Positive Technologies has conducted comprehensive research into the activities of the APT groups targeting organisations in the Middle East. The experts say that 88% of the groups under review were attacking Saudi Arabia, and the five most attacked sectors were government agencies, manufacturing, telecommunications, the military-industrial complex, and energy. To gain initialRead More…

The vulnerability was found in the NPort W2150a and W2250a converters. These devices allow industrial controllers, meters, and sensors to connect to a local Wi-Fi network. Wireless access is necessary to control equipment located, for example, on moving objects (containers, elevators, robots) or in aggressive environments (chemical and metallurgical plants). The vendorRead More…

Positive Technologies is constantly refining its approach to result-driven cybersecurity: as part of the bug bounty programme Positive Dream Hunting, security researchers worldwide can attempt to trigger two non-tolerable events. The first person who can inject malicious code into the company’s products or steal money from its accounts will be rewardedRead More…

Yealink has thanked Positive Technologies for discovering the critical vulnerability BDU:2024-00482 in its Yealink Meeting Server videoconferencing system. Yealink is a prominent VoIP provider and is among five major online conferencing vendors. Its products are used in 140 countries. The vendor was notified of the threat per the responsible disclosure policy and released a software patch.Read More…

With 2023 behind us, 2024 is set to feature an astonishing landscape of change for organisations across the Middle East. In light of the region’s race towards digitalization, Positive Technologies, a leader in the result-driven approach towards cybersecurity, has revealed its annual predictions for the most anticipated in technological advancementsRead More…