Positive Technologies - learn and secure
July 19, 2021
How to detect a cyberattack and prevent money theft
Money theft is one of the most important risks for any organization, regardless of its scope of activity. According to our data, 42% of cybe...
April 21, 2021
Open letter to the research community
Dear all, In light of recent events, we have received many words of encouragement in comments on social media, through direct messages, an...
April 16, 2021
Positive Technologies' official statement following U.S. sanctions
As a company, we deny the groundless accusations made by the U.S. Department of the Treasury. In the almost 20 years we have been operating ...
April 9, 2021
Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel
Author : Alexander Popov, Positive Technologies CVE-2021-26708 is assigned to five race condition bugs in the virtual socket implementation...
December 1, 2020
Linux kernel heap quarantine versus use-after-free exploits
It's 2020. Quarantines are everywhere – and here I'm writing about one, too. But this quarantine is of a different kind. In this art...
View web version