The new company will be engaged in product development and develop the service business.
Vladimir Yevtushenkov, founder and largest shareholder of Sistema, and Yuri Maksimov, founder of the Group Positiv holding, plans to establish a joint venture in the field of cybersecurity. This company...
The auto industry took its first step into the digital age back in 1967, when the Volkswagen Typ 3 was released in Germany with the D-Jetronic electronic injection system from Bosch. Today, computer systems control almost all functions of most cars - from engine operating modes to windshield...
This is what an anti-skimmer developed by representatives of the University of Florida looks like.
A researcher from the University of Floridapresented the results of his large-scale project to develop skimmer detection systems at the USENIX Security Symposium. We are talking about spy readers...
Confidential logins, SMTP access, password keys, certificates, and much more were stolen.
In the information space, there were reports of a serious cyber incident. The hacker, known under the pseudonym "IntelBroker", claims that he managed to penetrate the systems of one of the world's leading...
Employees work from home, and many of them do it all the time. Apps are moving to the cloud at an accelerated pace. Today, corporate security is all about secure remote access and protecting cloud resources. This means that enterprises need to deploy SD-WAN, Secure Access Service Boundary...
Malicious systems and technologies of cyber attacks appear quite often. Every month, new vulnerabilities are identified in different products, information appears about new ways to attack companies ' IT infrastructure, and new malware and other hacking software are created.
The development of...
Insurance has long been a common practice in global cybersecurity practices. Cyber risk insurance services are provided by both specialized companies and large international insurance organizations.
At the same time, the practice of cyber insurance in Russia is quite rare, despite the presence...
The appearance of stereotypes about certain professions is largely due to the peculiarities of human thinking. It is always easier to accept some "established" views than to independently understand a particular phenomenon and draw conclusions.
As applied to information security specialists...
Artificial intelligence and machine learning (Machine Learning Methods) are actively penetrating all areas related to high technologies, and information security is no exception. The development of digital technologies and digitalization in general entails not only an increase in the number of...
With the growth of information security threats, it is increasingly important to understand the tactics, methods and procedures used by attackers to carry out cyber attacks. Therefore, MITRE ATT&CK is of particular importance. We tell you what the MITRE ATT&CK matrix is and what role it plays in...
How did investors react and will the bank continue to operate?
The Central Bank of India has banned Kotak Mahindra Bank from registering new customers through online services and apps.
The measures were taken after "serious deficiencies were identified" in the management of IT systems...
Positive Technologies presented the top trending vulnerabilities for March.
In March 2024, Positive Technologies identified five more vulnerabilities as trending.: These are vulnerabilities that have already been used in cyber attacks and those that are expected to be exploited in the near...
How ignoring the precepts of Bill Gates led to a massive data leak.
A recent CISA report uncovered serious cybersecurity flaws at tech giant Microsoft that led to a massive data breach last year.
The consequences of last year's attack on Microsoft's Exchange email service, organized by the...
The US authorities should be aware of every attack on hundreds of thousands of companies.
The CISA submitted a draft law on mandatory reporting of critical infrastructure organizations on cyber attacks to the government.
The proposal has been published for public comment. The law that formed...
SpecterOps will teach you a lesson: how do I manage Microsoft servers securely?
A group of researchers from SpecterOps has announced the release of Misconfiguration Manager — an extensive repository of attack and protection methods for the Microsoft Configuration Manager (MCM) environment. This...
The first major update since 2014 brings many changes and improvements for organizations.
The US National Institute of Standards and Technology (NIST) has released an updated edition of its landmark cybersecurity document, the Cybersecurity Framework (CSF), which has reached version 2.0.
This...
Hackers are using increasingly sophisticated methods of attacks that can lead to serious consequences for business and the state.
The Russian company F. A. C. C. T., a developer of cybersecurity solutions, has published its annual report on cyber threats in Russia and the CIS. The authors of...
Compromise could have been avoided by applying only a few simple security measures...
The US Cybersecurity and Infrastructure Protection Agency (CISA), in collaboration with the Interstate Center for Analysis and Exchange of Information (MS-ISAC), found that unknown attackers gained access to...
The performance of PT NGFW is comparable to the leading foreign analogues.
Positive Technologies has announced that its new generation firewall (NGFW) product has been added to the unified register of Russian programs for electronic computers and databases.
"We are developing a Russian...
Other countries that produce spyware also refused to participate in the summit.
A conference organized jointly by the United Kingdom and France is taking place in London this week. The event is dedicated to cybersecurity issues. One of the goals is to develop measures to combat spyware abuse...