Research

Verizon Breach and the Importance of Security Coverage

The Verizon breach, or the NICE breach as it’s come to be known, may seem at first like just another example of a compromised data storage system on the internet, and it is that. However, it has also led to some scrambling on the part of Verizon to clean up the mess, mitigate any impa …

Read Story

Cyber Security Challenges Faced by the Education Industry

Cyber Security Challenges Faced by the Education Industry

Schools and universities are now becoming increasingly subject to all sorts of cyber attacks. With the push for increased digitalization, increasing number of systems and user accounts are connected via internet increases the attack surface. First Published 7th July 2017 Let me teach …

Read Story

More Testimony and Still No Details in Russian US Election Hacking Allegations

More Testimony and Still No Details in Russian US Election Hacking Allegations

Mr. Liles did not attribute the attack to any specific country, but told the Senate Intelligence Committee during his testimony that there are only a select few who had the capability to carry out this kind of attack. The media then filled in the gaps. First Published 23rd June 2017 S …

Read Story

North Korea & Why Small States Have Big Cyber Capabilities

North Korea & Why Small States Have Big Cyber Capabilities

Pyongyang’s cyber playbook includes denial of service attacks, infiltrating systems and extracting data, DDOS attacks against websites and potentially destructive computer worm capabilities. First Published 16th June 2017 "We might be hungry, but we'll see you at Black Hat." 4 min rea …

Read Story

Qatar Hack Follow-up

Qatar’s earlier claim of a ‘false news story’ has been walked back following an investigation by their own authorities and the results released through their official news agency. First Published 9th June 2017 All eyes are on the Qataris. 4 min read | Reflare Research Team As we discu …

Read Story

The Safety of Nuclear Submarines

The Royal Navy has four submarines capable of launching the UK’s Nuclear Deterrent. It's believed some of them run Windows XP. Yeah... nuclear submarines... on XP. First Published 2nd June 2017 Having difficulties with your sub? Just Control+Alt+Delete. 4 min read | Reflare Research T …

Read Story

Qatar, Hacking and the Never Ending Trouble with Proof

Qatar, Hacking and the Never Ending Trouble with Proof

The QNA website was soon restored with a message saying that the site had suffered from unauthorised access by 'state-backed elements' who had published a fake story. First Published 26th May 2017 Doha changes its story, literally. 4 min read | Reflare Research Team Between May 23rd a …

Read Story

WannaCry and the Dangers of Magical Thinking

WannaCry and the Dangers of Magical Thinking

WannaCry, while now more widely known as the “ransomware apocalypse” (and rightfully so), is more accurately defined as a form of ransomware with a worm-like spreading ability. But many think there are patches to fix things like this, right? Right?? First Published 18th May 2017 "Rans …

Read Story

French Election Cyber Attacks and Countermeasures

French Election Cyber Attacks and Countermeasures

The campaign of Emmanuel Macron, a centrist French politician and the winner of the 2017 French presidential election, was at the time the target of a large-scale cyber attack. First Published 12th May 2017 Leaders as targets. 4 min read | Reflare Research Team Shortly before last wee …

Read Story

Google Docs Phishing Attacks

This phishing attack begins by spoofing known contacts' email addresses using a technique called "address spoofing" in an attempt to steal people’s personal information. First Published 4th May 2017 Gone phishing. 4 min read | Reflare Research Team Over the past 24 hours, a massive ph …

Read Story

Subscribe by email