skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

Daily briefing.

US President Trump yesterday issued an Executive Order declaring a national emergency with respect to the threat foreign adversaries pose to US technology infrastructure, and banning the use of products and services produced by companies effectively under the control of such adversaries. The Secretary of Commerce will take the lead in determining where such threats to national security lie. The language is properly general, but the adversary of concern is obviously China, and the company most likely to be affected is Huawei. Huawei knows this, and has responded with a mixture of honey and vinegar: it's innocent, the Guardian reports the company saying, and it will sign agreements to convince skeptical governments that its products represent no threat.

Huawei's case isn't helped by reports from Reuters and Volkskrant that the Netherlands' General Intelligence and Security Service is investigating what it believes may be an espionage backdoor the company insinuated into Dutch commercial telecommunications networks.

The Telegraph reports that NSO Group's ownership says it will investigate how Pegasus became the payload in a WhatsApp exploit, and promises transparency and more due diligence with respect to its customers.

Concerns about US exports' potential contribution to spyware proliferation motivate legislation moving through the US House of Representatives. The proposed law would, according to Reuters, require the State Department to report on how it was overseeing and approving exports of cybersecurity goods and  services. Lawmakers cite Project Raven, formerly provided to the UAE, as an example of an approved export that might raise concerns.

Notes.

Today's issue includes events affecting Australia, Canada, China, European Union, France, Iran, Israel, Democratic Peoples Republic of Korea, Netherlands, New Zealand, Russia, United Kingdom, United States.

Bring your own context.

You know your own network (more or less). Or perhaps it would be more accurate to say you have a picture in your mind of what your own network looks like. The attacker doesn't share that picture.

"But for attackers, they incrementally - typically, incrementally - build up a picture over time of the network that you have and the systems that you have. So they start out with much less information. That results in, potentially, attack pathways and ways they attack the network, which seem illogical to the defender but very logical to the attacker because they have incomplete and impartial information."

—Daniel Prince, senior lecturer in cybersecurity at Lancaster University, on the CyberWire Daily Podcast, 5.14,19,

Napoleon used to warn his marshals against forming a picture. The enemy will have one too, and the enemy may surprise you.

Automation techniques by Coalfire and AWS enable FedRAMP ATO in half the time

Automation is dramatically changing the times and costs to compliance—in many cases by half compared to traditional methods. Furthermore, these techniques can slash the demands on in-house staff and eliminate much of the redundant work across frameworks. Download the white paper explaining the benefits of new automation techniques pioneered by Coalfire and AWS.

In today's podcast, out later this afternoon, we speak with Emily Wilson from our partners at Terbium Labs. She discusses the surprisingly open nature of online sales of illicit goods and services. Our guest is Kris Beevers from NS1 on DNS security and management technology.

And Hacking Humans is up. In this episode, "Live at KB4CON 2019" (so-called because we recorded it live last week at KnowBe4's conference in Florida), Dave describes a late-night phone call scam, Joe explains a Social Security scheme, Stu shares deadly catch of the day, and Kevin shares stories from his own hacking experience, and takes questions from the audience.

Uniting Women in Cyber (Arlington, VA, United States, May 17, 2019) Join us as we celebrate the women in today’s cybersecurity ecosystem at the Uniting Women in Cyber Symposium on May 17, 2019! This full-day event features dynamic women speakers discussing the future of tech, cybersecurity and business. Network among 300–400 business and technical professionals and attend our awards reception recognizing women in tech and business.

DreamPort Event: Tech Talk Series: How DevOps and Automation Can Accelerate Warfighting Readiness (Columbia, Maryland, United States, June 19, 2019) Come hear NetApp's own DevOps journey and lessons learned and see how NetApp has equipped large enterprises to change fast and manage risk, with its deep integration with DevOps tools. In this interactive demonstration and discussion, NetApp will guide conversation towards a DevSecOps vision that can be realized immediately with capabilities that are available today to Defense Department developers.

DreamPort Event: RPE- 006: The Defense at Pemberton Mill (Columbia, Maryland, United States, June 21, 2019) DreamPort, in conjunction with the Maryland Innovation & Security Institute and USCYBERCOM is hosting RPE -006: The Defense at Pemberton Mill. For this event, we'll be looking for solutions that monitor a fictitious network for vulnerabilities and detect attacks in progress. We want participants to bring solutions for monitoring both information technology (IT) and operational technology (OT) networks both in live (with network taps) and offline (PCAP) mode. This event is June 21.

