News






Background

todayMay 27, 2020

  • 3
close

Cyber security + Reflare News Analysis Editor

How a Multi-Stage Cyber-Attack Works

Many sophisticated cyber-attacks have multiple stages. What many regular people don’t realize is that this is often also true for attacks targeting them. In this briefing, we will construct a hypothetical attack scenario. It is explicitly not recounting an actual attack (albeit it is quite likely that someone is executing ...

todayMay 21, 2020

  • 3
close

Global news + Reflare News Analysis Editor

COVID-19 Tracking Apps

Over these last few days, both the news cycle and social media have been extensively covering the various COVID-19 contact tracking apps and APIs that are either being released or being finalized. In this briefing, we will take a look at who the major forces behind these apps are, what ...

woman using laptop while holding a cup of coffee

todayApril 18, 2020

  • 4
close

Cyber security Editor

Cybersecurity & working from home

Remote work As perpetrators are targeting companies that are rushing to set up networks for remote working cyberattacks are an increasingly common and worrisome threat. With more companies gaining an online presence the frequency of data breaches and cyberattacks is increasing and as organisations and companies have their employees working ...

todayMarch 23, 2020

  • 21
close

Cyber security + Reflare News Analysis Editor

Covid-19 and Cyber Attacks

The ongoing Covid-19 pandemic has affected almost all elements of modern life. That includes cybersecurity. In this briefing, we will take a look at some of the shifts and provide guidance on how they may be mitigated. Covid-19 related phishing attacks The key to a successful phishing attack is to ...

todayMarch 20, 2020

  • 1
close

Hackers + Reflare News Analysis Editor

Hard to Verify Claims of Hacking Go Both Ways

This week, the Chinese government made an official demand for an explanation to the US government regarding a number of alleged hacks against Chinese public and private targets, including research institutions, government branches, ISPs, and energy providers among others. In this briefing, we will take a look at what happened ...

todayFebruary 20, 2020

  • 8
close

Cyber security + Cybercrime Editor

The WHO warns against Corona Virus Phishing Attacks

As the corona virus outbreak continues to spread, scammers are using email phishing schemes in an attempt to profit on people’s confusion and fear surrounding the virus. The World Health Organization (WHO) has released a warning about Coronavirus-themed phishing attacks that impersonate the organization with the goal of delivering malware ...

todayFebruary 17, 2020

  • 1
close

Cyber security + News Editor

AI and the future of Cybersecurity

Every day we connect to the internet through various mediums bringing technology and man ever closer, our gadgets becoming an extension of self. Anytime we connect to the internet from our devices whether it be a smartphone, tablet, laptop or smart-TV we increase the risk of a cyber-attack.   With ...

todayFebruary 13, 2020

  • 2
close

News + South Africa Editor

Samsung pay now supports Nedbank Mastercard

Samsung has announced that Nedbank is the latest South African bank to join as a partner for Samsung Pay. Nedbank has now joined the growing network of Samsung partners, allowing the bank’s customers to make use of the service for the first time. Users can now make card payments with ...

todayFebruary 12, 2020

  • 1
close

Cyber security + Security Editor

I’m Afraid You Have “State Actor”

There is an old joke stating that if you’re sick and start searching for symptoms you experience online, you will inevitably find that you “have cancer”. In recent years, a similar phenomenon is starting to occur when organizations try to determine who was behind a breach. The trend According to ...

todayFebruary 12, 2020

close

News + Hackers Editor

The Changing Meaning of “A Hack”

What’s the point? Language is how we convey information. And by defining words to mean specific things, the narrative of stories can be controlled. In all human stories, “good” should win over “evil”. And the only differences between the stories are the definition of those words and their many proxies. ...

todayFebruary 12, 2020

close

Cyber security + Cybercrime + Global news + News + Security + Hackers Editor

YouTube Moves to Prohibit Hacking Videos

Alphabet Inc. owned video streaming platform YouTube updated its content policy to explicitly prohibit the sharing of instructional hacking and phishing videos. In this briefing we will take a look at these changes, the initial impact, and the expected long term implications from such actions. What happened? YouTube made an ...

todayFebruary 12, 2020

close

Cyber security + Cybercrime + Ransomware Editor

Ransomware is Still on the Rise

Ransomware attacks have been a recurring topic of our briefings,mostly because the trend continues to accelerate. Last week saw two high-profile governmental and one high-profile corporate ransomware incident. In this briefing, we will therefore re-visit why ransomware is so popular and what you can do to protect yourself. What happened? ...

todayFebruary 12, 2020

  • 1
close

Cybercrime + Global news + Data Breach + Hackers Editor

NASA Breach Follow Up

Last year’s breach of NASA’s Jet Propulsion Laboratory (JPL) networks led to a thorough audit. The final report of the audit was released to the public this week. While it contains many important details on network separation, incident response and other areas of unpreparedness, in this briefing we will focus ...

todayFebruary 12, 2020

close

Global news + Law + Security + Data Editor

Why Internet Voting is Still Rare

Late May of 2019 saw elections held across the European Union. One key point that has received significant media coverage was the relatively high voter turnout of over 50% of the population. While this turnout is historically high, it still means that about half of the people either chose to ...

todayFebruary 12, 2020

  • 2
close

Cyber security + Cybercrime + Global news + Hackers Editor

When Utilities Become Cyber Attack Casualties

Cyber attacks against individuals, governments, industrial targets and regular companies each come with their own set of risks, challenges and impacts. However one particular type of cyber attack target can cause widespread damage while usually being relatively weakly secured: Utility providers. In this briefing, we will discuss why utilities are ...


STAY UP TO DATE

NEWSLETTER SUBSCRIPTION

Receive weekly news updates on Cybersecurity.