Research / Infosec Culture (7)

Qatar Hack Follow-up

Qatar’s earlier claim of a ‘false news story’ has been walked back following an investigation by their own authorities and the results released through their official news agency. First Published 9th June 2017 All eyes are on the Qataris. 4 min read | Reflare Research Team As we discu …

Read Story

Qatar, Hacking and the Never Ending Trouble with Proof

Qatar, Hacking and the Never Ending Trouble with Proof

The QNA website was soon restored with a message saying that the site had suffered from unauthorised access by 'state-backed elements' who had published a fake story. First Published 26th May 2017 Doha changes its story, literally. 4 min read | Reflare Research Team Between May 23rd a …

Read Story

Bail Hearing in Yahoo! Hacking Case

Bail Hearing in Yahoo! Hacking Case

Karim Baratov is accused of using his role as a "criminal hacker-for-hire" and conspiring to harvest users' personal data from Yahoo's network using no less than five different methods. First Published 6th April 2017 "Bail? Yaaaa Hooooooo!!!" 4 min read | Reflare Research Team As we r …

Read Story

US Indictment of 4 Alleged Russian Cyber Attackers

US Indictment of 4 Alleged Russian Cyber Attackers

The US Department of Justice unsealed a grand jury indictment against four men, including two officers of Russia’s Federal Security Service for engaging in cyber attacks on behalf of Russian intelligence. First Published 16th March 2017 A 'Perry Mason moment' it was not. 4 min read | …

Read Story

A Look at the Vault 7 Leaks

 A Look at the Vault 7 Leaks

Wikileaks released a set of documents, which are allegedly a part of the CIA arsenal. The release was named Vault 7, a compilation of secret-classed files from the CIA’s Center for Cyber Intelligence. First Published 9th March 2017 The holiday residence of Mr. J Assange - professional …

Read Story

Further Anomalies in Russian Cybersecurity

The original allegations that Russia had hacked Ukraine and its electrical grid haven't been borne out, but they did spur more instances of alleged Russian cyber attacks. The most recent cases involve the Czech government and experts in the cyber security field. First Published 2nd Fe …

Read Story

Suspected North Korean Involvement in South Korea Hacks

Suspected North Korean Involvement in South Korea Hacks

The recent cyber attacks in South Korea have some of the ‘North Korea fingerprints’ on them. A look at the chronology of North Korean cyber retaliation over the past years shows a history of targeting South Korean critical infrastructure, not just the government. First Published 7th D …

Read Story

US Election Hacking Allegations

Several news outlets reported earlier this week that a “team of prominent computer scientists” had uncovered “persuasive evidence” that the recent US federal election had been hacked. Hmmm. First Published 24th November 2016 Be cautious of those who use 'cybersecurity hearsay' to chal …

Read Story

Three Kinds of Governmental Hacking

For one, private email accounts provide global government agencies with a means to conduct surveillance without leaving behind an official paper trail. Ask Hillary. First Published 12th October 2016 Rage against the machine, three ways. 4 min read | Reflare Research Team In this brief …

Read Story

Medical Devices and Security Issues

Medical Devices and Security Issues

Medical devices have a unique straddle over both the physical and digital world. However, they are often susceptible to cyber attacks as they allow wireless communication between electronic devices. First Published 5th October 2016 There are risks with body parts that have a mind of t …

Read Story

Subscribe by email