About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • How A Drive-by Download Attack Locked Down Entire City for 4 Days

    October 16, 2017

    We don’t really know the pain and cost of a downtime event unless we are directly touched. Be it a flood, electrical failure, ransomware attack or other broad geographic events; we don’t know what it is really like to have to restore IT infrastructure unless we have had to do it ourselves. We look at other people’s ...

  • WPA2 Going the Way of WEP After Wi-Fi Researchers Find Critical Flaw

    October 16, 2017

    The WPA2 (Wi-Fi Protected Access II) protocol that’s used by most Wi-Fi networks today has been compromised, and a way to intercept traffic between computers, phones, and access points has been found. Today’s Internet and network connections rely on specific tools that are taken for granted, most of the time. From time to time, a way ...

  • Linux vulnerable to privilege escalation

    October 15, 2017

    An advisory from Cisco issued last Friday, October 13th, gave us the heads-up on a local privilege escalation vulnerability in the Advanced Linux Sound Architecture (ALSA). The bug is designated CVE-2017-15265, but its Mitre entry was still marked “reserved” at the time of writing. Cisco, however, had this to say about it before release: “The vulnerability is due to a use-after-free ...

  • New EU cyber strategy leaves key security gaps

    October 15, 2017

    Last month, the European Commission released a report on “Resilience, Deterrence and Defence: Building strong cybersecurity for the EU”. GRI examines the strengths and weaknesses of this proposed strategy. The strategy is based on three principles: building greater resistance against cyber vulnerabilities, deterring cyber attacks against member states and increasing cooperation at the European and international level. In ...

  • Cyberespionage Group Steps Up Campaigns Against Japanese Firms

    October 14, 2017

    Researchers are learning more about the cyberespionage group Bronze Butler. While the gang has been targeting Japanese heavy industry since 2012, not much is known about the group’s current modus operandi. In a report released Thursday by the Counter Threat Unit at SecureWorks, a subsidiary of Dell Technologies, researchers paint the most complete picture yet of ...

  • Iran to blame for cyber-attack on MPs’ emails – British intelligence

    October 14, 2017

    Iran is being blamed for a cyber-attack in June on the email accounts of dozens of MPs, according to an unpublished assessment by British intelligence. Disclosure of the report, first revealed by the Times but independently verified by the Guardian, comes at an awkward juncture. Donald Trump made it clear on Friday that he wants to ...

  • Hyatt Hit By Credit Card Breach, Again

    October 13, 2017

    Hyatt Corp., hotel guests are being warned of a credit card breach, the second since December 2015. On Thursday, the hotelier identified 41 of its hotels spread across 13 countries where it confirmed unauthorized access to payment card information. China is the hardest hit by the breach with 18 hotels impacted. Three U.S. hotels were part ...