skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

Daily briefing.

the Global Cyber Innovation Summit

The Global Cyber Innovation Summit opened yesterday and continues through today in Baltimore. One of the principal organizers, Allegis Cyber’s Bob Ackerman, explained the choice of venue. The group that put the summit together wanted to create a “Davos-like atmosphere” that would cater to the needs and interests of CISOs. They chose to hold the Summit in Baltimore because the cybersecurity community needed this kind of engagement on the American East Coast. And Baltimore, being at the center of what Ackerman called an “unparalleled pool of cyber engineering talent” that’s grown in Maryland universities with the support of massive US Federal investment, was a natural choice. That massive Federal investment, of course, has long been centered on the National Security Agency, whose Fort Meade home is in the Baltimore suburbs.

Dave DeWalt, now of Momentum Cyber, formerly CEO of both FireEye and McAfee, delivered his account of the obverse of rapid innovation: rapid expansion of vulnerabiliies. He called the convergence of trends contributing to increased risk “a perfect cyber storm” created by the speed of innovation and the swift evolution of vulnerabilities and threats such innovation brings with it.

We’ll have updates and commentary from the summit over the next several days, both in this Daily News Briefing and in our Daily Podcast.

Flashpoint updates its inquiry into the attack on Wipro: the threat actors behind it have been active since 2015.

Barracuda is the latest to point out active attacks against users of Microsoft Office 365. Account takeover attacks surged during March. The attackers are opportunistic: brute-forcing, credential stuffing, and social engineering are all in play.

Zscaler warns against a third-party Android app store seemingly specializing in games. It's simply a front for a campaign to install malware into too-trusting victims' devices. The “Smart Content Store" isn't a smart place to shop, and it doesn't even offer real content. If you try to download "CrazyBirds" [sic] or SuperBros Run [sic], you won't even get a Trojanized game. All you'll install is malware.

The Times reports that UK Defense Secretary Williamson has been fired after investigation indicated he was the Cabinet member who talked out of school about Huawei. Williamson blames his sacking on a "kangaroo court" rigged by mandarins who had it in for him. He'll be succeeded by Penny Mordaunt.

After a failed attempt by Venezuela's constitutional acting president to oust President Maduro failed, the Times reports that the US has warned Russia not to continue attempts to prop up the Chavista regime.

Foreign Affairs looks at Ukrainian separatists and discusses how the commodification of attack tools has enabled even small, breakaway pseudostates to punch above their weight in cyberspace, but the analysis may underplay the extent to which such threat actors are deniable units operating in big power's hybrid wars.

Notes.

Today's issue includes events affecting Austria, China, India, Russia, Ukraine, United Kingdom, United States, and Venezuela.

Bring your own context.

A call for reflection on how enterprises reach decisions on industrial control system security.

"A lot of industrial security over the years has been copy-and-pasted enterprise security. We take frameworks and regulations from IT, and whatever doesn't break the ICS, we just move into the ICS. Like 'oh, you should have a patch program; that makes sense, we should have a patch program; let's have a patch program.' But why we have a patch program, or what its implications are, or even if it's valuable at all, never gets questioned." Robert M. Lee, CEO of Dragos, on the CyberWire Daily Podcast, 5.1.19.

So perhaps think through the implications of easy analogies with IT security before applying them to ICS security.

Get a Backstage Pass to LookingGlass’ Digital Business Risk Roadshow

When it comes to digital business risk, you don’t want a general admission perspective. Get a backstage pass for the LookingGlass Digital Business Risk Roadshow to learn the industry-latest on effective third party risk management, taking a proactive security approach, and get a cybercriminal mastermind's insights on manipulating your organization’s cyber strengths and weaknesses. Come see us in a city near you. The tour includes NYC, D.C., and Houston!

In today's podcast, up later this afternoon, we talk with our partners at the University of Maryland, as Jonathan Katz discusses law enforcement requests for “ghost” encryption. Our guest is Cody Cornell from Swimlane on collaborative SOCs.

And Hacking Humans is also up. In this episode, "Twitter bots amplifying divisive messages," we feature some followup from listeners on Google search result scams. Dave describes the city of Ottawa sending $100K to a fraudster. Joe shares results from the FBI's Internet Crime Report. The catch of the day involves a dating site and an offer to be someone's "sugar daddy." Our guest is Andy Patel from F-Secure, describing how Twitter bots are amplifying divisive messages.

