Pegasus: analysis of network behavior
Source code for Pegasus, a banking Trojan, was recently published online. Although the Carbanak cybercrime gang was referenced in the archive name, researchers at Minerva Labs have shown that Pegasus...
View ArticleLow-level Hacking NCR ATM
Image credit: Sascha Kohlmann, CC BY-SA 2.0Many of the systems that power the modern world are supposed to be beyond the reach of mere mortals. Developers naively assume that these systems will never...
View ArticleMachine learning: good for security or a new threat?
Machine learning is no novelty anymore. On the contrary: every self-respecting startup feels compelled to apply machine learning in its offerings. The hunt for scarce developers has been superseded by...
View ArticlePositive Technologies researcher finds vulnerability enabling disclosure of...
Image credit: UnsplashIntel has issued a patch in response to a serious vulnerability in Intel ME firmware discovered by Positive Technologies expert Dmitry Sklyarov. The vulnerability involved...
View ArticleHow we developed the NIOS II processor module for IDA Pro
IDA Pro UIIDA Pro has a well-earned place in the toolkit of security researchers worldwide. We at Positive Technologies are no exception. In fact, we like it so much that we developed a disassembler...
View ArticleIntel ME Manufacturing Mode: obscured dangers and their relationship to Apple...
The weakness of "security through obscurity" is so well known as to be obvious. Yet major hardware manufacturers, citing the need to protect intellectual property, often require a non-disclosure...
View ArticleHow STACKLEAK improves Linux kernel security
STACKLEAK is a Linux kernel security feature initially developed by Grsecurity/PaX. I'm working on introducing STACKLEAK into the Linux kernel mainline. This article describes the inner workings of...
View ArticleAdvanced attacks on Microsoft Active Directory: detection and mitigation
Attacks on Microsoft Active Directory have been a recurrent topic of reports on Black Hat and Defcon during the last four years. Speakers tell about new vectors, share their inventions, and give...
View ArticleModernizing IDA Pro: how to make processor module glitches go away
Hi there,This is my latest article on a topic near and dear to my heart: making IDA Pro more modern and, well, better.Those familiar with IDA Pro probably know that feeling: there are glitches in the...
View ArticleWhat We Have Learned About Intel ME Security In Recent Years: 7 Facts About...
Image: UnsplashIntel ME has captured the attention of researchers during the last years. There is an air of mystery about the technology. Although it has access to virtually all the data on the...
View ArticleHow to Protect Yourself When Shopping Online
Image credit: PexelsOnline shopping safety is a pressing issue for both consumers and business users, especially in the holiday season. As customers flock to online stores to cross off their Christmas...
View ArticleRemarkable talks from 35C3
The 35th Chaos Communication Congress was held at the end of December 2018 in Leipzig, Germany. I have attended a lot of interesting lectures. In this article I'll share the list of great technical...
View ArticleThe Cost Of Security And Privacy For Telcos: How To Do The Math
Image credit: PexelsJoin Positive Technologiesâ telecoms expert Michael Downs for a thought-provoking webinar on the processes and best practices all operators should be following to ensure their...
View ArticleDetecting Web Attacks with a Seq2Seq Autoencoder
Attack detection has been a part of information security for decades. The first known intrusion detection system (IDS) implementations date back to the early 1980s.Nowadays, an entire attack detection...
View ArticleHow Not To Help Hackers: 4 Common Security Mistakes Of Office Workers
Image credit: UnsplashMore and more often cybercriminals target office staff, knowing full well that people are the weakest link in the corporate protection systems. Today we'll discuss mistakes in...
View ArticleProtecting Money On The Internet. Five Tips To Secure Your Online Transactions
Image credit: UnsplashAccording to Positive Technologies research data, security of financial applications keeps growing. Banks make serious investments into improving security of their products. In...
View ArticleDHCP security in Windows 10: analyzing critical vulnerability CVE-2019-0726
Image credit: PexelsWhen January updates for Windows got released, the public was alarmed by news of critical vulnerability CVE-2019-0547 in DHCP clients. A high CVSS score and the fact that Microsoft...
View ArticleHow analyzing one critical DHCP vulnerability in Windows 10 led to discovery...
Image credit: Unsplash As described in our earlier article about CVE-2019-0726, sometimes a search for details of a known vulnerability leads to discovery of a new one. Sometimes even more than one.The...
View ArticleFour ways to phish: how to avoid falling for scammers' bait
Phishing is one of the main cybersecurity threats targeting Internet users. Today we will describe how these attacks work and how not to become a victim.Emails from trusted companiesAttackers often...
View ArticleIDS Bypass contest at PHDays: writeup and solutions
Positive Hack Days 2019 included our first-ever IDS Bypass competition. Participants had to study a network segment of five hosts, and then either exploit a service vulnerability or meet a particular...
View Article