Wicked6 Cyber Games (Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.

Cyber Attacks, Threats, and Vulnerabilities

Dutch spy agency investigating alleged Huawei 'backdoor': Volkskrant (Reuters) Chinese telecoms equipment maker Huawei has a hidden "backdoor" on the...

Russian government sites leak passport and personal data for 2.25 million users | ZDNet (ZDNet) Passport data for high-ranking Russian politicians among the leaked information.

Hackers can fake radio signals to hijack aircraft landing systems, warn researchers (Computing) Attackers could potentially change the course of a flight using $600 worth of commercially available equipment

Attackers Are Messing with Encryption Traffic to Evade Detection (Dark Reading) Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

Billions of Malicious Bot Attacks Take to Cipher-Stunting to Hide (Threatpost) Attackers have been tampering with TLS signatures at a scale never before seen using the cipher-stunting approach.

Threat Actor Profile: TA542, From Banker to Malware Distribution Service (Proofpoint) Proofpoint researchers detail historic and current campaigns and activities from TA542, the prolific actor behind Emotet, a “malware multi-tool.”

Intel MDS Vulnerabilities: What You Need to Know (SecurityWeek) New Intel CPU vulnerabilities known as MDS, ZombieLoad, Fallout and RIDL impact millions of devices. Affected vendors published advisories and blog posts with information for users.

Google warns Bluetooth Titan security keys can be hijacked by nearby hackers (Ars Technica) Attackers can connect their own device to Bluetooth-enabled keys used for 2fa.

Winnti: More than just Windows and Gates (Medium) The Winnti malware family was first reported in 2013 by Kaspersky Lab. Since then, threat actors leveraging Winnti malware have victimized…

Hackers Inject Magecart Card Skimmer in Forbes’ Subscription Site (BleepingComputer) Forbes' subscription website got injected by hackers with a Magecart card skimming script designed to exfiltrate customer payment data to a server controlled by the cybercriminals behind the attack.

WhatsApp breach has huge privacy implications: Forcepoint (Hindustan Times) A bug in the Facebook-owned messaging app’s audio call feature allowed hackers to install spyware onto Android and iOS phones just by calling the target.

Who's behind the WhatsApp hack and should you be worried? | CBC News (CBC) WhatsApp began urging its 1.5 billion or so users to update their apps after a weekend cyberattack. Here's what you need to know about the company believed to be behind the hack and what you should do now.

Australian Member of Parliament’s Websites: How Secure Are They? (Network Dynamics) The 2019 federal elections are just around the corner, so we thought it would be an interesting exercise to review the websites of our state MPs and see how they perform against a relatively simple security and best practices check.

SRA Warn Conveyancers And Solicitors Over Fresh Phishing Scam (Today's Conveyancer) The Solicitors Regulation Authority (SRA) are warning its members of another high profile email conveyancing scam.

Porn Email Scam Nets Scammers Almost $1M In Bitcoin (PYMNTS) There’s an email scam going around that involves scammers claiming to have webcam footage of people watching porn, with threats to release the info if not paid a hefty ransom in bitcoin, according to a report by Fortune. Oren Falkowitz, who heads an anti-phishing company called Area 1, was contacted by a colleague about a […]

Israeli TV Eurovision webcast hacked with fake missile alert (the Guardian) Song contest semi-final interrupted with warnings of imminent attack on Tel Aviv

8 days after cyberattack, Baltimore’s network still hobbled (Washington Post) More than a week after a cyberattack hobbled the Baltimore government’s computer network, city officials say they can provide no real timeline for when its system will be up and running

Baltimore Ransomware Siege Enters Second Week of Bitcoin Extortion Attack (CCN) Most of the Baltimore City’s government systems have been locked down since May 7th as a result of the “Robbinhood” ransomware attack. The successful crypto locking has forced the city to go “manual” in

Marriott CEO: Cyber Attack Will Cost 'Millions of Dollars' (Bloomberg) Marriott International Inc. President and Chief Executive Officer Arne Sorenson tells David Rubenstein that last year's hack of its Starwood reservation system that exposed the data of up to 500 million guests will end up costing "a number of quarters of millions of dollars," plus still-unknown penalties. His comments come in the latest episode of "The David Rubenstein Show: Peer-to-Peer Conversations."

