English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    Security Compliance

    Turn policies into protection

    Vulnerability Management

    Stop being an easy target

    Utilities

    Industrial-grade cybersecurity

    Financial Services

    Can your security keep up with you?

    ERP Security

    Take control of your ERP security

    View all →
  • Products
    MaxPatrol 8

    Vulnerability and compliance management system.

    PT Application Inspector

    Source code analysis tool.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    XSpider

    Vulnerability scanner.

    PT MultiScanner

    Multilayered protection against malware attacks.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    MaxPatrol VM

    Next-generation vulnerability management system.

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Penetration Testing

    A Comprehensive Approach

    ATM Security Assessments

    Uncover Your Weaknesses

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Forensic Investigation Services

    Prevent Future Incidents

    Web Application Security Services

    Black Box and White Box Analysis

    SSDL Implementation

    Secure Application Development at Your Organization

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    View all →
  • Partners
    Authorized Partners
    Distributors
    Technology Partners
    View all →
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Analytics
Subscribe to RSS
Threatscape
  • November 10, 2021 Medium – (5.3) PT-2021-07: GPay payments above NoCVM limits, CryptoATC out of order
  • November 10, 2021 Medium – (4.9) PT-2021-06: Lack of integrity checks of the MCC field
  • November 10, 2021 Medium – (4.1) PT-2021-05: Lack of Amount/CVMResults fields checking for Public Transport Schemes
Editor’s Choice
  • June 7, 2021 Positive Research 2021
  • December 7, 2020 Positive Research 2020
  • June 17, 2020 Vulnerabilities and threats in mobile banking
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2022 Positive Technologies. All Rights Reserved.
Find us:
  • Report a vulnerability
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2022 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap