skip navigation

More signal. Less noise.

Get your copy of the definitive guide to threat intelligence.

We brought together a team of experts and wrote the definitive guide to everything you need to know about threat intelligence. Whether you work in vulnerability management, incident response, or another part of cybersecurity, our book has something for you. Get your free copy of “The Threat Intelligence Handbook” now.

Daily briefing.

AFP reported yesterday that some major Airbus suppliers were hit by a cyberattack that seems designed to steal trade secrets. Engine manufacturer Rolls-Royce was among those hit, as was Expleo, a French technology consultancy and supplier. At least two other companies in the Airbus supply chain were also attacked, but their identities are so far not publicly known. There is so far no firm attribution, but informed speculation points to Chinese espionage. Either APT10 (which is also known as Stone Panda and Menupass) or JSSD are being mentioned in dispatches. JSSD is associated with the regional security ministry in Jiangsu. Jiangsu is a center of China’s aerospace industry, which is seeking to enter the commercial airline market.

Zscaler reports finding phishing campaigns (which the company assesses as "sophisticated") abusing Appspot.com and Web.app, both legitimate domains associated with Google Cloud. The researchers say the campaign, which deploys well-executed landing pages that spoof the two widely used sites, is similar to a phishing effort they found in July that was engaged in similar deception with respect to Microsoft Azure.

Imperva reports that the vBulletin zero-day is being exploited in the wild.

DoorDash disclosed that it's sustained a major data breach. Data on some 4.9 million customers, "Dashers" (gig workers who deliver for the service), and merchants were exposed to an "unauthorized third party" in May of this year. The company says the incident affected those who joined DoorDash before April 6, 2018. Customers, Dashers, and merchants who joined more recently are unaffected.

Notes.

Today's issue includes events affecting Azerbaijan, Bahrain, China, Ethiopia, European Union, Hungary, India, Iran, Japan, Democratic Peoples Republic of Korea, Myanmar, Pakistan, Russia, Saudi Arabia, Singapore, Tajikistan, Ukraine, United Kingdom, United States, Venezuela, and Zimbabwe.

Bring your own context.

Ransomware attacks against city governments have become more common.

"Basically, a lot of the attacks are going after services that could affect, you know, basically basic services - right? - including law enforcement, which can be disrupted. I think that the level of impact to everyday life is higher, especially when they hit home in the cities and also information related to citizens are gold to the bad guys, right? You can identify relationships between people if you get that information. You can identify social engineering end goals to further mount additional personal attacks or more targeted attacks against people using their information to do more damage to - you know, by opening accounts and doing things like that. So I think the information within city halls used to be walled off with a lot of protection, physical protection, now, you know, can be easily exposed digitally, which becomes a fuel for the bad guys to do more to everyone.

—Fleming Shi, Chief Technology Officer at Barracuda Networks, on the CyberWire Daily Podcast, 9.24.19.

A poorly protected target with inadequate recovery capability is always attractive. Where the information encrypted affects basic services, that increases pressure to pay. From the attacker's point of view, that's just gravy. Or gold.

Is your cybersecurity program aligned with your business goals and objectives?

Cybersecurity is a business risk, not an IT problem, and a critical part of business strategy. Security should not be an afterthought. Taking a proactive approach facilitates board-level cyber initiative buy in, supports traction across business units, establishes management alignment for key priorities, and manages data complexity. Let Edwards Performance Solutions better structure and position your cybersecurity program – making it a business asset for continued success. Learn more

In today's Daily Podcast, out later this afternoon, we speak with our partners at Webroot, as David Dufour discusses the need for a variety of areas of expertise in security. Our guest is Caleb Barlow, CEO and President of Cynergistek, talking about the security implications of being CEO of a public company.

Second Annual DataTribe Challenge (Online, October 1, 2019) Register now for a chance to be DataTribe's next world-class company. Finalists will split a $20,000 prize, and the winner may receive $2m in funding from DataTribe. Contestants have until October 1st to apply at www.datatribe.com/challenge­.

The 6th Annual Journal of Law and Cyber Warfare Symposium (New York, NY, United States, October 17, 2019) The 6th Annual Cyber Warfare Symposium features discussions around emerging cybersecurity issues, focusing on cyber warfare and how companies can respond to cyber-attacks. Use discount code CyberWire50 for 50% off. Email info@jlcw.org for a chance to receive a complimentary ticket.

