skip navigation

More signal. Less noise.

AT&T Cybersecurity Insights Report: Security at the Speed of 5G

AT&T Cybersecurity teamed up with 451 Research to survey organizations on their 5G security plans. Download today and see organizations’ 5G cybersecurity preparedness responses followed by gap analysis on what’s possibly being overlooked plus recommendations for strengthening 5G security efforts.

Daily briefing.

A leak of purportedly secret documents outlining alleged topics of Anglo-American trade talks appears to be foreign disinformation, most likely of Russian origin. Reuters reports that researchers see similarities to the Secondary Infektion campaign the Atlantic Council unmasked in June. The incident has raised concerns that foreign attempts to interfere with upcoming British elections may already be in progress.

US security start-up Strider has released a report on how China has penetrated quantum research laboratories in the US, Switzerland, the UK, and Germany to obtain results that have important military applications. Much of that penetration seems to have been obtained in traditional ways, by forming partnerships with universities, recruiting Western scientists, and placing students and faculty in research institutions of interest.

Responding to Senatorial questions, the US FBI said the Russian-developed facial-image-editing application FaceApp represents a counterintelligence threat. The New York Times points out that FaceApp denies sharing data with anyone, including the Russian intelligence and security organs, and says that "most" images are deleted from its servers within forty-eight hours. But the FBI regards any app built in Russia as inherently problematic. Russian services have "robust cyber exploitation capabilities," with both the ability and authority to "remotely access all communications and servers on Russian networks without making a request to ISPs."

BlackBerry Cylance describes PyXie, a new Python remote-access Trojan. This particular RAT delivers ransomware to targets in the education and healthcare sectors.

A US Ethereum developer was charged Friday with offenses related to helping North Korea evade sanctions.


Today's issue includes events affecting Brazil, China, European Union, India, Iran, Israel, Democratic Peoples Republic of Korea, Republic of Korea, Malaysia, Poland, Russia, United Kingdom, United States.

Bring your own context.

Information control, even in legitimate emergencies, can bite back.

"Another example about five years back was we had a group of terrorists seize a shopping mall in Kenya, and the government tried to shut down communication and reporting about what was happening. And the result was that the terrorists who were on social media became the primary source for the world on their act of terrorism. So actually, we fed into the very goal of terrorism, which is to drive the message and it's to drive fear viral. But what was, again, interesting is the terrorists realized that because they own the narrative, they also didn't have to tell the truth online. You know, again, sort of a seemingly obvious realization but, you know, this is where we are at."

—Peter W. Singer, strategist at New America and co-author, with Emerson Brooking, of book LikeWar: The Weaponization of Social Media, on the CyberWire's Special Edition, 11.30.19.

Sophocles would understand.

A recommendation to our readers.

If you're interested in space and communications (technology, policy, business, and operations), take a look at Cosmic AES Signals & Space. It offers a monthly overview of news in this sector.

Without proper context, cyber threat intelligence is useless.

The appearance of new threats and security challenges requires effective tools for their timely identification and in-depth analysis. Without proper contextualization, intelligence is completely useless. Context™ – Cyber Threat Intelligence Platform for enterprises and government agencies delivers cyber threat intelligence harvested from millions of data points from the Deep and Dark Web, combined with data science for objective and actionable insights.

In today's Daily Podcast, out later this afternoon, we speak with our partners at the University of Maryland's Center for Health and Homeland Security, as Ben Yelin discusses a bipartisan US bill requiring a warrant to use facial recognition technology. Our guest is Earl Matthews from Verodin, on the importance of collaboration between state governments and technology vendors to ensure election security.

And Recorded Future's latest podcast, produced in partnership with the CyberWire, is also up. In this episode, "Threat Hunting, Mentoring, and Having a Presence," the guest is O’Shea Bowens, CEO of Null Hat Security and a SOC manager for Toast, a Boston-area firm, where he focuses on threat hunting, incident response, SOC operations, and cloud computing. O’Shea shares his early beginnings as a teenage hacker learning the ropes, his career path, and why he believes it’s important to be a role model, a mentor, and to have a presence in the security community.

