Research

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

A critical vulnerability was discovered in a popular framework called Struts, a software library used to create Java applications. This vulnerability affects over 40 thousand applications currently in use by Fortune 500 companies, medium-sized enterprises and small startups. First Pub …

Read Story

More HBO Hacks

More HBO Hacks

Following the HBO cybersecurity breach, it has come to our attention that several Twitter accounts belonging to the media company including Game of Thrones, Last Week Tonight and Westworld have also been compromised. First Published 18th August 2017 Curb your enthusiasm. 4 min read | …

Read Story

The Myth of Absolute Safety

The Myth of Absolute Safety

Security is a complex discipline. It is not just about buying the right hardware, software, and policies, as important as these might be. Maintaining an organisation's security requires vigilance, continuous monitoring... and an acceptance that your security is not guaranteed. First P …

Read Story

HBO Hack and Leaks

HBO Hack and Leaks

The hackers claim to have stolen HBO's entire email database, including emails of its employees, contractors, and Game Of Thrones filming crew. The hackers also claim to have stolen 1.5 terabytes worth of data; which includes both video content and employees' documents. First Publishe …

Read Story

Third Party Breach Leaks Records from Italy's Largest Bank

The two-part data breach was reported to authorities by UniCredit after forensic accounting uncovered signs of fraud in some of their own subsidiaries, affecting roughly 400,000 customers. First Published 28th July 2017 Italians do 'IT' better? 4 min read | Reflare Research Team UniCr …

Read Story

Verizon Breach and the Importance of Security Coverage

The Verizon breach, or the NICE breach as it’s come to be known, may seem at first like just another example of a compromised data storage system on the internet, and it is that. However, it has also led to some scrambling on the part of Verizon to clean up the mess, mitigate any impa …

Read Story

Cyber Security Challenges Faced by the Education Industry

Cyber Security Challenges Faced by the Education Industry

Schools and universities are now becoming increasingly subject to all sorts of cyber attacks. With the push for increased digitalization, increasing number of systems and user accounts are connected via internet increases the attack surface. First Published 7th July 2017 Let me teach …

Read Story

More Testimony and Still No Details in Russian US Election Hacking Allegations

More Testimony and Still No Details in Russian US Election Hacking Allegations

Mr. Liles did not attribute the attack to any specific country, but told the Senate Intelligence Committee during his testimony that there are only a select few who had the capability to carry out this kind of attack. The media then filled in the gaps. First Published 23rd June 2017 S …

Read Story

North Korea & Why Small States Have Big Cyber Capabilities

North Korea & Why Small States Have Big Cyber Capabilities

Pyongyang’s cyber playbook includes denial of service attacks, infiltrating systems and extracting data, DDOS attacks against websites and potentially destructive computer worm capabilities. First Published 16th June 2017 "We might be hungry, but we'll see you at Black Hat." 4 min rea …

Read Story

Qatar Hack Follow-up

Qatar’s earlier claim of a ‘false news story’ has been walked back following an investigation by their own authorities and the results released through their official news agency. First Published 9th June 2017 All eyes are on the Qataris. 4 min read | Reflare Research Team As we discu …

Read Story

Subscribe by email