Positive Technologies stories
Vulnerabilities discovered in Veeam backup solutions
Among the possible consequences of the attacks are infection with ransomware, data theft, and denial of service.
COVID-19 vax most popular topic for phishing attacks in 2021
While phishing attacks remain a consistent threat to online security, attackers are switching up the topics they use to bait unsuspecting victims.
End of 2021 marks drop in cyber attacks, and increase in remote access malware
In Q3 2021 there has been a decrease in the number of unique cyber attacks, however there’s been an increase in the share of attacks against individuals, and also a rise in attacks involving remote access malware.
Cybercriminals hack 93% of company networks - report
"In order to build an effective protection system, it is necessary to understand what unacceptable events are relevant for a particular company."
Positive Technologies reveals updated cybersecurity platform
Positive Technologies has released a new version of its Network Attack Discovery solution, PT NAD.
Vulnerability in Cisco security devices could cause firewalls to fail
A vulnerability in Cisco security devices is dangerous for business processes in large companies.
Vulnerabilities in Apple Pay, Samsung Pay, and Google Pay open door for cyber attackers
Flaws in Apple Pay, Samsung Pay, and Google Pay are allowing attackers to make unlimited purchases.
ATM vulnerabilities open door for attacks - report
Vulnerabilities have been discovered in Wincor Cineo ATMs allowing illegal cash withdrawals
New cyber-criminal group discovered targeting government servers, fuel, energy and aviation companies
Researchers have identified a new, previously unknown group that has systematically attacked Russia's fuel and energy complex and its aviation industry.
Ransomware attacks reach disturbing levels
Ransomware attacks have reached 'stratospheric levels', now accounting for 69% of all attacks involving malware.
91% of industrial companies open to cyber attacks
"The level of cybersecurity at most industrial companies is too low for comfort."
Cyber incidents on the rise as ransomware accounts for two thirds of all malware attacks
More cybercriminals are customising malware for attacks on virtual infrastructure.
SonicWall vulnerability allows attackers to obtain full control of device and underlying OS
Tampering with this system may negatively impact a company's ability to work, to the point of full disruption of its protection system and stopping of business processes.
Vulnerabilities discovered in Cisco IT infrastructure deployment solution
The flaw means attackers could disrupt the operation of enterprise IT systems by deleting backups.
Sharp increase in cyber attacks in last quarter of 2020 - report
There was an increase in the number of attacks aimed at the trade industry and medical institutions, as well in the number of social engineering attacks on individuals.
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."
Cybercriminals target COVID-19 vaccine - report
Attackers did not spare clinics where COVID-19 patients were being treated or pharmaceutical sites where vaccine research was being conducted.
5G flaws allow criminals to steal data, cut access to the web
"There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities."
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Hackers difficult to distinguish from legitimate users - study
Almost half of all actions by attackers are identical to the usual activities of users and admins, a new report has found.
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
Dark web packed with offers to hack corporate networks
"The larger the hacked company is, and the higher the obtained privileges, the more profitable the attack becomes."
Cisco ASA firewall users urged to patch systems now
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.