Reflare Research Team

Posts by Reflare Research Team

It's Time for Corporate Leaders to Prioritise Cybersecurity Over Comfort and Convenience

A recent breach in Nagoya has revealed (again) the illusion that maintaining outdated software is more cost-effective than upgrading to secure systems, particularly in organisations predominantly run by leaders who are comfortable with older technologies.

Read Story

The MOVEit Hack: What You Need to Know

The intricacy of the MOVEit hack is having a profound impact on many public and private organisations. But will these organisations learn the crucial cybersecurity lessons this moment will ultimately teach them?

Read Story

How to Set Meaningful Cyber Security Development Goals

Having an acute understanding of not just the 'what', but the 'why' your staff members require specific capability development is critical for deploying training that gives the business what it really needs.

Read Story

AI Enabled Cybersecurity Lunges Towards the Future

AI Enabled Cybersecurity Lunges Towards the Future

Recent developments in artificial intelligence are now making its practical application more accessible to real-world challenges, including cybersecurity. You now must ask yourself, "Do I know how to use it correctly?"

Read Story

State-Sponsored Espionage and the Complexity of Mobile Security

State-Sponsored Espionage and the Complexity of Mobile Security

In a world progressively interwoven with technology, the ever-evolving landscape of mobile exploitation has become a focal point for cybersecurity and geopolitics alike. We dissect the multifaceted terrain of state-sponsored cyber-activity, revealing how the complexities of mobile sec …

Read Story

AirTags - The Good, The Bad, and the Future of Tracking Devices

As AirTags gain popularity, this seemingly convenient technology also has plenty of growing concerns surrounding privacy and security. Players in the tracking device market must stay two steps ahead to successfully manage the fallout of product misuse.

Read Story

Strengthening Cyber Resilience

Recent geopolitical events have put IT security departments across the globe on high alert. However, when interacting with colleagues from other departments, does anyone even know what we're talking about?

Read Story

Let's Talk GPT-4 and the Future of Cybersecurity

The cybersecurity landscape must adapt to both the opportunities and challenges that AI advancements like GPT-4 bring. We delve into the Italy-ChatGPT situation, experts' concerns, and the potential implications of LLMs in the realm of cybersecurity.

Read Story

Lapsus$, MFA Bombing, and Human Behaviour

Lapsus$, MFA Bombing, and Human Behaviour

As cybersecurity departments bucket money into solutions that improve network security, highly exploitable staff keep letting attackers in. Malicious actors know your users are your weakest link, and if you think their trickery is becoming sophisticated, you ain't seen nothing yet.

Read Story

Data Recovery Plans Matter

Data recovery plans are essential in times of natural disasters, as they ensure that critical data is protected and can be recovered quickly in the event of loss or damage. However, it is startling how few organisations have meaningful plans in place.

Read Story

Subscribe by email