• Check Point Research Publications

10 Years of DLL Hijacking, and What We Can Do to Prevent 10 More

September 25, 2024

Introduction DLL Hijacking — a technique for forcing legitimate applications to run malicious code — has been in use for about a ...

  • Check Point Research Publications
Iranian malware attack

Targeted Iranian Attacks Against Iraqi Government Infrastructure

September 11, 2024

Key Findings Check Point Research discovered a new set of malware called  Veaty  and  Spearal  that was used in ...

  • Check Point Research Publications
  • Threat Research

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove

August 16, 2024

Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of stealing browser data, instant ...

  • Check Point Research Publications
  • Threat Research

Server-Side Template Injection: Transforming Web Applications from Assets to Liabilities

August 14, 2024

Executive Summary Research by Erez Goldberg Server-Side Template Injection (SSTI) vulnerabilities refer to weaknesses in web ...

POPULAR POSTS