Research / Anatomy of a Breach (6)

A New Approach to Cyber Ransoms

A New Approach to Cyber Ransoms

With Ransomware, critical data is encrypted and then used to extort payment from the owners of said data. However, are organisations like Apple more likely to eat the cost than give in due to their strong security culture? First Published 30th March 2017 At what cost will Apple protec …

Read Story

A Rare Glimpse Into the Mechanics of a Major Breach

It’s almost inconceivable that Yahoo! suffered a breach of over 500 million user accounts, and it wasn’t even detected by Yahoo’s management team until years later. Yet here we are. First Published 2nd March 2017 "Database backups have been leaked"... yeah, um, that should be fine, ri …

Read Story

Attacks on San Francisco Muni and Deutsche Telekom

Attacks on San Francisco Muni and Deutsche Telekom

The Mirai botnet has been directly linked with a number of massive DDoS attacks, and it can now add Germany’s largest telecom company Deutsche Telekom to its list. First Published 30th November 2016 "Guten tag! Hallo... Hallo?" 3 min read | Reflare Research Team This week saw two high …

Read Story

Tesco Bank Attack

The financial strain from large-scale cyber attacks can be huge, which is why banks are investing heavily in cyber security. The UK financial institution Tesco Bank was hit by a large coordinated cyber attack just days after one of its main rivals, Barclays experienced a similar attac …

Read Story

Apple vs. FBI, and Vulnerability in Linux

Apple vs. FBI, and Vulnerability in Linux

There was a massive flaw in almost all Linux servers, as well as many of the most visited sites on the internet, for almost a decade. The main problem (until now) is that it was easily exploitable everywhere. First Published 24th February 2016 An Apple a day... 3 min read | Reflare Re …

Read Story

Subscribe by email