Research

NASA Breach Follow Up

A security audit found that the Jet Propulsion Laboratory (JPL) cyber attack involved the installation of unauthorised hardware, which eventually led to numerous malicious attacks against NASA networks. First Published 24th June 2019 JPL do some amazing things. Connecting a Raspberry …

Read Story

Telegram Messenger Hit by DDoS Attack Originating from China

Telegram Messenger Hit by DDoS Attack Originating from China

The app’s co-founder Pavel Durov said that its “Telegram Messenger” service had been blocked in China following a massive distributed denial of service (DDoS) attack launched from there. First Published 17th June 2019 The role of digital messaging in moments of geopolitical upheaval c …

Read Story

On the Australian National University Breach

On the Australian National University Breach

Hackers obtained personal details, including names, addresses, payment cards and other payment information of overseas students’ union leaders from the Australian National University (ANU). First Published 10th June 2019 Foreign relations between China and Australia - in happier times …

Read Story

The Cost Implications of the WhatsApp Hack

What’s perhaps most concerning is the ease with which this attack was carried out. The attackers were able to eavesdrop on users’ phones by simply placing a special WhatsApp call to the device. The user didn’t even have to answer it. First Published 21st May 2019 That feeling when the …

Read Story

When Utilities Become Cyber Attack Casualties

Utilities are sought-after targets for what has been deemed "a cause du jour" for cyber criminals and hacktivists. So if you live in a large, developed nation, assume that your utilities are under near constant attack by multiple actors. First Published 10th May 2019 Such targets can …

Read Story

Washington State Passes New Data Breach Legislation

Washington State Passes New Data Breach Legislation

The North-West US state of Washington passed new legislation that substantially tightens the notification requirements for breaches within it. The question now is - who will follow suit? First Published 30th April 2019 Get ready to report those breaches! 4 min read | Reflare Research …

Read Story

Yahoo! & The Price of Breaches

The Yahoo! breaches have been largely forgotten, lost in the sea of news of other cyber attacks. However, Yahoo! will indeed be remembered as a historic example of the damage poor security can cause to an organization’s reputation... and it's not over yet. First Published 15th April 2 …

Read Story

Asus Live Update Hack

ASUS Live Update (a tool used to update non-IT-savvy users’ ASUS software) appeared to be delivering malware in some instances. This piece of code was then said to self-propagate laterally across entire corporate networks by using a variety of techniques such as VPN connections and RD …

Read Story

Can Security Be Forced Upon Companies?

In the wake of two high-profile data breaches, lawmakers are asking tough questions to company executives, which is forcing them to reevaluate how they store, transfer and protect client data. First Published 12th March 2019 Make me do it. 4 min read | Reflare Research Team This week …

Read Story

Inside a Common Data Breach

Most small-to-medium companies rarely suffer from high-profile, extortion-style attacks. Instead, they suffer data breaches that are most often created by mistakes and negligence. First Published 4th March 2019 Careless staff members cause the highest number of data breach incidents. …

Read Story

Subscribe by email