About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Espionage Group Turla Tweaks Carbon Backdoor Malware with New Variants

    March 30, 2017

    Russian espionage group Turla has been working on various tools for years, including several new versions of Carbon, a second stage backdoor malware.  The discovery was made by researchers from ESET who claim that this malware is still under active development. Since the group is well known for changing its tools once they are exposed, it’s ...

  • IDEF’17 Will Open the Door Under the Auspices of The Presidency of the Republic of Turkey

    March 30, 2017

    One of the most important organization of Tukey, IDEF 13thInternational Defence Industry Fair will be held under the auspices of the Presidency of the Republic of Turkey and hosted by the Ministery of National Defence and under the management and responsibility of Turkish Armed Forces Foundation. IDEF which will be organized between May 09-12, 2017 at ...

  • Banking Malware Source Code Leaked by Author to Gain Credibility Among Hackers

    March 29, 2017

    The source code for a new Trojan called Nuclear Bot has been leaked online, which may spark a rise in attacks against banking services. As it happens almost every time the source code for a malicious program lands online, it is quite likely to see more unskilled cybercriminals launching malware attacks against users. Nuclear Bot first landed ...

  • The WikiLeaks Hacking Dump Exposed a Big Disconnect Over Cyber Security

    March 29, 2017

    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems swung into action. The WikiLeaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco’s ...

  • Credit card details and passwords of MILLIONS of users have been leaked online by Microsoft’s Docs.com

    March 28, 2017

    Credit card details, passwords and social security numbers are just some of the highly sensitive documents leaked by an online sharing site. Computer security researchers have revealed that Microsoft’s Docs.com is automatically sharing data – which users believed they were distributing privately among colleagues – with the public. Anyone using the site’s search engine can access this ...

  • Apple Fixes 223 Vulnerabilities Across macOS, iOS, Safari

    March 28, 2017

    Apple fixed hundreds of bugs, 223 to be exact, across a slate of products including macOS Sierra, iOS, Safari, watchOS, and tvOS on Monday. More than a quarter of the bugs, 40 in macOS Sierra, and 30 in iOS, could lead to arbitrary code execution – in some instances with root privileges, Apple warned. The lion’s share of ...

  • Laptops With More than 3.7 Million Hong Kong Voters’ Data Stolen

    March 28, 2017

    The Registration and Electoral Office of Hong Kong has reported the disappearance of two laptop computers after the chief executive election. The laptops contained around 3.7 million city’s voters personal information that could be compromised after the one of the most significant, if not the biggest ever data breaches in Hong Kong. The information that was ...

  • Nato to spend £2.6 billion on satellites, cyber security and drones

    March 27, 2017

    Nato will announce plans to spend €3bn (£2.6bn) on upgrading its satellite and computer technology over the next three years, a senior official has said. As the alliance adapts to new types of warfare it hoped the technology will deter hackers, as the North Atlantic Treaty Organisation (Nato) acknowledges conflicts are increasingly fought out online rather than in the air, on land or at sea. The ...

  • New Clues Surface on Shamoon 2’s Destructive Behavior

    March 27, 2017

    Researchers on Monday reported progress in piecing together some of the missing pieces of the Shamoon 2 puzzle that have been eluding them when it comes to lateral network movement and execution of the Disttrack malware component used in past campaigns. Shamoon 2 uses a combination of legitimate tools, such as the open source utility PAExec, and ...

  • Germany Fought Off Two Fancy Bear Cyber Attacks in 2016

    March 27, 2017

    Fears about Russian involvement in European elections, especially after last year’s US election, aren’t exactly unfounded or born out of paranoia. In fact, Germany says it fended off two cyber attacks coming from the same cybercriminals that targeted Hillary Clinton’s campaign. Arne Schoenbohm, a top German official, told Reuters they managed to fight off two attacks ...

  • Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates

    March 27, 2017

    A security researcher has disclosed critical issues in the processes and third-party API used by Symantec certificate resellers to deliver and manage Symantec SSL certificates. The flaw, discovered by Chris Byrne, an information security consultant and instructor for Cloud Harmonics, could allow an unauthenticated attacker to retrieve other persons’ SSL certificates, including public and private keys, ...

  • Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking

    March 27, 2017

    Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving ...