Positive Technologies - learn and secure
December 4, 2019
Malware creators trying to avoid detection. Spy.GmFUToMitm as an example
Image credit Unsplash Specialists from PT Expert Security Center found an interesting specimen of malware distributed in the Chinese se...
November 25, 2019
Studying Donot Team
APT group called Donot Team (aka APT-C-35, SectorE02) has been active since at least 2012. The attackers hunt for confidential informati...
September 25, 2019
Positive Technologies Brings ‘Hackable City’ to Life in The Standoff Cyberbattle at HITB+ CyberWeek
Attackers and defenders to face off in digital metropolis security challenge featuring real-world critical infrastructure and technologies....
September 10, 2019
Sustes malware updated to spread via vulnerability in Exim (CVE-2019-10149)
A new wave of attacks by the Sustes cryptominer is infecting computers via a June vulnerability in the Exim mail server. Starting on Augus...
August 28, 2019
Case study: Searching for a vulnerability pattern in the Linux kernel
This short article describes the investigation of one funny Linux kernel vulnerability and my experience with Semmle QL and Coccinelle, whi...
View web version