Crypto Miners, Targeted ransomware and cloud attacks dominate the threat landscape Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape.... Click to Read More
Researchers: Alon Boxiner, Eran Vaknin, Alexey Volodin, Dikla Barda, Roman Zaikin December 2019 Available in over 150 markets, used in 75 languages globally, and with over 1 billion users, TikTok has definitely... Click to Read More
Introduction Recently, Check Point engines detected a new phishing campaign impersonating the Royal Bank of Canada (RBC). The attack starts by sending legitimate-looking e-mails containing a PDF attachment to multiple organizations and victims... Click to Read More
By Dikla Barda, Roman Zaikin and Yaara Shriki Background: Some of the latest news regarding WhatsApp vulnerabilities are relating to a manipulation of the WhatsApp protocol using a tool built by Check Point... Click to Read More
Research by: Arie Olshtein These days, attackers use cheap and publicly accessible services to help them bypass Anti-Virus protections and gain a foothold in their victims’ systems. We give a behind the scenes... Click to Read More
By Matan Ben David, Incident response Analyst Imagine that you’re the owner of a startup and waiting for a million-dollar seed round of funding, only it never shows up in your bank account.... Click to Read More
For the latest discoveries in cyber research for the week of 2nd December 2019, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Check Point Research has found a nearly 223% increase... Click to Read More
Research by: Slava Makkaveev Introduction Most mobile users understandably worry about known vulnerabilities in the core operating system of their devices, which can give an attacker complete control over their mobile phones, and... Click to Read More
Research by: Alexey Bukhteyev Introduction We recently wrote about the massive “sextortion” spam campaign carried out by the Phorpiex botnet. However, this is only a small part of this botnet’s malicious activity. Capable... Click to Read More
Research By: Slava Makkaveev Trusted Execution Environment TrustZone is a security extension integrated by ARM into the Corex-A processor. This extension creates an isolated virtual secure world which can be used by the... Click to Read More
For the latest discoveries in cyber research for the week of 14th October 2019, please download our Threat Intelligence Bulletin TOP ATTACKS AND BREACHES Check Point Research has exposed the Phorpiex botnet which... Click to Read More
Reuven Plevinsky and Tal Vainshtein Background Following the recent hype over the TCP networking vulnerabilities found by Netflix in Linux and FreeBSD, for which Check Point quickly responded and provided protection, we have... Click to Read More
Research by: Kobi Eisenkraft, Arie Olshtein Introduction Redaman is a form of banking malware distributed by phishing campaigns that target mostly Russia language speakers. First seen in 2015 and reported as the RTM... Click to Read More
Research by: Gil Mansharov and Alexey Bukhteyev Introduction In its 2018 annual publication, the FBI IC3 (Internet Crime Complaint Center) reported a 242% rise in extortion emails, the majority of which are “sextortion”,... Click to Read More
Introduction Back in March 2019, Amnesty International published a report that uncovered a targeted attack against journalists and human rights activists in Egypt. The victims even received an e-mail from Google warning... Click to Read More