Positive Technologies - learn and secure
March 17, 2020
CVE-2019-18683: Exploiting a Linux kernel vulnerability in the V4L2 subsystem
This article discloses exploitation of CVE-2019-18683 , which refers to multiple five-year-old race conditions in the V4L2 subsystem o...
March 5, 2020
Intel x86 Root of Trust: loss of trust
The scenario that Intel system architects, engineers, and security specialists perhaps feared most is now a reality. A vulnerability has ...
January 21, 2020
Fileless ransomware FTCODE now steals credentials
In 2013, SophosLabs announced infections by a ransomware written in PowerShell . The attack targeted users from Russia. The ransomware encr...
December 17, 2019
Turkish tricks with worms, RATs… and a freelancer
The Positive Technologies Expert Security Center has detected a malicious campaign active since at least mid-January 2018. The operation m...
December 4, 2019
Malware creators trying to avoid detection. Spy.GmFUToMitm as an example
Image credit Unsplash Specialists from PT Expert Security Center found an interesting specimen of malware distributed in the Chinese se...
View web version