News May 2017 - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Category: News May 2017

Has WannaCry trashed reputations of leading cyber-security vendors?

Posted onMay 25, 2017May 31, 2017

There is no doubt that many organisations received an unwelcome penetration test of their security software in the form of the WannaCry ransomware attack. The question is, can security vendors survive with their reputations intact after what appears to be Read More …

CategoriesNews May 2017TagsInformation Security - Infosec, Malware, Ransomware, Security, WannaCry

Microsoft reportedly buys Israeli cybersecurity firm Hexadite

Posted onMay 24, 2017May 31, 2017

U.S. computing giant Microsoft is said to have acquired Israeli cybersecurity startup Hexadite for $100 million, the Hebrew language website Calcalist reported on Wednesday. The deal, if confirmed, would be the latest in a string of Microsoft acquisitions of Israeli Read More …

CategoriesNews May 2017TagsInvestment, Israel, M&A, Marketwatch, Microsoft

EternalRocks spreads seven Windows SMB exploits

Posted onMay 23, 2017July 14, 2018

Someone has stitched together seven of the Windows SMB exploits leaked by the ShadowBrokers, creating a worm that has been spreading through networks since at least the first week of May. Researcher Miroslav Stampar, a member of the Croatian government’s Read More …

CategoriesNews May 2017TagsCybercrime, Exploit, Malware, Security, Shadow Brokers, Small and Medium Business, Windows, Worm

Russian Cron Malware Operators Arrested Before Banking Malware Taken Abroad

Posted onMay 23, 2017December 27, 2019

With the help of an Android malware, Russian cyber criminals were able to steal from local bank customers and were planning to move their operation to the rest of Europe. Twenty people were arrested as law enforcement tried to kill Read More …

CategoriesNews May 2017TagsBanking and Finance, Cybercrime, Group IB, Malware, Russia, Security

Georgia Unveils Massive Cybersecurity Investment to Protect Against Emerging Threats

Posted onMay 23, 2017May 31, 2017

The state of Georgia has set aside $50 million to construct an innovation and training facility that helps state and local agencies better respond to cyber threats. “The Peach State” has more than 30 systems across 16 state agencies that Read More …

CategoriesNews May 2017TagsGeorgia, Information Security - Infosec, Security, USA

Korea, US to Begin Joint Investment in and Research on Cyber Security in Late May

Posted onMay 22, 2017December 23, 2020

Threats of More intelligent worldwide cyber attacks of these days are strengthening cyber security alliance between Korea and the United States.  According to the Korean Ministry of Science, ICT and Future Planning, the Korean government and the US government (Air Read More …

CategoriesNews May 2017TagsIndustrial Control Systems - ICS, Korea, USA

Yahoo Retires ImageMagick After Exploit Leaks Email Content

Posted onMay 22, 2017May 23, 2017

Yahoo is once more at the center of a security scandal after an ImageMagick library exploit was found leaking user email content. The discovery was made by security researcher Chris Evans, who demonstrated the exploit, showing just how easy it was Read More …

CategoriesNews May 2017TagsPrivacy, Vulnerability, Yahoo

WannaCry: A new era of cyber security

Posted onMay 20, 2017May 22, 2017

When the “WannaCry” virus hit computers in at least 150 countries around the world, some called it the beginning of a new era – an era in which hackers have become experts at finding weak spots in our online security. Read More …

CategoriesNews May 2017TagsMicrosoft, WannaCry

Russian mobile telecom giant MegaFon down in Moscow & other cities

Posted onMay 19, 2017

One of Russia’s three largest cellphone operators, MegaFon, has faced network troubles on Friday, according to comments from clients on social networks. Service has been affected in Moscow, Ryazan, Nizhny Novgorod and other cities. “At the moment, there are massive Read More …

CategoriesNews May 2017TagsCNI, Russia, Security, Telecommunications

Zomato Breach Exposes 17M User Records, Makes Deal with Hacker to Destroy Data

Posted onMay 19, 2017December 23, 2020

Restaurant guide Zomato has announced that it has been the victim of a data breach which saw the records of 17 million users being stolen from its database. The bad news is that 6.6 million of those are already on Read More …

CategoriesNews May 2017TagsCatering and Hospitality, Cybercrime, Data Breach, Hacking, Privacy, United Kingdom

Post navigation

← Older posts
Newer posts →

LATEST ARTICLES


A BEGINNER’S ROADMAP: HOW TO START YOUR AI SOC AGENT IMPLEMENTATION
By Kirsten Doyle
Cyber Security Review online – November 2025


THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER
Cyber Security Review online – July 2025


HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES
Cyber Security Review online – June 2025


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023

A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2025 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise