled the SailPoint Predictive Identity platform.

Squirrel Compliancy Solutions Releases Version 2 of their Automated Network Compliance for DISA STIGs (ANCDS) (Yahoo) Squirrel Compliancy Solutions, a provider of network infrastructure security management, has announced the availability of their Automated Network Compliance ...

New infosec products of the week: May 31, 2019 (Help Net Security) New infosec products of the week include releases from the following vendors: AccessData, Bittium, Moogsoft, SailPoint, StorageCraft and Zyxel.

Technologies, Techniques, and Standards

What’s in the ‘black box’ of AI? NIST invites industry to brainstorm standards (Federal News Network) The National Institute of Standards and Technology has just over two months to submit a plan for artificial intelligence technical standards.

Cyber Militia Innovation Meets Mission Needs (SIGNAL Magazine) National Guard members conducting cyber ops found themselves poorly equipped, so they banded together and built the system they needed on a shoestring budget.

Disruptive by Design: Intelligence Fusion Inoculates Against Cyber Threats (SIGNAL Magazine) In the cyber realm, organizations need the means to rapidly identify emerging threats, immediately respond to mitigate risk, and systematically learn from these encounters—just as the immune system responds to a virus.

Design and Innovation

CYBERSECURITY: DOE, utilities seek the ultimate shield against hackers (E&E News) A $33 million, five-year research project that teamed Energy Department laboratories with private cybersecurity firms and California's largest utilities wants to revolutionize how utilities defend themselves.

Even your bot needs to have a manageable identity (ITWeb) Identity governance platforms will need to evolve to identify and manage not only humans, but the non-human elements in our systems.

Bitcoin Mining Difficulty Hits All-Time High – So Is Price Next? ( Bitcoin mining difficulty has surged by more than 11 percent to reach a new all-time (ATH) for the network.

What You Should Know About The Origins Of Bitcoin (Crypto Daily) You probably think you know a lot about Bitcoin, you know what it is, you sort of know how it works and you certainly know what it’s worth, or at least, you know what your Bitcoin

A laptop infected with the worst malware sold for $1.3 million, all for art (National Post) Chinese internet artist Guo O Dong, who became famous for riding a Segway while walking a hipster on a leash, made the piece

Research and Development

Researchers spot manipulated photos and video using AI-driven imaging system (Help Net Security) To thwart sophisticated methods of altering photos and video, researchers have a technique to authenticate images throughout the entire pipeline.

Researchers fight ransomware attacks by leveraging properties of flash-based storage (Help Net Security) Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, "Project Almanac: A Time-Traveling Solid State Drive,"


UWF showcases cybersecurity initiatives on international stage at NATO cyber defence conference (University of West Florida Newsroom) Breaking barriers as the first U.S. academic institution to participate in the NATO Cyber Defence project, the University of West Florida showcased its cybersecurity initiatives this month on the international stage at the 5th NATO Cyber Defence Smart Defence Projects Conference. Dr. Eman El-Sheikh, UWF Center for Cybersecurity director, presented both at the conference and the …

Researchers want less restrictive policies on accepting money from Chinese telecoms giant Huawei, but that appears unlikely (Inside Higher Education) Researchers want less restrictive policies on accepting money from the Chinese telecom giant -- but that appears unlikely, given recent federal policy moves and legal action against the company. Professors also question why they aren't involved in making decisions on bans.

Legislation, Policy, and Regulation

In a Blow to Maduro, Russia Withdraws Key Defense Support to Venezuela (Wall Street Jounal) Russia has withdrawn key defense advisers from Venezuela, an embarrassment for President Nicolás Maduro as Moscow weighs the leader’s political and economic resilience against growing U.S. pressure.

Combating cyber attacks requires mindset change: CSA chief (The Straits Times) As malicious cyber attacks increasingly target civilian arenas like finance or healthcare, preparing for them requires a mindset change on the part of cyber-security agencies.. Read more at

Tech Companies & Security Experts Pan Encryption Backdoor Proposal (Digital Trends) Tech companies, civil rights groups, and security experts have released an open letter condemning the U.K. security agency GCHQ's proposal to circumvent encryption on private messages. The proposal suggested that encrypted messages should be copied and sent to law enforcement agencies.