Security Patches, Mitigations, and Software Updates

Google Will Replace Titan Security Key Over a Bluetooth Flaw (WIRED) Google will replace any Titan BLE branded security key, after disclosing that a nearby attacker could use it to compromise your accounts.

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign (WIRED) A very bad vulnerability in Windows XP could have serious ramifications, even with a patch.

Apple posts instructions on how to enable full mitigation against Intel CPU attacks on Mac, up to 40 percent performance penalty (9to5Mac) Following the announcement of new speculative execution exploits that target Intel CPU architecture, Apple has posted a new document on its website that explains how customers with computers that a…

Cyber Trends

Valimail Industry Report: Global Finance, May 2019 (Valimail) Business email compromise (BEC) and phishing attacks are a major issue for companies...

VPN Use in the Age of Fumbled Data Privacy (OpenVPN) OpenVPN surveyed 1,000 full- and part-time employees to gauge their awareness of VPN use and the tech giants who abuse data privacy. See the results here.

Bitglass Report: Publicly Traded Companies Suffering the Worst Data Breaches Averaged a 7.5 Percent Decrease in Stock Price (BusinessWire) Bitglass releases findings from its latest report on the worst data breaches of the last 3 years: Kings of the Monster Breaches.

DataGrail Research Reveals 70% of Privacy Professionals Agree Their Systems Will Not Support New Privacy Regulations (Yahoo) DataGrail, the privacy management platform purpose-built for the European (GDPR), Californian (CCPA) and impending privacy regulations, today announced the publication of "The Age of Privacy: The Cost of Continuous Compliance." The report benchmarks

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises (Yahoo) Dimension Data, the USD 8 billion global technology integrator and managed services provider for hybrid IT, has revealed exclusive findings from its Executive Guide to NTT Security's 2019 Global Threat Intelligence Report concerning the cybersecurity maturity

New Survey Finds Vast Majority of IT Security Pros Willing to Share Threat Intel to Improve Overall Collective Defense Efforts (IronNet Cybersecurity) Enterprises defending in isolation cannot ward off modern cyber threats; Faster, more effective threat sharing between industry peers and the government is necessary

Cybersecurity Market Review (Q1 2019) (Momentum Cyber) We are pleased to provide you with Momentum’s Cybersecurity Snapshot for April 2019. Strategic activity in April included 42 transactions completed totaling $1.7B in deal value across M&A (10 transactions, $1.03B) and financing (32 transactions, $627M).

Marketplace

NSO owner tells Amnesty it will prevent abuse of spyware linked to... (Reuters) NSO Group's owner said it will do whatever necessary to ensure the Israeli ...

Israeli spyware firm's British financial backer promises 'transparency' after WhatsApp hack (The Telegraph) The UK private equity fund backing Israeli spyware firm NSO has claimed it will toughen up the governance of the company after NSO’s software was allegedly used to hack WhatsApp.

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers (ProPublica) As ransomware attacks crippled businesses and law enforcement agencies, two U.S. data recovery firms claimed to offer an ethical way out. Instead, they typically paid the ransom and charged victims extra.

VMware buys Bitnami, targets cloud and enterprise app stores (CRN Australia) This matters to MSPs who offer Bitnami catalogs, and to VMware partners.

CrowdStrike IPO Filing Touts Security Software (CFO) “We believe we are defining a new category called the Security Cloud," the company says in its prospectus.

Kaseya acquisition trail continues with ID Agent -- is DR next? (SearchDataBackup) ID Agent becomes the latest Kaseya acquisition following a $500 million funding round. The ID Agent brand and staff will stay, and work has already begun integrating ID Agent with products from other Kaseya acquisitions, like Spanning and Unitrends.

Arctic Wolf Networks Announces Move to 100 Percent Channel (BusinessWire) Arctic Wolf Networks, Inc., a leading security operations center (SOC)-as-a-service company, is excited to announce a “100 percent channel” strategy t

Cybersecurity industry veteran Matthijs van der Wel to lead Nixu in the Benelux (News Powered by Cision) European cybersecurity services company, Nixu, has appointed Mr. Matthijs van der Wel as Market Area Leader Benelux to lead the operations and further growth of Nixu in the region.

