Reflare Research Team

Posts by Reflare Research Team

Pegasus and the Digital Arms Trade

Pegasus and the Digital Arms Trade

A high-profile divorce case has shown that the elite can indeed deploy government-level espionage spyware tools for their own personal use, and it's more common than you think. So, how did we get here?

Read Story

The Privacy and Security of COVID-19 Tracking Apps

COVID-19 tracking apps are now commonplace, despite numerous security concerns from public advocacy groups and segments of wider society. First Published 12th May 2020 | Latest Refresh 30th November 2021 The race to launch Covid apps might have overlooked some basics. 3 min read | Ref …

Read Story

India: Political Parties, Risk and Degrees of Attacks

The defacement of political party websites is nothing new, but what motivates them can be dynamic, as Indian Prime Minister Modi found out two days before an official visit to the United States. But since then, media have made the idea of the Indian Hacker increasingly more popular. F …

Read Story

Crypto Currency Breaches, Continued

Some time ago, CoinDash, an Israeli cryptocurrency startup, was using their ICO to raise $10 million. Just hours after it started, an unknown attacker compromised the website and took $7 million of it. Then, many were shocked this could happen. Today, crypto hacks are commonplace. Fir …

Read Story

Electoral Interference, Restrictions and Anonymity

Electoral Interference, Restrictions and Anonymity

The lack of international consensus on what exactly the Restrictive Internet Censorship and Freedom of Information laws should not have created a high-stakes game of political 'cat and mouse'. First Published 19th October 2016 Someone might be without their 'How to Frontside Smith Gri …

Read Story

Mobile App Hype and Criminal Activity

Mobile App Hype and Criminal Activity

While Pokemon Go promised to bring in more players, hackers counted on the excitement generated by the launch to spread malware among users until the location services were fully available worldwide. First Published 13th July 2016 | Latest Refresh 13th September 2021 I choose you, vag …

Read Story

The Trouble with Crowd Sourced Data

The Trouble with Crowd Sourced Data

A Mapbox GL JS v2.0.2 user maliciously renamed New York City. Within seconds of the attack, eBay, Snapchat, Foursquare, CitiBike and Zillow automatically fell in line, and NYC was gone. First Published 31st August 2018 The wisdom (and stupidity) of crowds. Baaaahstards! 4 min read | R …

Read Story

Petya Ransomware Outbreak

Petya Ransomware Outbreak

The Petya variant encrypts the MBR and rest of the hard disk drive, then attempts an operation similar to WannaCry. It displays a message informing victims that their files have been encrypted and that they should send $300 in bitcoin to a specific address to decrypt their files. Firs …

Read Story

A Look at the Most Attacked Ports

A Look at the Most Attacked Ports

Although the number of attacks against most ports remains relatively low, it is critical to understand which ones are the most targeted. You should conduct a rigorous audit, evaluate your own exposure, and act accordingly... or else.

Read Story

Government Authorities Raid DDoS Providers and Customers

DDoS for hire services operate as a niche within the cybercrime ecosystem, are increasing in popularity as an efficient and effective option to carry out attacks, and are often sold with promises that they will never be detected. *Cough*

Read Story

Subscribe by email