avril 21, 2025
Home » the expert revealed as the security gaps check

the expert revealed as the security gaps check

the expert revealed as the security gaps check


Buck4bug founder Paul Šliavas brought together many hackerswho check security gaps and even have the basics of military knowledge.

– In cyberspace, you are looking for weaknesses of companies and institutions, in other words, security gaps. Have you found a system that is completely inviolable in practice?

– Concepts such as a completely safe system do not exist at all. All cybersecurity professionals are well aware of this because the technology itself is not designed to be impermeable. The Internet was created for establishing and communicating connections, so full safety does not essentially exist.

– Even in public offices?

– I think there are many examples where burglands even happened to the Pentagon. So the question is not about whether the system is intact, and how long the hacker can break the system, what resources and forces it can concentrate on it. But again, I just have a completely safe system.

LNK stop shot.

– It sounds quite frightening.

– I understand. Especially since more and more technologies such as quantum computers are emerging. People are already participating in a variety of artificial intelligence congresses that say that artificial intelligence can break any encryption mechanism. However, while artificial intelligence has great potential, it is still difficult to work without human intervention.

– What are the most common security gaps?

– The business sector in Lithuania and the Baltic States and worldwide has quite a few cybersecurity loopholes. It is difficult to name one of the most common mistakes, but I can say that over the years, I have never found any vulnerability when working in information communication technology, testing companies.

– You say hackers attack anything, even, say, a flower sales business. What are the benefits to them?

– If your flower sales business is extremely profitable, it may certainly be interested in cyber scammers. Question – How do you sell your flowers? If you use online trading, this is already one of the possible hacking sites. Hackers, popularly called hackersmost of the time it takes advantage of such systems.

LNK stop shot.

– When you test corporate safety, did you never think about a million?

– I am 42 years old, I have completed the relevant studies and the first year has been clearly stated – we are ethical hackers; Of course, a person can always feel the temptation, but we work legally and really earn well. Therefore, there is absolutely no stimulus to commit crimes when it is possible to earn honestly.

– Let’s say we change the flower shop to a bakery. What to do to the bakery owner if he does not feel safe?

– First of all, it is important to understand that safety must be taken in advance. More recently, with colleagues and military personnel, we founded a startup, which is available to all people. It can be found online or just call us and we will definitely help. We have already performed more than 10 different tests in the last three months of starting and the companies have paid hackers for the vulnerabilities found.

Full LNK Report – In Video:

– Companies pay for hackers? Is it popular in the world?

– Yes, this is one of the most popular ways to test systems. Professional hackers using real hackers Methods, but by acting ethically and controlled, testes the safety of companies.

– What is the importance of military knowledge in cybersecurity?

– Many global training is very closely related to military training. We are not talking about weapons or physical actions, but about the cyber space of information technology. There are many programmers and IT professionals in Lithuania who are related to military structures in one way or another – shooters, military or other defense institutions.

– Everyone on social networks has seen situations where, for example, someone writes a critical comment on Russia, and there are thousands of bots that write the opposite opinion and praise Vladimir Putin. Can we really be sure that these are bots, not real people?

– Each case must be examined individually. Bates exist, but it is not always easy to distinguish them from real people. Lithuanian Internet suppliers have public IP addresses that are more or less known. For example, I recently wanted to create a website at one of the renters of the servers in Lithuania. I left a completely empty website and wanted to see if someone would try to break into it. The attacks began immediately.



View Original Source