CyberMaryland Job Fair, December 5, Baltimore. Visit ClearedJobs.Net or for details. (Baltimore, Maryland, United States, December 5, 2019) Cleared and non-cleared cybersecurity pros make your next career move at the free CyberMaryland Job Fair, December 5 in Baltimore. Meet face-to-face with leading cyber employers. Visit our site for more details.

CS4CA MENA returns to Dubai on 20th – 21st January 2020. Visit for details. (Dubai, UAE, January 20 - 21, 2020) #CS4CA MENA returns to Dubai on 20th – 21st January 2020 for an intimate and exclusive platform promoting in-depth cybersecurity knowledge and collaboration among IT & OT leaders from MENA’s Oil & Gas, Utilities, Chemicals, Aviation, Transport, Manufacturing industries.

Cyber Attacks, Threats, and Vulnerabilities

Leak of papers before UK election raises 'specter of foreign influence': experts (Reuters) The leak and distribution of classified British-U.S. trade documents online rese...

Vulnerability in fully patched Android phones under active attack by bank thieves (Ars Technica) "StrandHogg" spoofing flaw exploited by 36 apps, including bank trojans.

A bug in Microsoft’s login system put users at risk of account hijacks (TechCrunch) Microsoft has fixed a vulnerability in its login system, which security researchers say could have been used to trick unsuspecting victims into giving over complete access to their online accounts. The bug allowed attackers to quietly steal account tokens, which websites and apps use to grant users…

This trojan malware is being used to steal passwords and spread ransomware (ZDNet) PyXie RAT capabilities include keylogging, stealing login credentials and recording videos, warn researchers at BlackBerry Cylance - who also say the trojan can be used to distribute other attacks, including ransomware.

Meet PyXie: A Nefarious New Python RAT (Threat Vector) Introducing PyXie - a new Python RAT observed by our researchers delivering ransomware targeting the healthcare and education industries.

Quantum Dragon Report (Strider) Utilizing Strider’s technology platform and proprietary datasets, Quantum Dragon reveals how China leveraged foreign quantum science labs and government talent recruitment programs to advance its military quantum program.

Trend Micro Security 16 - DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628) (Safe Breach) Trend Micro Security 16 - DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628) December 2nd, 2019 Peleg Hadar Security Researcher, SafeBreach Labs Introduction SafeBreach Labs di…

Autodesk Desktop Application - Privilege Escalation to SYSTEM (CVE-2019-7365) (Safe Breach) Autodesk Desktop Application - Privilege Escalation to SYSTEM (CVE-2019-7365) December 2nd, 2019 Peleg Hadar Security Researcher, SafeBreach Labs Introduction SafeBreach Labs discovered a ne…

Kaspersky Secure Connection - DLL Preloading and Potential Abuses (CVE-2019-15689) (Safe Breach) Kaspersky Secure Connection - DLL Preloading and Potential Abuses (CVE-2019-15689) December 2nd, 2019 Peleg Hadar Security Researcher, SafeBreach Labs Introduction SafeBreach Labs discovered…

Exposed Firebase databases hidden by Google search (SearchSecurity) A security researcher found that exposed Firebase databases are searchable in most search engines but claimed Google is scrubbing such search results to hide databases that are publicly accessible.

Tuft & Needle exposed 236,400 customer shipping labels (TechCrunch) Another day, another server without a password.

Smith & Wesson Web Site Hacked to Steal Customer Payment Info (BleepingComputer) American gun manufacturer Smith & Wesson's online store has been compromised by attackers who have injected a malicious script that attempts to steal customer's payment information.

Ransomware infects NYPD’s fingerprint database, Accidentally! (CISO MAG) NYPD’s fingerprint database was shut down for a few hours when an accidental ransomware infected nearly 23 machines linked to the department’s LiveScan fingerprint-tracking system.

Securing Smart TVs (Oregon FBI Tech Tuesday) In this week's FBI Tech Tuesday segment, we look at ways to protect your smart TV from being accessed by bad cyber actors.

