Top infosec news for March 2025
Hello everyone! Time to refresh your memory on the key information security events from last month. The main one, undoubtedly, was Signalgate involving top U.S. officials,…
Hello everyone! Time to refresh your memory on the key information security events from last month. The main one, undoubtedly, was Signalgate involving top U.S. officials,…
In the small company TechnoSoft, which specialized in business automation software, a Friday evening seemed ordinary. The sales manager—a young, attractive girl with…
Everyone should play one great joke at least once in their life. In this article, I will talk about mine. The story is true, only the names have been removed to protect…
Agents are super buggy. In our company projects, we noticed that Langchain started to perform worse. In multi-agent systems, agents often loop because they don’t understand…
Getting to OFFZONE as a speaker is not the easiest task. Every year we get questions: how does the CFP work? which topics are better to choose? how to submit an application…
The article about how to blink an LED using Arduino was quite well received by the Tekkix audience. At the end of that article, there was a poll with a long list of topics…
Hello, today I will share with you another report. The vulnerability we will discuss is IDOR. Using it, I was able to expose personally identifiable information (PII…
A good interface should help the user. But what if I say that sometimes a good interface should hinder them?
Light weekend post, with all that implies: take it with either kind humor or harsh satire, but do not treat it as something serious.
Hello, tekkix! My name is Alexander Shcherbakov. I will tell you how Privileged Access Management systems help control the actions of privileged users with the help of…
AI assistants in programming have burst into developers' daily lives at incredible speed. But what lies behind the convenience? Acceleration or superficial thinking?
Welcome to all CTF and ethical hacking enthusiasts on the Red Team! In this article, we will look at how to complete the easy task TETRIS, developed by pentesters from…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
The morning of October 2nd burst into Inga's apartment with an unexpected call. The smartphone screen lit up at the moment when Inga brought a cup of tea to her lips—her…
Hello, tekkix! The team of the regional scientific and educational center "Artificial Intelligence and Big Data Analysis" at NSTU named after R. E. Alekseev is here.
In 2024, we released a post We Hacked Google A.I. for 50,000, which described how our group consisting of Roni “Lupin” Carta, Joseph “rez0” Tacker, and Justin “Rhynorater”…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…