skip navigation

More signal. Less noise.

Zero trust in one click. Impossibly simple microsegmentation

If we can land rockets on a barge, if we can search 30 trillion web pages in mere seconds, if cars can drive door to door autonomously, why does microsegmentation still take months to implement and cause so many headaches? Edgewise has radically simplified microsegmentation to one click, using machine learning and zero trust security:

  • Eliminate network attack surface in your hybrid cloud
  • Protect critical business applications
  • Get provable security outcomes

Try Edgewise’s 1-click auto-segmentation now.

Daily briefing.

Investigation into the South American grid failure centered on Argentina proceeds, but remains in its early stages, and no cause has been publicly identified, according to AFP and other sources. The blackout is thought to have cascaded from a local failure. "Operational and design errors" are thought to be at fault. Officials in Argentina say, according to the AP, that while a cyberattack is a possibility, that seems unlikely.

The BBC summarizes reports of US-staged malware in Russia's power grid, presumably held there for retaliation against future Russian cyberattacks on US targets. The reports are unconfirmed publicly and at least partially denied by the US. TASS says Russia regards cyberwar with the US as a "hypothetical possibility," that it's accustomed to US misbehavior, and that it's quite capable of protecting its grid. Lawfare has a useful account of how the laws of armed conflict might apply to what would appear to be a long-running, low-level conflict in cyberspace that many think has the potential to produce kinetic effects.

Iran, without providing much detail, tells Reuters that Tehran has detected and thwarted a US cyber-espionage campaign.

ISIS, from its diaspora in cyberspace, is said to be expressing an interest in protecting its adherents from BlueKeep exploits. Homeland Security Today says the Electronic Horizon Foundation, an ISIS help desk, is warning about the risk of BlueKeep-based attacks. It's not just ISIS that's concerned about BlueKeep: TechCrunch reports that the US Department of Homeland Security has developed a remote-code-execution proof-of-concept exploiting the bug.


Today's issue includes events affecting Argentina, Australia, Brazil, Chile, Ecuador, Paraguay, Russia, United Arab Emirates, United States, and Uruguay.

Bring your own context.

Organizing your resume for your cyber-job search? Shorter may be better.

"I think a very concise, succinct resume is a big standout. I'd like to see examples or notations of big projects they've taken on and maybe a little bit of information of how they solved that. I don't like to see a broad listing of all the certifications and all of the programming languages they know. Candidates need to think a little bit higher-level and put themselves in a hiring role - and maybe they've never been in a hiring role. But they need to think about, what would someone look at when they read this resume? How can they truly convey that they have the skills necessary in order to get the role?"

—Justin Harvey, global incident response leader at Accenture, on the CyberWire Daily Podcast, 6.14.19.

So, think like a hiring manager (and maybe get some coaching on how those hiring managers think).

What if your security strategy added zeros to your bottom line?

Focusing on response alone is costly. You lose data. You lose infrastructure. You lose human and capital resources that could be productive elsewhere. And you lose your reputation. When you catch threats before they execute, you contain the problem, and the rewards add up. Let Blackberry Cylance help you understand how you can reduce your total cost of security controls, bolster your organization’s security posture, and zero in on what really matters.

In today's podcast, out later this afternoon, we speak with our partners at the University of Maryland's Center for Health and Homeland Security, as Ben Yelin discusses a Virginia ban on license-plate readers. Our guest is Jack Danahy from Alert Logic, who talks about the troubling issue of adversary dwell time and the IT vigilance gap.

And Recorded Future's lastest podcast, produced in partnership with the CyberWire, is also up. In this episode, "Making the most of the NIST Cybersecurity Framework," Ken Durbin and Allan Liska describe the Framework and offer some insight into how organizations can use it.

