About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Linguistic Analysis Suggests WannaCry Hackers Could be From Southern China

    May 29, 2017

    It’s been almost four weeks since the outcry of WannaCry ransomware, but the hackers behind the self-spread ransomware threat have not been identified yet. However, two weeks ago researchers at Google, Kaspersky Lab, Intezer and Symantec linked WannaCry to ‘Lazarus Group,’ a state-sponsored hacking group believed to work for the North Korean government. Now, new research from ...

  • China’s Cyber Security Law: The Impossibility Of Compliance?

    May 29, 2017

    China’s much-anticipated Cyber Security Law (CSL) will come into effect on 1 June 2017.  The new law is the first comprehensive law to address cyber security concerns at the national level and to some extent consolidates cyber activities captured in other laws and regulations. The move by China to beef up its laws and regulations governing ...

  • Fancy Bear Hackers Tainted Dumped Emails with False Data

    May 27, 2017

    Hackers from Fancy Bear, the espionage hacker group with Russian ties, reportedly snuck false information in the data trove they leaked from the Democratic National Committee during the American elections. According to a report from Citizen Lab, an organization with ties to the University of Toronto, the hackers planted information inside emails belonging to a journalist ...

  • How Facebook’s tentacles reach further than you think

    May 26, 2017

    Facebook’s collection of data makes it one of the most influential organisations in the world. Share Lab wanted to look “under the bonnet” at the tech giant’s algorithms and connections to better understand the social structure and power relations within the company. A couple of years ago, Vladan Joler and his brainy friends in Belgrade began ...

  • GE Renewable Energy To Provide Cyber Security For Invenergy Wind Turbine Fleet

    May 26, 2017

    In the second agreement announced between the two companies this week, GE Renewable Energy has been selected to provide cyber security for Invenergy’s fleet of wind turbines. On Thursday, it was announced that GE Renewable Energy had been chosen to provide 300 megawatts (MW) worth of wind turbines to an Invenergy wind project being developed in ...

  • Medical device industry ‘not doing enough on cybersecurity’

    May 26, 2017

    The medical device industry appears to be under siege by cybercriminals, but it isn’t taking steps to defend itself, according to two separate reports. Over the next 12 months, two thirds of medical device manufacturers and more than half of healthcare delivery organizations (HDOs) say that a cyber-attack on one or more medical devices built or ...

  • Industrial cyber security – Securing Operational Technology 101

    May 26, 2017

    It would be fair to say that cyber security is at the top of most businesses’ list of concerns. The increased emphasis on IT and technology – every company is a technology company today, after all – has made it this way. Technology and data have become so deeply entrenched in many organisations that if it ...

  • Has WannaCry trashed reputations of leading cyber-security vendors?

    May 25, 2017

    There is no doubt that many organisations received an unwelcome penetration test of their security software in the form of the WannaCry ransomware attack. The question is, can security vendors survive with their reputations intact after what appears to be such a massive failure? SC Media UK had an opportunity to chat with the man who ...

  • Microsoft reportedly buys Israeli cybersecurity firm Hexadite

    May 24, 2017

    U.S. computing giant Microsoft is said to have acquired Israeli cybersecurity startup Hexadite for $100 million, the Hebrew language website Calcalist reported on Wednesday. The deal, if confirmed, would be the latest in a string of Microsoft acquisitions of Israeli software companies, many in the field of cybersecurity. Hexadite founded in Tel Aviv in 2014 and now ...

  • EternalRocks spreads seven Windows SMB exploits

    May 23, 2017

    Someone has stitched together seven of the Windows SMB exploits leaked by the ShadowBrokers, creating a worm that has been spreading through networks since at least the first week of May. Researcher Miroslav Stampar, a member of the Croatian government’s CERT, captured a sample of the worm last Wednesday in a Windows 7 honeypot he runs, ...

  • Russian Cron Malware Operators Arrested Before Banking Malware Taken Abroad

    May 23, 2017

    With the help of an Android malware, Russian cyber criminals were able to steal from local bank customers and were planning to move their operation to the rest of Europe. Twenty people were arrested as law enforcement tried to kill off the “Cron” malware campaign. Russian security firm Group IB writes that the raids also thwarted ...

  • Georgia Unveils Massive Cybersecurity Investment to Protect Against Emerging Threats

    May 23, 2017

    The state of Georgia has set aside $50 million to construct an innovation and training facility that helps state and local agencies better respond to cyber threats. “The Peach State” has more than 30 systems across 16 state agencies that house highly-sensitive financial or public safety information, according to Calvin Rhodes, Georgia’s CIO. The state has ...