Cybersecurity Impact Awards (Arlington, Virginia, United States, May 14, 2019) Winners of the Cybersecurity Impact Awards will be announced and recognized at the May 14, 2019 CYBERTACOS event. The event will start at 5:30 p.m. and the award presentation will begin at 6:00 p.m.! Join us afterwards for tacos and networking!

Cyber Investing Summit (New York City, New York, United States, May 16, 2019) The Cyber Investing Summit is a conference focused on financial opportunities and strategies in the cybersecurity sector. Join key decision makers, investors, and innovators to network, learn, and develop new partnerships May 16th in NYC. More information: www.cyberinvestingsummit.com.

Cyber Security Summits: May 16 in Dallas and in Seattle on June 25th (Dallas, Texas, United States, May 16 - June 25, 2019) Register for reduced admission to the Cyber Security Summit with promo code cyberwire19 for $95 admission ($350 without code). Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, U.S. Secret Service, Verizon, Center for Internet Security, and more. Breakfast, Lunch & Cocktail Reception are included with your admission. Passes are limited, secure yours today: www.CyberSummitUSA.com

Cyber Attacks, Threats, and Vulnerabilities

50,000 enterprise firms running SAP software vulnerable to attack (ZDNet) 9 out of 10 SAP production systems are believed to be vulnerable to new exploits.

DDoS Botnet Targeting Electrum Servers Grows to 152,000 Infected Hosts (Security Intelligence) A DDoS botnet targeting servers used by the Electrum bitcoin wallet reached 152,000 infected hosts at the end of April.

Database Exposes Medical Info, PII Data of 137k People in U.S. (BleepingComputer) A publicly accessible Elasticsearch database discovered on March 27 exposed various types of personally identifiable information (PII) and medical info of more than 100,000 individuals.

D.C. Metro Vulnerable to Cyber Attacks (Security Today) The inspector general believes D.C.'s transportation system is at a higher risk of cybersecurity attacks.

Austrian construction group Porr hit by cyber attack (The Mighty 790 KFGO) VIENNA (Reuters) - Austrian construction company Porr detected a cyber attack on its communication infrastructure on Thursday and its telephone lines and emails were disrupted, the company said. The disruption was caused by a virus, which has been identified, a company spokeswoman said. Technicians were working to find a solution, but the spokes...

Further details on Wipro phishing attack revealed (SC Media) The phishing attack that struck the Indian IT firm Wipro in April may have had the unexpected goal of conducting gift card fraud, according to a new Flashpoint report.

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro (Dark Reading) Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint.

Flashpoint - Wipro Threat Actors Active Since 2015 (Flashpoint) Evidence uncovered by Flashpoint researchers links the threat actors behind the Wipro breach to other activity dating back as early as 2015.

Crooks using hacked Microsoft email accounts to steal cryptocurrency (Naked Security) Hacked Microsoft email accounts are being used by criminals to compromise victims’ cryptocurrency exchange accounts and empty their funds.

JavaScript card sniffing attacks spread to other e-commerce platforms (ZDNet) OpenCart, OSCommerce, WooCommerce, Shopify are also being targeted.

Why credit card data stealing point-of-sale malware is still such a big problem (ZDNet) They're some of the simplest forms of cyberattacks out there, but credit card stealing POS malware remains highly effective.

Poisoned Apples: Email Subject Lines That Snooker Recipients (Email Insider) LinkedIn spoofing and lines that address the victim's concerns pull high click rates, security firm KnowBe4 finds.

Millions of consumer smart devices exposed by serious security flaw (Naked Security) This IoT software flaw could render millions of consumer devices, including baby monitors and webcams, open to remote discovery and hijack.

Hackers lurked in Citrix systems for six months (ZDNet) Social Security numbers and financial data may have been stolen.

Going Toe-to-Toe With Ukraine’s Separatist Hackers (Foreign Policy) The proliferation of cyberespionage tools empower even small breakaway regions to run digital intelligence operations.

