skip navigation

More signal. Less noise.

What if your security strategy added zeros to your bottom line?

Focusing on response alone is costly. You lose data. You lose infrastructure. You lose human and capital resources that could be productive elsewhere. And you lose your reputation. When you catch threats before they execute, you contain the problem, and the rewards add up. Let Blackberry Cylance help you understand how you can reduce your total cost of security controls, bolster your organization’s security posture, and zero in on what really matters.

Daily briefing.

Trend Micro has discovered a new variant of Mirai ("Backdoor.Linux.MIRAI.VWIPT") circulating in the wild. The IoT botnet's new variant repurposes thirteen exploits.

There's a rise in malicious crypto apps, wallets and other items, cropping up in Google Play. ESET notices that this increase is significantly correlated with Bitcoin price spikes.

Canadian targets received a lot of attention from social engineers during the first quarter of 2019, Proofpoint notices.

The US yesterday charged Wikileaks founder Julian Assange with Espionage Act violations related to activities in 2009 and 2010. The indictment supercedes the one filed last month. Mr. Assange is currently serving a fifty-week sentence in a British prison. Both the US and Sweden are seeking his extradition. The latest charges arouse concerns about press freedom (see WIRED, for example) but the Justice Department counters that what Wikileaks has done had little to do with journalism.

Russia has taken note of NATO Secretary General Stoltenberg's London remarks, pointing with sombre alarm in Sputnik to the Secretary General's obvious point that a response to a cyberattack need not itself be a cyber counterattack.

Infosecurity Magazine reports that a Red Sift study found that all twenty-two major British political parties have "deplorable" cybersecurity.

Under increasing pressure as the US blacklist extends its reach to international customers, Huawei takes its charm counteroffensive to Vice.

Emails that appear to carry threats of litigation are proving effective phishbait, KrebsOnSecurity reports. (It's long been difficult not to engage with things arriving that seem to come from law firms.)

Notes.

Today's issue includes events affecting Australia, China, Egypt, European Union, NATO/OTAN, Russia, Sweden, United Kingdom, United States.

A reminder: Monday is the annual observance of Memorial Day, and we'll take a hiatus for that day only, returning as normal on Tuesday. In the meantime, if you're in the US, enjoy the holiday, and wherever you are, spare a thought to remember the sacrifices of veterans and their families.

Bring your own context.

Don't let the lure of the exotic lead you to disregard the mundane. 

"I think what I see quarter after quarter, year after year is that, really, the tried-and-true methods for getting at sensitive information just keep happening over and over again. If we can phish a user, if we can get him to give up some credentials, that's going to get us access into his system. And we can poke around, maneuver around, escalate from there, see what we can get. And we see these same patterns repeating, month after month, year after year. So you know, I think the fundamentals still apply."

—Inga Goddijn from Risk Based Security on the CyberWire Daily Podcast, 05.22.19.

So don't neglect the obvious, whether you're mitigating risk, accepting risk, or transfering risk. And on transfering risk, you can rest assured the insurance carriers are aware of, and paying attention to, what's in front of your face.

Cyber State of Mind: 2019 Threat Landscape Review

According to CyberEdge’s 2019 Cyberthreat Defense Report, 78% of enterprises were victimized by a successful cyberattack last year. Is your organization next? On May 22nd at 2:00 PM ET join LookingGlass’ SVP of Delivery & Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper, as they review insights from CyberEdge’s sixth-annual research study. They’ll also provide answers to important questions, such as what are the weakest links in current security postures and What the hottest security technologies are in 2019.

In today's podcast, out later this afternoon, we speak with our partners at the Johns Hopkins University Information Security Institute, as Joe Carrigan discusses recent research from Google on the effectiveness of basic security hygiene. Our guest, Nate Lesser from Cypient Black, tells us about “entangled enterprise risk.”

National Cyber Summit Job Fair, June 5, Huntsville. (Huntsville, Alabama, United States, June 5, 2019) Cleared and non-cleared cybersecurity pros make your next career move at the free National Cyber Summit Job Fair, June 5 in Huntsville. Meet face-to-face with 22 leading cyber employers. Visit our site for more details.

