News

Stay up-to-date with the latest news and events in the cybersecurity industry. Here, you'll find a wide range of articles, updates, and event listings covering topics such as data breaches, emerging threats, and new security technologies.

Not child's play: 69 percent of malware with sandbox evasion capabilities used for cyberespionage

Threat actors combine sandbox evasion and anti-analysis methods in malware distribution

Positive Technologies: high demand for hackers observed in 90 percent of ads related to hacking sites

Positive Technologies’ experts have analyzed the ten most active forums on the dark web, which offer services for hacking websites, buying and selling databases, and accessing web resources . The research found that in the vast majority of cases on these forums, most individuals are looking for a hacker, and in 7 out of 10 ads, their main goal is to gain access to a web resource.

Fortinet fixes vulnerabilities discovered by Positive Technologies

Remote code execution and interception of administrator accounts were among the threats found

Positive Technologies helps eliminate DoS vulnerability in F5 BIG-IP application delivery controller

F5 has fixed a vulnerability in the configuration interface of the popular BIG-IP application delivery controller. The bug, discovered by Positive Technologies expert Nikita Abramov, affected a product that is used by some of the world's leading companies, and would allow remote hackers to cause denial of service attacks to the controller.

Security failures in new technologies and educational shortcomings in information security: results from the Standoff IT Security Scholarship Program

The writers of the best essays on information security were awarded USD 1,000

Six out of ten infosec pros prefer network visibility over traffic encryption

Positive Technologies surveyed information security specialists on the topic of corporate network visibility. Results show that companies have poor visibility into external and internal traffic on their networks. When asked to choose between encryption and visibility into their internal network, 64 percent of respondents opt for visibility.

Positive Technologies products discover use of FireEye pentesting tools stolen by hackers

The PT Network Attack Discovery system for deep traffic analysis, PT Sandbox, MaxPatrol 8 compliance and vulnerability management system, MaxPatrol SIEM incident detection system, and PT Industrial Security Incident Manager system for ICS traffic analysis detect the activity of tools used by FireEye specialists to perform pentests for their clients. The tools fell into the hands of attackers during a recent hacker attack.

Positive Technologies: cybercriminals pivoting from social engineering to hacking with interest in COVID-19 vaccine increasing

Positive Technologies’ experts have released a report which gives an overview of the cyber threat landscape during Q3 2020. Ransomware attacks have grown, with hacking now accounting for 30 percent of all attacks, and the healthcare industry is increasingly targeted by criminals. In particular, attackers have begun exploiting worldwide interest in a COVID-19 vaccine.

Positive Technologies: vulnerabilities in Ingenico POS terminals allowed hackers to intercept PIN code and data needed to clone the magnetic strip of a bank card

Ingenico has released fixes and recommends installing them as soon as possible

Fix issued for Verifone POS terminals after Positive Technologies discovers eight dangerous vulnerabilities

Threats include interception of card PINs and charging of attacker-chosen amounts

  • ...
  • ...

Thinking about the best way to protect your company?

Contact us.

During the consultation we'll propose a solution precisely tailored to your organization.

 

General questions

We're happy to answer any questions you may have.

Partnership

Join us in making the world a safer place.

Request a pilot

Test drive our solutions with a customized pilot program.

Email
Country