About the Review


Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.


Latest news 


  • Emergency Oracle Patch Closes Bug Rated 10 in Severity

    October 31, 2017

    Oracle pushed out an emergency update for a bug in Oracle Identity Manager that is as bad as it gets. Scoring a 10 on the CVSS scale, the vulnerability, CVE-2017-10151, enables an attacker to remotely take over the software without the need for authentication. “While the vulnerability is in Oracle Identity Manager, attacks may significantly impact additional products,” according ...

  • The nasty future of ransomware: Four ways the nightmare is about to get even worse

    October 31, 2017

    2017 has been the year of ransomware. While the file-encrypting malware has existed in one form or another for almost three decades, over the last few months it’s developed from a cybersecurity concern to a public menace. The term even made it into the dictionary in September. In particular, 2017 had its own summer of ransomware: while incidents ...

  • New EU framework allows members to consider cyber-attacks acts of war

    October 31, 2017

    A forthcoming policy framework from the European Union will declare that cyber-attacks from hostile actors can be considered an act of war that under the most serious of circumstances justifies a response with conventional weapons. The Framework on a Joint EU Diplomatic Response to Malicious Cyber Activities is intended to be a strong measure of deterrence ...

  • iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing

    October 29, 2017

    Are you a proud iPhone owner? If yes, this could freak you up. Trust me! Your iPhone has a serious privacy concern that allows iOS app developers to take your photographs and record your live video using both front and back camera—all without any notification or your consent. This alarming privacy concern in Apple’s mobile operating system ...

  • Australian National University establishes interdisciplinary Institute to focus on cybersecurity and innovation

    October 29, 2017

    The Australian National University (ANU) announced the establishment of the nation’s first interdisciplinary Cyber Institute on October 29. The announcement was made during a visit to Israel by a major Australian cyber security and innovation delegation, led by the Minister Assisting the Prime Minister on Cyber Security, Dan Tehan. Mr. Tehan welcomed the announcement. The ANU Cyber Institute ...

  • Ramnit worm: Still turning up in unlikely places

    October 27, 2017

    The Ramnit worm (W32.Ramnit) was an aggressively propagated Windows-based worm that first appeared around 2010. Its creator used an extensive range of propagation techniques to ensure that it spread quickly and widely. Once it infects a computer, it copies itself to all attached and removable drives. Crucially, it also searches for and infects .exe, .dll, ...

  • ‘Basic IT security’ could have prevented UK NHS WannaCry attack

    October 27, 2017

    England’s National Health Service (NHS) could have avoided the ransomware hack that crippled its systems in May, according to a government report. “Basic IT security” was all that was required to prevent the “unsophisticated” WannaCry attack, which affected more than a third of NHS organizations, said the National Audit Office (NAO). The full scale of the incident saw over 19,000 ...

  • Bad Rabbit used NSA “EternalRomance” exploit to spread, researchers say

    October 26, 2017

    Despite early reports that there was no use of National Security Agency-developed exploits in this week’s crypto-ransomware outbreak, research released by Cisco Talos suggests that the ransomware worm known as “Bad Rabbit” did in fact use a stolen Equation Group exploit  revealed by Shadowbrokers to spread across victims’ networks. The attackers used EternalRomance, an exploit that bypasses security over ...

  • Ursnif Banking Trojan Spreading In Japan

    October 26, 2017

    Attackers behind the pervasive banking Trojan Ursnif have made Japan one of their top targets, delivering the malware via spam campaigns that began last month. For years, Ursnif (or Gozi) has targeted Japan along with North America, Europe and Australia. But according to a recent IBM X-Force analysis of the malware, hackers have stepped up Ursnif ...

  • Bermuda cyber hack: Offshore law firm data hack leaves super-rich bracing for financial details to be released

    October 25, 2017

    A leading offshore law firm with clients including the super-rich and international corporations has revealed it suffered a “data security incident” that may result in customers’ private information being leaked. Bermuda-based Appleby, which has offices in a number of British overseas territories, said some of its data had been “compromised” in the 2016 cyber incident. The firm ...

  • DUHK Attack Exposes Gaps in FIPS Certification

    October 24, 2017

    Despite the obligatory logo and clever name, this week’s assault on crypto, the so-called DUHK attack (Don’t Use Hardcoded Keys), isn’t likely to be part of many threat models. Though the attack can be used to passively decrypt VPN and encrypted browser traffic, it relies on a host of implementation errors in admittedly ancient security appliances to trigger ...

  • Millions of Networks Compromised by New Reaper Botnet

    October 24, 2017

    A new and growing botnet called Reaper or Troop (detected by Trend Micro as ELF_IOTREAPER.A) has been found currently affecting more than one million organizations. According to the security researchers from Check Point and Qihoo 360 Netlab, the botnet they discovered is more sophisticated and potentially more damaging than Mirai. Reaper actually uses some of the code from ...

  • Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe

    October 24, 2017

    A new widespread ransomware attack is spreading like wildfire around Europe and has already affected over 200 major organisations, primarily in Russia, Ukraine, Turkey and Germany, in the past few hours. Dubbed “Bad Rabbit,” is reportedly a new Petya-like targeted ransomware attack against corporate networks, demanding 0.05 bitcoin (~ $285) as ransom from victims to unlock ...