Cyber Howard Conference (Columbia, Maryland, United States, June 19, 2019) Join us for our 10th annual cyber conference in Howard County. We will tackle the topic of Cyber Sensemaking which is a fluid and continuous approach for establishing better defenses and best practices as a cyber community.

Wicked6 Cyber Games (Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.

Cyber Warrior Women Summer Social: Sip and Paint (Columbia, Maryland, United States, August 21, 2019) Join the Cybersecurity Association of Maryland, Inc. (CAMI) for the annual Cyber Warrior Women Summer Social, an all-about-fun-and-networking event! We're adding an artistic element to this year's event with a wine glass painting exercise. No previous art experience required.

Cyber Attacks, Threats, and Vulnerabilities

Uncovering New Activity By APT10 (enSilo) In April 2019, enSilo detected what it believes to be new activity by APT 10, a Chinese cyber espionage group. The variants discovered by enSilo are previously unknown and deploy malware that is unique to the threat actor.

SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day (Threatpost) As promised, developer SandboxEscaper has dropped exploit code for four more bugs, on the heels of releasing a Windows zero-day yesterday.

Russian Nation-State Hacking Unit's Tools Get More Fancy (Dark Reading) APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.

Instagram website leaked phone numbers and emails for months, researcher says (CNET) The flaw made the information easy to scrape and turn into a database.

Beyond “North America” - Threat actors target Canada specifically (Proofpoint) Proofpoint researchers describe the Canadian email threat landscape.

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices (TrendLabs Security Intelligence Blog) We discovered a new variant of Mirai that uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks.

IoT Attacks Cost UK Firms Over £1bn (Infosecurity Magazine) Irdeto report reveals impact of customer data loss and attrition

Egyptian DDoS Campaign Observations (Akamai) Between March 19 and March 25, 2019, there was a very large amount of DDoS traffic sourced from a specific Egyptian Autonomous System (ASN) directed at Akamai Prolexic customers. It's worth noting this is an ASN we rarely see in...

PoC Exploits Created for Wormable Windows RDS Flaw (SecurityWeek) Several PoC exploits, including ones that can be used for remote code execution, have been created for the recently patched Windows RDS vulnerability tracked as CVE-2019-0708 and dubbed BlueKeep.

UK Political Parties Fail on Email Security Ahead of Elections (Infosecurity Magazine) Lack of strong DMARC policies put members at risk of phishing, says Red Sift

Another Day, Another Fraudulent App (White Ops) The White Ops Threat Intel team explores the inner workings of an app and a development kit that suggests fraudulent activity is afoot.

Fake cryptocurrency apps on Google Play try to profit on bitcoin price surge (Ars Technica) Researchers uncover two purported wallets uploaded after bitcoin prices rise.

Soaring Cryptocurrency Prices Draw Malicious Apps, Malware (Threatpost) As Bitcoin prices surge, so too are malicious apps, malware-ridden scams and cryptojacking attacks looking to profit from the cryptocurrency industry.

Fake cryptocurrency apps crop up on Google Play as bitcoin price rises | WeLiveSecurity (WeLiveSecurity) ESET researchers have analyzed fake cryptocurrency wallets cropping up on Google Play at the time of bitcoin’s renewed growth.

The alarming security state of airline mobile apps (Pradeo) Our latest study based on the security testing of global top 50 airline mobile applications shed the light on some alarming data privacy concerns.

Researchers are still using lessons from VPNFilter to track threats one year later - CyberScoop (CyberScoop) It’s a been a year since private security researchers worked with the FBI to dismantle a 500,000-router-strong botnet that loomed over Ukraine.

Comodo Issued Most Certificates for Signed Malware on VirusTotal (SecurityWeek) Comodo CA issued the largest number of digital certificates used to sign malware samples found on VirusTotal over the past year, Chronicle’s security researchers say.

An Update on How We Are Doing At Enforcing Our Community Standards (Facebook Newsroom) We're publishing our third Community Standards Enforcement Report.

More Data on Content Moderation Won't Silence Facebook’s Critics (WIRED) Facebook’s latest report lays out the sheer scale of its battle against fake accounts, spam, and other abuses.

Twitter Is Showing More Ads, And People Are Seeing Lots Of Weird Crap As A Result (BuzzFeed News) One malicious campaign used false articles about Drake and the Weeknd to promote casinos.

Snapchat Employees Abused Data Access to Spy on Users (Vice) Multiple sources and emails also describe SnapLion, an internal tool used by various departments to access Snapchat user data.

SQL Injections: The Cockroaches of the AppSec World (Infosecurity Magazine) If cockroaches had an equivalent in the digital world, it would have to be SQL injection vulnerabilities

Calibration Attack Drills Down on iPhone, Pixel Users (Threatpost) A new way of tracking mobile users creates a globally unique device fingerprint that browsers and other protections can't stop.

Cyberattacks are the newest frontier of war and can strike harder than a natural disaster. Here's why the US could struggle to cope if it got hit. (Albany Times Union) A successful cyberattack on critical infrastructure could do as much damage as a natural disaster, bringing a whole country to a standstill.

FBI investigating Cyber attack on City of Laredo (KGNS) A cyber attack on the City of Laredo caused panic for city officials and those who use their online services.

Google disables Baltimore's Gmail accounts used during ransomware recovery (Baltimore Sun) The creation of a large amount of accounts triggered Google's automated security system.

The city of Baltimore is being held hostage by ransomware (Naked Security) The mayor said no—for now—to paying 13 Bitcoins to (purportedly) unlock all seized systems. Manual rebuilding could take months.

EPA Cybersecurity Weaknesses Are Going Untracked and Unpatched (Nextgov) One EPA employee said their office was tracking vulnerabilities on their own to avoid oversight from other agency components.

Optus addresses major outage (CRN Australia) Impacted access to websites and gaming platforms.

Legal Threats Make Powerful Phishing Lures (KrebsOnSecurity) Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm.

How to defend against scams: 14 red flags everyone needs to be aware of (CSO Online) Does your security awareness training program help your employees learn when someone is trying to scam them?

LinkedIn Admits a Delay in Renewing TLS Cert (Infosecurity Magazine) A delay in SSL certification update has been fixed after users received security alerts.

Security Patches, Mitigations, and Software Updates

Mozilla fixes bugs, improves privacy in latest Firefox release (Naked Security) Mozilla rolled out version 67 of its Firefox browser this week, fixing some security bugs and introducing a host of privacy features.

Tor Browser for Android 8.5 offers mobile users privacy boost (Naked Security) After nine months of alpha testing, a stable release of the Tor browser for Android can now be downloaded from Google’s Play store or direct from the Project’s website.

Cyber Trends

Cyber Is the Perfect Weapon (SIGNAL Magazine) Cyber is fundamentally changing the national security landscape says David Sanger, national security correspondent for The New York Times.

73% of People Don’t Trust AI Voice Technology Such as Google Duplex to Make Simple Calls, Though Trust May Build as Usage Increases (Clutch) Nearly three-quarters of people (73%) say they are somewhat or very unlikely to trust a tool such as Google Duplex to correctly make simple calls for them. Duplex is a tool within Google Assistant that can call restaurants and book reservations using an AI-powered voice. Duplex caused controversy when it was unveiled in spring 2018 due to its

Attacks From Rogue Mobile Apps Jump 300%, and CNP Fraud Continues To Boom, RSA Finds (Digital Transactions) Fraud attacks involving rogue mobile applications jumped nearly 300% in the first quarter from the p

GDPR: Security Pros Believe Non-Compliance is Rife (Infosecurity Magazine) Lawyers warn enforcement activity will “step up”

Kaspersky Lab Sees Spike In Mobile Banking Cyberattacks (PYMNTS.com) Kaspersky Lab, a cybersecurity and anti-virus company, has reported a rise in a specific malware intended to steal money and credentials from people’s bank accounts. The company found 29,841 files of the malware in Q1 of 2019, which is up from 18,501 in Q4. Attacks on upwards of 300,000 users were detected. Kaspersky Lab released […]

Marketplace

‘Big four’ accountants are now Britain’s top cyber security employers (The Global Recruiter) “Every aspect of a modern company relies on its IT."

