OSI Network Model: Simple Explanation of Layers
Currently, the main model used in most network interactions is TCP/IP. It is simpler, more compact, and widely used. But here’s the catch: in any serious certification,…
Currently, the main model used in most network interactions is TCP/IP. It is simpler, more compact, and widely used. But here’s the catch: in any serious certification,…
Hello! We share with you the material prepared by Roman Strelnikov — head of the information security department at Bitrix24. Roman is the person who controls everything…
Model Context Protocol is rapidly becoming the de facto standard for interaction between AI agents and external tools. The statistics are impressive: as of May 2025,…
Incident Description: The attacker uses stolen credentials to access the company’s server, website, or cloud.
Holidays, public holidays, any "extra" days off - this is an opportunity for attackers to try to launch an attack. The attackers' calculation is simple: the fewer "defending"…
Hello, today I will share with you another report. The vulnerability we will discuss is IDOR. Using it, I was able to expose personally identifiable information (PII…
Hello! Today we decided to remind tekkix readers that Positive Technologies not only research vulnerabilities, write research papers, and develop software for protection…
Continuing the series of articles. - Detection is easy, dedicated to Detection engineering, which I write about in the Telegram channel of the same name. Today we will…
According to an ancient tradition, the roots of which even old-timers with advanced amnesia do not remember, before the New Year, one wants to say something significant…
There was already an interview on tekkix about Next Generation Firewall from Solar, which touched on the technical aspects of developing such solutions. There was also…
We at IDX, a company engaged in legal personal data verification, are naturally interested in everything related to PD, even if it goes beyond our operational activities.…
As stereotypical and annoying as this approach may seem, at the end of the year I sit down and determine for myself a list of priority areas that make sense to observe…
I have already done material on domestic NGFW from one of the cyber security companies, so I decided to continue the practice and talk about other NGFWs. And in May 2024…
In this article, I will talk about a relevant issue for many — migration from UserGate 6 to version 7. After the departure of foreign developers from the Russian market,…
Recently, the head of the advanced technologies department of Positive Technologies, Nikolai Anisenya, visited the AUTHORITY channel.
In the modern internet, many face the question of how to bypass blocks and protect personal data. And, while VPN applications are well-known, solutions like Shadowsocks,…
In the life of every HR, sooner or later, HE appears... Security professional! And how to approach hunting people for this position is usually unclear.