Pentest with AI agents, experiment with CAI
Hello tekkix!
Hello tekkix!
An article about modern concepts of information security: a brief history, description of the term, key principles, implementation methods.
We’ve gotten used to whispering in someone else’s house. We got “free” messengers where the walls have ears, the owner can change the locks at any moment, and our most…
Hello! We share with you the material prepared by Roman Strelnikov — head of the information security department at Bitrix24. Roman is the person who controls everything…
This article is dedicated to the bug in Power Dependency Coordinator, patched by Microsoft in April of this year.
Yoshua Bengio, one of the pioneers of artificial intelligence, Turing Award laureate, and scientist whose research laid the foundation for modern AI systems, raised alarm.…
Electronic signatures have long been an integral part of corporate processes. They are used to sign crucial documents, confirm transactions, and conduct financial operations.…
Exactly one year has passed since the world watched in awe as the investigation of one of the most sophisticated backdoors in Linux history unfolded. The story of the…
Hello, tekkix! We continue our series of reviews on laws, orders, decrees, and regulatory initiatives related to information security. In this article, we cover what…
Hello everyone! Time to refresh your memory on the key information security events from last month. The main one, undoubtedly, was Signalgate involving top U.S. officials,…
In the small company TechnoSoft, which specialized in business automation software, a Friday evening seemed ordinary. The sales manager—a young, attractive girl with…
Hello, tekkix! My name is Alexander Shcherbakov. I will tell you how Privileged Access Management systems help control the actions of privileged users with the help of…
Ignoring vulnerabilities in operating systems or other software products is fundamentally an unimaginable situation. On the contrary, developers always strive to find…
Continuing the series of articles. - Detection is easy, dedicated to Detection engineering, which I write about in the Telegram channel of the same name. Today we will…
Hello everyone! We are closing the year with our traditional news digest. December was rich in spyware news: Pegasus was highlighted due to the won Whatsapp case, its…
Throughout 2024, we have witnessed a lot of high-profile hacks, leaks, failures, and just funny news from the world of information security. For the New Year, we traditionally…
In this article, I will talk about a relevant issue for many — migration from UserGate 6 to version 7. After the departure of foreign developers from the Russian market,…
In recent years, there has been a trend towards the use of cloud computing, with companies increasingly preferring it when developing their information infrastructure.