News

    Positive Technologies experts: ransomware operators threaten to disclose stolen data unless the victims pay

    Positive Technologies cybersecurity experts have summarized their findings of the last quarter of 2019 in the report Cybersecurity Threatscape Q4 (insert link). They found that the number of cyber attacks increased by 12 percent in comparison to the previous quarter, and that payment card information comprised almost a third (32 percent) of all data stolen from organizations. The report indicates that the number of targeted attacks increased by two percentage points versus the previous quarter, and now makes up 67 percent of all attacks.

    Positive Technologies says 97% of Company Networks Carry Traces of Compromise

    Positive Technologies experts have analysed network activity of large companies (with over 1000 employees) in the key economic areas of Eastern European countries. Advanced network traffic analysis revealed suspicious activity in 97 percent of companies, and malware activity in 81 percent of companies.

    Positive Technologies: Unfixable vulnerability in Intel chipsets threatens users and content rightsholders

    An error in chipset read-only memory (ROM) could allow attackers to compromise platform encryption keys and steal sensitive information.

    Positive Technologies: 82 Percent of Web Application Vulnerabilities are in the Source Code

    Positive Technologies has released its report Web Application Vulnerabilities and Threats: Statistics for 2019, which found that 9 times out of 10, hackers can attack site visitors. Experts also found that 16 percent of applications contain vulnerabilities that allow attackers to take full control of the system, and on 8 percent of systems, full control of the web application server allowed attacking the local network. With full access to the web server, hackers can also place their own content on the attacked site (deface it) or even attack site visitors - for example, by infecting their computers with malware.

    One out of Every Five Companies Failed to Fix Vulnerability in the Citrix Software, Making the Internal Network Breachable within a Minute

    A month and a half after Positive Technologies released its overview of a critical vulnerability in Citrix software that was endangering 80,000 companies in 158 countries, one out of every five companies have still not taken any action to fix this vulnerability. This is evident from threat intelligence from Positive Technologies.

    Positive Technologies joins Microsoft Active Protections program

    Users of PT Network Attack Discovery (NAD) network traffic analysis system will now be protected from exploitation of zero-day vulnerabilities if discovered in Microsoft products.

    Positive Technologies: Citrix vulnerability allows criminals to hack networks of 80,000 companies

    Over 80,000 companies in 158 countries are at risk. In less than a minute, an external attacker can get inside the companies' internal networks.

    Positive Technologies helps in eliminating vulnerability in PRTG Network Monitor

    Alexander Melkikh, ICS Security expert at Positive Technologies, found a vulnerability in PRTG Network Monitor software developed by Paessler, Germany. The software is used by a number of companies in various industries to control the condition of devices on the network. Currently there are over 16,000 hosts which have this software in the USA, Brazil, Germany, Russia, and other countries, all available on the Internet.

    Positive Technologies assists Siemens with eliminating dangerous vulnerabilities in utility control system

    Siemens SPPA-T3000 is used for controlling and supervising electrical generation at major power plants in the U.S., Germany, Russia, and other countries.

    Positive Technologies: cyberattacks are becoming increasingly targeted in nature

    The experts at Positive Technologies have released their cybersecurity threatscape findings for the third quarter of 2019. The main trends highlighted in the report include an increase in the number of unique cyber incidents, a large amount of activity by APT groups engaged in targeted attacks, and a two-to-one greater incidence of data theft in comparison to direct financial gain as an attack motive.

    • ...
    • ...

    Get in touch

    Fill in the form and our specialists will contact you shortly.

    General questions

    We're happy to answer any questions you may have.

    Partnership

    Join us in making the world a safer place.

    Request a pilot

    Test drive our solutions with a customized pilot program.

    Phone number
    Email
    Country