About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • EternalRocks spreads seven Windows SMB exploits

    May 23, 2017

    Someone has stitched together seven of the Windows SMB exploits leaked by the ShadowBrokers, creating a worm that has been spreading through networks since at least the first week of May. Researcher Miroslav Stampar, a member of the Croatian government’s CERT, captured a sample of the worm last Wednesday in a Windows 7 honeypot he runs, ...

  • Russian Cron Malware Operators Arrested Before Banking Malware Taken Abroad

    May 23, 2017

    With the help of an Android malware, Russian cyber criminals were able to steal from local bank customers and were planning to move their operation to the rest of Europe. Twenty people were arrested as law enforcement tried to kill off the “Cron” malware campaign. Russian security firm Group IB writes that the raids also thwarted ...

  • Korea, US to Begin Joint Investment in and Research on Cyber Security in Late May

    May 22, 2017

    Threats of More intelligent worldwide cyber attacks of these days are strengthening cyber security alliance between Korea and the United States.  According to the Korean Ministry of Science, ICT and Future Planning, the Korean government and the US government (Air Force Research Laboratory) will finalize the selection of a research consortium for the start of joint ...

  • Yahoo Retires ImageMagick After Exploit Leaks Email Content

    May 22, 2017

    Yahoo is once more at the center of a security scandal after an ImageMagick library exploit was found leaking user email content. The discovery was made by security researcher Chris Evans, who demonstrated the exploit, showing just how easy it was to break Yahoo’s system to trigger email information leaks. Yahoo has since retired the use of ...

  • WannaCry: A new era of cyber security

    May 20, 2017

    When the “WannaCry” virus hit computers in at least 150 countries around the world, some called it the beginning of a new era – an era in which hackers have become experts at finding weak spots in our online security. There was also a kind of dawning realisation of how vulnerable organisations all over the globe ...

  • Russian mobile telecom giant MegaFon down in Moscow & other cities

    May 19, 2017

    One of Russia’s three largest cellphone operators, MegaFon, has faced network troubles on Friday, according to comments from clients on social networks. Service has been affected in Moscow, Ryazan, Nizhny Novgorod and other cities. “At the moment, there are massive difficulties with network connection.We are working on it. We apologize for any inconvenience caused,” the company posted ...

  • Zomato Breach Exposes 17M User Records, Makes Deal with Hacker to Destroy Data

    May 19, 2017

    Restaurant guide Zomato has announced that it has been the victim of a data breach which saw the records of 17 million users being stolen from its database. The bad news is that 6.6 million of those are already on sale on a dark web marketplace. The good news is that the company has more ...

  • More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry

    May 19, 2017

    Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA’s elite hacking team Equation Group – several hacking groups and individual hackers have started using them in their own way. The April’s data dump was believed to be the most damaging release by the Shadow Brokers till the ...

  • Available Tools Making Dent in WannaCry Encryption

    May 19, 2017

    Tools are beginning to emerge that can be used to start the process of recovering files encrypted by WannaCry on some Windows systems. This takes on extra urgency because today marks one week from the initial outbreak, and files encrypted during that first wave are on the clock and close to being lost forever. Adrien Guinet, of ...

  • Cyber superweapons and Windows XP – 5 reasons why the NHS attack was so successful

    May 18, 2017

    The Wanna Decryptor (Wannacry) attack is being cited as the largest ransomware attack in history – it was certainly the largest and most disruptive cyber attack ever launched against the UK’s National Health Service (NHS). The attack, which struck organisations across the globe on May 14 2017, knocked 40 NHS hospitals offline and cut access to ...

  • I gave up my job to retrain in cyber security with no experience of programming or coding

    May 18, 2017

    “Exactly how detailed are the background checks?” asked my uncle. “Do they look into your whole family?” Of all the responses my friends and family gave to the news I was changing careers to retrain in cyber security, this was probably the most curious – but also perhaps the most telling of the age we live ...

  • FDA, Industry Look for Gaps in Cybersecurity

    May 18, 2017

    The US Food and Drug Administration (FDA) on Thursday kicked off a fortuitously-timed public workshop on medical device cybersecurity, the agency’s third on the subject to date. At the workshop, FDA officials, representatives from industry and researchers are trying to determine the current gaps in regulatory science as it relates to cybersecurity with the aim of ...