- Threatscape
- PT ESC Threat Intelligence
- Cybersecurity glossary
-
Knowledge base
- SAST, DAST, IAST, and RASP: how to choose?
- How to prevent SQL injection attacks
- What is a cross-site scripting (XSS) attack?
- What is a web application firewall?
- Securing Web Applications: OWASP Top 10 Vulnerabilities and what to do about them
- Application Security requirements: GDPR vs. CCPA
- Network traffic analysis: what is it, and why do we need NTA systems?
- How to approach secure software development
- Work from home: digital distancing to keep your network safe
- What companies can do to stay safe
- Top 5 technology trends for SIEM in the next three years
- How to detect a cyberattack and prevent money theft
- Trending vulnerabilities 2023
- Corporate network visibility in 2020
- Top cyberthreats on enterprise networks. Network traffic monitoring: 2020 data
- Positive Technologies' key research activities in 2019–2021
- Cybersecurity 2020–2021
- Top 10 most popular phishing topics in 2021
- Standoff 365 Bug Bounty platform: first year in review
- The consequences of delays in remediating vulnerabilities, 2022–2023
- Data breaches: current threats for companies in H1 2024
- Security trends & vulnerabilities review: financial systems (2017)
- How hackers rob banks
- New bank attacks
- ATM logic attacks: scenarios, 2018
- Financial application vulnerabilities
- Vulnerabilities in online banking applications
- Cyberthreats to the financial industry: interim results for 2023
- ICS Security: 2016 year in review
- ICS Security: 2017 in review
- Industrial companies: attack vectors
- ICS vulnerabilities: 2018 in review
- Information security risks at industrial companies
- Corporate information system penetration testing: attack scenarios
- Attacks on corporate Wi-Fi networks
- Security trends & vulnerabilities review: corporate information systems
- Social engineering: how the human factor puts your company at risk
- Penetration testing of corporate information systems: statistics and findings, 2019
- Vulnerabilities in Corporate Information Systems 2018
- Top cybersecurity threats on enterprise networks
- Access for sale
- External pentests results – 2020
- Internal pentests results - 2020
- Going beyond the ordinary: how SIEM does incident detection, 2020
- Vulnerabilities on the corporate network perimeter
- Custom hacking services
- Criminal Market for Initial Access
- Business in the crosshairs: analyzing attack scenarios
- Vulnerability management: user guide
- Bootkits: evolution and detection methods
- Cybercriminal market in Telegram
- Results of penetration tests in 2022
- How to Detect 10 Popular Pentester Techniques
- Results of cybersecurity incident investigations in 2021–2023
- Pentesting results for 2023
- Web application attack trends
- Web application attack statistics: Q1 2017
- Security trends & vulnerabilities review: web applications (2017)
- Web Application Attack Statistics: Q2 2017
- Web Application Attack Statistics: Q3 2017
- Web application attack statistics: Q4 2017
- Automated code analysis: web application vulnerabilities in 2017
- Web application vulnerabilities: statistics for 2017
- Web application attack statistics: 2017 in review
- Web application vulnerabilities: statistics for 2018
- Attacks on web applications: 2018 in review
- Web Applications vulnerabilities and threats: statistics for 2019
- Threats and vulnerabilities in web applications 2020–2021
- Cybersecurity threatscape: Q1 2017
- Cobalt strikes back: an evolving multinational threat to finance
- Cybersecurity Threatscape: Q2 2017
- Cybersecurity threatscape: Q3 2017
- Cybersecurity threatscape: Q4 2017
- Cybersecurity threatscape 2017: trends and forecasts
- Cybersecurity threatscape: Q1 2018
- The criminal cyberservices market
- Cybersecurity threatscape: Q2 2018
- Cybersecurity threatscape: Q3 2018
- Cybersecurity threatscape: Q4 2018
- Cybersecurity threatscape 2018: trends and forecasts
- Cybersecurity threatscape: Q1 2019
- Cybersecurity threatscape: Q2 2019
- Cybersecurity threatscape: Q3 2019
- Cybersecurity 2019-2020
- Cybersecurity threatscape: Q4 2019
- Cybersecurity Threatscape 2019
- Cybersecurity threatscape, Q1 2020
- Cybersecurity threatscape: Q2 2020
- Cybersecurity threatscape: Q3 2020
- Cybersecurity threatscape: Q4 2020
- Cybersecurity Threatscape 2020
- Cybersecurity threatscape: Q1 2021
- Cybersecurity threatscape: Q2 2021
- Rootkits: evolution and detection methods
- Cybersecurity threatscape: Q3 2021
- Cybersecurity threatscape: Q4 2021
- Cybersecurity threatscape: year 2021 in review
- Cybersecurity threatscape: Q1 2022
- Cybersecurity threatscape: Q2 2022
- Cybersecurity threatscape: Q3 2022
- Cybersecurity threatscape: 2022 rundown
- Cybersecurity threatscape: Q4 2022
- Cybersecurity threatscape: Q1 2023
- Cybersecurity threatscape in the Middle East: 2022-2023
- Cybersecurity threatscape of African countries 2022–2023
- Cybersecurity threatscape: Q2 2023
- How individuals are attacked in the Middle East
- Cybersecurity threatscape of Asia: 2022–2023
- GCC data in demand on the cybercriminal services market
- Cybersecurity threatscape: Q3 2023
- Cybersecurity threatscape for Latin America and the Caribbean: 2022–2023
- Positive Technologies: vulnerability disclosure and researchers/vendors interaction in 2022–2023
- Trends in phishing attacks on organizations in 2022–2023
- Cybersecurity threatscape: Q4 2023
- Cyberthreats in the transportation industry
- Cybersecurity threatscape: Q1 2024
- Cybersecurity threatscape: Q2 2024
- GCC countries and the cybercriminal services market (2023–2024 report)
- Cyberthreats in the Public Sector
- Vulnerabilities and threats in mobile applications, 2019
- Vulnerabilities and threats in mobile banking
- Positive Research 2019
- Positive Research 2020
- Positive Research 2021
- Positive Research 2022
- Positive Research 2023
- Disabling Intel ME 11 via undocumented mode
- Where there’s a JTAG, there’s a way: obtaining full system access via USB
- Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
- Security threats in the retail sector
- Security of quantum technologies in IT
- Hack at all cost: putting a price on APT attacks
- Operation TaskMasters: Cyberespionage in the digital economy age
- Calypso APT: new group attacking state institutions
- How APT groups operate in the Middle East
- How APT groups operate in Southeast Asia
- Clients
-
Press
- News
-
Events
- Attackers are Innovating: Is your WAF? A Positive Technologies Webinar
- Webinar: Is your Mobile API under silent attack?
- Industrial Cybersecurity Workshops
- The Standoff recap
- The Standoff: virtual guided tour of the worldwide cyberbattle
- GITEX 2021 in Dubai
- Vietnam Security Summit
- Sincon 2021 Conference
- ADIPEC 2021
- Positive Technologies at GITEX Global 2022 in Dubai
- Application Vulnerabilities Detection: best practices to elevate security standards
- Contacts
- Documents and Materials