Zero Day Con (Washington, DC, USA, October 22, 2019) Zero Day Con hosts a day of expert discussion on security approaches to regain control over your systems, data, and information. Join us to examine insights, security technologies, and key priorities to secure your systems. Get a 20% discount: CYBER_WIRE20

Cyber Attacks, Threats, and Vulnerabilities

Masad Stealer: Exfiltrating using Telegram (Juniper Networks)   Juniper Threat Labs discovered a new Trojan-delivered spyware that uses Telegram to exfiltrate stolen information. Using Telegram as a Command and Control (CnC) channel allows the malware some anonymity, as Telegram is a legitimate messaging application with 200 million monthly active users.    Th...

Analysis | The Cybersecurity 202: U.S. voting machines vulnerable to hacks in 2020, researchers find (Washington Post) Democrats to use test results to scare "the living bejesus out of every member of Congress."

Beware! North Korean hackers are watching your ATM transactions (The Economic Times) Lazarus group, controlled by North Korea's primary intelligence bureau, is behind this malware affecting ATM machines.

Digital database of Hungarian Development Center destroyed by hackers (SpamFighter) Hungarian Development Center became victim of hackers and suffered from a massive cyberattack.

How The U.S. Hacked ISIS (NPR.org) In 2016, the U.S. launched a classified military cyberattack against ISIS to bring down its media operation. NPR interviewed nearly a dozen people who lived it.

Phishing attacks abusing appspot.com and web.app domains on Google Cloud (Zscaler) Zscaler ThreatLabZ researchers recently detected phishing campaigns that are abusing Google domains Appspot.com and Web.app. Using the domains' SSL certificates, the phishing pages, spoof leading business brands like Microsoft Office and attempt to steal user login credentials.

New WhiteShadow downloader uses Microsoft SQL to retrieve malware (Proofpoint US) New WhiteShadow downloader uses Microsoft SQL to retrieve malware

High-severity vulnerability in vBulletin is being actively exploited (Ars Technica) Devs push a fix for the flaw, but hackers are still hitting unpatched sites.

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability (Imperva) Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday 23rd September 2019, an exploit was published for a vulnerability found within vBulletin (versions 5.0.0 to 5.5.4), allowing malicious attackers to perform authentication-free Remote Code Execution on the origin server. …

Hackers tried to steal Airbus secrets via contractors: AFP (U.S.) A series of cyber attacks on Airbus in the past few months was conducted via the...

China's APT10 hacking group suspected of cyber attacks against Airbus suppliers (Computing) Four major attacks on Airbus's supply chain have been detected in the past 12 months

Airbus hit by series of cyber attacks on suppliers (France 24) Airbus hit by series of cyber attacks on suppliers

Airbus Counters Cyber Attacks Targeting Suppliers (Bloomberg) Aerospace company said it has detection methods, quick response. French authorities have warned about security risk at partners.

Chinese Hackers Suspected Of Airbus Cyberattacks—A350 Among Targets (Forbes) Another major cyberattack with Chinese state hackers as the prime suspects.

Alert to logistics and shipping as digital detectives unmask new cyber attack (Loadstar) Research shows hackers are targeting transport and shipping companies with a new trojan malware campaign.

DoorDash confirms data breach affected 4.9 million customers, workers and merchants (TechCrunch) DoorDash has confirmed a data breach. The food delivery company said in a blog post Thursday that 4.9 million customers, delivery workers and merchants had their information stolen by hackers. The breach happened on May 4, the company said, but added that customers who joined after April 5, 2018 ar…

Nodersok malware turns PCs into potential "proxy zombies" (SC Media) Fileless attacks use legitimate code to infect systems. The malware also uses computer's own LOLBins to infect machines

Why are cybercriminals disguising wipers as ransomware? (Emsisoft | Security Blog) We’ve seen an increase in cybercriminals disguising destructive malware as ransomware. What’s the motivation behind these attacks?

Illegal gambling apps snuck into Apple and Google stores (SC Media) Google and Apple recently removed hundreds of apps from their respective app stores after being informed they were actually fronts for gambling

Google Removed Dozens Of Android Apps From A Major Chinese Developer And Won’t Say Why (BuzzFeed News) This is the third time in recent months that Google has mass-removed apps from a big Chinese developer.

Scamelot: Phishing and Email Fraud at Wes (The Wesleyan Argus) Public Safety Lieutenant Paul Verrillo has seen all kinds of scams: voices on the phone impersonating the IRS, emails about job offers that pay hundreds of dollars a week for almost no work, and hackers offering false opportunities. Verrillo said that students report scams to him all the time, but usually it’s too late.

Hearing aid manufacturer hit by cyber attack slashes profits by $95 million (Graham Cluley) Demant, the manufacturer of Oticon hearing aids, has said that it expects losses of up to 650 million kroner (approximately $95 million) following a cyber attack earlier this month.

Singapore student events app Get in data breach; 30,000 users at risk (AsiaOne) An event ticketing and payment app popular with university students across Asia and backed by the venture capital arm of Singapore state investment firm Temasek has suffered a second data breach, potentially exposing the personal details of more than 30,000 users in the city-state.

Hackers target Minneapolis Mayor Jacob Frey with phishing scam (Star Tribune) The hack appears to be limited to the mayor's e-mail account, and does not include the rest of the City Hall network.

Official: Moorhead schools affected by data breach (INFORUM) news, sports, opinion, entertainment, business, lifestyle, milestones, obituaries and weather for Fargo, ND

Broken Arrow online payment system shutdown after possible data breach (KOKI) The system is currently down as experts investigate.

Woodstock cyber attack continues, affects other city institutions (Woodstock Sentinel Review) Networks and email are still down at the City of Woodstock as the administration continues to fight a cyber attack that began Saturday.

How Sparks, Nevada, is rethinking security after ransomware (StateScoop) Commentary: The city’s IT manager recounts a 2015 cyberattack and how managed detection and response has transformed the city’s security posture.

Lee County cyber attack probe may take months (The News-Press) Lee County officials say no money was stolen and no data was lost during the five-day disruption of the county computer system due to a cyber attack.

Security Patches, Mitigations, and Software Updates

Cisco Patches 13 High-Severity Router and Switch Bugs (Threatpost) One Cisco bug impacting its 800 and 1000 series routers had a CVSS severity score of 9.9.

Cyber Trends

Cybersecurity and Infrastructure Security Agency (CISA) (Department of Homeland Security) The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face.

Venafi Study: How Much Do Global Consumers Worry About Private Data Protection? (Venafi) According to Venafi survey, global consumers do not trust governments or social media organizations with private data

Less capable than they think: No-one fully GDPR compliant & few truly secure (SC Media) Whether its down to cost or understanding, neither SMEs nor enterprises have any room for complacency about their cyber-defence capabilities according to a recent UK survey.

DoorDash is the latest to expose customers' data (CNET) Here's our list of every major data breach so far.

Enterprise ransomware threat shines spotlight on poor patch management (SC Magazine) Vulnerability scores from 2007 don't adequately measure risk in 2019; 31.5% of vulnerabilities exploited by ransomware could have been patched from 2015 or earlier but they're used as they're still successful;

Threat Spotlight: Inefficient incident response (Barracuda) Inefficient incident response to email attacks is costing businesses billions in losses every year. For many organizations, finding, identifying and removing email threats is a slow and manual process that takes too long and uses too many resources. As a result, attacks often have time to spread and cause more damage.

Marketplace

California's new labor law is going to impact bug bounty companies. By how much is unknown. (CyberScoop) AB5 is going to impact the way bug bounty companies deal with freelance hackers once the law goes into effect on Jan. 1, 2020.

Huawei CEO is considering licensing the company's 5G tech exclusively to a US firm (CNBC) Chinese tech giant Huawei is willing to exclusively license its 5G technology to one American firm to create a level playing field for competitors, CEO Ren Zhengfei said on Thursday.

Buying Huawei Technology ‘Like Buying Chinese Fighter Planes’, New Report Warns (Forbes) A new​ report claims mobile operators​ cannot afford to keep Huawei in their networks for security reasons, and the cost of replacement is much less than previously thought.

The real cost to rip and replace Chinese equipment from telecom networks (Strand Report) The Wireless Ecosystem, US vs. EU

CrowdStrike CEO says company is ‘nonpartisan,’ issues 2020 warning (Silicon Valley Business Journal) In an interview with CNBC, the Sunnyvale company's chief executive said that government work makes up the bulk of its revenue and it protects both Democrats and Republicans

Arceo.ai bags $37 mn in funding; cyber risk management on agenda (IBS Intelligence) US InsurTech Arceo.ai has secured $37 million in a recent funding round led by Lightspeed Venture Partners and Founders Fund. 