'You feel violated,' says Cornwall, Ont., woman who lost life savings to SIN identity fraud scam (CBC) A Cornwall, Ont., woman has lost all her money after falling victim to a scam the RCMP are calling the top identity fraud in Canada.

Vulnerability Summary for the Week of November 25, 2019 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.  

Security Patches, Mitigations, and Software Updates

Avast Firefox Extensions Removed Possibly Due to Browsing Data Collection (Softpedia) Browser extensions not fully banned yet though

Cyber Trends

Unprecedented Leaks Underscore The Deep Discontent Inside China (The Federalist) While the world was still digesting the Xinjiang Papers, two more China-related intelligence information bombs were dropped last weekend.

Most Brazilians believe companies don't protect their personal data (ZDNet) A new study has found consumers in the Latin country are dissatisfied with the way their data is handled as another major leak exposes information of 1,4 million people.

With Brits Used to Surveillance, More Companies Try Tracking Faces (Wall Street Journal) The U.K. has more surveillance cameras per capita than any other country in the West. But it is private companies’ cameras, not the government’s, that are starting to worry activists and regulators.

10 Predictions How AI Will Improve Cybersecurity In 2020 (Enterprise Irregulars) Cybersecurity is at an inflection point entering 2020. Advances in AI and machine learning are accelerating its technological progress. Real-time data and analytics are making it possible to build stronger business cases, driving higher adoption. Cybersecurity spending has rarely been linked to increasing revenues or reducing costs, but that’s about to change in 2020. What …

Experian Predicts the Top Data Breach Trends for 2020 (PR Newswire) As we look to 2020 and a new decade, cybersecurity will continue to be a top priority for businesses and consumers alike. To help organizations...

Report: 'Smishing,' Deepfakes to Continue to Rise in 2020 ( Drones may also be more widely weaponized to steal consumer data from public Wi-Fi networks, according to a new report on 2020 data breach trend predictions.

Cliff Notes to 5 Studies about the State of Cybersecurity in Healthcare (Bricata) The volume and severity of cyber threats and attacks have grown in healthcare. Here's a look at several studies that describe the state of cybersecurity for the industry.


DHS Seeks Feedback on Cyber Talent Personnel System (MeriTalk) The Department of Homeland Security (DHS) is seeking feedback on program objectives for implementation of a new cybersecurity-focused personnel system.

Small Contractors Struggle to Meet Cyber Security Standards, Pentagon Finds (Defense One) Even large companies aren’t doing as well as they think they are, the assistant acquisition chief said Monday.

Top Israeli VC talks cybersecurity, diversity and ‘no go’ investments (TechCrunch) Jerusalem Venture Partners has raised more than $1.4 billion raised over two decades, powering some of Israel's largest cybersecurity startups.

Shunned in the US, Huawei looks to Russia to invent an AI future (South China Morning Post) As research relations sour with American universities, China’s tech giant finds willing partners in institutes keen to monetise their technical skills.

Chris Cuomo Fact-Checks GOP Lawmaker: CrowdStrike’s Not Owned by a Ukrainian (The Daily Beast) “The man is American-born of Russian descent. He’s not Ukrainian. Even if he were, that’s what you’re going to hang it on?”

Ability Inc. Announces Entry into New Contracts (West) Ability Inc. (Nasdaq: ABIL) (the “Company”), a leading provider of innovative tactical and strategic communications intelligence solutions, today announced that on November 29, 2019, it has entered into, through its wholly-owned subsidiary Ability Computers and Software Industries Ltd. (“ACSI”), into new contracts for selling its strategic interception solutions. According to the contracts, ACSI is expected to receive fees in the aggregate amount of up to $9.0 million, subject to certain approvals from local authorities and systems acceptances.

Lucideus Bags $7 Mn Funding To Become India’s Most Valuable Cybersecurity Startup (Inc42 Media) Cybersecurity startup Lucideus has raked in $7 Mn in a fresh round of funding led by MS&AD Ventures, the venture capital arm of one of Japan’s leading insurance companies.

