Research / Infosec Culture

The Shadow War: Advanced Persistent Threats in Modern Cybersecurity

APTs are the top predators in the digital landscape. Advanced cyber tactics, ranging from basic break-ins to sophisticated and prolonged campaigns, are blurring the lines between annoying disruption and outright warfare. Throwing shade.

Read Story

A History of Government Attempts to Compromise Encryption and Privacy

The dance between maintaining national security and protecting individual privacy has been complex, shaped by the evolving landscape of technology. And it’s not over yet - not by a long shot.

Read Story

Capture The Flag: Honing the Edge in Cybersecurity

One of the most effective – and, let's face it, entertaining – methods of cybersecurity development is participating in Capture The Flag (CTF) competitions.

Read Story

Understanding the Post-Exploitation Jargon and Concepts

Post-exploitation is the art of the 'what next?' for cyber attackers, a critical phase where they leverage access to dig deeper, escalate privileges, and extract valuable data. First Published 29th February 2023 Post exploitation. 4 min read | Reflare Research Team Imagine yourself as …

Read Story

The Benefits of Studying Classic Systems and Exploitation Techniques

In a rapidly evolving technological world where it's easy to be dazzled by the cutting-edge, the wisdom and treasure to be found in the exploitation techniques of yesteryear remains timeless.

Read Story

Hacking Large Language Models

Hacking Large Language Models

Top AI companies have challenged hackers to trick chatbots into producing inappropriate or inaccurate answers. We explore the inner workings of Large Language Models (LLMs), the innovative techniques to exploit them, and the critical safeguards necessary to ensure their secure and eth …

Read Story

It's Time for Corporate Leaders to Prioritise Cybersecurity Over Comfort and Convenience

A recent breach in Nagoya has revealed (again) the illusion that maintaining outdated software is more cost-effective than upgrading to secure systems, particularly in organisations predominantly run by leaders who are comfortable with older technologies.

Read Story

How to Set Meaningful Cyber Security Development Goals

Having an acute understanding of not just the 'what', but the 'why' your staff members require specific capability development is critical for deploying training that gives the business what it really needs.

Read Story

AirTags - The Good, The Bad, and the Future of Tracking Devices

As AirTags gain popularity, this seemingly convenient technology also has plenty of growing concerns surrounding privacy and security. Players in the tracking device market must stay two steps ahead to successfully manage the fallout of product misuse.

Read Story

Strengthening Cyber Resilience

Recent geopolitical events have put IT security departments across the globe on high alert. However, when interacting with colleagues from other departments, does anyone even know what we're talking about?

Read Story

Subscribe by email