Research / Infosec Culture

How to Evaluate Your CTF Program

Rolling out an in-house CTF can feel like reinventing the wheel, designing custom challenges is time-intensive, running the platform demands ongoing resources, and unseen organisational biases can skew the learning experience. When budgets tighten, these internal programs, which are e …

Read Story

How Indie Documentaries Are Creating Tomorrow's Cybersecurity Experts (and Cyber Criminals)

Behind every teenager watching hacker documentaries today is a future CISO, or a future cybercriminal. The storytelling matters more than ever.

Read Story

Is Security Talent Born or Made?

Are great security professionals naturally talented, or do they become great through training and experience? This is not just an interesting debate; it shapes how we identify, hire, and develop cybersecurity talent at a time when skilled professionals are hard to find.

Read Story

When the Guards Turn into Vulnerabilities

Imagine investing in security products only to find they’re giving hackers free reign over your network. This latest crisis isn’t just a fluke - it’s part of an alarming trend in security failures that aren’t doing the industry any favours.

Read Story

Understanding Cyber Threat Intelligence - The Good, the Bad, and the Ugly

As cyberattacks evolve into high-stakes showdowns, Cyber Threat Intelligence can emerge as your organisation's most trusted lookout - if you know how to sift through the hype.

Read Story

The Shadow War: Advanced Persistent Threats in Modern Cybersecurity

APTs are the top predators in the digital landscape. Advanced cyber tactics, ranging from basic break-ins to sophisticated and prolonged campaigns, are blurring the lines between annoying disruption and outright warfare. Throwing shade.

Read Story

A History of Government Attempts to Compromise Encryption and Privacy

The dance between maintaining national security and protecting individual privacy has been complex, shaped by the evolving landscape of technology. And it’s not over yet - not by a long shot.

Read Story

Capture The Flag: Honing the Edge in Cybersecurity

One of the most effective – and, let's face it, entertaining – methods of cybersecurity development is participating in Capture The Flag (CTF) competitions.

Read Story

Understanding the Post-Exploitation Jargon and Concepts

Post-exploitation is the art of the 'what next?' for cyber attackers, a critical phase where they leverage access to dig deeper, escalate privileges, and extract valuable data. First Published 29th February 2023 Post exploitation. 4 min read | Reflare Research Team Imagine yourself as …

Read Story

The Benefits of Studying Classic Systems and Exploitation Techniques

In a rapidly evolving technological world where it's easy to be dazzled by the cutting-edge, the wisdom and treasure to be found in the exploitation techniques of yesteryear remains timeless.

Read Story

Subscribe by email