Research

Heavy Industry and Information Security

Heavy Industry and Information Security

While attacks against management or staff systems related to industrial targets are common, attacks against actual plant infrastructure are comparatively rare. First Published 19th January 2018 Critical infrastructure is still a desirable target. 4 min read | Reflare Research Team Whi …

Read Story

Meltdown & Spectre

Meltdown & Spectre

Not a week goes by without yet another attack being disclosed that can allow an attacker to take over any unpatched system, steal data, access corporate networks, and all kind of other fun activities. Meltdown and Spectre are the newest members in a long line of similar attacks. First …

Read Story

ROBOT Attack - Specification vs Implementation

ROBOT is a new attack against TLS, the encrypted communications protocol used for browsing the web, sending email via Outlook, and many other everyday tasks that use encryption. First Published 15th December 2017 I, Robot. 4 min read | Reflare Research Team This week saw the release o …

Read Story

NiceHash Hack

NiceHash, a Slovenian company that allows users to mine virtual currencies for themselves or for others suffered a hack which led to tens of millions of dollars worth of Bitcoin being stolen. First Published 8th December 2017 While demand continues to grow, crypto platforms are strugg …

Read Story

Uber - On Paying Ransoms

Third-party cloud-based services are like a box of chocolates - you often don't know what you’re going to get. They could work perfectly, but they could also put you in a very uncomfortable position. First Published 24th November 2017 Uber, showing its hand. 4 min read | Reflare Resea …

Read Story

DHS Hacks One of its Airplanes

During a speech at the CyberSat Summit, Pam Dixon, the Director of DC3, revealed that while it was possible for other malicious hackers to remotely hijack connected electronic devices on commercial aeroplanes. First Published 17th November 2017 Hack your own equipment. 3 min read | Re …

Read Story

Replacing Social Security Numbers

The litany of SSN breaches over the years provides evidence that the system is ripe for exploitation by individuals, businesses and even government officials at various levels. First Published 10th November 2017 One number to rule them all. 4 min read | Reflare Research Team The US Se …

Read Story

Malaysian Data Breach

Malaysian Data Breach

With a current population of roughly 32 million people, this means that the private data of virtually every Malaysian citizen has been compromised - an alarming amount of personal information now vulnerable to identity fraud. First Published 2nd November 2017 Everything you ever wante …

Read Story

Checking Boxes vs. Proactive Security

Checking Boxes vs. Proactive Security

While it is true that new vulnerabilities receive the most media attention, these issues are quite rare compared to well-known vulnerabilities. So, are our leaders focused on the security risks that actually matter? First Published 27th October 2017 Hey everybody - we are now 100% sec …

Read Story

KRACK, WPA2 & Unforeseen Behaviour

KRACK, WPA2 & Unforeseen Behaviour

There are some shocking headlines going around about a newly discovered security flaw called KRACK. But one of the biggest reasons for this panic is because many people are unaware that WPA and WPA2 have long been considered broken. First Published 20th October 2017 Removal of the pow …

Read Story

Subscribe by email