News

    First results from The Standoff: red teams hacked the airport, the municipal system for fines and damages, and the petrochemical plant

    The first two days of the event also included over 30 presentations given by information security experts, which were viewed by over 13,000 participants around the globe.

    The Standoff: Black-hat hackers combat!

    The Standoff cyber-range has experienced a DDoS attack.

    New talks at The Standoff: the art of the breach, protection from ransomware, and automation of honeypot

    We continue to introduce you to the upcoming talks at The Standoff online conference. How do hackers break into IT systems step by step? Is it possible to recover data after a ransomware attack? Why should we automate honeypot? These questions will be answered by the speakers we are announcing today.

    More topics to be discussed at The Standoff: ICS security, approaches to disclosure of dangerous vulnerabilities and evasion attacks against computer vision

    We continue to introduce you to the program of the online conference, which will be held as part of The Standoff. Please find announcements of other talks on the Positive Technologies website (first and second announcements), and here are five more interesting topics.

    Positive Technologies expert has discovered a vulnerability in McAfee ePO security management system

    The vulnerability allowed attackers to perform actions on behalf of system administrators, such as disabling protection and developing an attack on a network

    New talks at The Standoff: adversarial machine learning, 5G vulnerabilities, and COVID-19 effects on security

    We are approaching The Standoff, a global information security event. We already presented the first group of speakers who will give their talks at our online conference.

    Positive Technologies: 84 percent of companies have high-risk vulnerabilities on the network perimeter

    Positive Technologies performed instrumental scanning of the network perimeter of selected corporate information systems. A total of 3,514 hosts were scanned, including network devices, servers, and workstations. The results show the presence of high-risk vulnerabilities at most companies. However, half of these vulnerabilities can be eliminated by installing the latest software updates.

    Vulnerability fixed in Rapid7 Nexpose security scanner after discovery by Positive Technologies expert

    Positive Technologies expert Mikhail Klyuchnikov has identified a vulnerability in Rapid7's Nexpose tool which attackers can exploit to escalate low system privileges to obtain unauthorized access to resources and data. The vulnerability is present in Security Console versions 6.6.48 and earlier versions of the product.

    Positive Technologies helps fix 11 vulnerabilities in popular SonicWall firewall appliances

    Potential threats included disconnection of remote employees or branches and possible attacker penetration into corporate networks

    PT Industrial Security Incident Manager detects attempts at data exfiltration and connection tunneling

    A new expertise pack for PT Industrial Security Incident Manager (PT ISIM), the hardware and software suite for deep ICS traffic analysis, allows security engineers to detect attacks that employ hidden tunneling and exfiltration of data from ICS networks.

    • ...
    • ...

    Get in touch

    Fill in the form and our specialists will contact you shortly.

    General questions

    We're happy to answer any questions you may have.

    Partnership

    Join us in making the world a safer place.

    Request a pilot

    Test drive our solutions with a customized pilot program.

    Phone number
    Email
    Country