The Leyman's Guide to Fuzzing
by Reflare Research Team on Dec 1, 2022 7:48:00 PM
Fuzzing can (among other things) be used to expose software bugs, test browser security, and perform static program analysis. However, as the types of fuzzers continue to expand, so do their use cases.
How to Condense Your Cyber Security Training Scope
by Reflare Research Team on Nov 23, 2022 7:51:00 AM
The range of IT securities capabilities you can train for is limitless, and some domain areas are more valuable than others. Therefore, the right question is not "What training do you want", but "What training is good for you".
On Drones and Physical Security
by Reflare Research Team on Nov 5, 2022 7:47:00 PM
As commercial and non-commercial drones become more commonplace, so do their dubious applications. We profile several crimes enabled by drones, and how security professionals must now consider the physical implications of defending against such an attack.
A Warning Tale on IT Security Reporting
by Reflare Research Team on Oct 16, 2022 7:53:00 AM
Well-intentioned media organisations push hard to break stories in real-time, but at what cost? Inaccurate reporting, insufficient context, and no quality control often lead to misinformation and outright confusion.
The Fifth Third Bank Breach - Banks and Insider Threats
by Reflare Research Team on Sep 13, 2022 6:24:00 PM
We’re starting to see a pattern emerge in the reporting that financial institutions use when they’re breached. Fifth Third Bank, one of the top 20 banks in the US, is yet another high-profile organisation to have suffered a major security incident. First Published 25th February 2020 | …
Stop 3rd Party Security Vendor Backdoor Leaks Before They Bite
by Reflare Research Team on Sep 13, 2022 6:18:00 PM
Several major networking equipment providers were found to have backdoors in their firmware that exposed private keys and even allowed remote code execution. If you’re not yet worried, then you’re not paying attention.
The Black Market for Accounts
by Reflare Research Team on Sep 13, 2022 6:13:00 PM
While black markets have existed since the early days of the internet, recent technological changes have made them a much more lucrative and popular option than before. The value of credentials for services like Disney+, Netflix and AWS will continue trending upward as long as there’s …
InterContinental Hotels Group Card Data Hack
by Reflare Research Team on Sep 13, 2022 5:47:00 PM
If reports were correct, this was one of the hospitality industry's largest data breaches to date. With nearly 1,200 hotels affected, the breach was large enough to reach out and touch a significant portion of the 61 million IHG stays per year. First Published 20th April 2017 | Latest …
Cybercrime in an Interconnected World
by Reflare Research Team on Sep 13, 2022 1:01:00 PM
Cybercriminals are not confined to one region or culture, but operate throughout the interconnected world to capitalise on evolving opportunities to steal customer data and transfer funds. Published 25th May 2016 | Latest Refresh 13th September 2022 A web that reaches from a pocket in …
Proof of Attack vs Proof of Attacker
by Reflare Research Team on Sep 13, 2022 12:46:00 PM
When a system is said to be under attack, compromised or a breach is suspected and/or detected, given the physical and technical challenges, is it even possible to prove who did it? First Published 15th December 2016 | Latest Refresh 13th September 2022 Sufficient due process to separ …