Positive Technologies - learn and secure
June 14, 2018
Apple fixed firmware vulnerability found by Positive Technologies
The vulnerability allowed exploiting a critical flaw in Intel Management Engine and still can be present in equipment of vendors that use I...
May 11, 2018
Take Part in PHDays 8 Online CTF
Positive Hack Days 8 will start in a couple of days, and we have lots of exciting stuff not only for participants who will visit the eve...
April 4, 2018
Is your Mobile API under silent attack?
How well protected are your mobile apps? Pretty Secure? What about the mobile API they rely on? This could be the weakest link in 's...
March 19, 2018
We need to talk about IDS signatures
The names Snort and Suricata are known to all who work in the field of network security. WAF and IDS are two classes of security systems...
March 13, 2018
How to assemble a GSM phone based on SDR
The smartphones so familiar to most of us contain an entire communication module separate from the main CPU. This module is what makes a...
View web version