Flashpoint - Wipro Threat Actors Active Since 2015 (Flashpoint) Evidence uncovered by Flashpoint researchers links the threat actors behind the Wipro breach to other activity dating back as early as 2015.

Threat Spotlight: Account Takeover (Barracuda) This Threat Spotlight reveals a startling rise in account takeover attacks, looking at how account takeover work and where attacks are coming from.

Updated: This DDoS Attack Unleashed the Most Packets Per Second Ever. Here’s Why That’s Important. (Blog) (Updated April 30, 2019 with new data from an even larger attack. Skip directly to the bottom to learn more.) DDoS attacks are usually measured by the amount of bandwidth involved, such as the 1.35 Terabits per second (maximum) attack directed at GitHub last year, the largest DDoS attack ever at the time. However, in …

Polymorphic Magecart skimmer capable of attacking 57 payment systems uncovered (Computing) Researchers have described it as the most advanced payments skimmer to date, tracing it back to Ukraine

Sodinokibi Ransomware Exploits WebLogic Server Vulnerability (CloudTweaks) Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called “Sodinokibi.” Sodinokibi attempts to encrypt data in a user’s…

Job recruitment site Ladders exposed 13 million user profiles (TechCrunch) Ladders, one of the most popular job recruitment sites in the U.S. specializing in high-end jobs, has exposed more than 13.7 million user records following a security lapse. The New York-based company left an Amazon -hosted Elasticsearch database exposed without a password, allowing anyone to acces…

Diabetics are hunting down obsolete insulin pumps with a security flaw (Naked Security) The flaw makes it possible to overwrite the devices’ programming and insert an algorithm that turns them into artificial pancreases.

Texas Cities Struggle To Defend Against Cyber Crime With Sparse Resources (Texas Public Radio) Across the country, one in four cities reported being attacked by cyber criminals every hour. That’s according to a 2016 survey, but attacks against cities

The Difficulty of Gauging Health Care Cybersecurity Risk (IoT World Today) While the threat of hacked medical devices has drummed up headlines, commodity malware could be a bigger health care cybersecurity threat.

Security Patches, Mitigations, and Software Updates

Cisco's warning: Patch now, critical SSH flaw affects Nexus 9000 fabric switches (ZDNet) Cisco alerts customers to a 9.8/10 flaw among a number of security bugs affecting Nexus 9000 fabric switches.

Cyber Trends

55% of Small Business Owners Would Pay for their Data in a Ransomware Attack (Small Business Trends) Businesses value their data so much more than half will pay cyber criminals to get it back.

Growing Cyber Threats Drive Need for Advanced Security Defenses (Oracle) Policy makers and C-Suite executives believe U.S. should invest more in advanced cybersecurity technology

Industry Invasions: Fraud & Security Incidents By Business Size... (Merchant Machine) Security is one of the biggest issues facing businesses and their customers, with advancing technology making attacks harder to defend against. We've outlined some the impacts this has and the industries that suffer most. Fraud & Security By Business Size. Depending on how big your company is...

A History of Major Computer Viruses from the 1970s to the Present (The Devolutions Blog) A couple of years ago, I wrote about the history of programming. It was fascinating to see how far things have come since Charles Babbage conceived the very first analytical engine back in 1837. Now, ...

Marketplace

Coalfire Expands Partnership with University of Washington through Information Security and Risk Management Program (Yahoo) Coalfire, a trusted provider of cybersecurity advisory and assessment services, announced today that it has expanded its partnership with the University of Washington through the university's Information Security and Risk Management (ISRM) program.

What's driving Maryland cybersecurity's economic growth? (Technical.ly Baltimore) Macro factors and local talent combine to make cybersecurity a growing industry that the state is looking to expand.

Microsoft's security chief explains why the company is eliminating passwords (CNBC) Microsoft's Bret Arsenault, who serves as its top cybersecurity executive, discussed the top issues facing his company and its clients, and offers advice for smaller firms on how they can get better at eliminating the simplest, most devastating attacks.

The Pentagon Is Flubbing Its Pitch to Silicon Valley (Defense One) Appeals to patriotism won’t move America’s tech industry. Other approaches might work better.