Slack, WhatsApp, Snapchat And Ghost Protocol All Security Risks, Says Wickr CTO (Forbes) Wickr is known as one of the most secure messaging apps available, even trusted by government agencies against state-level hacking. Now the company's co-founder and CTO gives his views on the security risks with WhatsApp, Slack and Snapchat, as well as the issues with the "ghost protocol."

Tory leadership contenders side with US over Huawei security threat (Times) Tory leadership candidates backed US calls to block Huawei from Britain’s communications network yesterday as President Trump prepared to raise the issue during his state visit. Hours before he...

Pompeo Tells Germany to Tackle China or Lose Data Sharing (Bloomberg) U.S. won’t allow data to flow across ‘untrustworthy’ networks. U.S. Secretary of State has talks with Merkel, Maas in Berlin.

Shanahan: Chinese relationship with Huawei, companies is a security risk for DoD (Defense News) Speaking at the annual Shangri-La Dialogue security summit in Singapore, Shanahan stressed that “no one nation can – or should - dominate the Indo-Pacific.”

US doesn’t have any evidence on Huawei chips: Chinese official (The Economic Times) Degui said, “I don't know where they got the information that our chips are not secure.” Nudging US, he emphasized, “they (US) dont have the evidence at all.”

US doesn’t have any evidence on Huawei chips: Chinese official (The Economic Times) Degui said, “I don't know where they got the information that our chips are not secure.” Nudging US, he emphasized, “they (US) dont have the evidence at all.”

China Threatens To Blacklist U.S. Firms Refusing To Supply Huawei (Forbes) China has announced its own "non-reliable entity list" in retaliation for U.S. sanctions against Huawei which have hit the Chinese manufacturing giant hard. The move is intended to even the playing field ahead of trade talks and makes Huawei concessions more likely.

America must secure its supply chains against a vulnerability of its own making (Defense News) If China’s rare earth leverage over the U.S. is one part strategic foresight, it is two parts American strategic miscalculation and shortsightedness.

Should private companies be drafted in the cyber war? (TheHill) Historically, the defense, intelligence and law enforcement communities were primarily responsible for handling nation-state attackers.

DHS Needs to Set Guardrails for Its Expanded Insider Threat Program ( As the department starts monitoring activity on unclassified networks, officials need to update policies and procedures to keep the program effective and constitutional.

In a White House Summit on Quantum Technology, Experts Map Next Steps (Wall Street Journal) Academics and government officials met on the White House grounds to discuss the urgent need to collaborate to advance the country’s prowess in quantum information science.

IG: DHS needs more election tech help, IT patching (FCW) The Department of Homeland Security needs additional IT workers to help it assist state and local election officials, as well as patch its internal systems, the agency's IG said in a semi-annual report to Congress.

Navy ramping up adoption of new pay and hiring system for cyber employees (Federal News Network) In today’s Federal Newscast, the Navy’s Fleet Cyber Command started wide-scale implementation of the Cyber Excepted Service this month.

Litigation, Investigation, and Law Enforcement

Arrest of Los Alamos scientist opens new front in crackdown on Chinese infiltration of U.S. labs (Yahoo News) The indictment of a former researcher at Los Alamos National Laboratory appears to signal a new front in the government’s crackdown on China’s efforts to get access to sensitive U.S. scientific research.

NCIS witnesses refuse to take the stand in SEAL war crimes case, judge mulls dismissing all charges (Navy Times) Navy judge Capt. Aaron Rugh unexpectedly released Gallagher from custody on Thursday as a remedy to what he called interference by prosecutors.

Assange won’t face charges over role in devastating CIA leak (POLITICO) The decision surprised national security experts and some former officials, given prosecutors’ recent decision to go after the WikiLeaks founder on Espionage Act charges.

Manning renews effort to be released from Virginia jail (AP NEWS) Lawyers for former Army intelligence analyst Chelsea Manning are renewing efforts to get her released from a northern Virginia jail. Manning's lawyers filed court...

Justice Department Is Preparing Antitrust Investigation of Google (Wall Street Journal) The Justice Department is gearing up for an antitrust investigation of Alphabet’s Google, a move that could present a major new layer of regulatory scrutiny for the search giant.

