• Check Point Research Publications
  • Web 3.0 Security

Unveiling the Scam: How Fraudsters Abuse Legitimate Blockchain Protocols to Steal Your Cryptocurrency Wallet

July 23, 2024

Research by Dikla Barda, Roman Ziakin and Oded Vanunu Check Point’s Threat Intel blockchain system identified and alerted that in ...

  • Check Point Research Publications

New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns

July 15, 2024

Key Findings MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and Security (MOIS), has ...

  • Check Point Research Publications

Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)

July 9, 2024

by Haifei Li Introduction and Background Check Point Research recently discovered that threat actors have been using novel (or ...

  • Check Point Research Publications

Exploring Compiled V8 JavaScript Usage in Malware

July 8, 2024

Author: Moshe Marelus Introduction In recent months, CPR has been investigating the usage of compiled V8 JavaScript by malware ...

POPULAR POSTS