The Week that Was
Every Sunday evening, the CyberWire takes a look back in the Week that Was, a narrative summary of the past seven days' significant cyber security news. Designed for busy professionals who need a week-to-week perspective on developments and trends, the Week that Was provides context for the breaking stories of the day. Every issue is organized topically, with inline links to sources the reader can follow for amplified detail. Like the Daily News Briefing, the Week that Was is delivered to subscribers by email, free and spam-free.
G20 and the cooperation that wasn't. Clausewitz comes to the cyber domain. Assessing NotPetya's cost. The Great Fire Wall and the Crypto Wars. GSA and Kaspersky. More from Vault7. Lawful intercept gets lawless? Leaky S3 buckets. Crime and punishment. Industry notes.
M.E. Doc and its role as NotPetya's patient zero. Enterprises continue NotPetya recovery. Warnings to US power plants. WikiLeaks dumps more Vault7 documents. Data toxicity? Notes on criminal markets.
Petya/Nyetya/NotPetya's rampage. WikiLeaks and the ShadowBrokers are back (as expected). Brute-force bears. ISIS vs. states and counties. The Five Eyes and the Crypto Wars. Regulation as carrot and stick. Cyber insurance and cyber warranties.
Westminster email credentials brute-forced. WikiLeaks dumps "Brutal Kangaroo" from Vault7. Insider threats. Energy sector responds to CrashOverride. WannaCry continues to infest the IoT. Election influence operations. Adware in Google's Play Store. Other exploits. Industry notes.
Leaks and patches. Hidden Cobra and Lazarus Group. Hybrid warfare and influence operations. Crimeware updates. CrashOverride and how ICS operators responded. Moderating extremism (harder than it looks). GDPR approaches.
NSA report leaked. Comey testifies. Hacks with diplomatic consequences. Really well-known wolves. Attribution, deterrence, retaliation. Counter-messaging. Cybercrime, patches and marketplace news.
Howling for jihad. Hybrid warfare. The murky arts of attribution. Patching. Ransomware rising. Anonymous says they're back. Tech trends in security software.
Lone wolves, known wolves, and packs. Counterterror law and policy. Leaky intelligence services? Doxing turns to disinformation. Ransomware's commodification. Backdoors, bugs, RATS, and stolen exploits.