About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is a publication designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • Invisible Malware Found in Banking Systems in over 40 Countries

    February 7, 2017

    Banks, telcos, and even governmental agencies in the United States, South America, Europe, and Africa are being targeted by hackers in a series of ongoing attacks that are extremely difficult to detect. According to a new Kaspersky Lab report, at least 140 banks and other enterprises have been infected by malware that’s nearly invisible. Although this ...

  • Polish Banks Hacked using Malware Planted on their own Government Site

    February 6, 2017

    In what considered to be the largest system hack in the country’s history and a massive attack on the financial sector, several banks in Poland have been infected with malware. What’s surprising? The source of the malware infection is their own financial regulator, the Polish Financial Supervision Authority (KNF) — which, ironically, is meant to keep ...

  • IIoT Hot Buttons for 2017

    February 6, 2017

    By Jason Andersen, Vice President, Business Line Management, Stratus Technologies In our 35-plus years of providing continuous availability solutions for enterprises, we’ve seen only a handful of technology shifts that you could call “seismic.” The globalisation of eCommerce was a big one that was transformational for mission critical infrastructures. At Stratus, we believe that the next ...

  • Cybersecurity High on Netanyahu Agenda for Trump, May Meetings

    February 5, 2017

    When Israeli Prime Minister Benjamin Netanyahu meets with world leaders this month, strengthening cybersecurity ties will figure high on the agenda. “What you see today is going to get a lot worse in the future if we don’t band together,” Netanyahu said at a cyber conference in Tel Aviv last week. “That’s why I intend to ...

  • Anonymous Hacker took down over 10,000 Dark Web Sites; Leaked User Database

    February 5, 2017

    Dark Web is right now going through a very rough time. Just two days ago, a hacker group affiliated with Anonymous broke into the servers of Freedom Hosting II and took down more than 10,000 Tor-based .onion dark websites with an alarming announcement to its visitors, which said: “Hello, Freedom Hosting II, you have been hacked.” Freedom Hosting ...

  • Windows SMB Zero-Day Exploit Released in the Wild after Microsoft delayed the Patch

    February 5, 2017

    Last weekend a security researcher publically disclosed a zero-day vulnerability in Windows 10, Windows 8.1 and Server editions after Microsoft failed to patch it in the past three months. The zero-day memory corruption flaw resides in the implementation of the SMB (server message block) network file sharing protocol that could allow a remote, unauthenticated attacker to ...

  • Popular hacker warkit Metasploit now hacks hardware and cars

    February 3, 2017

    Popular offensive hacking toolkit Metasploit now works on hardware, including cars, after a major update to the 13-year old platform. The free-or-paid modular hacking machine now sports plenty of CVE-specific exploitation components that security professionals have long-used for penetration tests and research. An update to the Hardware Bridge API means the platform will now work on variety ...

  • iOS Cracking Tools Allegedly Stolen from Cellebrite Get Dumped Online by Hackers

    February 3, 2017

    We may finally have the answer to one of the big mysteries of 2016 – how did Cellebrite manage to help the FBI break into the San Bernardino shooter’s iPhone. The answer seems to be repurposing other existing cracking tools used to jailbreak iPhones. One hacker broke into Cellebrite’s servers last month, stealing 900 GB of ...

  • Security firms ‘overstate hackers’ abilities to boost sales’

    February 3, 2017

    Computer security companies have been accused of “massively” exaggerating the abilities of malicious hackers. Dr Ian Levy, technical director of the UK’s National Cyber Security Centre, made the accusation in a speech. He said the firms played up hackers’ abilities to help them sell security hardware and services. Overplaying hackers’ skills let the firms claim only they could ...

  • ENISA report on cyber security information sharing in the energy sector

    February 3, 2017

    The purpose of this report is to understand and learn the development of CSIRTs, ISACs, as well as relevant initiatives on information sharing on cyber security incidents in the energy sector by focusing on the subsectors identified in the NIS Directive (European Parliament and Council, 2016) – namely electricity, oil and gas – complemented by ...

  • Incident Response Plans: A Comparison of US Law, EU Law and Soon-To-Be EU Law

    February 3, 2017

    The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare. In the United States, incident response plans are commonplace. Since 2005, the federal banking agencies have interpreted the Gramm-Leach-Bliley Act as requiring financial institutions to create procedures for ...

  • Britain could carry out cyber attacks to defend itself against Russia

    February 2, 2017

    Britain could carry out offensive cyber attacks to tackle high-tech Russian subversion, the Defence Secretary has suggested. Sir Michael Fallon said the UK and its Nato allies must now compete on the cyber battlefield as much as they do in conventional air, land and sea warfare. Britain’s adversaries must know they face a price for using cyber ...