About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Undetectable Mac Malware Proton for Sale on the Dark Web for 40 BTC

    March 6, 2017

    Hackers are now selling malware for Mac devices straight out on the dark web. They claim the malware is undetectable and provides hackers with the ability to take full control over MacOS devices by evading antivirus software. Proton, as it has been named, the malware is a Remote Administration Tool that is currently being sold over ...

  • This hard drive will self destruct. Data-wiping malware targets Europe

    March 6, 2017

    Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is back. Its new, meaner design has been unleashed three time since November. What’s more, a new wiper developed in the same style as Shamoon has been discovered targeting a ...

  • U.S. oil and gas companies are ‘still trying to catch up’ on cybersecurity, experts say

    March 6, 2017

    Digital systems and internet networks belonging to U.S. oil and gas companies have increasingly come under attack from hackers in recent years, experts tell CyberScoop. The Homeland Security Department received — between 2011 and 2015 — roughly 350 reports from domestic energy companies who were concerned about hackers probing or breaking into their systems, according to ...

  • WikiLeaks reveals CIA files describing hacking tools

    March 6, 2017

    WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung. The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep ...

  • New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

    March 5, 2017

    It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored. The latest example of such ...

  • One-third of global firms will fall in cyber attack, says report

    March 5, 2017

    According to a new report, if there was a cyber attack on global firms, almost 73 per cent of them will fail to identify the threat and ward off any damage to their important data and high-value assets. An era where technology is evolving in leaps and bounds, hacking is no longer a rocket science ...

  • Europe Tackles Cybersecurity

    March 3, 2017

    Several European countries have moved to adopt distinct cybersecurity measures as a result of the increased interconnectivity within Europe’s energy system along with a changing paradigm that includes decentralized power sources, the integration of electric vehicles, new digital infrastructure, and connected operational technology. According to a 2016 survey by the European Commission, at least 80% of ...

  • New Data: High Cyber Security Maturity in IT, Telco, Finance, but Health Care and Energy Lag Behind

    March 2, 2017

    Australia’s first cyber security collaboration platform – Security Colony (securitycolony.com) – today released its “Vendor Risk Assessment” tool, enabling any organisation to risk assess their internet facing sites, and receive a profile reflecting their cyber security maturity. To demonstrate the system, scores were calculated for each of the ASX 100 companies. Analysed by industry, the average ...

  • Yahoo: 32 Million Accounts Accessed via Cookie Forging Attack

    March 2, 2017

    An unauthorized third party accessed the company’s proprietary code and learned how to forge cookies. Yahoo believes this is the same actor that caused the 2014 data breach. “The outside forensic experts have identified approximately 32 million user accounts for which they believe forged cookies were used or taken in 2015 and 2016,” Yahoo discloses in ...

  • Dridex Banking Trojan Gains ‘AtomBombing’ Code Injection Ability to Evade Detection

    March 1, 2017

    Security researchers have discovered a new variant of Dridex – one of the most nefarious banking Trojans actively targeting financial sector – with a new, sophisticated code injection technique and evasive capabilities called “AtomBombing.” On Tuesday, Magal Baz, security researcher at Trusteer IBM disclosed new research, exposing the new Dridex version 4, which is the latest ...

  • Fighting cyber crimes in offshore oil and gas industry

    March 1, 2017

    Cyber crime costs offshore oil and gas companies millions each year in lost business and damaged equipment, a cyber attack on critical infrastructure, such as an oil rig, can result in more than just lost revenue but it can be catastrophic for the environment and have far reaching impacts. However, cyber security on actual installations is ...

  • New Global Cybersecurity Report Reveals Misaligned Incentives, Executive Overconfidence Create Advantages for Attacker

    March 1, 2017

    Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), today released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation ...