Zoom-Zoom: We Are Watching You

January 28, 2020 4:00 am

Alexander Chailytko Cyber Security, Research & Innovation Manager In this publication we describe a technique which would have allowed a threat actor to potentially identify and join active meetings. All the details discussed... Click to Read More

Phorpiex Arsenal: Part I

January 27, 2020 7:34 am

The Phorpiex botnet currently consists of more than 1,000,000 infected Windows computers. In our previous publications, we wrote about the botnet architecture, its command and control infrastructure, and monetization methods: Phorpiex Breakdown In... Click to Read More

The 2020 Cyber Security Report

January 22, 2020 5:23 am

Crypto Miners, Targeted ransomware and cloud attacks dominate the threat landscape   Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape.... Click to Read More

Tik or Tok? Is TikTok secure enough?

January 8, 2020 1:30 am

Researchers: Alon Boxiner, Eran Vaknin, Alexey Volodin, Dikla Barda, Roman Zaikin December 2019   Available in over 150 markets, used in 75 languages globally, and with over 1 billion users, TikTok has definitely... Click to Read More

Canadian banks targeted in a massive phishing campaign

December 23, 2019 3:00 am

Introduction Recently, Check Point engines detected a new phishing campaign impersonating the Royal Bank of Canada (RBC). The attack starts by sending legitimate-looking e-mails containing a PDF attachment to multiple organizations and victims... Click to Read More

BreakingApp – WhatsApp Crash & Data Loss Bug

December 17, 2019 3:00 am

By Dikla Barda, Roman Zaikin and Yaara Shriki Background: Some of the latest news regarding WhatsApp vulnerabilities are relating to a manipulation of the WhatsApp protocol using a tool built by Check Point... Click to Read More

DeCypherIT – All eggs in one basket

December 12, 2019 12:01 am

Research by: Arie Olshtein These days, attackers use cheap and publicly accessible services to help them bypass Anti-Virus protections and gain a foothold in their victims’ systems. We give a behind the scenes... Click to Read More

Incident Response Casefile – A successful BEC leveraging lookalike domains

December 5, 2019 3:00 am

By Matan Ben David, Incident response Analyst Imagine that you’re the owner of a startup and waiting for a million-dollar seed round of funding, only it never shows up in your bank account.... Click to Read More

2nd December – Threat Intelligence Bulletin

December 2, 2019 9:13 am

For the latest discoveries in cyber research for the week of 2nd December 2019, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Check Point Research has found a nearly 223% increase... Click to Read More

Long-known Vulnerabilities in High-Profile Android Applications

November 21, 2019 3:12 am

Research by: Slava Makkaveev Introduction Most mobile users understandably worry about known vulnerabilities in the core operating system of their devices, which can give an attacker complete control over their mobile phones, and... Click to Read More