Analysis of vulnerability CVE-2024-7965
On August 21, the Chrome browser received an update that fixed 37 security-related bugs. The attention of researchers around the world was drawn to the vulnerability…
On August 21, the Chrome browser received an update that fixed 37 security-related bugs. The attention of researchers around the world was drawn to the vulnerability…
This publication is a translation of the article - HUNTING FOR MALWARE WITH COMMAND LINE LOGGING AND PROCESS TREES by Vanja Svajcer. The article is about how to use command…
Artificial intelligence is now largely everywhere. In any industry, we are told that neural networks, machine learning, and other AI directions are used in it. Systems…
Hello, tekkix! This is Viktor Sergeev from MTS Digital. Today we will talk about the Arbiter Studio Polar 75 Pro keyboard. It can be said that a keyboard is good, a keyboard…
When we were preparing this material, we argued for a long time about which characters could be used to visually compare OCR and IDP. The Coen brothers, Thor and Loki,…
«ChatGPT reveals personal data of real people!», «Side-channel attack on ChatGPT!», «ChatGPT chatbot caused a leak of confidential data!», «Hackers started using ChatGPT…
Hello tekkix! Let's talk about AIOps. As a profession, similar to the role of a DevOps engineer, AIOps has not yet formed into a clearly defined position. In companies,…
Hello, tekkix! Matvey Mochalov from cdnnow! is with you again, and in this post, we will not be dealing with FFmpeg - this time our "Eeeeeexperiments!" section will cover…
Good afternoon, dear tekkix readers. In this article, dedicated to the Setezor product, a description of the integration with the Acunetix web resource vulnerability…
Hello! I am Zhenya, CPO at the corporate messenger Compass. I often study the stories of large companies and popular services. This helps to look at non-standard successful…
My provider, in addition to slowing down YouTube, has also started blocking connections to my work VPNs. My employer doesn't really like it when I answer for a week at…
Information security specialists create systems that resist cyberattacks. They implement firewalls, configure monitoring, write security policies, and train employees.…
High-profile cybersecurity scandals in which employees of large companies and government agencies were found guilty have become one of the main topics of the past three…
Discover OWASP Top 10 for LLM and GenAI and explore key strategies for securing your AI models and applications.
Hello! My name is Nikolai, I have been working in the field since 2010. This is my first article on tekkix. Based on my experience of passing the Stanford Online certification…
In the world of artificial intelligence, an interesting breakthrough has occurred. Researchers have developed a new type of neural network that can make their work more…
Everyone who is familiar with mobile testing knows that different devices are needed for tests. If everything is clear with iOS — there is one operating system, one vendor,…
The idea of creating this publication has been on my mind for a long time, the fact is that one of my hobbies is related to distributed computing, and another hobby is…