GET IN TOUCH
Contact us.
We read every email. Tips on breaking incidents, corrections to existing coverage, partnership questions, and press inquiries all go to a single inbox.
What to write about
Breaking incidents & tips
If you’re seeing active exploitation, a new CVE, an IOC pattern, or insider details on a breach — send the technical details and your preferred attribution (name, alias, or anonymous).
Corrections & factual disputes
Reference the specific article URL and what you’d like corrected. Include sources where possible. We respond to legitimate correction requests within 48 hours.
Press & media inquiries
Looking for expert commentary, citation permissions, or interview requests — let us know your outlet, deadline, and topic.
Partnerships & sponsored content
All partnership inquiries reviewed. We do not accept covert sponsorships — only clearly disclosed editorial relationships. Pitches must align with our editorial standards.
Security disclosures
Reporting a vulnerability in our infrastructure, or alerting us to a security issue affecting our readers? Email contact@cipherssecurity.com with subject line starting [SECURITY] — we triage these within four hours.
We follow standard coordinated disclosure. Please don’t publish proof-of-concept exploits until we’ve had a chance to remediate.
For everything else — yes, that includes “is your team hiring”, “can I write a guest post”, “where do I send my résumé” — write to the same address. We read it all.