Research / Anatomy of a Breach (2)

Hackable Medical Implants and Somebody Else's Fault

Hackable Medical Implants and Somebody Else's Fault

Those of you into (anti)lifehacking might have already heard about the exploitable risks with implantable cardiac devices. This is no longer a "once in a blue moon" kind of attack, but something that the medical implant industry really needs to get on top of. First Published 10th Augu …

Read Story

The Weakness of Academic Cybersecurity

A penetration test conducted for a UK government agency came out with one simple conclusion - 100% of UK universities and academic institutions have shockingly weak cyber security. Just ask the University of Sunderland. First Published 8th April 2019 | Latest Refresh 18th August 2022 …

Read Story

Log4j and the Open-Source Rebellion

Many organisations have an over-reliance on open-sourced projects. What makes this interesting is that many of them are unaware of it. However, they are now starting to find out (the hard way). First Published 14th February 2022 "Let's break the internet!" 4 min read | Reflare Researc …

Read Story

The Eyebrow-Raising Breaches of 2021

Did 2021 feel a bit busier for cybersecurity professionals? Yeah... it did, because it was. Early numbers show that it may have been the biggest year for security breaches yet. However, some were more 'special' than others. First Published 4th January 2022 | Latest Refresh 25th Januar …

Read Story

Crypto Currency Breaches, Continued

Some time ago, CoinDash, an Israeli cryptocurrency startup, was using their ICO to raise $10 million. Just hours after it started, an unknown attacker compromised the website and took $7 million of it. Then, many were shocked this could happen. Today, crypto hacks are commonplace. Fir …

Read Story

The Trouble with Crowd Sourced Data

The Trouble with Crowd Sourced Data

A Mapbox GL JS v2.0.2 user maliciously renamed New York City. Within seconds of the attack, eBay, Snapchat, Foursquare, CitiBike and Zillow automatically fell in line, and NYC was gone. First Published 31st August 2018 The wisdom (and stupidity) of crowds. Baaaahstards! 4 min read | R …

Read Story

3rd Party Vendors Add Hard to Calculate Information Security Risks

The Solarwinds breach is a classic case that shows how hard it can be to evaluate information security risks. There are many external and internal factors that can come into play. What you don’t see might hurt you the most. First Published 12th February 2021 "And the award for the Mos …

Read Story

How a Multi-Stage Cyber-Attack Works

Multi-stage, or hit-and-run attacks, are a common way that cyber criminals approach their victims. And, increasingly, complex organisations are the targets. First Published 26th May 2020 Well-designed attacks come in waves. 4 min read | Reflare Research Team Many sophisticated cyber-a …

Read Story

The SBA Breach - Why Breaches Increase During Crisis

The EIDL system had been breached for approximately five and a half hours. During this time, hackers gained access to sensitive business-related information. First Published 28th April 2020 Covid is a convenient distraction that attackers are taking advantage of. 4 min read | Reflare …

Read Story

The Unsolvable Problem of Insider Threats

The Unsolvable Problem of Insider Threats

This is a rare occurrence for a Chief Intelligence Officer to be arrested on such serious criminal charges, and frankly, it would have been almost unthinkable just a few years ago. First Published 25th September 2019 "Pssst. Do you have a pen? It's admin, admin." 4 min read | Reflare …

Read Story

Subscribe by email