DoD stepping up recruitment efforts to find more diverse cyber talent (Federal News Network) As part of a new pilot program, the Defense Department awards contracts to five companies to actively recruit technical talent from the private sector.

Intel Community Asks Industry for Help Sorting Signal From Noise (Bloomberg GOV) The Office of the Director of National Intelligence will ramp up its outreach to technology providers as part of its Intelligence, Science, and Technology Partnership, or In-Step, according to a May 22 request for information.

How Silicon Valley gamed Europe’s privacy rules (POLITICO) The region’s data protection overhaul was supposed to help citizens. Instead, it’s helped Big Tech.

Huawei’s European Customers Are Put on Hold by U.S. Ban (New York Times) They’re unsure how Android phones will keep working as Google and other companies assess a Trump administration order.

Huawei’s US ban: A look at the hardware (and software) supply problems (Ars Technica) Huawei's hardware independence is actually pretty good! The software, though...

Jim Routh Joins Respond Software's Advisory Board (Yahoo) Veteran chief security officer to advise company on product direction and customer engagement

Cyren Expands Executive Team (Yahoo) Cyren (CYRN), a leader in cloud security, announced today that Lior Kohavi, who has served as Cyren's Chief Technical Officer since joining the company in 2013, has been promoted to the newly created position of Chief Strategy Officer & EVP Advanced Solutions

Products, Services, and Solutions

Blue Hexagon Expands Deep Learning-Based Network Threat Protection Solution with Comprehensive File and Platform Support (Blue Hexagon) Blue Hexagon expands file type and platform support to achieves parity with leading sandbox vendors without suffering from their inherent weaknesses.

SolarWinds Launches SolarWinds Security Event Manager (SEM) to Help IT and Security Pros Better Detect, Respond to, and Report on Threats (Yahoo) SolarWinds (NYSE:SWI), a leading provider of powerful and affordable IT management software, today announced the launch of SolarWinds® Security.

Tripwire Cloud Management Assessor Expands, Now Manages Secure Configuration for All Cloud Assets, from Cloud Storage to SaaS applications (BusinessWire) Enhanced Tripwire cloud security functionality allows organizations to evaluate monitor third-party SaaS applications such as Salesforce.com,

Barracuda launches Advanced Bot Protection (Yahoo) Application security leader deploys machine learning to protect organizations against automated threats CAMPBELL, Calif. , May 23, 2019 /PRNewswire/ -- Highlights: Barracuda Advanced Bot Protection uses ...

Forescout Strengthens Investment in OT Security (West) Forescout leads innovation within the operational technology (OT) cybersecurity space with the release of SilentDefense 4.0

How the browser betrays your organization (Federal News Network) Authentic8 offers a cloud browser called Silo, which facilitates worry-free browsing.

Technologies, Techniques, and Standards

Inside the Government's Quest to Safely Use Open-Source Code (Defense One) One security company found that about 10 percent of individual software components contain a known vulnerability.

CVE-2019-11815: A Cautionary Tale About CVSS Scores (TrendLabs Security Intelligence Blog) by John Simpson Vulnerabilities in the Linux kernel are not uncommon. There are roughly 26 million lines of code, with 3,385,121 lines added and 2,512,040 lines removed in 2018 alone. The sheer complexity of that much code means that vulnerabilities are bound to exist. However, what is not at all common is the existence of...

Protect Your Account With Google's Highest Ranked Security Methods (Life Hacker) Everywhere you turn, someone is handing out advice about account security and privacy. And while it never hurts to be reminded about all the ways you can protect your critical data, have you topped to wonder whether any of the various security measures you’re taking are actually effective?

How to conduct a proper GDPR audit: 4 key steps (CSO Online) Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

12 dark secrets of encryption (CIO) With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.

How DHL is securing 'the world's most international company' (CIO) Chin Kiat Chim, vice president and CISO of multinational logistics company DHL, explains the importance of combined business and technology strategies in security and the profile of the new CISO

How to stop email fraud, the costliest cybercrime (Avast) Learn what the FBI urges consumers and businesses to do to stop fraudulent emails.

