About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • $39 million cyber heist crooks caught by Omani agency

    August 2, 2017

    Omani forensic specialists helped track down online crooks who stole $39 million from a government bank, the director of the Internet Technology Agency has revealed. A cyber attack on an Oman bank in 2013 sparked a global manhunt across 24 nations that led to the arrests of seven people in the USA, according to Dr Badr ...

  • EU agency asks Commission to ‘avoid fragmentation’ in new cybersecurity plans

    August 1, 2017

    The EU needs to step up its cooperation between civil and military cybersecurity authorities when member states are attacked by hackers, according to the EU cybersecurity agency ENISA. The Athens-based agency asked the European Commission for a bigger role in responding to cybersecurity breaches. Part of that role would mean working more with the military when ...

  • Legislation Proposed to Secure Connected IoT Devices

    August 1, 2017

    A Senate bill introduced today would prioritize security in connected devices, requiring providers who sell to the U.S. government to implement measures that would have been an impediment to the IoT botnet-fueled attacks against DNS provider Dyn and webhost OVH. The Internet of Things Cybersecurity Improvement Act provides stringent guidance for the security of connected devices starting with mandates that ...

  • INTERPOL World 2017 strengthens resolve for international cooperation to address crime

    July 31, 2017

    SINGAPORE – INTERPOL World 2017 concluded on a resounding note, with 8,362 attendees from over 40 countries and regions gathered at the event to network, source and forge alliances with the security community. 565 government leaders, international organization representatives, technology innovators and academics engaged in robust dialogues at the Congress, addressing future security challenges, with ...

  • Hackers descend on Las Vegas to expose voting machine flaws

    July 30, 2017

    Election officials and voting machine manufacturers insist that the rites of American democracy are safe from hackers. But people like Carten Schurman need just a few minutes to raise doubts about that claim. Schurman, a professor of computer science at the University of Copenhagen in Denmark, used a laptop’s Wi-Fi connection Friday to gain access to ...

  • Dubai Health Authority (DHA) launches information security project

    July 30, 2017

    The Dubai Health Authority (DHA) has launched an information security project, which comes in line with the Dubai Cyber Security Strategy. The strategy was launched by His Highness Shaikh Mohammad Bin Rashid Al Maktoum, Vice-President and Prime Minister of the UAE and Ruler of Dubai, with an aim to strengthen Dubai’s position as a world leader ...

  • SMEs supplying large firms asked to prove cyber security systems are in place

    July 30, 2017

    One in three small and medium-sized enterprises have had their cyber security precautions questioned as part of winning a contract in the past year, a study by cyber security platform Cybsafe found. Meanwhile, half have had cyber security clauses added to new contracts in the past five years and 44 per cent had been required to ...

  • Virgin America Hacked, Employee Passwords and Personal Information Compromised

    July 28, 2017

    Virgin America has confirmed in a letter sent to employees that its network was compromised by hackers, with data belonging to thousands of workers compromised and possibly stolen by the attackers. While an investigation is already under way, the airline did not provide any specifics about the hackers, saying instead that it’s working with law enforcement ...

  • Healthcare executives are investing heavily in cybersecurity technology but analysts worry that approach is shortsighted

    July 28, 2017

    Healthcare executives report a growing number of cyberattacks against their organizations over the past two years, and the vast majority have countered with larger cybersecurity investments to combat those threats. But analysts say that funding is concentrated too heavily on technology and not enough on staffing. Two-thirds of healthcare organizations have invested in information security over the past ...

  • Attack Uses Docker Containers To Hide, Persist, Plant Malware

    July 27, 2017

    A novel attack vector allows for adversaries to abuse the Docker API to hide malware on targeted systems, and even execute remote code. The proof of concept attack was developed by researchers at Aqua Security, and the technique was first demonstrated today at Black Hat by Sagie Dulce, senior security researcher, with Aqua Security. The attack works ...

  • 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

    July 27, 2017

    WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems. If you are a regular reader of THN, you must be ...

  • CowerSnail — Windows Backdoor from the Creators of SambaCry Linux Malware

    July 27, 2017

    Last month, we reported about a group of hackers exploiting SambaCry—a 7-year-old critical remote code execution vulnerability in Samba networking software—to hack Linux computers and install malware to mine cryptocurrencies. The same group of hackers is now targeting Windows machines with a new backdoor, which is a QT-based re-compiled version of the same malware used to ...

  • APT Group Uses Catfish Technique To Ensnare Victims

    July 27, 2017

    Meet Mia Ash, a 20-something London-based photographer, amateur model, social media butterfly with a keen interest in tech-savvy guys with ties to the oil and gas industry. You guessed it. Mia Ash doesn’t exist. Ash, according to Dell SecureWorks Counter Threat Unit, is a virtual persona stitched together by the APT known as Cobalt Gypsy, OilRig, ...