• Home
  • Sitemap
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
    • SAST, DAST, IAST, and RASP: how to choose?
    • How to prevent SQL injection attacks
    • What is a cross-site scripting (XSS) attack?
    • What is a web application firewall?
    • Securing Web Applications: OWASP Top 10 Vulnerabilities and what to do about them
    • Application Security requirements: GDPR vs. CCPA
    • Network traffic analysis: what is it, and why do we need NTA systems?
    • How to approach secure software development
    • Work from home: digital distancing to keep your network safe
    • What companies can do to stay safe
    • Top 5 technology trends for SIEM in the next three years
    • How to detect a cyberattack and prevent money theft
  • Corporate network visibility in 2020
  • Top cyberthreats on enterprise networks. Network traffic monitoring: 2020 data
  • Positive Technologies' key research activities in 2019–2021
  • Cybersecurity 2020–2021
  • Top 10 most popular phishing topics in 2021
  • Security trends & vulnerabilities review: financial systems (2017)
  • How hackers rob banks
  • New bank attacks
  • ATM logic attacks: scenarios, 2018
  • Financial application vulnerabilities
  • Vulnerabilities in online banking applications
  • ICS Security: 2016 year in review
  • ICS Security: 2017 in review
  • Industrial companies: attack vectors
  • ICS vulnerabilities: 2018 in review
  • Information security risks at industrial companies
  • Corporate information system penetration testing: attack scenarios
  • Attacks on corporate Wi-Fi networks
  • Security trends & vulnerabilities review: corporate information systems
  • Social engineering: how the human factor puts your company at risk
  • Penetration testing of corporate information systems: statistics and findings, 2019
  • Vulnerabilities in Corporate Information Systems 2018
  • Top cybersecurity threats on enterprise networks
  • Access for sale
  • External pentests results – 2020
  • Internal pentests results - 2020
  • Going beyond the ordinary: how SIEM does incident detection, 2020
  • Vulnerabilities on the corporate network perimeter
  • Custom hacking services
  • Criminal Market for Initial Access
  • Business in the crosshairs: analyzing attack scenarios
  • Vulnerability management: user guide
  • Bootkits: evolution and detection methods
  • Cybercriminal market in Telegram
  • Results of penetration tests in 2022
  • Web application attack trends
  • Web application attack statistics: Q1 2017
  • Security trends & vulnerabilities review: web applications (2017)
  • Web Application Attack Statistics: Q2 2017
  • Web Application Attack Statistics: Q3 2017
  • Web application attack statistics: Q4 2017
  • Automated code analysis: web application vulnerabilities in 2017
  • Web application vulnerabilities: statistics for 2017
  • Web application attack statistics: 2017 in review
  • Web application vulnerabilities: statistics for 2018
  • Attacks on web applications: 2018 in review
  • Web Applications vulnerabilities and threats: statistics for 2019
  • Threats and vulnerabilities in web applications 2020–2021
  • Cybersecurity threatscape: Q1 2017
  • Cobalt strikes back: an evolving multinational threat to finance
  • Cybersecurity Threatscape: Q2 2017
  • Cybersecurity threatscape: Q3 2017
  • Cybersecurity threatscape: Q4 2017
  • Cybersecurity threatscape 2017: trends and forecasts
  • Cybersecurity threatscape: Q1 2018
  • The criminal cyberservices market
  • Cybersecurity threatscape: Q2 2018
  • Cybersecurity threatscape: Q3 2018
  • Cybersecurity threatscape: Q4 2018
  • Cybersecurity threatscape 2018: trends and forecasts
  • Cybersecurity threatscape: Q1 2019
  • Cybersecurity threatscape: Q2 2019
  • Cybersecurity threatscape: Q3 2019
  • Cybersecurity 2019-2020
  • Cybersecurity threatscape: Q4 2019
  • Cybersecurity Threatscape 2019
  • Cybersecurity threatscape, Q1 2020
  • Cybersecurity threatscape: Q2 2020
  • Cybersecurity threatscape: Q3 2020
  • Cybersecurity threatscape: Q4 2020
  • Cybersecurity Threatscape 2020
  • Cybersecurity threatscape: Q1 2021
  • Cybersecurity threatscape: Q2 2021
  • Rootkits: evolution and detection methods
  • Cybersecurity threatscape: Q3 2021
  • Cybersecurity threatscape: Q4 2021
  • Cybersecurity threatscape: year 2021 in review
  • Cybersecurity threatscape: Q1 2022
  • Cybersecurity threatscape: Q2 2022
  • Cybersecurity threatscape: Q3 2022
  • Cybersecurity threatscape: 2022 rundown
  • Cybersecurity threatscape: Q4 2022
  • Vulnerabilities and threats in mobile applications, 2019
  • Vulnerabilities and threats in mobile banking
  • Positive Research 2019
  • Positive Research 2020
  • Positive Research 2021
  • Positive Research 2022
  • Positive Research 2023
  • Disabling Intel ME 11 via undocumented mode
  • Where there’s a JTAG, there’s a way: obtaining full system access via USB
  • Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
  • Security threats in the retail sector
  • Hack at all cost: putting a price on APT attacks
  • Operation TaskMasters: Cyberespionage in the digital economy age
  • Calypso APT: new group attacking state institutions
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • PT PyAnalysis
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Partners
About
  • Clients
  • Press
  • News
  • Events
    • Attackers are Innovating: Is your WAF? A Positive Technologies Webinar
    • Webinar: Is your Mobile API under silent attack?
    • Industrial Cybersecurity Workshops
    • The Standoff recap
    • The Standoff: virtual guided tour of the worldwide cyberbattle
    • GITEX 2021 in Dubai
    • Vietnam Security Summit
    • Sincon 2021 Conference
    • ADIPEC 2021
    • Positive Technologies at GITEX Global 2022 in Dubai
    • Application Vulnerabilities Detection: best practices to elevate security standards
  • Contacts
  • Documents and Materials
Cookie Notice
Privacy Notice
Terms of use
Report a vulnerability
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • PT PyAnalysis
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap