About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Deloitte and Dragos Partner on Industrial Cybersecurity

    May 9, 2017

    The industrial control system cybersecurity space continues to attract new investments, partnerships and companies. To say that the industrial cybersecurity industry has changed dramatically over the past few years would be a major understatement—not only because the changes have been so significant, but because the evolution is still underway. Just in the past few months we’ve ...

  • UK businesses concerned about cyber-risks linked to smart energy tech

    May 8, 2017

    The latest PwC B2B Energy Survey found that 65 percent of UK businesses are significantly concerned about the issue of cyber-risks and over half (51 percent) are worried that their client data isn’t handled with enough security by their energy supplier. The research included responses from more than 500 UK businesses. If their energy supplier fell victim ...

  • Are Cross-Protocol Attacks The Next Big Cybersecurity Danger?

    May 8, 2017

    In the digital world we live in, technologies are rapidly evolving. Cyber threats are not lagging behind. While developers build more and more complex programs, hackers find new, smarter ways to attack. New threats can break connections that were considered highly secure until recently. One specific and recent example are the so-called cross–protocol attacks. They make it ...

  • Intel Chip Vulnerability Worse than Thought, Lets Hackers Hijack Fleets of PCs

    May 8, 2017

    That vulnerability that Intel discovered and disclosed last week after going undetected for almost a decade is much worse than originally thought as it allows hackers to remotely gain full control over affected PCs running Windows, without even needing a password.  As announced by Intel, the bug affects Intel’s Active Management Technology (AMT) which allows IT ...

  • Investigatory Powers Act: Back doors, black boxes, and tech capability regs

    May 8, 2017

    The Home Office has launched an under-the-radar consultation on a critical step in the implementation of the Investigatory Powers Act (IP Act): the regulations on technical capability notices. The Open Rights Group has recently revealed details of the proposed regulations. Under the IP Act, a technical capability notice can be issued to a telecommunications operator by the secretary of state ...

  • Snake and Proton Malware Found Targeting Mac Users

    May 8, 2017

    Two malware targeting Mac-run machines recently surfaced in the wild: Snake (a.k.a. Turla, Uroburos, and Agent.BTZ, and detected by Trend Micro as OSX_TURLA.A) and Proton (OSX_PROTON.A). Both are remote access Trojans that can grant attackers unauthorized remote access to the system, consequently enabling them to steal files, data, and credentials stored in the affected system, ...

  • Hackers emit 9GB of stolen Macron ’emails’ two days before French presidential election

    May 6, 2017

    Emmanuel Macron, the front-runner in France’s presidential election, has condemned the online leakage of what’s alleged to be his campaign staff’s emails. A 9GB cache of internal documents was dumped onto the Magnet file-sharing network on Friday night, less than two days before the French people go to the polls on Sunday. These archives landed just before ...

  • Ultrasonic Beacons Are Tracking Your Every Movement

    May 5, 2017

    More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising. Academics from Technische Universitat Braunschweig in Germany recently published a paper in which they describe their research into the practice of using these beacons to monitor a consumer’s shopping and ...

  • Microsoft says: Lock down your software supply chain before the malware scum get in

    May 5, 2017

    Microsoft’s security team is urging developers to shore up their software update systems – after catching miscreants hijacking an editing application’s download channels to inject malware into victims’ PCs. In a security advisory, Redmond’s infosec gurus describe Operation WilySupply: their mission to find, isolate and destroy an unusual and highly targeted form of malicious code that ...

  • Debenhams Data Breach Affects 26K Customers, Payment Details Exposed

    May 5, 2017

    Personal data of up to 26,000 people was exposed due to a data breach affecting customers of Debenhams Flowers, the retailer’s florist arm. According to Debenhams, the site is actually operated by Ecomnova, which is a third-party supplier. Therefore, customers of other services it provides have not been affected in any way. On the other hand, Ecomnova ...

  • Wikileaks Unveils CIA’s Man-in-the-Middle Attack Tool

    May 5, 2017

    Wikileaks has published a new batch of the Vault 7 leak, detailing a man-in-the-middle (MitM) attack tool allegedly created by the United States Central Intelligence Agency (CIA) to target local networks. Since March, WikiLeaks has published thousands of documents and other secret tools that the whistleblower group claims came from the CIA. This latest batch is the ...

  • An Army of Thousands of Hacked Servers Found Mining Cryptocurrencies

    May 4, 2017

    A new botnet consisting of more than 15,000 compromised servers has been used to mine various cryptocurrencies, earning its master around $25,000 per month. Mining cryptocurrencies can be a costly investment, as it requires an enormous amount of computing power, but cybercriminals have found an easy money-making solution. Dubbed BondNet, the botnet was first spotted in December ...