Menlo Security Hires Scott Fuselier as Chief Revenue Officer and Young-Sae Song as Chief Marketing Officer (MarTechSeries) Secure Web Visionary Expands Sales and Marketing Teams with New Executive Hires to Drive Global Expansion Menlo Security, a leader

Advanced Onion Enhances Executive Team in Pursuit of Corporate Growth (Odessa American) Advanced Onion, Inc. (AO) has added another layer of strategy to its best-in-class technology delivery and uniquely personalized business development. Romain Nowakowski joined the AO team in April 2019 as Vice President of Strategic Growth and Business Development.

Products, Services, and Solutions

Akamai Enterprise Defender Simplifies Journey to Zero Trust for Businesses (Yahoo) New offering provides secure app access, malware prevention, application security and acceleration in a single solution CAMBRIDGE, Mass. , May 16, 2019 /PRNewswire/ -- Akamai (NASDAQ: AKAM), the intelligent ...

Endgame Introduces Reflex™ Real-Time, Autonomous Protection Engine To Close Adversary ‘Breakout’ Window (West) Reflex is the first technology to move custom protection within reach of IT Operations

Tech Data Partners with Deep Instinct to Provide Deep Learning that Thwarts Cyberattacks (Deep Instinct) Tech Data has partnered with Deep Instinct to offer their deep learning cybersecurity platfom to customers in the US, Canada and Latin America

Distil Networks Strengthens Bot Management Solution with Significant Product Enhancements (Distil Networks) New Deployment Options Integrate Bot Defense into AWS, Cloudflare, F5 Networks and NGINX while Granular Web Traffic Analysis Enhances Capabilities for Sophisticated Bot Protection.

SecureLink launches SecureDetect Intelligence to provide digital risk protection through strategic partnership with Digital Shadows | Digital Shadows (Digital Shadows) SecureDetect Intelligence to help enterprises across Europe detect data loss, secure their online brand and reduce their attack surface San Francisco, London and Sliedrecht, the Netherlands.

HackerOne Achieves FedRAMP In Process Milestone (Yahoo) FedRAMP Authorization Streamlines HackerOne’s Ability to Provide Crowdsourced Security Solutions to U.S. Public Sector

Eastern Communications of the Philippines partners with DOSarrest to deliver cloud based Internet Security solutions (West) Leading Philippine based telecommunications carrier selects Internet Security firm DOSarrest to deliver cyber security solutions to their commercial client base. The partnership allows Eastern to provide a number of cloud based security solutions including DDoS Protection, Web Application Firewall, global load balancing and Content Delivery Network(CDN). The partnership also gives Eastern Communications access to DOSarrest’s traffic Analyzer (DTA) and Data Center Defender, a solution that allows its customer to protect thousands of IP addresses at the same time with one automated cloud based service.

Tresys Announces New Release of XD Air its Portable Media Threat Protection Appliance (Newkerala.com News) Tresys Technology, an industry leader in Cross Domain Solutions, today announced the release of XD Air version 5.0, a portable media inspection and file transfer appliance.

Cynet Introduces New Tool to Identify and Remove Cybersecurity Threats: Interview with Eyal Gruner, the CEO of Cynet. (TechBullion) Cynet recently announced a Free Incident Response (IR) Tool to remediate cybersecurity breaches. As pioneers in automated threat discovery and mitigation, this free offering for organizations identifies critically exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active in the environment. Eyal Gruner, the CEO of Cynet will be discussing this […]

LIFARS, eSentire Deliver Incident Response-as-a-Service (MSSP Alert) LIFARS & eSentire introduce Incident Response as a Service. Together, the two companies offer managed security (MSSP), managed detection & response (MDR) & digital forensics services.

Microsoft: 'We're detecting 5 billion cybersecurity threats on devices a month (ZDNet) Microsoft offers a new snapshot of the data that feeds into its Intelligence Security Graph.

IGEL Launches a Fast, Cost-Effective and Secure Endpoint Device for the Future of Work (IGEL) #IGEL launches the #UD2 as part of their Universal Desktop #endpoint solutions. The UD2 is a fast, cost-effective & #secure endpoint device to meet the needs for the “future of work”. Learn more.

