Research / Infosec Culture (7)

Checking Boxes vs. Proactive Security

Checking Boxes vs. Proactive Security

While it is true that new vulnerabilities receive the most media attention, these issues are quite rare compared to well-known vulnerabilities. So, are our leaders focused on the security risks that actually matter? First Published 27th October 2017 Hey everybody - we are now 100% sec …

Read Story

North Korea and the Asymmetric Power of Hacking

North Korea and the Asymmetric Power of Hacking

Pyongyang is believed to have stolen 235 gigabytes of confidential information from South Korea's military network, which purports to include information about the plan for retaking North Korea in the case of unification. First Published 13th October 2017 Truman left many things in So …

Read Story

More Testimony and Still No Details in Russian US Election Hacking Allegations

More Testimony and Still No Details in Russian US Election Hacking Allegations

Mr. Liles did not attribute the attack to any specific country, but told the Senate Intelligence Committee during his testimony that there are only a select few who had the capability to carry out this kind of attack. The media then filled in the gaps. First Published 23rd June 2017 S …

Read Story

North Korea & Why Small States Have Big Cyber Capabilities

North Korea & Why Small States Have Big Cyber Capabilities

Pyongyang’s cyber playbook includes denial of service attacks, infiltrating systems and extracting data, DDOS attacks against websites and potentially destructive computer worm capabilities. First Published 16th June 2017 "We might be hungry, but we'll see you at Black Hat." 4 min rea …

Read Story

Qatar Hack Follow-up

Qatar’s earlier claim of a ‘false news story’ has been walked back following an investigation by their own authorities and the results released through their official news agency. First Published 9th June 2017 All eyes are on the Qataris. 4 min read | Reflare Research Team As we discu …

Read Story

Qatar, Hacking and the Never Ending Trouble with Proof

Qatar, Hacking and the Never Ending Trouble with Proof

The QNA website was soon restored with a message saying that the site had suffered from unauthorised access by 'state-backed elements' who had published a fake story. First Published 26th May 2017 Doha changes its story, literally. 4 min read | Reflare Research Team Between May 23rd a …

Read Story

Bail Hearing in Yahoo! Hacking Case

Bail Hearing in Yahoo! Hacking Case

Karim Baratov is accused of using his role as a "criminal hacker-for-hire" and conspiring to harvest users' personal data from Yahoo's network using no less than five different methods. First Published 6th April 2017 "Bail? Yaaaa Hooooooo!!!" 4 min read | Reflare Research Team As we r …

Read Story

US Indictment of 4 Alleged Russian Cyber Attackers

US Indictment of 4 Alleged Russian Cyber Attackers

The US Department of Justice unsealed a grand jury indictment against four men, including two officers of Russia’s Federal Security Service for engaging in cyber attacks on behalf of Russian intelligence. First Published 16th March 2017 A 'Perry Mason moment' it was not. 4 min read | …

Read Story

A Look at the Vault 7 Leaks

 A Look at the Vault 7 Leaks

Wikileaks released a set of documents, which are allegedly a part of the CIA arsenal. The release was named Vault 7, a compilation of secret-classed files from the CIA’s Center for Cyber Intelligence. First Published 9th March 2017 The holiday residence of Mr. J Assange - professional …

Read Story

Further Anomalies in Russian Cybersecurity

The original allegations that Russia had hacked Ukraine and its electrical grid haven't been borne out, but they did spur more instances of alleged Russian cyber attacks. The most recent cases involve the Czech government and experts in the cyber security field. First Published 2nd Fe …

Read Story

Subscribe by email