The dark side of IT: sinister stories about passwords, stinginess, and DDoS
When spirits come into our world and magic becomes not just a myth, but something real, anything can happen. For example, all servers suddenly overheat, smoke, and users…
When spirits come into our world and magic becomes not just a myth, but something real, anything can happen. For example, all servers suddenly overheat, smoke, and users…
Hello everyone! In the blog of the Solar 4RAYS Cyber Threat Research Center, we continue to share the results of incident investigations, useful tools for information…
Hello, tekkix! In the previous article, the primary analysis of the application was discussed, which tools should be used to collect information and how to work with…
A few days ago, we held the main online camp on practical cybersecurity for the third time — CyberCamp 2024. It took place from October 3 to 5 online. Over the course…
It is no secret that bug hunting is gaining popularity every year, attracting the attention of both companies seeking to improve the security of their products and white…
Fintech has truly revolutionized the field of financial services. The accelerated development of technology and the growing interest in digital financial solutions have…
In a world where cyberattacks are becoming more frequent, it is important to understand the process of incident response in information security.
Hello, tekkix! My name is Irina, I am an information security analyst at Avito. In this article, I share our experience and my personal impressions of building the information…
Hello! My name is Alexey Kolesnikov, I work in the malware detection department of the Positive Technologies security expert center, in the PT Sandbox team.
High-profile cybersecurity scandals in which employees of large companies and government agencies were found guilty have become one of the main topics of the past three…
Hello! My name is Nikolai, I have been working in the field since 2010. This is my first article on tekkix. Based on my experience of passing the Stanford Online certification…
tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…
In this article, we have collected the main "symptoms" of mobile surveillance that we found on the Internet. Each of them is commented on by a specialist in the field…