About the Review

Welcome to the Cyber Security Review website.

The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.

Threats to cyber security are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, online commerce and the private sector worldwide, security experts are finding that their work has become a race against the attackers.

The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.

Latest news 

  • 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

    July 27, 2017

    WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems. If you are a regular reader of THN, you must be ...

  • CowerSnail — Windows Backdoor from the Creators of SambaCry Linux Malware

    July 27, 2017

    Last month, we reported about a group of hackers exploiting SambaCry—a 7-year-old critical remote code execution vulnerability in Samba networking software—to hack Linux computers and install malware to mine cryptocurrencies. The same group of hackers is now targeting Windows machines with a new backdoor, which is a QT-based re-compiled version of the same malware used to ...

  • APT Group Uses Catfish Technique To Ensnare Victims

    July 27, 2017

    Meet Mia Ash, a 20-something London-based photographer, amateur model, social media butterfly with a keen interest in tech-savvy guys with ties to the oil and gas industry. You guessed it. Mia Ash doesn’t exist. Ash, according to Dell SecureWorks Counter Threat Unit, is a virtual persona stitched together by the APT known as Cobalt Gypsy, OilRig, ...

  • Microsoft announces huge bug bounty rewards for security flaws

    July 27, 2017

    Microsoft has announced the Windows Bounty Program with rewards as high as $250,000 for users who can find bugs in Windows 10. While the company has had a number of previous bug bounty programs, this is the first one to target features in its Windows operating system specifically. Microsoft’s new program not only covers Windows 10 but ...

  • Swedish PM Lofven drops two ministers over IT crisis

    July 27, 2017

    Sweden’s Prime Minister, Stefan Lofven, says his minority government will not resign despite a security crisis over the handling of sensitive public data. He said two ministers would leave their posts, rejecting calls for a snap election. Citing Brexit and security he said “I won’t put Sweden in political crisis.” Meanwhile, the main opposition bloc said a vote ...

  • UniCredit Bank Hacked, 400,000 Accounts Exposed

    July 26, 2017

    UniCredit has just announced in an official statement that its servers were breached by hackers, with details of approximately 400,000 clients said to be exposed. The bank explained that hackers managed to get inside its systems in Italy twice in the last 12 months. The first hack took place in September and October 2016, while the ...

  • Global ransomware attacks on the rise: Europol

    July 25, 2017

    Global ransomware attacks soared by over 11 percent in the 12 months to March, Europol reported Tuesday, but specialist tools developed with its partners had helped unlock some 28,000 encrypted devices. “Ransomware has soared since 2012, with criminals lured by the promise of profit and ease of implementation,” the European police agency said in a statement. According ...

  • Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers

    July 25, 2017

    Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defence and academic organisations in various countries. The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli ...

  • Adobe will kill Flash by 2020

    July 25, 2017

    Adobe has officially set a kill date for its beleaguered Flash. The Photoshop giant said today it plans to end support for the hacker-prone multimedia browser plugin by the end of 2020. This means no more updates for Flash Player after that date and the end of support on many browsers, including Chrome, Internet Explorer and ...

  • Novel Attack Tricks Servers to Cache, Expose Personal Data

    July 25, 2017

    Researcher Omer Gil has devised a way to trick a web server into caching pages and exposing personal data. The so-called web caching attack targets sites that use content delivery network (CDN) services such as Akamai and Cloudflare. These services act as traffic load balancers and reverse proxies, and store files that are frequently retrieved in ...

  • Medical technology is advancing, but how secure is it?

    July 25, 2017

    We’re fortunate to live in an age when medical technology is hyper-advanced and continuing to innovate rapidly. Today, depending on where you live, you may expect to live to be up to 80 years or older; but just a hundred years ago, most people didn’t make it beyond the age of 50. Obviously researchers, medical professionals, ...

  • Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

    July 24, 2017

    Yes, even Mac could also get viruses that could silently spy on its users. So, if you own a Mac and think you are immune to malware, you are wrong. An unusual piece of malware that can remotely take control of webcams, screen, mouse, keyboards, and install additional malicious software has been infecting hundreds of Mac ...

  • Sweden data leak ‘a disaster’, says PM

    July 24, 2017

    The Swedish government has admitted to a huge data leak made by one of its own departments during an IT outsourcing procedure in 2015. Sweden’s prime minister said it was “a disaster”, Swedish media reported. Reports say that confidential data about military personnel, along with defence plans and witness protection details, were exposed by the Transport Agency. They ...