News

Stay up-to-date with the latest news and events in the cybersecurity industry. Here, you'll find a wide range of articles, updates, and event listings covering topics such as data breaches, emerging threats, and new security technologies.

Positive Technologies: malware and infractions of cybersecurity regulations were detected at each industrial company and government institution

Positive Technologies experts have analyzed the results of network activity monitoring at 41 companies where PT Network Attack Discovery (PT NAD) was deployed as pilot project . The experts detected suspicious network activity at most companies. Malware was identified at each industrial company and government institution.

IBM fixes vulnerability in QRadar SIEM discovered by Positive Technologies

The Server-Side Request Forgery (SSRF) vulnerability identified in IBM QRadar SIEM by Positive Technologies expert Mikhail Klyuchnikov has an average severity level (CVSS 5.4). The IBM QRadar SIEM event monitoring and correlation system is one of the world's leading SIEM systems.

Positive Technologies researcher discovers and patches Linux kernel vulnerabilities

Now-fixed vulnerabilities enabled local privilege escalation

VMware fixes dangerous vulnerabilities that threaten many large companies

The RCE vulnerability allows attackers to execute arbitrary commands on the server, compromising the vCenter Server, and gain access to sensitive data

VMware fixes vulnerability discovered by Positive Technologies

A vulnerability in the data replication tool allowed remote command execution on the server

Not child's play: 69 percent of malware with sandbox evasion capabilities used for cyberespionage

Threat actors combine sandbox evasion and anti-analysis methods in malware distribution

Positive Technologies: high demand for hackers observed in 90 percent of ads related to hacking sites

Positive Technologies’ experts have analyzed the ten most active forums on the dark web, which offer services for hacking websites, buying and selling databases, and accessing web resources . The research found that in the vast majority of cases on these forums, most individuals are looking for a hacker, and in 7 out of 10 ads, their main goal is to gain access to a web resource.

Fortinet fixes vulnerabilities discovered by Positive Technologies

Remote code execution and interception of administrator accounts were among the threats found

Positive Technologies helps eliminate DoS vulnerability in F5 BIG-IP application delivery controller

F5 has fixed a vulnerability in the configuration interface of the popular BIG-IP application delivery controller. The bug, discovered by Positive Technologies expert Nikita Abramov, affected a product that is used by some of the world's leading companies, and would allow remote hackers to cause denial of service attacks to the controller.

Security failures in new technologies and educational shortcomings in information security: results from the Standoff IT Security Scholarship Program

The writers of the best essays on information security were awarded USD 1,000

  • ...
  • ...

Thinking about the best way to protect your company?

Contact us.

During the consultation we'll propose a solution precisely tailored to your organization.

 

General questions

We're happy to answer any questions you may have.

Partnership

Join us in making the world a safer place.

Request a pilot

Test drive our solutions with a customized pilot program.

Email
Country