Research

Cyber-Attacks hit German Governmental Network

Cyber-Attacks hit German Governmental Network

German officials have confirmed a major security breach at a government network, but they are not revealing any additional information or the nature of the attack, even though different media agencies are reporting wildly different versions of what happened. First Published 2nd March …

Read Story

Attackers are Humans Too - On Stealing $24

What do you do when you successfully attack a service designed to help the vision impaired interact with over 5,000 websites? Mine $24 worth of Monero, of course (duh!) First Published 16th February 2018 "Now that I've finally managed to break in, I'll just take this." 4 min read | Re …

Read Story

Cryptocurrency Giveaway Scams

Cryptocurrency Giveaway Scams

Cryptocurrency scams have been rife on the internet for a number of years. One common target is the noob investor who is desperate to cash in on the latest boom. Luckily for scammers, many of these investors don’t know any better. First Published 10th February 2018 The sign of a great …

Read Story

Coincheck and Half a Billion Dollars

Coincheck and Half a Billion Dollars

Imagine waking up one morning to find out hackers stole roughly 500 million USD from your company's crypto exchange. Now, imagine your customers begging for it back. First Published 2nd February 2018 More and more, victims of cryptocurrency theft are turning to god. 4 min read | Refla …

Read Story

10% of ICO Funding Stolen by Hackers

10% of ICO Funding Stolen by Hackers

The question of investor protection and the lack of a safety net for contributors was recently brought to light when hackers managed to steal more than 10% of the Ether created in a crowd sale. First Published 26th January 2018 Investment Banker? Hacker? When it comes to going public, …

Read Story

Heavy Industry and Information Security

Heavy Industry and Information Security

While attacks against management or staff systems related to industrial targets are common, attacks against actual plant infrastructure are comparatively rare. First Published 19th January 2018 Critical infrastructure is still a desirable target. 4 min read | Reflare Research Team Whi …

Read Story

Meltdown & Spectre

Meltdown & Spectre

Not a week goes by without yet another attack being disclosed that can allow an attacker to take over any unpatched system, steal data, access corporate networks, and all kind of other fun activities. Meltdown and Spectre are the newest members in a long line of similar attacks. First …

Read Story

ROBOT Attack - Specification vs Implementation

ROBOT is a new attack against TLS, the encrypted communications protocol used for browsing the web, sending email via Outlook, and many other everyday tasks that use encryption. First Published 15th December 2017 I, Robot. 4 min read | Reflare Research Team This week saw the release o …

Read Story

NiceHash Hack

NiceHash, a Slovenian company that allows users to mine virtual currencies for themselves or for others suffered a hack which led to tens of millions of dollars worth of Bitcoin being stolen. First Published 8th December 2017 While demand continues to grow, crypto platforms are strugg …

Read Story

Uber - On Paying Ransoms

Third-party cloud-based services are like a box of chocolates - you often don't know what you’re going to get. They could work perfectly, but they could also put you in a very uncomfortable position. First Published 24th November 2017 Uber, showing its hand. 4 min read | Reflare Resea …

Read Story

Subscribe by email