Cyber Security Summits: Seattle on June 25th and in DC on July 16 (Seattle, Washington, United States, June 25, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The DOJ, U.S. Secret Service, Verizon, Center for Internet Security, Google and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today:

RSA Conference 2019 Asia Pacific & Japan (Singapore, Republic of Singapore, July 16 - 18, 2019) Join industry leaders and peers at the region’s leading cybersecurity event. Learn the latest issues and solutions, stay on top of new regulations, demo cutting-edge products, expand your skills and grow your personal network. Register now.

Wicked6 Cyber Games (Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.

Cyber Attacks, Threats, and Vulnerabilities

New ISIS Cybersecurity Bulletin Shows Interest in Microsoft BlueKeep Bug (Homeland Security Today) NSA stressed that "we have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact."

Homeland Security has tested a working BlueKeep remote code execution exploit (TechCrunch) Homeland Security’s cyber agency says it has tested a working exploit for the BlueKeep vulnerability, capable of achieving remote code execution on a vulnerable device. To date, most of the private exploits targeting BlueKeep would have triggered a denial-of-service condition, capable of knoc…

Iran says it dismantled a U.S. cyber espionage network (Reuters) Iran said on Monday it had exposed a large cyber espionage network it alleged wa...

Russia thwarts U.S. cyber attacks on its infrastructure: news agencies (Reuters) Russia has uncovered and thwarted attempts by the United States to carry out cyb...

Kremlin Warns of Cyberwar After Report of U.S. Hacking Into Russian Power Grid (New York Times) The New York Times reported that American intelligence had secretly inserted software that could allow it to disable the Russian energy system.

US cyberwar against Russia is hypothetical possibility, says Kremlin spokesman (TASS) According to Dmitry Peskov, "regretting to say that," Russia has repeatedly stated "that the vital areas of our economy are under continuous attacks from abroad"

Russia: Cyber war with US a possibility (Computing) President Trump has rejected reports of US agencies deploying malware in Russia's power grid

Kremlin: Cyber warfare between U.S., Russia a 'possibility' (UPI) The Russian government said Monday its electrical grid is safe but constantly under attack from enemies abroad -- including, Kremlin officials say, the United States.

Russia warns of “cyberwar” following report the US attacked its power grid (Ars Technica) NYT reported on US efforts to insert malware into Russia's energy infrastructure.

Trump administration escalates cyber-attacks on Russia as warning to Putin (The Independent) Aggressive strategy leaves US better poised to attack in case of major conflict but carries significant risk of escalating digital Cold War and cementing power grids as legitimate targets

U.S. Cyber Command and the Russian Grid: Proportional Countermeasures, Statutory Authorities and Presidential Notification (Lawfare) A blockbuster article by David Sanger and Nicole Perlroth in the New York Times reports U.S. Cyber Command operations to hold at-risk at least some aspects of the electric power grid in Russia. The story raises a host of legal and policy questions.

Argentina official: Cyber attack did not cause massive blackout (KTVZ) Argentina's energy secretary said he does not believe a cyberattack caused a massive power outage that left tens of millions of people in Argentina, Paraguay and Uruguay in darkness for several hours on Sunday.

A blackout left millions in South America without power. Officials still don't know what caused it (CNN) Argentina's Energy Secretary said he does not believe a cyber attack caused a massive power outage left tens of millions of people in Argentina, Paraguay and Uruguay in darkness for several hours on Sunday.

When your apps are dormant, you become a more likely target for crooks (CyberScoop) If you have banking or e-commerce apps you haven’t opened in months, it’s a good time to make sure no one else is using them, either.

At least 50,000 license plates leaked in hack of border contractor not authorized to retain them (CNN) At least 50,000 American license plate numbers have been made available on the dark web after a company hired by Customs and Border Protection was at the center of a major data breach, according to CNN analysis of the hacked data. What's more, the company was never authorized to keep the information, the agency told CNN.

A bug in Wi-Fi ‘extenders’ could give a hacker full control over the devices (CyberScoop) If you’re looking to strengthen the Wi-Fi signal in your home or business, be sure the equipment you use doesn’t have a vulnerability that could give free rein to hackers.

