Reflare Research Team

Posts by Reflare Research Team

A Look at Politically Motivated Hacks Through the Lens of the Donald Daters App

If you’re a hopeless romantic (and who isn’t), then you can probably appreciate the irony of the “No. 1 Place for Patriotic Singles” having some of the weakest security on the internet. First Published 19th October 2018 | Latest Refresh 5th April 2022 Horny and confused. 4 min read | …

Read Story

A Case-Study on the Quality of Infosec Reporting

There are few things that infosec professionals hate more than having their work misrepresented, misunderstood, or sensationalised to the point that it loses all semblance of truth. First Published 18th January 2019 | Latest Refresh 23rd February 2022 Fair and balanced? 5 min read | R …

Read Story

Log4j and the Open-Source Rebellion

Many organisations have an over-reliance on open-sourced projects. What makes this interesting is that many of them are unaware of it. However, they are now starting to find out (the hard way). First Published 14th February 2022 "Let's break the internet!" 4 min read | Reflare Researc …

Read Story

Thinking of Cybersecurity in Relative Terms

There is an enormous disconnect between industry experts, reporters and users when discussing cybersecurity incidents and risks. This leaves a chasm of misunderstanding regarding the severity and scope of what is possible. First Published 9th October 2019 | Latest Refresh 8th February …

Read Story

Human Nature and Strong Adversary Fiction

Human Nature and Strong Adversary Fiction

“The bad guys entered through an old blog post from 2012 and hit us hard. It was a State Actor, and our network is now under the control of Chinese Hackers who are wiping us out.” Yeah... okaay. First Published 23rd October 2019 | Latest Refresh 3rd February 2022 Those who are breache …

Read Story

The Eyebrow-Raising Breaches of 2021

Did 2021 feel a bit busier for cybersecurity professionals? Yeah... it did, because it was. Early numbers show that it may have been the biggest year for security breaches yet. However, some were more 'special' than others. First Published 4th January 2022 | Latest Refresh 25th Januar …

Read Story

The Logic Behind Suing Hackers

The Logic Behind Suing Hackers

Microsoft successfully sued a network of Russian “Fancy Bear” (APT28) hackers, which has been blamed for many cyber attacks, including the DNC hack in 2016. Wait... is Microsoft actually suing hackers?!? First Published 25th August 2017 | Latest Refresh 23rd January 2022 Microsoft get …

Read Story

Artificial Intelligence and Malware Detection

Artificial Intelligence and Malware Detection

The term 'artificial intelligence' is no longer a mere buzzword in the antivirus industry. But does it mean it is the holy grail for malware detection or the perfect weapon against malware developers? Not quite.

Read Story

How to Ask for Honest User Feedback on Your IT Security Training Program

How to Ask for Honest User Feedback on Your IT Security Training Program

Both tech and non-tech staff understand how important IT security is, and they will happily tell you what they think of your training initiatives if you ask them. Are you ready to hear it? And even if you are, what are you going to do next?

Read Story

The Changing Image of Cyber Warfare

The evolution of cyber attacks has raised the profile of cyber warfare. For example, one cyber attack against state-owned Saudi Aramco almost destroyed the company’s entire computer system. The attack was rated as being capable of causing $150 billion in damage, which would rank it eq …

Read Story

Subscribe by email