Understanding the Post-Exploitation Jargon and Concepts
by Reflare Research Team on Feb 29, 2024 11:43:52 AM
Post-exploitation is the art of the 'what next?' for cyber attackers, a critical phase where they leverage access to dig deeper, escalate privileges, and extract valuable data. First Published 29th February 2023 Post exploitation. 4 min read | Reflare Research Team Imagine yourself as …
The Benefits of Studying Classic Systems and Exploitation Techniques
by Reflare Research Team on Nov 3, 2023 8:08:00 PM
In a rapidly evolving technological world where it's easy to be dazzled by the cutting-edge, the wisdom and treasure to be found in the exploitation techniques of yesteryear remains timeless.
Hacking Large Language Models
by Reflare Research Team on Sep 2, 2023 8:04:00 PM
Top AI companies have challenged hackers to trick chatbots into producing inappropriate or inaccurate answers. We explore the inner workings of Large Language Models (LLMs), the innovative techniques to exploit them, and the critical safeguards necessary to ensure their secure and eth …
It's Time for Corporate Leaders to Prioritise Cybersecurity Over Comfort and Convenience
by Reflare Research Team on Aug 1, 2023 8:02:00 PM
A recent breach in Nagoya has revealed (again) the illusion that maintaining outdated software is more cost-effective than upgrading to secure systems, particularly in organisations predominantly run by leaders who are comfortable with older technologies.
How to Set Meaningful Cyber Security Development Goals
by Reflare Research Team on Jun 27, 2023 6:59:00 PM
Having an acute understanding of not just the 'what', but the 'why' your staff members require specific capability development is critical for deploying training that gives the business what it really needs.
AirTags - The Good, The Bad, and the Future of Tracking Devices
by Reflare Research Team on May 2, 2023 7:57:00 PM
As AirTags gain popularity, this seemingly convenient technology also has plenty of growing concerns surrounding privacy and security. Players in the tracking device market must stay two steps ahead to successfully manage the fallout of product misuse.
Strengthening Cyber Resilience
by Reflare Research Team on Apr 23, 2023 7:29:00 PM
Recent geopolitical events have put IT security departments across the globe on high alert. However, when interacting with colleagues from other departments, does anyone even know what we're talking about?
Let's Talk GPT-4 and the Future of Cybersecurity
by Reflare Research Team on Apr 5, 2023 7:55:00 PM
The cybersecurity landscape must adapt to both the opportunities and challenges that AI advancements like GPT-4 bring. We delve into the Italy-ChatGPT situation, experts' concerns, and the potential implications of LLMs in the realm of cybersecurity.
Lapsus$, MFA Bombing, and Human Behaviour
by Reflare Research Team on Apr 5, 2023 7:45:00 PM
As cybersecurity departments bucket money into solutions that improve network security, highly exploitable staff keep letting attackers in. Malicious actors know your users are your weakest link, and if you think their trickery is becoming sophisticated, you ain't seen nothing yet.
Making a Business Case for Information Security Training
by Reflare Research Team on Mar 17, 2023 6:49:00 PM
While information security training is an absolute necessity for any modern organisation, it can be surprisingly difficult to convince decision-makers to allocate funding, let alone perform a successful rollout.