In pursuit of shadows: image geolocation using the Shadow Finder Tool
GEOINT often takes a lot of time, researchers spend hours viewing photos, studying satellite images, and viewing street views.
GEOINT often takes a lot of time, researchers spend hours viewing photos, studying satellite images, and viewing street views.
Many people have photos of their passport, driver's license, and child's birth certificate on their phone. But not everyone realizes how easy it is to access them. One…
The world of vulnerabilities is quite diverse. Usually, hackers try to achieve their goals using arbitrary code execution vulnerabilities, the very abbreviation RCE.…
Anastasia Vazhinskaya is an information security engineer, not a front-end developer, but her presentation became the most important for the main hall of the FrontendConf…
tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…
In this article, we will look at how to organize simple secrets management for applications in Kubernetes using the GitOps approach. We store secrets in git securely…
This article is a translation of the Password Security Guidance from the National Cyber Security Centre of Canada. There is a lot of information about passwords available…
In this article, we have collected the main "symptoms" of mobile surveillance that we found on the Internet. Each of them is commented on by a specialist in the field…
In the article, I will tell a case from the practice of analyzing the protection of Android applications. Names and places of events have been changed. Any coincidences…