• Check Point Research Publications
  • Threat Research

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove

August 16, 2024

Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of stealing browser data, instant ...

  • Check Point Research Publications
  • Threat Research

Server-Side Template Injection: Transforming Web Applications from Assets to Liabilities

August 14, 2024

Executive Summary Research by Erez Goldberg Server-Side Template Injection (SSTI) vulnerabilities refer to weaknesses in web ...

  • Check Point Research Publications
  • Threat Research

Static Unpacking for the Widespread NSIS-based Malicious Packer Family

May 28, 2024

Packers or crypters are widely used to protect malicious software from detection and static analysis. These auxiliary tools, through the use ...

  • Check Point Research Publications
  • Threat Research

Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities

March 8, 2024

Key Points Magnet Goblin is a financially motivated threat actor that quickly adopts and leverages 1-day vulnerabilities in ...

Page 1

POPULAR POSTS