Thinking about the best way to protect your company?
Contact us.
During the consultation we'll propose a solution precisely tailored to your organization.
Stay up-to-date with the latest news and events in the cybersecurity industry. Here, you'll find a wide range of articles, updates, and event listings covering topics such as data breaches, emerging threats, and new security technologies.
TgRAT can take screenshots, upload files to a target host, and download data from the host to the C2 server
TgRAT, a malware that uses private chats in the Telegram messaging app, was discovered during an investigation by PT Expert Security Center (PT ESC)–Positive Technologies' incident response team.
Major hacks of darkweb forums provoke a mass shift of attackers to messengers
Positive Technologies analyzed cybercrime posts in Telegram channels and chats. Most of the messages were shown to be related to user data compromise, including buying and selling data. A record number of hacker posts was registered in Q2.
Positive Technologies analyzed the largest and most active bug bounty platforms across the globe. The highest demand for services of bug bounty platforms was observed in the following sectors: IT (16%), online services (14%), services (13%), trade (11%), and finance (9%). This global trend largely correlates with the situation in the Russian market. Russian bug bounty programs are mostly used by private businesses serving a large number of customers. Some examples of such businesses are banks, online services, e-commerce players, and IT vendors. Public sector and critical infrastructure organizations could become the main driver of bug bounty initiatives.
On November 22–24, 2022, white-hat hackers and infosec experts will convene once again at the Standoff open cyberbattle. For the tenth time, the infrastructure of the virtual State F will come under a barrage of hacker attacks, while infosec experts will uncover flaws in the infrastructure and figure out how hackers might break in. The event will be streamed live online at standoff365.com.
Positive Technologies expert Nikita Abramov found a vulnerability in the ASUSTOR Data Master (ADM) operating system for managing network-attached storage (NAS) devices. It allowed an intruder to remotely execute arbitrary code in the operating system of NAS devices.
Positive Technologies has analyzed the cyberthreats of Q2 2022: ransomware activity increased by 65% against the previous quarter, attacks on industry were up 53%, while the number of attacks on transport almost doubled. Cryptocurrencies and crypto investments also attracted more interest from cybercriminals.
Contact us.
During the consultation we'll propose a solution precisely tailored to your organization.