A Look at the Most Attacked Ports
by Reflare Research Team on May 15, 2021 7:43:00 PM
Although the number of attacks against most ports remains relatively low, it is critical to understand which ones are the most targeted. You should conduct a rigorous audit, evaluate your own exposure, and act accordingly... or else.
Government Authorities Raid DDoS Providers and Customers
by Reflare Research Team on May 14, 2021 7:40:00 PM
DDoS for hire services operate as a niche within the cybercrime ecosystem, are increasing in popularity as an efficient and effective option to carry out attacks, and are often sold with promises that they will never be detected. *Cough*
The Median Cyber-Attacker Isn't Even Remotely as Skilled as the Public Thinks
by Reflare Research Team on May 14, 2021 7:38:00 PM
Despite the almost ubiquitous adoption of advanced persistent threat (APT) and zero-day threat actor motifs into cyber security culture, it remains true that the vast majority of cyber-attackers are incapable of even executing the most basic of attacks.
Cryptocurrencies, 51% and the Future of Botnets
by Reflare Research Team on May 14, 2021 7:34:00 PM
In spite of several innovative and complementary alternative decentralised financial applications being built using blockchain technology, cryptocurrencies still struggle for mainstream adoption. One of the reasons for this is a tendency for security scares resulting from apparent cri …
The Root of Security Bugs
by Reflare Research Team on May 14, 2021 7:30:00 PM
Even the giants can get it wrong. In November of 2017, Mac users running the then newest incarnation of Apple’s operating system — macOS High Sierra, which was released only a month before — were open to attack. The bug allowed anyone with access to the computer to log in as the “root …
New Hacking Techniques Targeting Car Keys
by Reflare Research Team on May 14, 2021 7:22:00 PM
It has been proven that hackers can communicate with the encrypted logic of a car's key fob to force it to unlock vehicles. What's more, these keys can be cloned and duplicated using off-the-shelf equipment, allowing anyone to open and drive a vehicle without the keys or validating au …
What is 00153random02009d?
by Reflare Research Team on May 12, 2021 7:16:00 PM
The usefulness of randomness is obvious. However, the probabilistic nature of computers limits their usefulness with the concept. Subsequently, you would reasonably assume that a body like the gambling industry would understand such limitations, but apparently not.
Hacking the Radio, and Other Analogue Vulnerabilities
by Reflare Research Team on May 11, 2021 7:09:00 PM
If the signal from your favourite radio station isn’t streaming smoothly to your dial, it may be malicious interference from someone who doesn’t appreciate the program you’re trying to listen to. That’s exactly what happened recently to a number of stations around the world where an i …
Reflare presents with Deloitte at Blackhat
by Reflare Research Team on May 9, 2021 5:05:00 PM
The results presented in this study explored the inherent correlation biases found in widely used computer vision models, which were leveraged to create images that these systems failed to interpret correctly. First Published 9th May 2021 The reversing engineer. 3 min read | 27 min vi …
A Post-Hack Crisis, Escalation of Rhetoric and Where to Place Blame
by Reflare Research Team on May 8, 2021 7:03:00 PM
Widespread accusations towards the Russian government services and the apparent lack of a “smoking gun” after the 2016 US election raises the question of whether the United States brought on a second post-hack crisis of their own creation.
Even More Evidence to Show Us the Dangers of Poorly Designed Smart Devices
by Reflare Research Team on May 7, 2021 6:09:00 PM
The increasing scale and flexibility of DDoS attacks should be a wake-up call for IoT manufacturers as such breaches become more prevalent in both consumer and industrial automation systems. But who will be able to resolve the challenge of providing security for these devices as they …
How Tech and Non-Tech Staff Unwillingly Become a Hacker’s Best Friend
by Reflare Research Team on May 6, 2021 6:54:00 PM
A cyber-attack cripples a power grid leaving an entire town in the dark, and a jammed home security system stops detecting intruders. What's the commonality across all these seemingly unrelated events? Surprise! It's inadequately trained staff.
When Securing Your Company Data, Please Remember the Promiscuous
by Reflare Research Team on May 5, 2021 6:46:00 PM
Security is never stagnant. At best, it’s a game of cat and mouse where you try to outsmart the other party — with new security threats arising when you least expect them. However, there are some valuable lessons from the past that many have yet to learn.
Government Eavesdropping and Onsite Backdoors
by Reflare Research Team on May 4, 2021 5:27:00 PM
In the name of ‘national security’, there continues to be repeated calls for tech organisations to build backdoors into their systems to enable government access. The overarching concern is that corporations use of backdoors will undermine and weaken encryption methods, and there are …