HPE completes acquisition of Cray (Intelligence Community News) Hewlett Packard Enterprise of San Jose, CA announced on September 25 that it has completed the acquisition of supercomputing leader Cray Inc., earlier than the original target date. HPE paid $35.00…

Shares in Rheinmetall drop after company discloses malware attack (Reuters) German arms and car parts maker Rheinmetall said it had been hit by a malware at...

F-Secure joins ETIS to help Europe's telecom providers secure smart homes (Intelligent CIO Europe) Cybersecurity provider, F-Secure, has joined ETIS, an organisation that facilitates cooperation between companies working in the European telecommunications

Houston County schools seeking legal counsel on cyber-security contract (Dothan Eagle) The Houston County Schools system, which is still recovering from a criminal malware attack that downed servers in July and delayed the start of classes, put off moving on a

Renowned Gartner Analyst Joanna G. Huisman Joins KnowBe4 (PRWeb) KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced it has hired former Gartner se

Cybersecurity and Military Intelligence Veteran Mark Willis Joins Bluescape® as Chief Information Security Officer (PR Newswire) Bluescape®, a leading visual collaboration platform, today announced that Mark Willis, cybersecurity and U.S....

Products, Services, and Solutions

SecureAge’s AI-Powered APEX Anti-Malware Engine Comes Out-of-Beta for SecureAPlus Users (SecureAge Technology) SecureAge announces Artificial Intelligence roll out amid UI overhauls and new tiered version structure for SecureAPlus antivirus.

OPSWAT Unveils New Critical Infrastructure Protection Cybersecurity Training and Certification Program (Yahoo) As unprecedented threats to mission critical organizations increase demand for highly skilled cybersecurity talent, OPSWAT Academy pioneers a more practical approach to CIP workforce development

Tripwire Launches Next Generation of Tripwire Connect (Tripwire) Tripwire Connect delivers enhanced visualization capabilities and comprehensive reporting layer to support cross-functional users at all levels

XMedius Launches New Version of XM Fax FoIP Software (West) Delivers Powerful New Security Features for Highly Regulated Industries

Celerium Announces New Cyber Defense Network Solution for Critical Supply Chains (PR Newswire) Celerium Inc., a leader in innovative cyber defense solutions, today announced its plans for Cyber Defense...

Cyber Insurer Coalition Expands Coverage to Businesses With Up To $1B in Revenue (Insurance Journal) Coalition, an cyber insurance company focused on small- and midsize-businesses, has expanded its cyber and technology errors and omissions coverage —

New encryption devices now available for Five Eyes partners (C4ISRNET) The United States government has approved new encryption devices developed by Viasat for broader use among Five Eyes partners.

Ministry of Defence, Singapore (MINDEF) Bolsters Security With Second HackerOne Bug Bounty Challenge (BusinessWire) HackerOne, the number one hacker-powered pentesting and bug bounty platform, has announced it will be conducting its second bug bounty program with th

Technologies, Techniques, and Standards

Defining "Reasonable" Security at (ISC)2 Security Congress (PR Newswire) The DoCRA (Duty of Care Risk Analysis) Council, a not-for-profit (501(C)(3)) organization that authors,...

Best Practices to Help Electro-Industry Improve Customer Cybersecurity (Electrical Construction & Maintenance (EC&M) Magazine) White paper identifies guidelines that electrical equipment manufacturers may consider

How Federal Agencies Can Be More Proactive About Cloud Security (Nextgov.com) For starters, agencies need a deep understanding of user behavior.

Tripwire Connect: Why Cybersecurity Pros Need to Be Good Storytellers (The State of Security) Whether you are a CISO or a security analyst, Tripwire Connect is designed to empower you with visuals that help you improve your cybersecurity posture.

Top 10 internal controls to mitigate cybersecurity risks in the family office (San Antonio Business Journal) With cybersecurity awareness month right around the corner, is your office prepared for potential threats? Cybersecurity risks do not just affect corporations and government entities but can be a common and very present danger to family offices and small businesses alike.

Design and Innovation

Microsoft, Mastercard Fund Initiative to Help Thwart Hackers (Bloomberg) CyberPeace Institute to aid dissidents, vulnerable groups. Focus on civilians who become ‘collateral damage’ of attacks.