Wall Street spending big to protect against hacking: report (New York Post) Wall Street’s biggest companies are pumping more cash into cybersecurity, as the industry’s brass openly frets that hackers are the next major threat to the financial system. Financial middlemen li…

FireEye Joins Team to Provide Defensive and Cyber Threat Intelligence Operations Support to U.S. Army Cyber Command (AP NEWS) As part of a new $905 million, five-year award, Perspecta Inc. has subcontracted with FireEye to enhance cyber operations and global mission support for ARCYBER.

Financial Firms Spend Up to $3,000 Per Employee on Cybersecurity (Bloomberg) Big banks and other financial firms spend as much as $3,000 per employee to defend computer networks from cyber criminals, a survey found, as the industry remains the primary target of such attacks.

Google can now automatically delete your location, app, and search activity data (VentureBeat) Google's new control automatically deletes location, activity, and services data collected by its suite of mobile and web apps.

Mark Zuckerberg Wants Facebook’s Future to Be Private (WIRED) At F8, Mark Zuckerberg unveiled a subtle redesign for Facebook that places more emphasis on Groups and new products like Secret Crush.

At F8, Facebook focuses on privacy — and little else (Interface) F8 is a conference where Facebook executives talk about the future — and at Facebook, the future is flexible. In 2015, the future was video. The next year, the future was bots. The year after that, the future was augmented reality — and also a project to let you hear with your skin. All of those technologies eventually found their way into Facebook's products, in some form — well, all except the skin hearing thing. But none really shifted the company away from its core product: an infinitely scro

The Woman Who Saved John McAfee from an Epically Bad Deal (WIRED) He was going to sell his antivirus software company to Symantec for $20 million. But Sonja Hoel had a smarter, better offer.

Analysis | The Cybersecurity 202: Here's the one thing Republicans and Democrats could agree on during Barr hearing (Washington Post) They wanted the attorney general's commitment to improving election security.

Aryaka Raises $50M to Accelerate Global Managed SD-WAN Expansion (Yahoo) Series F, Led by Goldman Sachs, Enables Company to Quickly Grow Revenues, Headcount & Global Footprint

Products, Services, and Solutions

SolarWinds adds Mac capabilities to dashboards (SecurityBrief) Ability to manage both Mac and Windows devices on the same dashboard will streamline monitoring and management for MSPs.

Secureworks launches new cybersecurity analytics application (Intelligent CIO) Secureworks, a leading cybersecurity company that keeps organisations safe in the digitally connected world, has announced the launch of a software-as-a-service (SaaS) application that will transform the way companies detect, investigate and respond to cyberthreats.

Recorded Future Debuts Library of Intelligence Use Cases (Channelnomics) Visit the post for more.

WatchGuard Expands Award-Winning WatchGuardONE Partner Program With New Specializations and Financial Incentives (PR Newswire) WatchGuard® Technologies, a global leader in network security and intelligence, secure Wi-Fi and multi-factor...

​​Unisys Announces Integration of Unisys Stealth® Security with Industry-Leading Cyber Recovery Software for Improved Cyber Resilience (Unisys) Unisys Corporation (NYSE: UIS) today announced at Dell Technologies World 2019 that its award-winning Unisys Stealth® security software suite has been integrated with Dell EMC Cyber Recovery software to provide enhanced protection to clients' cyber recovery operations.

Technologies, Techniques, and Standards

5 threat detection and response technologies are coming together (CSO Online) Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.

Do You Need a WAF, or Something Better than a WAF? (Security Boulevard) “The king is dead! Long live the king!” The jarring conflict embodied in this timeless hoorah is about to apply to the application security space. Subjects are giving up on the old king—the web application firewall (WAF) technology—as their primary appsec tool, for several reasons. First, because WAFs are too complicated. Second, because attackers have …

Creating A Roadmap For Hardware Security (Semiconductor Engineering) Government and private organizations developing blueprints for semiconductor industry as threat level rises.

Home - Password Day (Password Day) Treat everyday like Password Day and #LayerUp your login to make the Internet a more secure place. Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Whether you’re protecting your bank account, your email, or your social media, put the brakes on ID theft...

World Password Day: We Need to Talk (Juniper Networks) Passwords are the foundation upon which much of modern IT security is built, and what better day to discuss the topic than World Password Day, an event which occurs on the first Thursday of May every year.

