News

    Positive Technologies Finds an Average of 31,000 Security Vulnerabilities Are Present in Each Organization

    A new vulnerability management user guide offers results from 2021 vulnerability management scans, and explains what factors influence the criticality of vulnerabilities, why it is necessary to quickly eliminate trending vulnerabilities, details mistakes companies often make in identifying threats, and offers steps for optimizing the process of prioritizing vulnerabilities.

    Positive Technologies Names Top 10 Phishing Topics of 2021

    In a new study, Positive Technologies listed the ten most popular topics used in phishing attacks throughout 2021. According to the company the share of attacks on individuals using social engineering in Q3 2021 increased to 83%, up from 67% in the same quarter of 2020. Although most attack vectors remain current from year to year, attackers are constantly refining their methods and adapting to pandemic conditions. Criminals increasingly exploit the greater public demand for vaccinations, delivery services, online dating, subscriptions to services, and even compensation for fraud victims.

    Protecting All Assets from All Cyber Attacks Is Unrealistic; Focus on Preventing the Unacceptable: Positive Technologies CEO

    Seeking to protect all assets from all cyber threats sounds noble but is essentially unrealistic. Instead, a new approach that specifically focuses on eliminating ‘unacceptable’ risks at every level—companies, industries, even entire countries—is both viable and hugely beneficial. That was the message from Denis Baranov, CEO of Positive Technologies at the World Expo 2020 Dubai "Breakthrough Russian Digital Solutions for Government and Industry" business session, held on January 23.

    Positive Hack Days 2022 to take place on May 18–19

    New Year has arrived, which means that the cyberindustry's most eagerly awaited event is already on the horizon: the Positive Hack Days international practical cybersecurity forum, held annually since 2011. This year's event will take place on May 18–19 at the now traditional venue of the World Trade Center Moscow. For those unable to attend in person, an online broadcast of all talks and presentations will be available.

    Positive Technologies Uncovers Vulnerability in IDEMIA Biometric Identification Devices That Can Unlock Doors and Turnstiles

    The problem concerns IDEMIA biometric readers designed to organize access control, in which privileged commands can be executed via the management protocol. IDEMIA released a Security Bulletin explaining how to mitigate the discovered vulnerability

    Positive Technologies Reports Decrease In Unique Cyberattacks for the First Time in Recent Memory

    Research from cybersecurity specialist finds ransomware attacks are declining, and ransomware operators have started ’rebranding’

    PJSC Positive Group lists on the Moscow Exchange and starts trading its shares

    PJSC Positive Group (hereinafter referred to as Positive Group), a leading Russian developer of cybersecurity solutions, has announced its listing of ordinary shares on the Moscow Exchange and the start of trading in securities.

    Positive Technologies: Cybercriminals Can Penetrate 93% of Local Company Networks, and Trigger 71% of Events Deemed ‘Unacceptable’ For Their Businesses

    Positive Technologies today issued a new research report analyzing results of the company’s penetration testing projects caried out in the second half of 2020 and first half of 2021. In 93% of cases, an external attacker can breach an organization’s network perimeter and gain access to local network resources, and it takes an average of two days to penetrate a company's internal network. In 100% of companies analyzed, an insider can gain full control over the infrastructure.

    Positive Technologies Offers Solutions to Cope with Critical Vulnerability in Popular Log4j library

    Security specialist Positive Technologies today announced that the company’s signature products—the MaxPatrol VM vulnerability management system, the PT Network Attack Discovery system for deep traffic analysis, and the PT Application Firewall—offer a strong line of defense against the critical zero-day vulnerability identified in the popular Apache Log4j log library used by millions of Java-based applications and services, enterprise software, cloud servers, and computer games. The vulnerability has generated extensive coverage, and attackers have been actively scanning networks for vulnerable systems and attacking honey pots since Dec. 10

    Positive Technologies Upgrades Network Attack Discovery Solution To Identify 33 New Types of Suspicious Network Activities

    Positive Technologies today released version 10.2 of its PT Network Attack Discovery (PT NAD) traffic analysis system, which detects attacks on the perimeter and inside corporate networks, makes hidden threats visible, identifies suspicious activity even in encrypted traffic, and helps investigate incidents. Deep analytics modules in PT NAD 10.2 can detect 37 different types of suspicious activities, a ninefold increase over previous versions, all displayed in a single feed to help organizations and end users respond to threats faster.

    • ...
    • ...

    Get in touch

    Fill in the form and our specialists will contact you shortly.

    General questions

    We're happy to answer any questions you may have.

    Partnership

    Join us in making the world a safer place.

    Request a pilot

    Test drive our solutions with a customized pilot program.

    Phone number
    Email
    Country