Vulnerability Summary for the Week of June 10, 2019 (US-CERT) The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. 

Australian Catholic University staff accounts compromised in phishing attack (CRN Australia) University email and bank account details accessed.

Three U.S. Universities Disclose Data Breaches Over Two-Day Span (BleepingComputer) Three U.S. universities have disclosed data breach incidents impacting personally identifiable information of students or employees following unauthorized access to some of their employees' email accounts.

I’d like to add you to my professional network of people to spy on (Naked Security) A deepfake was reportedly spotted in the wild: LinkedIn’s well-connected, young, attractive Eurasia/Russia expert “Katie Jones.”

Riviera Beach, Fla., Works Toward Normalcy Post-Cyberattack (GovTech) "We have not discussed the details of what's going on," said city spokeswoman Rose Anne Brown. "We feel it's expedient not to do that until we worked our way through this."

Security Patches, Mitigations, and Software Updates

The BlueKeep RDP Vulnerability - Making the Case for Patch Management (F-Secure Blog) The BlueKeep RDP vulnerability is a perfect example of why all companies should consider patch management as a core component of their security strategy.

Cyber Trends

Radware Survey: Cybersecurity is no Longer a Cost Factor for $1B Organizations; Rather It’s a Business Driver (West) Cybersecurity is Becoming a Shared Responsibility Across All Members of the C-Suite. 75% of Executives Say Security is a Key Component in Their Marketing Strategy. 72% of Executives Note Information Security as a Recurring Agenda Item in Every Board Meeting

EfficientIP and IDC: Average DNS Attack Cost Rises 49% to $1,070,000 (PRWeb) New EfficientIP report, in partnership with IDC, shows 34% increase in attacks

Domain Fraud Threats, Hiding in Plain Sight: Key Takeaways from the 2019 Domain Fraud Report (Proofpoint) Web domain fraud is a growing risk for businesses, employees, and their customers. Learn about domain fraud, industry trends, and research from the 2019 domain fraud...

2019 Domain Fraud Report (Proofpoint) Domain Fraud is an attractive attack for cyber criminals. Discover our Domain Fraud report that outlines our latest research on domain trends.

New McAfee Report Finds Eighty-Seven Percent of Companies Experience Business Acceleration from Use of Cloud Services (BusinessWire) McAfee, the device-to-cloud cybersecurity company, today released a special edition of its Cloud and Risk Adoption Report, focused on the business imp

Human error still the cause of many data breaches (Help Net Security) More than half of all C-Suites and nearly 3 in 10 SBOs reveal that human error or accidental loss by an external vendor was the cause of the data breach.

Business leaders admit to knowledge gaps and a lack of resources amid the growing threat of a cyber attack (Nominet) Report - find out how cyber security is treated at board level. What can hard-pressed CISOs and CIOs do about it?

Former NSA chief opens up about protecting the U.S. from cyberattacks (SiliconANGLE) Former NSA chief opens up about protecting the U.S. from cyberattacks - SiliconANGLE

Cyberattacks in the Middle East are on the rise. Here's who they're targeting (CNBC) A growing number of cyberattacks have been detected in the Middle East, and especially in the United Arab Emirates, according to a new report from cybersecurity firm DarkMatter.

DarkMatter Group Calls for Improved Vigilance as UAE's Cyber-threat Landscape Reaches Critical Level (Yahoo) DarkMatter Group, the region's first and only fully integrated digital and cyber transformation firm, today released the first semi-annual Cyber Security Report for 2019 revealing that critical infrastructure sectors, including Oil &

The sick man of the cyber-security sphere…it’s time the Australian healthcare industry took a preventative approach to high tech ‘contagion’ (CSO) Which industry is Australia’s worst offender when it comes to data breaches and cyber-security threats?


Huawei laptops return to Microsoft’s online store after mysteriously disappearing (The Verge) Gone one month, back the next

Why DoD’s decision to make cybersecurity an ‘allowable cost’ matters (Federal News Network) As part DoD’s move to shore up its supply chain, the Pentagon is developing with industry and other experts a new cybersecurity maturity model that is borrowing from standards like ISO 9000.