Facebook tries hiding Like counts to fight envy (TechCrunch) If their post has lots of Likes, you feel jealous. If your post doesn’t get enough Likes, you feel embarrassed. And when you just chase Likes, you distort your life seeking moments that score them, or censor it fearing you won’t look popular without them. That’s why Facebook is of…

3 Ways To Prepare Now For Future Endpoint Defense (Cyber Security Hub) The traditional network endpoint was isolated to desktop PCs and laptop computers that attached to the organization’s network. A dramatic increase in mobile devices, cloud and IoT has broadened the definition. Security leader Kayne McGladrey weighs in on enterprise endpoint defense tactics.

Cyber security a road block to digital innovation (Government News) Cyber security doesn't have to be a road block to transformation, an industry expert says.

Research and Development

Why Google's Quantum Victory Is a Huge Deal—and a Letdown (Wired) When news leaked that Google scientists had achieved "quantum supremacy," researchers immediately clashed on its implications.

To Invent a Quantum Internet (Quanta Magazine) Fifty years after the current internet was born, the physicist and computer scientist Stephanie Wehner is planning and designing the next internet — a quantum one.

Academia

Texas Comptroller Continues Good For Texas Tour: Cybersecurity Edition  (San Marcos Corridor News) Yesterday, Hegar touted the cybersecurity programs at The University of Texas at San Antonio as well as the university’s National Security Collaboration Center (NSCC), a national leader in cybersecuri

Legislation, Policy, and Regulation

U.S., EU Start Formal Talks on Cross-Border E-Evidence Pact (Bloomberg) A U.S.-EU deal to help law enforcement exchange data across borders is inching closer, as officials began formal talks on an e-evidence agreement.

Defense report stresses space, cyber security (NHK WORLD) Japan's annual defense report stresses the importance of gaining superiority in new areas, including space and cyber security.

Big data expert takes over as China’s new cybersecurity chief (South China Morning Post) One of Wang Yingwei’s priorities will be overseeing the coming roll-out of a new regulatory regime.

At Least 70 Countries Have Had Disinformation Campaigns, Study Finds (New York Times) Governments are using “cyber troops” to discredit political opponents, bury opposing views and interfere in foreign affairs, according to Oxford researchers.

US lobby group calls for open standards to fight Huawei 'threat' (Register) There's an 'undeclared war' going on

New Group Looking to Ban Huawei Needs a Better Argument (Wccftech) We need more than innuendo about subsidies and hacking to build an effective argument against Huawei.

US senators green-light recruitment of crack infosec teams, both public and private (Register) Cyber-terrorists, your game is through, 'cause now you have to answer to: America, fsck yeah!

Should the National Security Council restore the cybersecurity coordinator role? (Help Net Security) Bolton’s departure from the White House has sparked the question of whether the National Security Council should restore the cybersecurity coordinator role.

Is Homeland Security prepared for its central role in cybersecurity? (Fifth Domain) A new DHS inspector general report found significant shortfalls in a workforce expected to secure federal networks.

GOP Lawmaker Calls for Fed to Detail Its Cybersecurity (Wall Street Journal) The top Republican lawmaker on an influential House committee wants the Federal Reserve to be more open about its cybersecurity preparations.

Cyber rules for self-driving cars stall in Congress (TheHill) Major automakers are moving full steam ahead with their plans to put self-driving cars on the road, even as lawmakers and regulators in Washington fall behind on creating a cybersecurity framework for those vehicles.

Why Ottawa needs to step up efforts to help shield small businesses from cyberattacks (The Hill Times) Small businesses face tough challenges for survival, and cyberattacks have a direct correlation with the viability of a small enterprise.

Courts to prep for Russian campaign of disinformation (Arizona Capitol Times) The CIA spoke and Dave Byers, the director of Arizona’s Administrative Office of the Courts, liste...

California Privacy Rights and Enforcement Act – CCPA 2.0? (Cooley) On Sept. 25, 2019, Californians for Consumer Privacy, a nonprofit group led by the real estate magnate who spurred passage of the California Consumer Privacy Act (CCPA) of 2018, filed a new ballot …

Houston County Schools tables vote on cyber security program (WTVY) The Houston County School Board continues to consider what action it wants to take after being hacked this summer.

Litigation, Investigation, and Law Enforcement

Trump’s Call With Zelensky Was Not Out of the Ordinary—for Trump (Foreign Policy) In this most transactional of presidencies, he’s always asking for a quid pro quo.

Analysis | The Cybersecurity 202: Trump’s CrowdStrike conspiracy theory shows he still doubts Russian election interference (Washington Post) This has officials and security experts irate.

