Research

On Darknet Marketplaces, Cryptocurrencies, and the Flow of Funds

Darknet marketplaces have been around for years, but they have been problematic for both those who run them, and the law-enforcement agencies who look to stamp them out. However, with sophisticated use of cryptocurrencies, these platforms are about to enter a period of rapid expansion …

Read Story

Why Internet Voting is Still Rare

With security becoming increasingly important in the digital realm, nations are starting to ask (again) if internet voting can be implemented successfully. But finding an answer first hasn't stopped some. First Published 27th May 2019 | Latest Refresh 3rd May 2022 Exercise your discre …

Read Story

Yesterday’s Security Challenges Haven’t Gone Anywhere

Cyber threats are always evolving, and so we’re forced to rethink our security strategies. Whether it’s new malware or an old threat that resurfaces, history shows us we need to stay vigilant to make sure our defences are up to par.

Read Story

A Look at Politically Motivated Hacks Through the Lens of the Donald Daters App

If you’re a hopeless romantic (and who isn’t), then you can probably appreciate the irony of the “No. 1 Place for Patriotic Singles” having some of the weakest security on the internet. First Published 19th October 2018 | Latest Refresh 5th April 2022 Witness the fitness. 4 min read | …

Read Story

A Case-Study on the Quality of Infosec Reporting

There are few things that infosec professionals hate more than having their work misrepresented, misunderstood, or sensationalised to the point that it loses all semblance of truth. First Published 18th January 2019 | Latest Refresh 23rd February 2022 Fair and balanced? 5 min read | R …

Read Story

Log4j and the Open-Source Rebellion

Many organisations have an over-reliance on open-sourced projects. What makes this interesting is that many of them are unaware of it. However, they are now starting to find out (the hard way). First Published 14th February 2022 "Let's break the internet!" 4 min read | Reflare Researc …

Read Story

Thinking of Cybersecurity in Relative Terms

There is an enormous disconnect between industry experts, reporters and users when discussing cybersecurity incidents and risks. This leaves a chasm of misunderstanding regarding the severity and scope of what is possible. First Published 9th October 2019 | Latest Refresh 8th February …

Read Story

Human Nature and Strong Adversary Fiction

Human Nature and Strong Adversary Fiction

“The bad guys entered through an old blog post from 2012 and hit us hard. It was a State Actor, and our network is now under the control of Chinese Hackers who are wiping us out.” Yeah... okaay. First Published 23rd October 2019 | Latest Refresh 3rd February 2022 Those who are breache …

Read Story

The Eyebrow-Raising Breaches of 2021

Did 2021 feel a bit busier for cybersecurity professionals? Yeah... it did, because it was. Early numbers show that it may have been the biggest year for security breaches yet. However, some were more 'special' than others. First Published 4th January 2022 | Latest Refresh 25th Januar …

Read Story

The Logic Behind Suing Hackers

The Logic Behind Suing Hackers

Microsoft successfully sued a network of Russian “Fancy Bear” (APT28) hackers, which has been blamed for many cyber attacks, including the DNC hack in 2016. Wait... is Microsoft actually suing hackers?!? First Published 25th August 2017 | Latest Refresh 23rd January 2022 Microsoft get …

Read Story

Subscribe by email