Welcome to the Cyber Security Review website.
The growth of the internet has impacted profoundly on everyday life and the global economy. It has evolved into a global, interconnected network of systems and information – cyberspace – that we know today, transforming the conduct of business and opening new markets.
Threats posed by cybercriminals, state and non-state actors are persistent and constantly evolving. With an ever-growing number of cyber attacks on critical infrastructure, manufacturing, online commerce and digital life in general, security experts are finding that their work has become a race against the attackers.
The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.
Our mission is to promote dialogue and provide a platform for information exchange and cooperation between stakeholders, industry, academia and security experts worldwide.
- 1,900 Signal users exposed: Twilio attacker ‘explicitly’ looked for certain numbers
August 16, 2022
The security breach at Twilio earlier this month affected at least one high-value customer, Signal, and led to the exposure of the phone number and ...
- RTLS systems vulnerable to MiTM attacks, location manipulation
August 16, 2022
Security researchers have uncovered multiple vulnerabilities impacting UWB (ultra-wideband) RTLS (real-time locating systems), enabling threat actors to conduct man-in-the-middle attacks and manipulate tag geo-location data. RTLS ...
- Disrupting SEABORGIUM’s ongoing phishing operations
August 15, 2022
The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM, an actor Microsoft has tracked since 2017. SEABORGIUM ...
- Identity Week Asia – a leading identity and trust event for the APAC region
August 15, 2022
London, UK, August 15, 2022 – Identity Week Asia, a leading identity and trust event for the APAC region, will be returning to the Suntec ...
- Indian military ready to put long-range quantum key distribution on the line
August 15, 2022
India’s military has celebrated the nation’s Independence Day by announcing it will adopt locally developed quantum key distribution (QKD) technology that can operate across distances ...
- Over 9,000 VNC servers exposed online without a password
August 14, 2022
Researchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used without authentication, allowing threat actors easy access ...
- Potential hack for some Boeing planes fixed
August 12, 2022
A digital vulnerability in the computer systems used on some Boeing Co aircraft that could have allowed malicious hackers to modify data and cause pilots ...
- Chinese hackers backdoor chat app with new Linux, macOS malware
August 12, 2022
Versions of a cross-platform instant messenger application focused on the Chinese market known as ‘MiMi’ have been trojanized to deliver a new backdoor (dubbed rshell) ...
- UK: Ransomware attack on NHS systems could take weeks to fix, major IT provider warns
August 11, 2022
A cyberattack that hit a major IT provider for the NHS and severely affected the 111 service involved ransomware and could take up to four ...
- Cisco admits corporate network compromised by gang with links to Lapsus$
August 11, 2022
Cisco disclosed on Wednesday that its corporate network was accessed by cyber-criminals in May after an employee’s personal Google account was compromised – an act ...
- Automotive supplier breached by 3 ransomware gangs in 2 weeks
August 10, 2022
An automotive supplier had its systems breached and files encrypted by three different ransomware gangs over two weeks in May, two of the attacks happening ...
- Palo Alto Networks Releases Security Update for PAN-OS
August 10, 2022
Palo Alto Networks has released a security update to address a vulnerability in PAN-OS firewall configurations. A remote attacker could exploit this vulnerability to conduct ...