Positive Technologies, an industry leader in result-driven cybersecurity, to host an open event for cybersecurity professionals in Cairo on 26th February. This event, will bring together cybersecurity professionals, students, and aspiring researchers, both Russian and local experts in an
Positive Technologies
PT SWARM expert Arseniy Sharoglazov identified the CVE-2024-28059 (BDU:2024-01648) vulnerability in MyQ Print Server, a printing management solution. MyQ Print Server is installed on Windows servers of an organization to give a single access interface for controlling printers and scanners from different vendors. MyQ solutions are used in 140 countries around the world. The
Positive Technologies announced that they discoveried five vulnerabilities in Mitsubishi Electric’s MELSEC System Q and MELSEC System L series PLC processor modules. These modules are used in the chemical industry, semiconductor production, building automation, and other industries. Mitsubishi Electric is one of the top three largest global manufacturers of industrial
Positive Technologies is planning to open its own corporate email security tool PT Knockin to general public access. The company has been assessing the security of its technologies and constantly testing their effectiveness with its own proprietary tools such as PT Knockin. Now its exclusive expertise can be leveraged by external users. PT Knockin, a […]
Positive Technologies has conducted a comprehensive research into the activities of the APT groups[1] targeting organizations in the Middle East[2]. The experts say that 88% of the groups under review were attacking Saudi Arabia, and the five most-attacked sectors were government agencies, manufacturing, telecommunications, the military-industrial complex, and energy. To
Positive Technologies experts analyzed phishing attacks against organizations in 2022–2023. Most often, in phishing messages, criminals pose as contractors. The phishing-as-a-service model has become common practice. Experts predict an increase in the role of AI in both conducting and preventing phishing attacks. The main objectives of phishing attacks are data theft (85%)
Positive Technologies is constantly refining its approach to result-driven cybersecurity[1]: as part of the bug bounty program Positive Dream Hunting, security researchers from around the world can attempt to trigger two non-tolerable events[2]. The first person who can inject malicious code into the company’s products or steal money from its accounts will be