A Quick Introduction to Symbolic Execution
by Reflare Research Team on Jul 1, 2024 2:24:56 PM
By analysing the behaviour of programs under various hypothetical inputs represented as symbolic values, this technique allows security professionals to systematically uncover and address potential security flaws that might not be evident during conventional testing.
Path Traversal and The Good Old Days
by Reflare Research Team on Jun 3, 2024 2:41:17 PM
Why do old cybersecurity vulnerabilities like path traversal still pose risks to contemporary digital infrastructures? After multiple decades, their enduring presence shows us there is still much we can learn from the past.
The CVE-2024-3094 Saga
by Reflare Research Team on Apr 29, 2024 5:02:43 PM
Open-source software powers the backbone of the internet, driving everything from tiny IoT devices to massive data centres. However, CVE-2024-3094 serves as yet another cautionary tale of trust and treachery. First Published 29th April 2024 Trust me. 5 min read | Reflare Research Team …
Reverse Engineering is Not Hard with LLM Powered Tools
by Reflare Research Team on Apr 9, 2024 7:07:53 AM
With the advent of LLM-powered tools, the intricate task of reverse engineering compiled software is becoming more manageable, allowing newcomers and seasoned professionals to navigate the process more easily. First Published 9th April 2024 The reversing engineer. 4 min read | Reflare …
Is Your CPU Leaking Sensitive Data?
by Reflare Research Team on Jan 2, 2024 1:20:36 PM
In a recent turn of events, Intel and AMD are once again under the cybersecurity spotlight, with critical vulnerabilities found in their CPUs, challenging the notion of hardware-level security in modern computing.
Exploring Data Science and Machine Learning the Cybersecurity Way
by Reflare Research Team on Dec 12, 2023 3:23:16 PM
Focusing on the dynamic interplay between artificial intelligence and cybersecurity, we cast an eye over some of the more valuable projects in the areas of malware detection and software vulnerability analysis.
AI Enabled Cybersecurity Lunges Towards the Future
by Reflare Research Team on Jun 23, 2023 7:35:00 PM
Recent developments in artificial intelligence are now making its practical application more accessible to real-world challenges, including cybersecurity. You now must ask yourself, "Do I know how to use it correctly?"
The Leyman's Guide to Fuzzing
by Reflare Research Team on Dec 1, 2022 7:48:00 PM
Fuzzing can (among other things) be used to expose software bugs, test browser security, and perform static program analysis. However, as the types of fuzzers continue to expand, so do their use cases.
Artificial Intelligence and Malware Detection
by Reflare Research Team on Jan 16, 2022 7:19:00 PM
The term 'artificial intelligence' is no longer a mere buzzword in the antivirus industry. But does it mean it is the holy grail for malware detection or the perfect weapon against malware developers? Not quite.
A Look at the Most Attacked Ports
by Reflare Research Team on May 15, 2021 7:43:00 PM
Although the number of attacks against most ports remains relatively low, it is critical to understand which ones are the most targeted. You should conduct a rigorous audit, evaluate your own exposure, and act accordingly... or else.