Asia's leading source of security and threat news
Login
Register
Search
Results:
Positive Technologies
These search results are from across the Techday network of sites
Yesterday
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.
More
11 Feb
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."
More
23 Dec
Cybercriminals target COVID-19 vaccine - report
Attackers did not spare clinics where COVID-19 patients were being treated or pharmaceutical sites where vaccine research was being conducted.
More
17 Dec
5G flaws allow criminals to steal data, cut access to the web
"There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities."
More
04 Nov
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
More
21 Aug
Hackers difficult to distinguish from legitimate users - study
Almost half of all actions by attackers are identical to the usual activities of users and admins, a new report has found.
More
18 Jun
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
More
21 May
Dark web packed with offers to hack corporate networks
"The larger the hacked company is, and the higher the obtained privileges, the more profitable the attack becomes."
More
11 May
Cisco ASA firewall users urged to patch systems now
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
More
03 Apr
Data is more valuable to cyber attackers than cash - report
Data theft was the goal of more than half of all attacks in 2019, according to PT. This is a 20 percentage point increase compared to 2018 when data theft was the goal of only 30% of incidents.
More
09 Mar
Unfixable vulnerability found in Intel chipsets 'impossible' to detect
Positive Technologies says it is ‘impossible’ to detect this kind of key breach, and no firmware updates can fix the vulnerability.
More
19 Feb
2G and 3G networks are 'open doors' for cyber attacks
Security researchers have warned about SS7 for decades, however, the vulnerabilities have become more severe in recent years.
More
07 Feb
15,000 companies still critically vulnerable from Citrix security flaws - report
Positive Technologies reports 1 in 5 companies affected have not taken any action to address the threat.
More
26 Dec
Citrix flaw puts 80,000 companies at risk
"Considering the high risk brought by the discovered vulnerability, and how widespread Citrix software is in the business community, we recommend information security professionals take immediate steps to mitigate the threat."
More
05 Dec
Cyberattacks becoming increasingly targeted in nature, research finds
The number of unique cyber incidents have increase for third quarter of 2019, according to a new report on the cybersecurity threatscape.
More
02 Jul
Financial institutions' websites most frequently attacked – report
Positive Technologies found that the majority of all web attacks in 2018 targeted sites of financial institutions, transportation companies, hospitality and entertainment companies.
More
19 Jun
Cryptolocker malware and ransomware threats on the rise
Cryptolocker malware and ransomware is increasing at a rapid rate, with these threats rising 167% over the previous quarter.
More
18 Apr
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
More