Keeping your data safe when traveling (Naked Security) Our data is especially vulnerable when we ourselves are too: at border crossings and when in unfamiliar environments.

Design and Innovation

Cyber Defense Media Group Announces Black Unicorn Awards for 2019 Are (PRWeb) Cyber Defense Media Group (CDMG), the industry’s leading electronic information security media group, is announcing that the annual Black Unicorn awards are now open. Innovative information security companies of any size, that have not yet gone public, with a public market valuation of $1B USD or more may apply for this prestigious award.

Research and Development

Funding dries up for DHS emerging tech investments (FCW) The department's Silicon Valley Innovation Program is notifying participants that solicitations could be cancelled due to lack of funding.

Academia

Why the Air Force Is Embedding Airmen at Carnegie Mellon (WIRED) In an interview with WIRED editor-in-chief Nicholas Thompson, Air Force Secretary Heather Wilson expounds on surveillance, drones, and the cutting edge of plane-painting.

Air National Guard partners with UMass Dartmouth on cybersecurity (DVIDS) DARTMOUTH, Mass. - The Massachusetts Air National Guard’s 102nd Intelligence Wing and the University of Massachusetts Dartmouth signed a Memorandum of Understanding (MOU) agreeing to establish collaborative programs in the field of cybersecurity on Monday, April 29, 2019. The MOU creates a partnership that aims to mutually benefit both organizations for years to come.

Legislation, Policy, and Regulation

Putin signs Runet law to cut Russia's internet off from rest of world (ZDNet) Russia's sovereign internet bill has been signed into law, giving authorities an easier way to block content.

TSA preps new guidelines on pipeline cyber (FCW) The Transportation Security Administration has developed a plan to more regularly update its cybersecurity guidelines for oil, natural gas and hazardous materials pipeline operators.

Evaluating the GDPR experiment (SC Media) Companies are keeping their eyes on fines and gauging how GDPR compliance, or lack thereof, might impact them. Allen Bernard reports. We are starting to

White House has signaled it may seek permanent renewal of controversial surveillance power (Washington Post) The Trump administration was prepared to ask Congress to reauthorize Section 215 of the Patriot Act.

Expert Reaction On UK Government Plans To Improve Security Of IoT Devices (Information Security Buzz) The UK Department for Digital, Culture, Media and Sport (DCMS) is consulting on regulatory proposals regarding consumer Internet of Things security.

Defense Department Cyber Requires Speed, Precision and Agility (SIGNAL Magazine) The JFHQ-DODIN maintains a broad-based security approach to defending defense cyber assets.

Agency Cyber Pros Welcome DHS’ Leadership If It’s Not One-Size-Fits-All (Nextgov.com) Homeland Security is well-positioned to lead governmentwide cyber acquisitions and standards, so long as they work with agencies as individuals, officials said.

Killer Apps (Foreign Affairs) The real danger of an AI arms race isn't that another country would win; it's that unsafe technologies would make everyone lose.

US warns Moscow against propping up Maduro regime (Times) The United States has warned Russia to stop meddling in Venezuela and has again raised the possibility of direct military action to oust the Maduro regime after Tuesday’s failed coup. John Bolton...

Juan Guaidó Calls Venezuelans to the Streets (Foreign Policy) A transcript of the opposition leader’s remarks from La Carlota Air Base.

Venezuela’s Suicide (Foreign Affairs) Socialism and declining oil prices are often blamed for Venezuela’s catastrophe. In reality, it was decades of destructive leadership under Hugo Chávez and his successor, Nicolás Maduro, that transformed Venezuela into a poor country and criminalized state beholden to a foreign power.

CORRECTED-New Czech minister sees no one ruled out of 5G, nuclear... (Reuters) The Czech Republic should not initially rule out any Chinese or Russian companie...

British Prime Minister Theresa May fires Defense Secretary Gavin Williamson after Huawei leak (CNBC) "The Prime Minister's decision has been informed by his conduct surrounding an investigation into the circumstances of the unauthorised disclosure of information from a meeting of the National Security Council," Downing Street said in a statement.

Theresa May sacks Gavin Williamson over Huawei leak (Times) Gavin Williamson blamed a vendetta by Britain’s most senior civil servant for his dismissal as defence secretary yesterday. Mr Williamson became the first cabinet minister in more than 30 years to...

First female defence secretary Penny Mordaunt has armed forces in her blood (Times) Penny Mordaunt has become Britain’s first female defence secretary only months after speculation that she could resign from the government over Theresa May’s Brexit deal. The staunch Eurosceptic...

Government unveils new laws for IoT and internet-connected devices (Computing) Government IoT proposals would introduce security labeling to internet-connected devices

Analysis | The Cybersecurity 202: Here's the one thing Republicans and Democrats could agree on during Barr hearing (Washington Post) They wanted the attorney general's commitment to improving election security.

CISA wants more funding for critical infrastructure activities (FCW) Christopher Krebs, director of the Cybersecurity and Infrastructure Security Agency, said the agency's focus on election security operations is a good model for other critical infrastructure sectors.

Army multi-domain task force could spell acquisition changes (FCW) A new focus on interoperability with allies and partners could alter buying practices as it matures.

Senate Passes Bill to Allow Cyber Talent to Rotate Through Agencies (Nextgov.com) The bipartisan legislation would allow certain cybersecurity-related personnel to rotate across various federal agencies.

FCC Dem demands info on location sharing by phone carriers (TheHill) A Democrat on the Federal Communications Commission (FCC) is demanding information from wireless companies about their location data practices.

Litigation, Investigation, and Law Enforcement

Judge blasts Assange for jumping bail, sentences him to almost one year (Ars Technica) The Wikileaks founder's legal troubles are far from over.

Zuckerberg Sued Over Privacy Scandals, Alleged Insider Trades (Bloomberg Law) Mark Zuckerberg and Facebook Inc.‘s other top executives have been hit with a lawsuit accusing them of insider trading and blaming them for the privacy scandals that have rocked the social media giant and its stock value since 2016.

Julian Assange legal team begin 'big fight' over extradition (Guardian) Supporters of WikiLeaks founder ready for long battle after he is jailed for bail breach

Julian Assange to fight US extradition from his jail cell (Times) Julian Assange will begin his battle against extradition to the US from a high-security British prison today after he was jailed for more than 11 months for breach of bail. The Wikileaks founder...

Barr testifies about the Mueller investigation (Washington Post) Follow our live coverage.

Mueller complained that Barr’s letter did not capture ‘context’ of Trump probe (Washington Post) In a letter and phone call, special counsel Robert S. Mueller III and Attorney General William P. Barr went back and forth over Mueller’s concerns. “The summary letter the Department sent to Congress and released to the public . . . did not fully capture the context, nature, and substance of this office’s work and conclusions,” Mueller wrote.

US attorney-general William Barr dismisses Robert Mueller claims over collusion inquiry (Times) The US attorney-general said that he was “not in the business of determining when lies are told to the American people” when pushed by Democrats yesterday on whether President Trump covered up an...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Infosecurity Europe (London, England, USA, June 4 - 6, 2019) Europe’s Leading Event for Information and Cyber Security Bringing business, tech and cyber communities together to discuss and discover how best to protect companies and individuals. Join in to find ‘everyone...

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

Global Cyber Innovation Summit (Baltimore, Maryland, USA, May 1 - 2, 2019) The inaugural 2019 Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber...

2019 Innovator's Showcase (McLean, Virginia, USA, May 2, 2019) The Intelligence and National Security Alliance (INSA) will showcase IR&D projects with national security applications at its 2019 Innovators’ Showcase. Held in partnership with the Office of the Director social media for protecting or removing anonymity utilizing social media, internet-connected data stores, and other assets associated with life in a fully digital world, and ephemeris identity telemetry. including identifying characteristics such as biometrics, geolocation, digital signatures, and geo-environmental association..

Data Connectors Cybersecurity Conference Philadelphia (Philadelphia, Pennsylvania, USA, May 2, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Infiltrate 2019 (Miami Beach, Florida, USA, May 2 - 3, 2019) INFILTRATE is a deeply technical conference that focuses entirely on offensive security issues. Groundbreaking researchers demonstrate techniques that you cannot find elsewhere. Learn computer and network...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.