Controversial NSO Group to adopt policy of closer respect for human rights (Times of Israel) Owners say Herzliya-based company, whose spyware has allegedly been used by repressive regimes, will seek greater transparency, align itself with UN guiding principles on rights

Top 10 Cybersecurity Companies To Watch In 2019 (Forbes) Cloud Security platform and application sales are projected to grow at a 35.3% Compound Annual Growth Rate (CAGR) between 2017 to 2019, becoming a $459M market this year.

Accenture Acquires Deja vu Security, Seattle-Based ‘Security of Things’ Company (Accenture Newsroom) Accenture is announcing the acquisition of Deja vu Security.

Microsoft's GitHub acquires Pull Panda for code-review collaboration (Computing) Pull Reminders, Pull Analytics, and Pull Assigner now available free in the GitHub Marketplace

United Technologies CEO predicts Raytheon merger gets done despite activist investor opposition (CNBC) The deal would bring together a booming aerospace company with a giant government defense contractor.

CrowdStrike IPO: Investors Are Positively CrowdStruck—Cyber Saturday (Fortune) Is the Alphabet-backed firm really the "Salesforce of cybersecurity" its CEO claims?

SyncDog Announces Plan for Global Expansion Through Export Promotion Alliance (BusinessWire) SyncDog Announces Plan for Global Expansion Through Export Promotion Alliance

This Baltimore-based venture capital firm is looking to invest in D.C.-area startups ( DC) Inner Loop Capital launched a $2.6 million Syndicate Fund to support cybersecurity and enterprise tech startups in the D.C. region.

Unicorn Power (J4VV4D Blog) As of last week, it became official, that KnowBe4 became the latest Infosec unicorn.

Bitdefender appoints new leader for the Middle East ( Bitdefender has appointed Tarek Kuzbari as regional director for the ME. The move comes as part of the vendor’s strategy to expand business.

Teradata Appoints Scott Brown as Chief Revenue Officer (Yahoo) Teradata (NYSE: TDC), the industry’s only Pervasive Data Intelligence company, today announced that it has appointed Scott Brown as Chief Revenue Officer, effective June 17, 2019. In this role, Brown will direct Teradata’s global go-to-market strategy and execution, and guide worldwide sales,

Products, Services, and Solutions

SolarWinds Announces the Availability of SolarWinds Service Desk (SolarWinds) The SaaS-based offering, available immediately, complements the company’s current IT Service Management (ITSM) product suite, extending ITSM capabilities to businesses of all sizes and maturity...

CipherCloud Extends Zero Trust Cloud Security to Email for Office 365 and G Suite (Yahoo) CASB+ Platform Innovations include Adaptive Access Control, UEBA, End-to-End Encryption, and Digital Rights Management for All Clouds

Netskope Introduces Zero-Trust Secure Access to Private Enterprise Applications (PR Newswire) Netskope, the leader in cloud security, today introduced Netskope for Private Access, a cloud-based service...

Trustonic, Rubean & CCV announce collaboration to develop mPOS solution (Trustonic) Using a smartphone as a mobile point of sale (mPOS) solution enables traders, small retailers and SMBs to save money on costly payment acceptance hardware, improve staff efficiency and increase customer satisfaction.

Avanan Reinvents Email Security with First Inline API-Based Solution to Catch Advanced Phishing Attacks (Yahoo) Avanan, a pioneer in cloud security, announced the first inline email security solution based fully on Application Programming Interfaces (APIs). The platform solves for the challenges associated

Aqua Security Announces Vulnerability Shield™, Industry-first Solution for Automatically Detecting and Blocking Attempts to Exploit Container Vulnerabilities | Aqua (Aqua) Aqua CSP 4.2 introduces the Vulnerability Shield to detect & prevent attacks targeting containers. And advanced runtime protection for serverless functions.

