Dorks in a new way – looking for what is open
When conducting any pentest of a corporate network, one of the actions of white hackers is to search for information that is practically in the public domain: on file…
When conducting any pentest of a corporate network, one of the actions of white hackers is to search for information that is practically in the public domain: on file…
My career in information security began, like many others, with work in IT infrastructure. Initially, my company was engaged in maintaining the stability of networks…
BI.ZONE WAF Cyber Threat Analytics and Research Department studied the statistics of attacks on web applications protected by BI.ZONE WAF. We compared this information…
Imagine: you have a large company with offices from Moscow to the Far East, hundreds of facilities, thousands of shift workers, and an ancient 1C server that barely copes…
We delve into Open AI's privacy policy and find out why experts have dubbed GPT-4o the "data turbo vacuum cleaner".
In a world where cyberattacks are becoming more frequent, it is important to understand the process of incident response in information security.
Fuzzing is a very popular software testing technique using random input data. There are a huge number of materials on the web about how to find software defects using…
Hello, tekkix! My name is Irina, I am an information security analyst at Avito. In this article, I share our experience and my personal impressions of building the information…
Hello, dear readers of tekkix. The more I delve into LLM, the more I am convinced that they have now taken, if not the most important, then certainly one of the very…
Over the years of the protocol's existence, many vulnerabilities have been identified in it. And recently, a group of researchers found a new one. We explain what this…
Recently, within the company, we have had several enthusiasts interested in DevSecOps for completely different reasons. Someone was asked an uncomfortable question by…
Hello! My name is Alexey Kolesnikov, I work in the malware detection department of the Positive Technologies security expert center, in the PT Sandbox team.
Greetings to all tekkix readers. If you throw out administrative work, then my main activity at work is finding various vulnerabilities. Most often, my toolkit consists…
On August 21, the Chrome browser received an update that fixed 37 security-related bugs. The attention of researchers around the world was drawn to the vulnerability…
This publication is a translation of the article - HUNTING FOR MALWARE WITH COMMAND LINE LOGGING AND PROCESS TREES by Vanja Svajcer. The article is about how to use command…
Information security specialists create systems that resist cyberattacks. They implement firewalls, configure monitoring, write security policies, and train employees.…
High-profile cybersecurity scandals in which employees of large companies and government agencies were found guilty have become one of the main topics of the past three…
Hello! My name is Nikolai, I have been working in the field since 2010. This is my first article on tekkix. Based on my experience of passing the Stanford Online certification…