Technologies, Techniques, and Standards

Seven in Ten Cybersecurity Professionals Are Using or Considering Honey Pots, Deception Technology to Deliver Advanced Forensic and Attribution Capabilities (BusinessWire) One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pot

Three ways to prevent exchange hacks—how 3FA can foil cryptocurrency exchange robberies (CryptoSlate) The recent hack of the world’s biggest cryptocurrency exchange, Binance, highlights the need for heightened security in the crypto space. In what Wired reported as “a ‘large-scale security breach,’ hackers stole not only 7,000 bitcoin—equivalent to over $40 million ($56 million at the time of this writing, just one week later)—but also some user two-factor …

Design and Innovation

Behind Twitter’s Plan To Get People To Stop Yelling At One Another (BuzzFeed News) Twitter’s leadership knows that it’s fundamentally broken, and its latest attempt to fix itself shows how daunting of a task that will be.

YouTube’s Newest Far-Right, Foul-Mouthed, Red-Pilling Star Is A 14-Year-Old Girl (BuzzFeed News) "Soph" has nearly a million followers on the giant video platform. The site's executives only have themselves to blame.

What does it take to be an infosec product strategist? (Help Net Security) A good product strategist must be good at balancing local and global priorities, ensuring the near-term and specific fit in with the longer-term.

Forget endpoints—it’s time to secure people instead (Security Brief) Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.

Legislation, Policy, and Regulation

Iran builds firewall against Stuxnet computer virus: minister (Reuters) Iran has developed software to protect its industry against the Stuxnet computer...

The Knowns and Unknowns of What’s Happening With Iran (The Atlantic) Conflicting signals from both sides could be read as a march to war or business as usual.

Jacinda Ardern's ambitious plan to end online extremism after the Christchurch massacre (ABC News) New Zealand's Prime Minister is taking her fight to end online extremism to Europe today, teaming up with Emmanuel Macron to try and curtail the power of tech companies to self moderate.

White House declines to back Christchurch call to stamp out online extremism amid free speech concerns (Washington Post) The White House will not sign an international agreement to combat online extremism brokered between French and New Zealand officials and top social media companies, amid U.S. concerns that the pact clashes with constitutional protections for free speech.

White House launches tool to report censorship on Facebook, YouTube, Instagram, and Twitter (The Verge) ‘If you suspect political bias caused such an action to be taken against you, share your story with President Trump’

Why Are the U.S.'s Cyber Secrets Getting Stolen? Because China’s Getting Better At Stealing Them. (Lawfare) America’s cyber adversaries are catching up to it. NOBUS no more.

Executive Order on Securing the Information and Communications Technology and Services Supply Chain | The White House (The White House) By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code, I, DONALD J. TRUMP, President of the …

Trump signs order to protect U.S. networks from foreign espionage, a move that appears to target China (Washington Post) A new executive order gives the federal government broad powers to bar U.S. companies from doing business with certain foreign suppliers.

Trump administration cracks down on giant Chinese tech firm, escalating clash with Beijing (Washington Post) The president also signed an executive order to protect U.S. networks from foreign espionage, a move that appears to target China.

Trump Telecom Ban Takes Aim at China, Huawei (Wall Street Journal) President Trump signed an executive order that allows the U.S. to ban telecommunications network gear and services from foreign adversaries, taking aim at Chinese telecom companies Huawei and ZTE and dialing up security and trade tensions.

Analysis | The Cybersecurity 202: Trump makes boldest strike yet to bar Chinese tech from U.S. (Washington Post) The executive order appears focused on Huawei but could be far broader.

Huawei hits back over Trump's national emergency on telecoms 'threat' (the Guardian) Chinese firm says ban on tech from ‘foreign adversaries’ will harm US consumers

Is Huawei a Pawn in the Trade War? (Foreign Affairs) The company's troubles are linked to the politics of the global tech race.

Analysis | The Cybersecurity 202: Trump officials and lawmakers say China is the problem not Huawei (Washington Post) ‘It’s not about overseeing Huawei. It’s about overseeing China,’ Lindsey Graham says.

