Reflare Research Team

Posts by Reflare Research Team

KRACK, WPA2 & Unforeseen Behaviour

KRACK, WPA2 & Unforeseen Behaviour

There are some shocking headlines going around about a newly discovered security flaw called KRACK. But one of the biggest reasons for this panic is because many people are unaware that WPA and WPA2 have long been considered broken. First Published 20th October 2017 Removal of the pow …

Read Story

North Korea and the Asymmetric Power of Hacking

North Korea and the Asymmetric Power of Hacking

Pyongyang is believed to have stolen 235 gigabytes of confidential information from South Korea's military network, which purports to include information about the plan for retaking North Korea in the case of unification. First Published 13th October 2017 Truman left many things in So …

Read Story

Deloitte Breach

The hacking attack on Deloitte is the latest in a disturbing trend of hacking attacks against large organisations whose email services use Microsoft’s Office 365 system. First Published 29th September 2017 Maybe they could bring in some consultants? 4 min read | Reflare Research Team …

Read Story

Equifax and Apache Struts

Equifax and Apache Struts

The vulnerability allows anyone who knows it exists to remotely execute arbitrary commands on servers using default installations of Apache Struts and Java, leaving sensitive data exposed without authentication. First Published 15th September 2017 | Latest Refresh 27th September 2017 …

Read Story

SEC Breach

“The EDGAR system was taken offline while the intrusion was being investigated and immediate steps were taken to enhance cybersecurity monitoring,” the agency said... a year later. First Published 22nd September 2017 The Insecurities and Exchange Commission. 3 min read | Reflare Resea …

Read Story

Pacemakers Recalled Over Hacking Concerns

Pacemakers Recalled Over Hacking Concerns

We have traditionally been good at patching software when vulnerabilities are discovered – but this becomes harder for embedded devices such as pacemakers because they cannot be independently updated. First Published 1st September 2017 At some point in every person's life, an assisted …

Read Story

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

A critical vulnerability was discovered in a popular framework called Struts, a software library used to create Java applications. This vulnerability affects over 40 thousand applications currently in use by Fortune 500 companies, medium-sized enterprises and small startups. First Pub …

Read Story

More HBO Hacks

More HBO Hacks

Following the HBO cybersecurity breach, it has come to our attention that several Twitter accounts belonging to the media company including Game of Thrones, Last Week Tonight and Westworld have also been compromised. First Published 18th August 2017 Curb your enthusiasm. 4 min read | …

Read Story

The Myth of Absolute Safety

The Myth of Absolute Safety

Security is a complex discipline. It is not just about buying the right hardware, software, and policies, as important as these might be. Maintaining an organisation's security requires vigilance, continuous monitoring... and an acceptance that your security is not guaranteed. First P …

Read Story

HBO Hack and Leaks

HBO Hack and Leaks

The hackers claim to have stolen HBO's entire email database, including emails of its employees, contractors, and Game Of Thrones filming crew. The hackers also claim to have stolen 1.5 terabytes worth of data; which includes both video content and employees' documents. First Publishe …

Read Story

Subscribe by email