News

Stay up-to-date with the latest news and events in the cybersecurity industry. Here, you'll find a wide range of articles, updates, and event listings covering topics such as data breaches, emerging threats, and new security technologies.

Positive Technologies expands educational partnerships with Indonesian universities to train cybersecurity professionals

Positive Technologies, a leader in the Russian cybersecurity industry, is continuing to strengthen its educational ties with Indonesia. During the International Economic Forum "Russia–Islamic World: KazanForum," the company signed agreements with five of the republic's leading universities: Universitas Brawijaya (UB), Universitas Pendidikan Indonesia (UPI), Politeknik Manufaktur Bandung, Institut Teknologi dan Sains Mandala (ITSM), and Universitas Darul Ma'arif (UDM). A similar document was signed a day earlier in Moscow with Universitas Padjadjaran (UNPAD). The primary goal of these partnerships is to develop the cybersecurity workforce in Southeast Asia's largest country.
Фон

Positive Technologies warns: damage from hacktivist attacks reaches the level of nation-state groups

The line between ideologically driven hackers (hacktivists) and advanced persistent threat (APT) groups is blurring, as these actors increasingly carry out operations on behalf of governments and state-affiliated organizations. Experts at Positive Technologies have highlighted this major shift in the global cyberthreat landscape. They predict that further collaboration between politically motivated hackers and nation-state groups will lead to the rise of "hacktivism as a service" on the global dark web.
Фон

Positive Technologies reports Russia among the top three countries facing the highest volume of cyberattacks

According to research by Positive Technologies, Russia was one of the three most frequently targeted countries for cyberattacks in 2025, alongside the United States and China. Researchers recorded the activity of 57 cybercrime groups targeting CIS nations. The primary objectives of these threat actors remained data exfiltration, industrial espionage, sabotage, and financial gain. Furthermore, cybercriminals actively leveraged artificial intelligence and unconventional tools to generate phishing campaigns and deepfakes during their attacks.
Фон

Positive Technologies helps fix vulnerabilities in Delta Electronics controllers

During a recent security study, PT SWARM experts Sergey Fedonin and Ivan Kurnakov, assisted by Vladimir Nazarov, uncovered four critical vulnerabilities in Delta Electronics AS300 series PLCs. If exploited, these flaws could allow an attacker to halt production processes, disrupt expensive machinery, and cause industrial accidents, ultimately leading to severe financial and reputational damage. The manufacturer was notified of the cyberthreat in accordance with responsible disclosure guidelines and has since released a firmware update to secure the devices.
Фон

Positive Hack Talks in Kuala Lumpur: Positive Technologies' international meetup series returns to Southeast Asia

Positive Technologies, an industry leader in results-driven cybersecurity, hosted an open event for cybersecurity professionals in Malaysia. The meetup brought together local, Russian, and international experts who shared their practical knowledge and unique experience. These events are open to all cybersecurity enthusiasts—from students and beginners to seasoned pros who are eager to share their insights.
Фон

Positive Technologies helps secure Dell thin client management solution

PT SWARM expert Alexander Zhurnakov discovered a vulnerability chain in Wyse Management Suite, a thin client management platform developed by Dell, one of the world's largest computer hardware manufacturers. While thin clients function like standard computers, they rely on remote servers to operate. If exploited, this vulnerability chain could allow attackers to disrupt business operations, steal data, and move laterally across a corporate network. Dell was notified of the threat in line with the responsible disclosure policy and has already released software update.
Фон

Positive Technologies reports a new wave of attacks by CapFix

Experts at Positive Technologies have uncovered a new series of attacks by the CapFix threat group, spanning from late 2025 through March 2026. The threat actors used upgraded tools and compromised infrastructure, which they likely accessed by exploiting a critical vulnerability in the Roundcube Webmail client. An analysis of the group's attacks in autumn 2025 revealed that the criminals specifically targeted Russian companies in the industrial and aerospace sectors.
Фон

Positive Technologies helps fix four vulnerabilities in Foswiki, a free enterprise collaboration platform

PT SWARM researcher Evgeny Kopytin discovered four vulnerabilities in Foswiki, a widely used open-source wiki collaboration platform. Organizations around the world rely on Foswiki for internal knowledge bases, project management, and collaborative document editing in a web browser. The security flaws could enable attackers to steal sensitive information, take over accounts of employees and administrators, and even gain full control over corporate servers. Affected are wiki engine versions 2.1.9 and earlier, as well as the bundled MentionsPlugin version 1.0 component. The findings were disclosed responsibly to the Foswiki project team, and patched software releases are already available.
Фон

Positive Technologies helps fix vulnerabilities in Proxmox Mail Gateway

PT SWARM researcher Artyom Danilov identified four vulnerabilities in Proxmox Mail Gateway, an open-source platform developed by Proxmox Server Solutions to protect corporate email against spam and malware. If exploited, the vulnerabilities could allow an attacker to deliver malicious attachments to employees, including ransomware and spyware. The vendor was notified through responsible disclosure and issued an update to remediate the flaws.
Фон

Positive Technologies helps strengthen security of Yealink video conferencing system

Egor Dimitrenko of PT SWARM identified and helped fix two vulnerabilities in Yealink Meeting Server. Tracked as PT-2025-54941 (BDU: 2025-06898) and PT-2025-54940 (BDU: 2025-06897), they received CVSS 3.1 scores of 8.8 and 5.3, corresponding to high and medium severity. Successful exploitation could have enabled remote attackers to take control of the server, intercept calls, access sensitive data, and use the compromised system as a foothold for attacks on internal corporate networks. The findings were reported to the vendor in accordance with responsible disclosure practices, and patches have already been released (1, 2).
Фон
  • ...

Thinking about the best way to protect your company?

Contact us.

During the consultation we'll propose a solution precisely tailored to your organization.

 

General questions
We're happy to answer any questions you may have.
Partnership
Join us in making the world a safer place.
Request a pilot
Test drive our solutions with a customized pilot program.
News & events