Detectify Secures $23 Mn Plans to Deliver Secure Internet Services (Tech) Detectify secured $23 Mn in Series B round led by venture capital firm Balderton Capital, and supported by existing investors Paua Ventures, Inventure and Insight Partners.

HelpSystems Announces Clearswift Acquisition to Expand Cybersecurity Portfolio (West) HelpSystems announced today that it will acquire Clearswift, a UK-based content threat protection software company.

Cyber giant Check Point acquires Jerusalem start-up Protego (The Jerusalem Post) "On their journey to cloud transformation, organizations require a new security paradigm to protect against 5th and 6th generation of cyber attacks."

Tanium Expands ‘Endpoint’ Visibility Vision (Forbes) The world is a maelstrom of endpoints. Computers and devices in any form that enjoy a connection to the Internet are known as ‘endpoints’, simply because they represent one end of the journey that information (in the form of data) takes to travel to the human or machine using it.

NortonLifeLock: A Leaner, Meaner Symantec (Seeking Alpha) After selling its stressed enterprise business division to Broadcom, a leaner NortonLifeLock (Symantec) plans to market its consumer cybersecurity business globally.

Cipherloc Appoints Andrew Borene as CEO (Yahoo) Borene brings deep domain expertise across both the public and private sectors to the CipherLoc team. "I look forward to hitting the ground running with the team at CipherLoc," said Andrew Borene, newly appointed CEO. "We are excited to welcome Andrew to CipherLoc," said Tom Wilkinson

Juniper CTO Bikash Koley Calls It Quits (SDX Central) Juniper Networks former Chief Technology Officer Bikash Koley is out, and the company hired Raj Yavatkar as the new CTO.

Products, Services, and Solutions

AlgoSec Appoints Chief Revenue Officer & Chief Financial Officer to Manage Growth Acceleration (West) Leading network security management solution provider appoints two industry veterans to drive expansion fuelled by multiple growth avenues and new revenue initiatives

SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform, is Now Available (West) Allows on-demand API access to turnkey cyberthreat expertise

TrueFort Unveils Industry-First Application Detection and Response Platform to Secure Applications and Cloud Workloads (BusinessWire) Fortress XDR provides end-to-end visibility into application behaviors in context and in real-time to detect anomalies and protect workloads.

The Digital Guardian Data Protection Platform is Now Available in AWS Marketplace (Digital Guardian) Digital Guardian today announced that its award winning Data Protection Platform is now available in AWS Marketplace.

Cryptomathic Signer Achieves Early Common Criteria Certification to New eIDAS Protection Profile for QSCD Products to Deliver Qualified Electronic Signatures (Cryptomathic) Cryptomathic, announces that its popular e-signature solution, Signer, has received Common Criteria certification to the new eIDAS protection profile 419 241-2 for remote Qualified Electronic Signatures.

OPTOLANE Chooses Trustonic to Protect New Connected Medical Diagnostic Devices (Global Security Mag Online) Trustonic announces that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities.

LiveTiles and Nucleus Cyber Announce Solution to Govern and Secure Mic (PRWeb) LiveTiles Limited (ASX: LVT), a global software company that empowers its users to create their own intelligent workplace experiences, announced the release of

Alert Logic Enhances its Threat Detection and Response Solution Leveraging Amazon Web Services to Improve Customer Security Posture in Cloud Environments (Yahoo) Alert Logic, a leader in managed threat detection and response, announced today at AWS re:Invent 2019 in Las Vegas, the first of several planned integrations with newly-launched AWS Identity and Access Management (IAM) Access Analyzer. Alert Logic's initial integration with AWS IAM Access Analyzer

Acronis SCS Releases Hardened Backup Solution Purpose Built for Air Gapped Networks (PR Newswire) Over the weekend, Acronis SCS – a trusted American edge data security company dedicated to the US public sector – added an additional backup...

Elcomsoft Extracts Data from Locked iPhones with Unpatchable checkra1n Jailbreak (PR Newswire) Elcomsoft Co. Ltd. releases a major update of iOS Forensic Toolkit, the company's mobile forensic tool for extracting data from a range of...