Pompeo warns Russia: US won't tolerate election interference (TheHill) Secretary of State says Russian meddling in 2020 "would put our relationship in an even worse place"

The next Maria Butina? 2020 campaigns to be briefed on counterintelligence threat (CNN) In the wake of cybersecurity attacks and attempted infiltration by foreign nationals in the 2016 election, the FBI has offered defensive briefings to 2020 presidential campaigns, seeking to help them prepare for possible counterintelligence threats, a government official tells CNN.

As security officials prepare for Russian attack on 2020 presidential race, Trump and aides play down threat (Washington Post) The president’s refusal to focus on Russia’s past election interference invites more of it, analysts say.

House Homeland Gives Thumbs Up for Permanent DHS Cyber Response Team (Nextgov) The committee passed a trio of other bills that would fight digital spies, improve intelligence sharing and bolster counterterrorism tech research.

The Gravity Of Josh Hawley's Culture War Against Big Tech (The Federalist) As both parties grapple with surging populism, Missouri Sen. Josh Hawley has identified Big Tech as a worthy battleground.

One day they may part, but for now Cyber Command loves working with the NSA (Fifth Domain) Officials spoke favorably about the dual-hat arrangement.

Identity crisis: FBI plays catch-up as cyberthreats escalate (Yahoo News) In the United States, digital criminals using everything from weaponized botnets to ransomware are attacking private industry and the government on a daily basis, increasing the demand for experts with skills in cybersecurity, intelligence and law enforcement.

Lawmakers introduce legislation to improve cyber workforce funding (TheHill) Lawmakers in the House and Senate introduced legislation on Wednesday to improve the cybersecurity workforce by directing the Department of Labor to award grants that help create and expand cyber apprenticeship programs.

Litigation, Investigation, and Law Enforcement

UK Supreme Court Overturns Ultimate Authority of Investigatory Powers Tribunal (SecurityWeek) Over the last few years, the UK government has implemented 'national security' laws that many other countries might consider draconian.

Lawmakers seek probe on U.S. hacking services sold globally (Reuters) U.S. lawmakers are pushing legislation that would force the State Department to ...

US attorney John Durham has been reviewing origins of Russia probe 'for weeks': source (Fox News) The U.S. attorney appointed to examine the origins of the Russia investigation has been working on his review “for weeks,” a person familiar with the process told Fox News on Tuesday.

6 Things to Know About the Prosecutor Investigating Spying on Trump Campaign (The Daily Signal) Attorneys general under Republican and Democrat presidents have appointed Durham to lead special probes.

Europol, DOJ announce the takedown of the GozNym banking malware (TechCrunch) Europol and the U.S. Justice Department, with help from six other countries, have disrupted and dismantled the GozNym malware, which they say stole more than $100 million from bank accounts since it first emerged. In a press conference in The Hague, prosecutors said 10 defendants in five countries …

United States of America v. Alexander Konoolov [and 9 others] (US Department of Justice) At all times material to this Indictrnent, unless otherwise alleged...

A Shield From Cyber Liability: Diving Deeper Into the SAFETY Act (JD Supra) As we’ve discussed in previous posts, the SAFETY Act has the potential to serve as a valuable tool for companies looking to mitigate risk from...

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Newly Noted Events

Gartner Security & Risk Management Summit 2019 (National Harbor, Maryland, USA, June 17 - 20, 2019) Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security & Risk Management Summit 2019,...

IT & Cyber Day at Aberdeen Proving Ground (Aberdeen, Maryland, USA, August 1, 2019) Aberdeen Proving Grounds (APG) provides technology life cycle management for the US Army and the various commands involved in the fielding and closeout of their technologies. The Cyber and IT Day expo...

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

TechNet Cyber (Baltimore, Maryland, USA, May 14 - 16, 2019) TechNet Cyber 2019, formerly the Defensive Cyber Operations Symposium, will be the staging area for military, industry and academia to discuss and plan how to achieve persistent engagement, persistent...

CYBERSEC Brussels Leaders' Foresight 2019 (Brussels, Belgium, May 15 - 16, 2019) The aim of the CYBERSEC Brussels Leaders' Foresight 2019 is to give proactive guidance on how to lead, encourage evidence-based desision-making, and develop cybersecurity policy statecraft in the EU and...

Cyber Investing Summit (New York, New York, USA, May 16, 2019) The Cyber Investing Summit is an all-day conference focused on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the...

SecureWorld Cincinnati (Cincinnati, Ohio, USA, May 16, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.