A Warning Tale on IT Security Reporting
by Reflare Research Team on Oct 16, 2022 7:53:00 AM
Well-intentioned media organisations push hard to break stories in real-time, but at what cost? Inaccurate reporting, insufficient context, and no quality control often lead to misinformation and outright confusion.
The Fifth Third Bank Breach - Banks and Insider Threats
by Reflare Research Team on Sep 13, 2022 6:24:00 PM
We’re starting to see a pattern emerge in the reporting that financial institutions use when they’re breached. Fifth Third Bank, one of the top 20 banks in the US, is yet another high-profile organisation to have suffered a major security incident. First Published 25th February 2020 | …
Stop 3rd Party Security Vendor Backdoor Leaks Before They Bite
by Reflare Research Team on Sep 13, 2022 6:18:00 PM
Several major networking equipment providers were found to have backdoors in their firmware that exposed private keys and even allowed remote code execution. If you’re not yet worried, then you’re not paying attention.
The Black Market for Accounts
by Reflare Research Team on Sep 13, 2022 6:13:00 PM
While black markets have existed since the early days of the internet, recent technological changes have made them a much more lucrative and popular option than before. The value of credentials for services like Disney+, Netflix and AWS will continue trending upward as long as there’s …
InterContinental Hotels Group Card Data Hack
by Reflare Research Team on Sep 13, 2022 5:47:00 PM
If reports were correct, this was one of the hospitality industry's largest data breaches to date. With nearly 1,200 hotels affected, the breach was large enough to reach out and touch a significant portion of the 61 million IHG stays per year. First Published 20th April 2017 | Latest …
Cybercrime in an Interconnected World
by Reflare Research Team on Sep 13, 2022 1:01:00 PM
Cybercriminals are not confined to one region or culture, but operate throughout the interconnected world to capitalise on evolving opportunities to steal customer data and transfer funds. Published 25th May 2016 | Latest Refresh 13th September 2022 A web that reaches from a pocket in …
Proof of Attack vs Proof of Attacker
by Reflare Research Team on Sep 13, 2022 12:46:00 PM
When a system is said to be under attack, compromised or a breach is suspected and/or detected, given the physical and technical challenges, is it even possible to prove who did it? First Published 15th December 2016 | Latest Refresh 13th September 2022 Sufficient due process to separ …
The FriendFinder Hack and the Value of Customer Data
by Reflare Research Team on Sep 13, 2022 12:36:00 PM
FriendFinder was the victim of a cyber attack leading to a data leak, including usernames and passwords for 412 million accounts. The hack is one thing, but the blackmail! Oh, the blackmail. First Published 16th November 2016 | Latest Refresh 13th September 2022 Stephen, 31, persists …
The Accessible Guide to Penetration Testing
by Reflare Research Team on Sep 7, 2022 7:43:00 PM
For years, penetration testing was viewed primarily as an activity for large and complex companies. Now that it is significantly more accessible, smart (and less sophisticated) businesses are baking it into their business-as-usual activities even as early as the point of their creatio …
Cybersecurity Recruitment, Education, and Neurodiversity
by Reflare Research Team on Sep 1, 2022 7:40:00 PM
Companies are screaming for new cybersecurity professionals to join their teams. However, they are going out of the way to make their recruitment as difficult as possible.