Welcome to the Cyber Security Review website.
The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.
Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.
The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.
Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.
Latest news
- Cyber Dam Busters could give Australia’s military an asymmetric edge
April 9, 2018
The Australian Defence Force (ADF) has a “distinct battlefield edge” because it has fully integrated its military offensive capability into ADF operations. But a “modest” ...
- Critical Code Execution Flaw Found in CyberArk Enterprise Password Vault
April 9, 2018
A critical remote code execution vulnerability has been discovered in CyberArk Enterprise Password Vault application that could allow an attacker to gain unauthorized access to the system ...
- Delta Confirms Breach Of Customer Payment Details
April 5, 2018
Hackers have had access to Delta customer payment data for over six months after third party breach US airline Delta Air Lines and American department store ...
- 1.5 billion sensitive files exposed by misconfigured servers, storage and cloud services
April 5, 2018
Researchers have discovered over 1.5 billion sensitive files including payroll information, credit card details, medical data, and patents for intellectual property are exposed online, putting ...
- Rarog Trojan ‘Easy Entry’ For New Cryptomining Crooks, Report Warns
April 5, 2018
A malware family called Rarog is becoming an appealing and affordable tool for hackers to launch cryptocurrency mining attacks, researchers say. They say the Trojan ...
- A new Mirai-style botnet is targeting the financial sector
April 5, 2018
A botnet made up of hijacked internet-connected televisions and web cameras has a new target, security researchers have found. Three financial sector institutions have become the ...
- Retail sector top cyber attack target
April 5, 2018
The retail sector suffered the most breach incidences (16.7%) in 2017 as attackers became more organised, the latest Trustwave security report shows. The retail sector was ...
- Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking
April 4, 2018
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker ...
- Tech and digital start-ups needed for the oil & gas industry
April 4, 2018
The oil & gas industry is currently undergoing a digital transformation, and the interest in emerging technologies and the latest developments is ever-growing. The variety of ...
- Insecure SCADA Systems Blamed in Rash of Pipeline Data Network Attacks
April 4, 2018
After a cyberattack shut down numerous pipeline communication networks this week, experts are stressing the importance of securing third-party systems in supervisory control and data ...