• Check Point Research Publications

Wallet Scam: A Case Study in Crypto Drainer Tactics

September 26, 2024

Key takeaways Check Point Research (CPR) uncovered a malicious app on Google Play designed to steal cryptocurrency marking the first ...

  • Check Point Research Publications

10 Years of DLL Hijacking, and What We Can Do to Prevent 10 More

September 25, 2024

Introduction DLL Hijacking — a technique for forcing legitimate applications to run malicious code — has been in use for about a ...

  • Check Point Research Publications
Iranian malware attack

Targeted Iranian Attacks Against Iraqi Government Infrastructure

September 11, 2024

Key Findings Check Point Research discovered a new set of malware called  Veaty  and  Spearal  that was used in ...

  • Check Point Research Publications
  • Threat Research

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove

August 16, 2024

Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of stealing browser data, instant ...

POPULAR POSTS