MongoDB 4.2 Adds Distributed Transactions, Field Level Encryption, Updated Kubernetes Operator and More... (MongoDB) MongoDB, Inc. (NASDAQ: MDB), the leading, modern, general purpose data platform, today announced the latest version of its core database...

ReliaQuest Launches Platform to Strengthen Visibility and Control in Enterprise Cybersecurity (PR Newswire) ReliaQuest, the cybersecurity enabler, today introduced GreyMatter, a first-of-its-kind, integrated platform that...

Redox Launches Public Bug Bounty Program With Bugcrowd to Help Keep Health Data Secure (BusinessWire) Redox launched a public bug bounty program with Bugcrowd to help ensure the security of its customers’ health data.

DH2i Launches DxConnect Network Security Software for Integrated Zero Trust Connectivity (DH2i) DH2i® today announced the general availability launch of DxConnect™ network security software for integrated Zero Trust (ZT) connectivity.  DxConnect enables developers and network administrators to build an integrated ZT connectivity security infrastructure for cloud native applications, hybrid/multi-cloud connectivity and privileged user access without using a VPN.

Recorded Future Express Now Available on AWS Marketplace (Yahoo) Easy-to-Use Browser Extension Provides Instant Access to Actionable Threat Intelligence

BNM to establish financial threat intelligence platform (The Star Online) Bank Negara Malaysia (BNM), together with the financial industry, is in the process of establishing a Financial Threat Intelligence Platform.

Facebook Unveils Libra, Cryptocurrency Rival to Bitcoin (Wall Street Journal) Facebook formally announced plans to launch a cryptocurrency called Libra, promising a secure blockchain-based payment system backed by hard assets and designed for mainstream users.

Facebook reveals digital currency details (BBC News) Users will be able make payments with the currency via Facebook's apps and WhatsApp.

Cloudflare launches decentralized service for generating random numbers (ZDNet) New "League of Entropy" service will generate a stream of random numbers using five servers located across the globe.

The League of Entropy Forms to Offer Acts of Public Randomness (Decipher) Cloudflare and several other members have formed the League of Entropy to offer a quorum of public randomness beacons.

Microsoft Office 365 packs strong cyber defense features — if set up correctly (CIO Dive) The suite of cloud-connected enterprise applications holds up well before, during and after an incident, experts said. But only if the right settings are in place. 

Skybox Security launches update to simplify hybrid cloud risk management (Security Brief) Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.

Most Powerful Email Security Solution Now Offered by ITsavvy (EIN News) ITsavvy just announced a partnership with Mimecast for powerful email security, archiving and retrieval.

Technologies, Techniques, and Standards

Fourth-Party Security: Another Level of Security Management (Panorays) Panorays' research indicates that there is a direct correlation between the security posture of the third party and its fourth parties.

How the U.S. is trying to improve election security ahead of 2020 (PBS NewsHour) Here are some of the steps the federal government has taken to help secure elections in the U.S., as well as some of the possible disinformation threats that could reappear in 2020.

How network modeling helps operations and security teams mitigate risk (CyberScoop) FDIC’s Howard Whyte and RedSeal’s Wayne Lloyd detail how network modeling of cloud and on-premise infrastructure help CIOs and security teams mitigate risk.

Tips on keeping personal info safe from online threats (Press Enterprise) The lines of privacy have blurred in our “share everything” social media culture. People are sharing aspects of their personal life that they never did before, giving criminals a leg up.

Soyez plus Smart que votre Smartphone : 10 conseils pour se protéger (Global Security Mag Online) Avec l’été qui approche à grands pas, de plus en plus de personnes utilisent leurs smartphones pour des tâches telles que faire du shopping de dernière minute pour les vacances, accéder à son compte bancaire ou rester connecté avec ses amis...

Design and Innovation

One Big Lesson From the Cyber Range to Help Solve Confirmation Bias (Security Intelligence) The IBM X-Force IRIS team practices a method called dual verification in the cyber range to help overcome confirmation bias and arrive at ground truth more quickly.