Tehama Achieves Amazon Web Services End User Computing Competency (BusinessWire) Tehama Achieves Amazon Web Services End User Computing Competency

SageSure Insurance Managers Partners with Quantemplate for Data Management (West) Through Quantemplate’s platform for data preparation, storage and business intelligence, SageSure is able to support business strategy and growth initiatives

IGEL Enhances the Security Capabilities of UD7 Endpoints (IGEL) IGEL, provider of the next-gen edge OS for cloud workspaces, today announced that it has integrated the AMD Secure Processor on IGEL UD7 endpoints, effectively creating a dedicated ‘chain of trust’ security system that further strengthens IGEL’s security posture. IGEL UD7 featuring the integrated AMD Secure… Read More »

Design and Innovation

How Auschwitz-themed Christmas ornaments ended up on Amazon (The Telegraph) It takes about 10 seconds to find an antisemitic product for sale on Amazon.

Research and Development

Only 9% of 15-year-olds can tell the difference between fact and opinion (Quartz) That's according to the latest results of PISA, an international test of math, science and reading administered by the OECD every three years.

How to tell the difference between persuasion and manipulation (Aeon) We influence each other in many ways besides pure reason. What’s the moral difference between persuasion and manipulation?

This Is Your Brain on Terrorism (Foreign Affairs) The science behind a death wish.

Do Cultural Differences Account for Global Gap in Online Regulation? (Security Magazine) Differences in cultural values have led some countries to tackle cyber attacks with increased internet regulation, while others have taken a ‘hands-off’ approach to online security.

Legislation, Policy, and Regulation

The priorities of cyber diplomacy in the Rouhani’s government (Modern Diplomacy) Technological growth and its breakthrough advances, along with their advantages, also have disadvantages, which are obvious examples of communication equipment. In fact, today, the Internet, telephones, cell phones and other communication devices can be described as a double-edged sword used to facilitate communications on the one hand and to spy on and monitor information. The […]

China Uses DNA to Map Faces, With Help From the West (New York Times) Beijing’s pursuit of control over a Muslim ethnic group pushes the rules of science and raises questions about consent.

UN Facial ID Tenets Framed By China ( Technology firms in China are framing facial recognition policies at the UN. Standards established in the ITU are often used as doctrine by emerging nations.

Can New Norms of Behavior Extend the Rules-Based Order Into Cyberspace? (World Politics Review)

Although the benefits of cyberspace are undeniable, malicious state and criminal actors often use it for nefarious ends, and at times endanger its digital infrastructure. A recently issued report by the Global Commission on the Stability of Cyberspace is a first step toward protecting this vulnerable domain.

Why there cannot be any national security without individual privacy | Analysis (Hindustan Times) NSO-Pegasus case: Set up an independent inquiry panel and conduct its proceedings transparently

Europe must put security first with 5G (POLITICO) US message to EU allies: Don’t trust Chinese firms with critical networks.

Are Russia and China Really Forming an Alliance? (Foreign Affairs) The evidence is less than impressive.

Cyberspace Solarium Commission to Study DoD’s Defend Forward Concept (Executive Gov) The Congress-created Cyberspace Solarium Commission is working to determine ways the Department of D

MinDef seeks allocation to face cyber threats (The Edge Markets) The Ministry of Defence (MinDef) is seeking an additional allocation to face a new threat, namely, cyber attacks as stated in the Defence White Paper (KPP), said its Minister Mohamad Sabu.He said the ministry endeavoured to obtain more funds and found that Members of Parliament including from the opposition wanted the ministry to boost the acquisition of assets specifically in facing the threat of cyber attacks."Yes, they (government and opposition Members of Parliament) are of

US cyber commander in Seoul for ‘important, timely’ discussion (Korea Herald) Paul Nakasone, US director of the National Security Agency, has arrived in South Korea to discuss the two countries’ alliance and cyber cooperation, government officials here confirmed Tuesday. On Tuesday morning, Nakasone, who is also the commander of the US Cyber Command, met with Chun Jung-soo, commander for Korea’s Cyber Operations Command, to discuss reinforcing cooperation in the area of cybersecuri...

GOP criticizes Pelosi for sidelining election security for impeachment (TheHill) House Republicans are criticizing Speaker Nancy Pelosi (D-Calif.) for "sidelining" election security for impeachment. In 

Air Force detachment activated for cyber testing (Antelope Valley Press) Detachment 1, 47th Cyberspace Test Squadron, 96th Cyberspace Test Group, 96th Test Wing, was officially activated during a ceremony at Edwards Air Force Base on Nov. 19.

Litigation, Investigation, and Law Enforcement

Cyber Attack Has Louisiana State Lawmakers Asking Questions (Red River Radio) The ransom-ware cyberattack that occurred two weeks ago on Louisiana’s state government computer servers disrupted

FBI Says Russian FaceApp Is 'Potential Counterintelligence Threat' (New York Times) The Federal Bureau of Investigation considers any mobile app developed in Russia to be a "potential counterintelligence threat," it said on Monday, responding to a U.S. lawmaker's query about face-editing photo app FaceApp.

FBI Letter to Senator Schumer re: FaceApp (Federal Bureau of Investigation) Dear Senator Schumer: On behalf of the Federal Bureau of Investigation (FBI), this responds to your letter, dated July 17, 2019, to the FBI and the Federal Trade Commission (FTC) regarding the mobile software application FaceApp.

Poland’s Internal Security Service is critical to hunting down spies (Defense News) Poland’s counterintelligence service has been hard at work. Faced with an evolving espionage threat, it has developed a toolkit to push back against those who want to steal state secrets.

Analysis | The Cybersecurity 202: Activist wants court to name and shame electric utilities for violating cybersecurity rules (Washington Post) Regulators have withheld names of utilities that paid millions in fines.

US says cryptocurrency expert violated NKorea sanctions (Fifth Domain) At the conference, Virgil Griffith talked about how North Korea could use cryptocurrency to

TikTok accused in California lawsuit of sending user data to China (Reuters) A California college student has accused popular video-sharing app TikTok in a...

Google in firing line again over data collection (CRN) European Commission confirms further investigation into Google's data-gathering conduct

Sex trafficked on social media: the children sold on Snapchat and Instagram (The Telegraph) He told her she was pretty.

IG: OPM could put up a better defense against cyber attacks (Federal News Network) In today’s Federal Newscast, a new audit by the inspector general found the Office of Personnel Management’s financial management systems lack some basic cybersecurity protections.

Former Franklin Regional student pleads guilty in 2016 cyber attack case ( A former Franklin Regional High School student pleaded guilty Monday to launching a cyber attack on the school’s computer network that disrupted servers at more than a dozen other local school districts and government offices. Police said Michaela G. King, 21, of Murrysville, was a high school senior in November

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

WSJ Pro Cybersecurity Executive Forum (New York, New York, USA, December 3, 2019) Cybersecurity risks are rapidly changing, so this year’s forum and masterclasses have been redesigned to focus on timely topics including: lessons from the most recent major hacks, what and how to report...

International Security Expo 2019 (London, England, UK, December 3 - 4, 2019) International Security Expo, formerly UK Security Expo showcases over 1,000 of the latest innovative security products to help you improve your security. Featured over the 2 days are 13 free to attend,...

Insider Threat Program Development & Management Training (College Park, Maryland, USA, December 3 - 4, 2019) The Insider Threat Defense Group will hold its highly sought after and very affordable Insider Threat Program (ITP) Development & Management Course, at the University of Maryland College Park Campus.

Dallas Cybersecurity Conference (Dallas, Texas, USA, December 4, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...

CISO Leadership Forum (Austin, Texas, USA, December 4 - 5, 2019) Forget the typical conference, which may or may not focus on the latest industry buzz, vendor specific pitches or trendy new development. Our learning sessions are vendor agnostic only as we focus on peer-to-peer...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.