• CheckPoint.com
  • Facebook
  • Google Plus
  • LinkedIn
  • E-Mail Checked Point Research
  • RSS
  • Twitter
Check Point Research
  • Publications
    • Threat Research
    • CPRadio
    • Attack Reports
  • Tools
    • CPR Zero- Vulnerability Repository
    • Evasion techniques Encyclopedia
    • Anti-Debug Tricks
    • SandBlast File Analysis
    • How-To Guides
    • URL Categorization
    • Instant Security Assessment
    • Live Threat Map
  • About Us
  • Contact Us
  • Subscribe
  • Are You Under Attack?
MENU

Eye on the Nile

April 16, 2020

It began with a “Google” security email. But the trail of breadcrumbs traced back to something much, much bigger: a laser-targeted hacking campaign that put its targets’ lives in danger.

Related Articles

Researching Xiaomi’s TEE to get to Chinese money

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

New Wormable Android Malware Spreads by Creating Auto-Replies to Messages in WhatsApp

Vulnerability in Google Play Core Library Remains Unpatched in Google Play Applications

Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints

Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa

New Joker variant hits Google Play with an old trick

Would you like some RCE with your Guacamole?

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)

Canadian banks targeted in a massive phishing campaign

8th August – Threat Intelligence Report

CloudGuard Spectral detects several malicious packages on PyPI – the official software repository for Python developers

Check Point’s 2022 Mid-Year Cyber Attack Trends report

Check Point Software’s Mid-Year Security Report Reveals 42% Global Increase in Cyber Attacks with Ransomware the Number One Threat

Publications
  • GLOBAL CYBER ATTACK REPORTS
  • RESEARCH PUBLICATIONS
  • IPS ADVISORIES
  • CHECK POINT BLOG
  • DEMOS
Tools
  • SANDBLAST FILE ANALYSIS
  • URL CATEGORIZATION
  • INSTANT SECURITY ASSESSMENT
  • LIVE THREAT MAP
About Us
Contact Us
Subscribe

© 1994 Check Point Software Technologies LTD. All rights reserved.
Property of CheckPoint.com | Privacy Policy

Call For Papers