What remains after us online — and how to deal with it
My friend passed away recently.
My friend passed away recently.
Can confidential user data be stolen through third-party apps on the device? Ideas for protection against potential attacks and discussion of how possible this is today
Hello! We share with you the material prepared by Roman Strelnikov — head of the information security department at Bitrix24. Roman is the person who controls everything…
This article is dedicated to the bug in Power Dependency Coordinator, patched by Microsoft in April of this year.
When I started writing the Node.js service that was supposed to integrate with the LLM model, I already understood that access to some foreign APIs from Russia could…
If you enter the phrase "most famous female hackers" into any foreign search engine, the impartial search engine will instantly generate a list, with Kristina Svechinskaya…
As a result of my security research of 3,000 Russian frontend applications, it was discovered that Bitrix CMS has been transmitting website visitors' personal data to…
Imagine you're running a call center and decide to implement an open LLM for automating communication. Everything works great—until a scammer whispers a strange phrase,…