Research / Anatomy of a Breach (5)

Cyber-Attacks hit German Governmental Network

Cyber-Attacks hit German Governmental Network

German officials have confirmed a major security breach at a government network, but they are not revealing any additional information or the nature of the attack, even though different media agencies are reporting wildly different versions of what happened. First Published 2nd March …

Read Story

Attackers are Humans Too - On Stealing $24

What do you do when you successfully attack a service designed to help the vision impaired interact with over 5,000 websites? Mine $24 worth of Monero, of course (duh!) First Published 16th February 2018 "Now that I've finally managed to break in, I'll just take this." 4 min read | Re …

Read Story

NiceHash Hack

NiceHash, a Slovenian company that allows users to mine virtual currencies for themselves or for others suffered a hack which led to tens of millions of dollars worth of Bitcoin being stolen. First Published 8th December 2017 While demand continues to grow, crypto platforms are strugg …

Read Story

Malaysian Data Breach

Malaysian Data Breach

With a current population of roughly 32 million people, this means that the private data of virtually every Malaysian citizen has been compromised - an alarming amount of personal information now vulnerable to identity fraud. First Published 2nd November 2017 Everything you ever wante …

Read Story

Deloitte Breach

The hacking attack on Deloitte is the latest in a disturbing trend of hacking attacks against large organisations whose email services use Microsoft’s Office 365 system. First Published 29th September 2017 Maybe they could bring in some consultants? 4 min read | Reflare Research Team …

Read Story

Equifax and Apache Struts

Equifax and Apache Struts

The vulnerability allows anyone who knows it exists to remotely execute arbitrary commands on servers using default installations of Apache Struts and Java, leaving sensitive data exposed without authentication. First Published 15th September 2017 | Latest Refresh 27th September 2017 …

Read Story

SEC Breach

“The EDGAR system was taken offline while the intrusion was being investigated and immediate steps were taken to enhance cybersecurity monitoring,” the agency said... a year later. First Published 22nd September 2017 The Insecurities and Exchange Commission. 3 min read | Reflare Resea …

Read Story

Pacemakers Recalled Over Hacking Concerns

Pacemakers Recalled Over Hacking Concerns

We have traditionally been good at patching software when vulnerabilities are discovered – but this becomes harder for embedded devices such as pacemakers because they cannot be independently updated. First Published 1st September 2017 At some point in every person's life, an assisted …

Read Story

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

Critical Vulnerability in Apache Struts Affects Thousands of Enterprise Applications

A critical vulnerability was discovered in a popular framework called Struts, a software library used to create Java applications. This vulnerability affects over 40 thousand applications currently in use by Fortune 500 companies, medium-sized enterprises and small startups. First Pub …

Read Story

More HBO Hacks

More HBO Hacks

Following the HBO cybersecurity breach, it has come to our attention that several Twitter accounts belonging to the media company including Game of Thrones, Last Week Tonight and Westworld have also been compromised. First Published 18th August 2017 Curb your enthusiasm. 4 min read | …

Read Story

Subscribe by email