Searchable

Check Point Mobile Research Team Looks Back On 2017

The mobile world is extremely dynamic and changes rapidly, so it's always a little hectic to follow its lead. For this reason, we try...

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous...

A New Rig Exploit Kit Campaign Dropping XMRig Miner

Cryptocurrency values may be tumbling but cyber criminals are still hedging their bets on its long term returns. Check Point researchers have discovered a new...

DorkBot: An Investigation

Research By: Mark Lechtik Overview: DorkBot is a known malware that dates back to 2012. It is thought to be distributed via links on social media,...

H2 2017 Global Threat Intelligence Trends Report

2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to...

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Research by: Elena Root & Bogdan Melnykov Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself...

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker...

Exploiting CVE-2018-0802 Office Equation Vulnerabilty Demo Video

Check Point Software Technologies Research Team discovered a new vulnerability (CVE-2018-0802) in the Office Equation 3.0 process (EQNEDT32.EXE). This is a POC video of the...

LightsOut Mobile Malware Demo Video

 Video demo of how the malware works How It Works

Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability

By: Omer Gull and Netanel Ben Simon Background A few weeks ago, a vulnerability in the Office Equation 3.0 process (EQNEDT32.EXE) was discovered by Embedi. For...
×

Subscribe to Cyber Intelligence Reports for the most current news and insights.