Design and Innovation

Can the re-use of identity data be a silver bullet for industry? (CSO Online) The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen.

When Quantum Computing Meets AI: Smarter Digital Assistants and More (Wall Street Journal) Quantum computing’s processing power could significantly improve artificial-intelligence systems within about five years, experts and business leaders say.

Amazon Is Working on a Device That Can Read Human Emotions (Bloomberg) Described as a health product, it would work with a mobile app. Machines that can understand emotions are a sci-fi staple.

Legislation, Policy, and Regulation

‘Not Limited’ to Cyberspace: NATO Threatens Physical Response to Cyberattacks (Sputnik) Jens Stoltenberg, NATO's secretary general, told officials at the Cyber Defense Pledge Conference in London on Thursday that the alliance won't hesitate to use all means necessary to respond to cyberattacks moving forward.

Time finally runs out for Theresa May (Times) Theresa May is set to resign as the Conservative leader today, clearing the way for a new prime minister by the end of July. She is expected to bring her premiership of nearly three years to a...

Who are the candidates to replace Theresa May? (Deutsche Welle) Following Theresa May's confirmation that she will quit on June 7, there are several Conservative candidates jostling for position to replace her as party leader, and by extension prime minister of the United Kingdom.

China’s new cyber totalitarianism (Boulder Weekly) Human Rights Watch has released a report on human rights abuses in the world’s largest totalitarian state — the People’s Republic of China. And it’s terrifying. As bad, if not worse, as anything Orwell imagined in 1984. It turns out that Human Rights Watch got its hands on a mobile surveillance app that Chinese security …

Forced Tech Transfers Are on the Rise in China, European Firms Say (Wall Street Journal) European businesses in China say forced technology transfers to local firms have become more common over the past two years as foreign firms battle for access in the world’s second-largest economy.

US, China dig in heels on Huawei as tech war intensifies (AFP.com) The United States and China hardened their stands over Huawei Thursday as Washington brushed aside claims of "bullying" and accused the Chinese tech giant of misrepresenting its ties to the Beijing government.

What to expect from China, as U.S. companies continue to cut ties with Huawei (Yahoo) Panasonic is the latest U.S. company to cut ties with Huawei. Yahoo Finance talks to the CEO of Red Balloon Security to discuss how China will react to this pull out.

China's Tariff List Advertises Its Trade War Weakness (The National Interest) President Donald Trump obviously overstated the case when he claimed that a trade war with China would be “easy to win.”

Trump calls Huawei 'dangerous' but says dispute could be resolved in trade deal (Stamford Advocate) President Donald Trump raised the possibility that a U.S. dispute with Chinese telecom giant Huawei could be resolved as part of a trade deal, days after his administration cut off U.S. technology sales to the company, calling it a national security threat.

Trump’s latest explanation for the Huawei ban is unacceptably bad (The Verge) It could do lasting damage to America’s credibility

Analysis | The Cybersecurity 202: FEC approves free cybersecurity for campaigns despite influence concerns (Washington Post) A nonprofit plans to give campaigns free security tools and run cyber bootcamps.

Murphy, Waltz to introduce bill to inform officials and public of hacking (Orlando Sentinel) U.S. Reps. Stephanie Murphy and Michael Waltz will file bipartisan legislation to require deferral officials to alert Congress and state and local officials when election systems are hacked.

Proposed US Senate bill would hand $700M to rural telecoms to avoid Huawei & ZTE (AppleInsider) A bipartisan group of U.S. senators have proposed a bill that would hand $700 million in grants to rural telecom providers to cover the cost of stripping Huawei and ZTE gear from their networks.

Senate panel wants to see secure 5G network experimentation (C4ISRNET) The Senate Armed Services Committee wants to ensure the Department of Defense can take advantage of the next generation of wireless technology, 5G.

Inside GCHQ: the art of spying in the digital age (Financial Times) Britain’s biggest intelligence service is rethinking its mission — and recruitment strategy

Facial Recognition Has Already Reached Its Breaking Point (WIRED) Facial recognition technology has proliferated unchecked in the US so far. Congress finally seems ready to do something about it.