Impeachment: Trump allies turn on Giuliani over Ukraine whistleblower crisis (Times) One name crops up repeatedly in the memo of the call between President Trump and his Ukrainian counterpart: Rudy Giuliani. The former mayor of New York, now personal lawyer to the president, has...

Trump’s Ukraine Intervention May Violate FCPA, Arms Export Laws: Experts (Breaking Defense) The president's personal intervention was "highly improper," one arms export expert says, concluding that the Foreign Corrupt Practices Act "appears to have been criminally violated here."

This is the US threat intel firm referenced in the Trump-Ukraine controversy (Fifth Domain) President Donald Trump brought up CrowdStrike in a phone call that has led to an impeachment inquiry in the House.

Whistleblower alleges White House coverup (CNN) A whistleblower's complaint about President Trump's communications with Ukraine has been declassified. Follow here for the latest news and updates on Joseph Maguire's testimony.

If This Whistleblower’s Identity Is Revealed, We Might All Regret It (POLITICO Magazine) A short history of retaliation against government truth-tellers.

What's in Trump's Super Classified Server and Why Is He Hiding Things There (Vice) Putting a politically-damaging phone call with Ukraine on the "codeword-classified" system is highly inappropriate and would give Trump "maximum control over who sees it."

Computer System Where Trump Document Was Reportedly Stashed Is Reserved for Biggest U.S. Secrets (Wall Street Journal) A highly secure computer system where aides to President Trump reportedly stashed the details of his call with Ukraine’s leader is so secretive that even top White House national-security aides don’t have regular access.

Attorney General Barr Seeks DOJ Facebook Antitrust Probe (Bloomberg) Facebook now target of two federal cases simultaneously. FTC already has separate Facebook investigation underway.

Facebook in Talks for Sandberg to Testify to House Next Month (Bloomberg) Sandberg likely to face questioning on Libra crypto project. July hearings drew bipartisan skepticism about Facebook’s plan.

Facebook Says Giant Data-Breach Suit Has No Legs to Stand On (Bloomberg) Company lawyers say only user still in case can’t back claims. ‘A few random spam emails cannot be the keys to federal court.’

Microsoft Just Lost A Big Fight With America’s Top Huawei Prosecutor (Forbes) In a previously-secret fight with the U. S. government, Microsoft has been told to hand over emails belonging to one of its unnamed enterprise customers.

Microsoft Is Still Rattled Over U.S. ‘Sneak-and-Peek’ Searches (Bloomberg) Company says it’s challenging ‘secrecy order’ on data demand. Enterprise customer targeted in warrant isn’t identified.

NY AG James Sues Dunkin' For Neglecting User Cybersecurity (Law360) New York's attorney general has hit Dunkin' Donuts with a lawsuit for failing to protect customers from cyber attacks, alleging the coffee chain barely acted in response to two data breaches in 2015 and 2018 that together compromised more than 300,000 customer accounts.

Schoolboy turns to cyber crime to avoid doing homework (BusinessCloud.co.uk) Merseyside student crashed school website in organised DoS attack to get out of doing his homework

Prosecutor: ‘Satanist’ soldier sought government’s overthrow (Army Times) A prosecutor alleged in federal court Thursday that an Army infantry soldier charged with distributing information about building bombs is a Satanist who plotted to overthrow the U.S. government, while his attorney said he's only an internet troll caught

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Detect '19 (National Harbor, Maryland, USA, September 29 - October 2, 2019) Insights from compelling customer presentations highlighting real-world threat intelligence big data issues. Threat intelligence data is a valuable asset for security teams who unlock the value it contains.

Defend Your Organization: Cybersecurity in Manufacturing Conference (Boston, Massachusetts, USA, October 1 - 2, 2019) The manufacturing industry is one of the most heavily targeted industries for cyberattacks. As manufacturers undertake digital transformations, vulnerability to attacks increase. Hear from expert speakers...

SecureWorld Detroit (Detroit, Michigan, USA, October 1 - 2, 2019) Connecting, informing, and developing leaders in cybersecurity. For the past 17 years, SecureWorld conferences have provided more content and facilitated more professional connections than any other event...

Kansas City Cybersecurity Conference (Kansas City, Missouri, USA, October 3, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

Australian Cyber Conference 2019 (Melbourne, Victoria, Australia, October 7 - 9, 2019) The Australian Information Security Association (AISA) is the premier industry body for information security professionals in Australia. As a nationally recognised not-for-profit organisation, AISA champions...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.