Research / Anatomy of a Breach (5)

Malaysian Data Breach

Malaysian Data Breach

With a current population of roughly 32 million people, this means that the private data of virtually every Malaysian citizen has been compromised - an alarming amount of personal information now vulnerable to identity fraud. First Published 2nd November 2017 Everything you ever wante …

Read Story

Deloitte Breach

The hacking attack on Deloitte is the latest in a disturbing trend of hacking attacks against large organisations whose email services use Microsoft’s Office 365 system. First Published 29th September 2017 Maybe they could bring in some consultants? 4 min read | Reflare Research Team …

Read Story

Equifax and Apache Struts

Equifax and Apache Struts

The vulnerability allows anyone who knows it exists to remotely execute arbitrary commands on servers using default installations of Apache Struts and Java, leaving sensitive data exposed without authentication. First Published 15th September 2017 | Latest Refresh 27th September 2017 …

Read Story

SEC Breach

“The EDGAR system was taken offline while the intrusion was being investigated and immediate steps were taken to enhance cybersecurity monitoring,” the agency said... a year later. First Published 22nd September 2017 The Insecurities and Exchange Commission. 3 min read | Reflare Resea …

Read Story

Pacemakers Recalled Over Hacking Concerns

Pacemakers Recalled Over Hacking Concerns

We have traditionally been good at patching software when vulnerabilities are discovered – but this becomes harder for embedded devices such as pacemakers because they cannot be independently updated. First Published 1st September 2017 At some point in every person's life, an assisted …

Read Story

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

A critical vulnerability was discovered in a popular framework called Struts, a software library used to create Java applications. This vulnerability affects over 40 thousand applications currently in use by Fortune 500 companies, medium-sized enterprises and small startups. First Pub …

Read Story

More HBO Hacks

More HBO Hacks

Following the HBO cybersecurity breach, it has come to our attention that several Twitter accounts belonging to the media company including Game of Thrones, Last Week Tonight and Westworld have also been compromised. First Published 18th August 2017 Curb your enthusiasm. 4 min read | …

Read Story

HBO Hack and Leaks

HBO Hack and Leaks

The hackers claim to have stolen HBO's entire email database, including emails of its employees, contractors, and Game Of Thrones filming crew. The hackers also claim to have stolen 1.5 terabytes worth of data; which includes both video content and employees' documents. First Publishe …

Read Story

Third Party Breach Leaks Records from Italy's Largest Bank

The two-part data breach was reported to authorities by UniCredit after forensic accounting uncovered signs of fraud in some of their own subsidiaries, affecting roughly 400,000 customers. First Published 28th July 2017 Italians do 'IT' better? 4 min read | Reflare Research Team UniCr …

Read Story

Verizon Breach and the Importance of Security Coverage

The Verizon breach, or the NICE breach as it’s come to be known, may seem at first like just another example of a compromised data storage system on the internet, and it is that. However, it has also led to some scrambling on the part of Verizon to clean up the mess, mitigate any impa …

Read Story

Subscribe by email