Research

DHS Hacks One of its Airplanes

During a speech at the CyberSat Summit, Pam Dixon, the Director of DC3, revealed that while it was possible for other malicious hackers to remotely hijack connected electronic devices on commercial aeroplanes. First Published 17th November 2017 Hack your own equipment. 3 min read | Re …

Read Story

Replacing Social Security Numbers

The litany of SSN breaches over the years provides evidence that the system is ripe for exploitation by individuals, businesses and even government officials at various levels. First Published 10th November 2017 One number to rule them all. 4 min read | Reflare Research Team The US Se …

Read Story

Malaysian Data Breach

Malaysian Data Breach

With a current population of roughly 32 million people, this means that the private data of virtually every Malaysian citizen has been compromised - an alarming amount of personal information now vulnerable to identity fraud. First Published 2nd November 2017 Everything you ever wante …

Read Story

Checking Boxes vs. Proactive Security

Checking Boxes vs. Proactive Security

While it is true that new vulnerabilities receive the most media attention, these issues are quite rare compared to well-known vulnerabilities. So, are our leaders focused on the security risks that actually matter? First Published 27th October 2017 Hey everybody - we are now 100% sec …

Read Story

KRACK, WPA2 & Unforeseen Behaviour

KRACK, WPA2 & Unforeseen Behaviour

There are some shocking headlines going around about a newly discovered security flaw called KRACK. But one of the biggest reasons for this panic is because many people are unaware that WPA and WPA2 have long been considered broken. First Published 20th October 2017 Removal of the pow …

Read Story

North Korea and the Asymmetric Power of Hacking

North Korea and the Asymmetric Power of Hacking

Pyongyang is believed to have stolen 235 gigabytes of confidential information from South Korea's military network, which purports to include information about the plan for retaking North Korea in the case of unification. First Published 13th October 2017 Truman left many things in So …

Read Story

Deloitte Breach

The hacking attack on Deloitte is the latest in a disturbing trend of hacking attacks against large organisations whose email services use Microsoft’s Office 365 system. First Published 29th September 2017 Maybe they could bring in some consultants? 4 min read | Reflare Research Team …

Read Story

Equifax and Apache Struts

Equifax and Apache Struts

The vulnerability allows anyone who knows it exists to remotely execute arbitrary commands on servers using default installations of Apache Struts and Java, leaving sensitive data exposed without authentication. First Published 15th September 2017 | Latest Refresh 27th September 2017 …

Read Story

SEC Breach

“The EDGAR system was taken offline while the intrusion was being investigated and immediate steps were taken to enhance cybersecurity monitoring,” the agency said... a year later. First Published 22nd September 2017 The Insecurities and Exchange Commission. 3 min read | Reflare Resea …

Read Story

Pacemakers Recalled Over Hacking Concerns

Pacemakers Recalled Over Hacking Concerns

We have traditionally been good at patching software when vulnerabilities are discovered – but this becomes harder for embedded devices such as pacemakers because they cannot be independently updated. First Published 1st September 2017 At some point in every person's life, an assisted …

Read Story

Subscribe by email