UK to invest $28M in cyber operations centers (TheHill) The United Kingdom is preparing to invest 22 million pounds, the equivalent of almost $28 million, to open new cyber operation centers.

Texas passes first grid protection bills to boost cybersecurity monitoring and best practices (Utility Dive) SB 475 establishes the Texas Electric Grid Security Council to develop grid security standards, prepare for grid-related security threats and amend the state emergency plan to ensure coordinated response and recovery efforts.

The U.S. Senate is coming after ‘loot boxes’ (TechCrunch) Gamers feel passionately about loot boxes, turns out some elected officials do too. A new Senate bill was formally introduced today with bipartisan support and it could categorically shift how today’s top platforms and distribution platforms monetize the titles they sell. The bill’s int…

GOP, Dem Senators officially introduce loot box, “pay-to-win” legislation (Ars Technica) Expansive prohibitions could heavily impact large swathes of the game industry.

Litigation, Investigation, and Law Enforcement

Julian Assange faces 17 new charges under US Espionage Act (Times) The US authorities have issued 17 new charges against Julian Assange and accused him of breaking the Espionage Act for publishing classified military and diplomatic documents. The charges, which...

WikiLeaks founder Julian Assange charged with violating Espionage Act (Washington Post) The case could have major First Amendment repercussions.

WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment (US Department of Justice) A federal grand jury returned an 18-count superseding indictment today charging Julian P. Assange, 47, the founder of WikiLeaks, with offenses that relate to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States. Assistant Attorney General for National Security John C. Demers, U.S. Attorney G. Zachary Terwilliger for the Eastern District of Virginia, Assistant Director John Brown of the FBI’s Counterintelligence Division and Acting Assistant Director in Charge Timothy Dunham of the FBI’s Washington Field Office made the announcement.

The Latest Julian Assange Indictment Is an Assault on Press Freedom (WIRED) By invoking the Espionage Act against Julian Assange, the Justice Department will effectively put national security journalism on trial.

New Assange indictment adds 17 espionage charges (Ars Technica) Obtaining, disclosing "National Defense Information" charges could trigger 1st Amendment battle.

Wikipedia case against NSA internet snooping returns to court (Washington Examiner) Attorneys for Wikipedia are scheduled to return to federal court next week in a long-running fight to limit government surveillance of internet messages.

Huawei Executive Accused by U.S. Startup of Involvement in Trade-Secrets Theft (Wall Street Journal) CNEX Labs, a chip startup backed by Microsoft and Dell, has accused a senior executive at Huawei Technologies of participating in a conspiracy to steal its trade secrets.

San Jose startup claims Huawei exec ordered IP theft (Silicon Valley Business Journal) A back-and-forth lawsuit over allegedly stolen trade secrets took a new turn at a pretrial hearing, where San Jose-based CNEX reportedly claimed a Huawei executive ordered an employee to spy on the startup.

BREAKING: Trump Approves Declassification of Documents Related to 2016 Election Spying (Townhall ) Late Thursday evening, President Trump granted Attorney General Bill Barr the authority to declassify information relevant to the investigation into how spying on the Trump campaign started in 2016.

Republicans Seethe as NSA Slow-Rolls ‘Unmasking’ Reform (The Daily Beast) The agency indicated more than a year ago it would shed more light for Republicans on who gets unmasked and why. Republicans say it hasn’t happened—and they’re not giving up.

TalkTalk Overlooked Nearly 5000 Customers with Breach Notification (Infosecurity Magazine) New report reveals thousands of victims were not informed

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Cybertech Midwest 2019 (Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...

SecureWorld Atlanta (Atlanta, Georgia, USA, May 29 - 30, 2019) Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry...

Louisville Cybersecurity Conference (Louisville, Kentucky, USA, May 30, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

National Cyber Summit (Huntsville, Alabama, USA, June 4 - 6, 2019) National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising...

Infosecurity Europe (London, England, USA, June 4 - 6, 2019) Europe’s Leading Event for Information and Cyber Security Bringing business, tech and cyber communities together to discuss and discover how best to protect companies and individuals. Join in to find ‘everyone...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.