The Justice Department is preparing a potential antitrust investigation of Google (Washington Post) The Justice Department has taken early steps toward opening a federal antitrust investigation into Google, according to three people familiar with the matter.

Google facing fresh US antitrust investigation after billions in EU fines (The Telegraph) The US Department of Justice is preparing to investigate whether Google conducts anti-competitive business practices in its online searches.

Facebook Loses Appeal to Stall EU Data Transfer Battle (Bloomberg Law) Facebook Inc. lost its bid to have Irish courts rehear a challenge to its EU-to-U.S. cross-border data transfer methods, setting the stage for a battle before the European Union’s top court.

Ruppersberger: EternalBlue Not a Factor in Recent Baltimore Ransomware Attack (Congressman C.A. Dutch Ruppersberger) Congressman C.A. Dutch Ruppersberger (D-MD) on Friday met with senior leaders of the National Security Agency, located in his district, to discuss recent malicious cyber attacks throughout the country, including the City of Baltimore. He issued the following statement:

N.S.A. Denies Its Cyberweapon Was Used in Baltimore Attack, Congressman Says (New York Times) A stolen N.S.A. hacking tool was a component in a cyberattack on the city, people involved in the investigation have told The Times.

‘Everyone dies’: Barr says he’s unconcerned about the toll his job is taking on his reputation (Washington Post) In a CBS interview, the attorney general also defended Trump against accusations that he is “shredding institutions,” saying he’s seen no evidence of that.

Do Republicans Have The Will To Win The Russia Hoax? (Human Events) Do Republicans have the will to stop their shallow whataboutism and “it’s time to move on” long enough to seize victory?

Alleged LinkedIn hacker Yevgeniy Nikulin will stand trial in U.S. court, despite mental illness symptoms (CyberScoop) Yevgeniy Nikulin is headed back to court. The Russian accused of hacking a number of sites, including LinkedIn and Dropbox, was ruled fit to stand trial in a May 29 decision by U.S. District Judge William Alsup. Nikulin previously was ordered to undergo a psychiatric evaluation for refusing to communicate with his attorneys about his case, despite an ability to communicate about other topics without difficulty. Government attorneys previously argued “there is no comparison to the present case, where the defendant has stated that he has no complaint regarding his representation, but chooses not to discuss the proceedings with his counsel.” The defense has argued that Nikulin suffers from post-traumatic stress disorder related to his brother’s suicide and an abusive father, and that he has exhibited irrational behavior. Now, Alsup has ruled that the case against Nikulin will move forward. In his decision, the judge said Nikulin’s refusal to participate …

Canadian sentenced for selling encrypted phones to criminals (AP NEWS) A Canadian man who sold encrypted Blackberry smartphones to criminals worldwide that enabled them to sell drugs and even plan murders while avoiding the prying eyes of law...

Tech buyer rights raised in Cisco vulnerability (SearchNetworking) The Cisco vulnerability, Thrangycat, raises the question of tech buyer protections when fixing such a serious flaw in a vendor's hardware.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

SecureWorld Bay Area (Santa Clara, California, USA, August 21, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld St. Louis (St. Louis, Missouri, USA, September 18 - 19, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld New York (New York, New York, USA, September 25, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld Detroit (Detroit, Michigan, USA, October 1 - 2, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld Dallas (Dallas, Texas, USA, October 9 - 10, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld Twin Cities (Minneapolis, Minnesota, USA, October 16, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld Denver (Denver, Colorado, USA, October 29 - 30, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

SecureWorld Seattle (Seattle, Washington, USA, November 13 - 14, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

National Cyber Summit (Huntsville, Alabama, USA, June 4 - 6, 2019) National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising...

Infosecurity Europe (London, England, USA, June 4 - 6, 2019) Europe’s Leading Event for Information and Cyber Security Bringing business, tech and cyber communities together to discuss and discover how best to protect companies and individuals. Join in to find ‘everyone...

San Diego Cyber Security Conference (San Diego, California, USA, June 5, 2019) Join us to interact with CISOs & Senior Level Executives who have effectively mitigated the risk of Cyber Attacks. In San Diego the keynote will be delivered by Darin Andersen, CEO/ Founder NXT Robotics,...

Seattle Cybersecurity Conference (Seattle, Washington, USA, June 6, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.