Vulnerability in Cisco Security Devices is Dangerous For Business Processes of Large Companies
Remote access can be disrupted
Havoc at a petrochemical facility, false information published on behalf of the head of the state, and a sewage spill: The Standoff has come to an end
Hackers put the security of the digital state to a test but could not destroy it completely.
Just like in real life: a train passenger alert system gets hacked seven times at the Moscow cyber-range
That's how The Standoff, the largest competition between hackers and IT security specialists, began
Positive Technologies Conducts Open Cyber-Exercises, Tests MaxPatrol O2 in Battle
The cyber-exercises will be held on Positive Technologies' own infrastructure and can be viewed on Nov. 15 and 16
Positive Technologies Discovers Vulnerability in Intel Processors used in Laptops, Cars and Other devices
Flaw can be exploited to gain access to encrypted files, for espionage, and to bypass copyright protection
Positive Technologies Helps Eradicate Vulnerabilities in Zoom
Intruders could intercept data from meetings and attack customer infrastructure
Positive Technologies: Vulnerabilities in Apple Pay, Samsung Pay, and Google Pay Allow Attackers to Make Unauthorized Purchases
Attackers Need Only a Smartphone With an Added Credit Card and Enabled Public Transport Schemes
Positive Technologies: the greater the success, the greater the pressure
Positive Technologies' official statement on the U.S. Department of Commerce sanctions
Positive Technologies Report Examines the Evolution and Current Threat of Rootkits
Difficult and Costly to Create, These Malicious Programs That Hide the Presence of Malware Target Governments and Research Institutes, and Are Here to Stay
WinRAR vulnerability allows execution of arbitrary code
The attack requires access to the same network, compromised router, or fake Wi-Fi hotspot
...
...
Get in touch
Fill in the form and our specialists will contact you shortly.