Twitter, 17-year-olds, and the difference between a hack and a cover-up
by Reflare Research Team on Sep 1, 2020 6:40:00 PM
Graham was able to enter a hole in a website that should have been patched. Twitter’s architecture is based on open-source software which makes it easier to find bugs and then exploit them, to which he did exactly that. First Published 1st September 2020 Ask and you shall receive. 4 m …
The Aftermath of the Twitter Hack
by Reflare Research Team on Jul 30, 2020 6:38:00 PM
The hacker's actions are reminiscent of many other incidents involving social media sites and cryptocurrency, but for Twitter users, the reputational risks can be significant. First Published 30th July 2020 Scam at scale. 4 min read | Reflare Research Team As dozens of high-profile Tw …
Vault 7 - Why Professional Attackers Are Not Good Defenders
by Reflare Research Team on Jun 23, 2020 6:36:00 PM
The skillset required to be good at offence is entirely different from the skillset required to be good at defence – in large part because the offence is focused on executing a single attack (i.e., compromising a system), while the defence is focused on preventing all attacks (i.e., d …
How a Multi-Stage Cyber-Attack Works
by Reflare Research Team on May 26, 2020 6:35:00 PM
Multi-stage, or hit-and-run attacks, are a common way that cyber criminals approach their victims. And, increasingly, complex organisations are the targets. First Published 26th May 2020 Well-designed attacks come in waves. 4 min read | Reflare Research Team Many sophisticated cyber-a …
The SBA Breach - Why Breaches Increase During Crisis
by Reflare Research Team on Apr 28, 2020 6:32:00 PM
The EIDL system had been breached for approximately five and a half hours. During this time, hackers gained access to sensitive business-related information. First Published 28th April 2020 Covid is a convenient distraction that attackers are taking advantage of. 4 min read | Reflare …
Hacking Smear Campaigns and their Effects
by Reflare Research Team on Apr 2, 2020 6:30:00 PM
With its user growth down 80% and accelerating and its stock price taking a nosedive, Houseparty issued a statement offering $1m for proof that recent hacking and/or breach allegations against it were part of an organised smear campaign. First Published 2nd April 2020 Fast rise, fast …
Covid-19 and Cyber Attacks
by Reflare Research Team on Mar 23, 2020 6:29:00 PM
To an extent, the Covid-19 virus has already served its purpose – to spread fear and paranoia in people. The attackers are using the opportunity to test out different ways of circumventing cyber security measures. First Published 23rd March 2020 Covid - the beautiful distraction. 4 mi …
The Iowa Primary from an Information Security Perspective
by Reflare Research Team on Feb 10, 2020 6:23:00 PM
The app suffered a significant hack that compromised the integrity of the vote and threatened to invalidate the results completely. The app developers are now suggesting "a firewall issue", which had nothing to do with their code, is to blame. First Published 10th February 2020 Actual …
The Inevitability of 'Shlayer'
by Reflare Research Team on Jan 31, 2020 6:21:00 PM
There seems to be a perception by many Apple users that Macs are somehow immune to infection with malware. Unfortunately, Shlayer is an example of just how wrong that idea is. First Published 31st January 2020 macOS in the spotlight. 4 min read | Reflare Research Team We have repeated …
I'm Afraid You Have 'State Actor'
by Reflare Research Team on Jan 17, 2020 11:34:00 AM
When it comes to cyberattacks, the threat of a nation-state adversary infiltrating your network is among the most serious threats you can face. But just how frequently does this actually happen? First Published 17th January 2020 Just because you feel it doesn't mean they are there. 4 …