Virginia Cyber Range challenges hackers for good (Virginia Tech) The Virginia Cyber Range contributed to the 2nd Annual AWS Hackathon for Good by sponsoring a challenge during the Amazon Web Services Public Sector Summit in Washington, D.C.

Purdue announces new computer science department head (Purdue University) Professor Dongyan Xu has been named the next head of the Department of Computer Science at Purdue University. He begins his position Sept. 1.

Legislation, Policy, and Regulation

Peter Dutton urges 'sensible' consideration of expanded cyber spy powers (The Sydney Morning Herald) Proposals for expanded domestic powers have stirred controversy but the minister has rejected suggestions of increased spying on Australians.

Scalise: I'm glad the administration is taking aggressive cybersecurity action (TheHill) House Minority Whip Steve Scalise (R-La.) in an interview that aired Sunday responded to a report that the Defense Department is ramping up digital attacks on Russia by saying he is glad the Trump administration is getting aggressive on cybersecur

House Homeland Security Republicans to introduce slew of cybersecurity bills (TheHill) Republicans on the House Homeland Security Committee are gearing up to introduce a bevy of bills aimed at enhancing the Department of Homeland Security's (DHS) cybersecurity capabilities.

Senate Receives Bill to Ensure Small Businesses Get DHS Contract Share (Homeland Security Today) Sponsor Correa calls legislation "necessary" to outfit DHS "while allowing domestic small businesses to better compete for federal government contracts."

How will Congress combat deepfake videos? (C4ISRNET) Congress is grappling with how to combat deepfake videos, which are created to manipulate audio and video in a way that is indistinguishable to most people.

3 more steps before Cyber Command can split from NSA (Fifth Domain) The Pentagon would have to meet a series of new requirements before U.S. Cyber Command could split from the National Security Agency, according to a proposal from a Senate defense committee.

Litigation, Investigation, and Law Enforcement

'Not all FAANGS will survive this battle': A Wall Street firm handicapped the impact of Big Tech regulation — and it's bad news for Facebook (Business Insider) Facebook is now under the jurisdiction of the FTC, which could be bad news for the social media company, relative to Apple and Alphabet.

Opinion | We still have questions about whether Russia meddled in N.C. That’s a bad sign. (Washington Post) A possible North Carolina cyberattack proves how vulnerable we really are.

A Supreme Court Decision Could Have Implications for Social Media Free Speech (Pacific Standard) The court ruled that First Amendment protections don't apply to a corporation that operates a public access channel in New York.

Sources: US to question Assange pal jailed in Ecuador (AP NEWS) U.S. investigators have received permission from Ecuador to question a Swedish programmer close to WikiLeaks founder Julian Assange who has been held in jail for more than...

State Department identifies 23 violations, 'multiple security incidents' concerning Clinton emails (Fox News) The State Department revealed Monday that it has identified "multiple security incidents" involving current or former employees' handling of Hillary Clinton's emails, and that 23 "violations" and seven "infractions" have been issued as part of the department's ongoing investigation.

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

Hack in Paris 2019 (Paris, France, June 16 - 20, 2019) Intrusion attempts are more and more frequent and sophisticated, regardless of their target (state or corporation). In this context, international hacking events are multiplying. A few events took place...

Gartner Security & Risk Management Summit 2019 (National Harbor, Maryland, USA, June 17 - 20, 2019) Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security & Risk Management Summit 2019,...

Banking Cyber Security Forum London (London, England, United Kingdom, June 18, 2019) The Banking Cyber Security Forum is an exclusive, top flight event exclusively for senior banking executives, set to address each of these challenges and opportunities and encourages peer-to-peer conversation...

Norwich University CGCS 2019 Cyber Security Summit (Northfielf, Vermont, USA, June 18 - 19, 2019) Mid- and executive-level managers seeking to broaden their organizations’ approaches to prudent cyber security practices will gain insight through a series of workshops and discussions on relevant issues...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.