Research

A History of Government Attempts to Compromise Encryption and Privacy

The dance between maintaining national security and protecting individual privacy has been complex, shaped by the evolving landscape of technology. And it’s not over yet - not by a long shot.

Read Story

The Starter’s Guide to Strengthening Skills with CTF

Capture The Flag (CTF) events offer an engaging and challenging way to enhance your cybersecurity skills while having fun. But what should you know beforehand to make sure you get the most out of your experience?

Read Story

Capture The Flag: Honing the Edge in Cybersecurity

One of the most effective – and, let's face it, entertaining – methods of cybersecurity development is participating in Capture The Flag (CTF) competitions.

Read Story

A Quick Introduction to Symbolic Execution

A Quick Introduction to Symbolic Execution

By analysing the behaviour of programs under various hypothetical inputs represented as symbolic values, this technique allows security professionals to systematically uncover and address potential security flaws that might not be evident during conventional testing.

Read Story

Path Traversal and The Good Old Days

Why do old cybersecurity vulnerabilities like path traversal still pose risks to contemporary digital infrastructures? After multiple decades, their enduring presence shows us there is still much we can learn from the past.

Read Story

The CVE-2024-3094 Saga

Open-source software powers the backbone of the internet, driving everything from tiny IoT devices to massive data centres. However, CVE-2024-3094 serves as yet another cautionary tale of trust and treachery. First Published 29th April 2024 Trust me. 5 min read | Reflare Research Team …

Read Story

Reverse Engineering is Not Hard with LLM Powered Tools

Reverse Engineering is Not Hard with LLM Powered Tools

With the advent of LLM-powered tools, the intricate task of reverse engineering compiled software is becoming more manageable, allowing newcomers and seasoned professionals to navigate the process more easily. First Published 9th April 2024 The reversing engineer. 4 min read | Reflare …

Read Story

Understanding the Post-Exploitation Jargon and Concepts

Post-exploitation is the art of the 'what next?' for cyber attackers, a critical phase where they leverage access to dig deeper, escalate privileges, and extract valuable data. First Published 29th February 2023 Post exploitation. 4 min read | Reflare Research Team Imagine yourself as …

Read Story

Is Your CPU Leaking Sensitive Data?

Is Your CPU Leaking Sensitive Data?

In a recent turn of events, Intel and AMD are once again under the cybersecurity spotlight, with critical vulnerabilities found in their CPUs, challenging the notion of hardware-level security in modern computing.

Read Story

Exploring Data Science and Machine Learning the Cybersecurity Way

 Exploring Data Science and Machine Learning the Cybersecurity Way

Focusing on the dynamic interplay between artificial intelligence and cybersecurity, we cast an eye over some of the more valuable projects in the areas of malware detection and software vulnerability analysis.

Read Story

Subscribe by email