Check Point CloudGuard Spectral exposes new obfuscation techniques for malicious packages on PyPI

November 9, 2022 1:58 pm

Highlights:  Check Point Research (CPR) detects a new and unique malicious package on PyPI, the leading package index used by developers for the Python programming language The new malicious package was designed to... Click to Read More

Check Point Software’s Mid-Year Security Report Reveals 42% Global Increase in Cyber Attacks with Ransomware the Number One Threat

August 3, 2022 12:58 pm

Cyber Attack Trends: 2022 Mid-Year Report takes a closer look at how cyberattacks have intensified and been elevated as state – level weapon with hacktivism flourishing in the first half of this year... Click to Read More

Behind the Curtains of the Ransomware Economy – The Victims and the Cybercriminals

April 28, 2022 12:57 pm

Executive Summary In its latest report, Check Point Research (CPR), in cooperation with Kovrr, has looked behind the curtains of the ransomware economy to uncover the situation from the point of view of... Click to Read More

Check Point Research detects vulnerability in the Everscale blockchain wallet, preventing cryptocurrency theft

April 25, 2022 1:06 pm

Research By: Alexey Bukhteyev Highlights Check Point Research (CPR) discovered a vulnerability in the web version of Ever Surf wallet, part of the Everscale blockchain ecosystem By exploiting the vulnerability, an attacker could... Click to Read More

Check Point Research detects Vulnerability in the Rarible NFT Marketplace, Preventing Risk of Account Takeover and Cryptocurrency Theft

April 14, 2022 12:55 pm

14/04/2022 Research by: Roman Zaikin, Dikla Barda & Oded Vanunu Highlights: Check Point Research identifies a vulnerability within the Rarible NFT Marketplace that allows attackers to take over cryptocurrency wallets By luring victims... Click to Read More

Google is on guard: sharks shall not pass!

April 7, 2022 12:56 pm

Research by: Alex Shamshur, Raman Ladutska Introduction When you search for Anti-Virus (AV) solutions to protect your mobile devices, you don’t expect these solutions to do the opposite i.e. make devices vulnerable to... Click to Read More

AirDrop process of ApeCoin cryptocurrency found vulnerable, led to theft of millions of dollars in NFTs

March 19, 2022 2:10 pm

Research by : Dikla Barda, Roman Zaikin, Oded Vanunu Highlights: ApeCoin, one of the largest NTF’s today announced free token claim on launch Hackers found a way to claim free tokens on ApeCoin... Click to Read More

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

February 24, 2022 1:56 pm

Popular games such as “Temple Run” or  “Subway Surfer” were found to be malicious Attackers can use the installed malware as a backdoor in order to gain full control on the victim’s machine... Click to Read More

A Modern Ninja: Evasive Trickbot Attacks Customers of 60 High-Profile Companies

February 16, 2022 1:52 pm

Research by: Aliaksandr Trafimchuk, Raman Ladutska This research comes as a follow-up to our previous article on Trickbot,  “When Old Friends Meet Again: Why Emotet Chose Trickbot For Rebirth” where we provided an... Click to Read More

The Death of “Please Enable Macros” and What it Means

February 14, 2022 1:18 pm

Introduction On the 7th of February, Microsoft announced an impending change to its ubiquitous suite of Office apps. In Microsoft’s own words: “VBA macros obtained from the internet will now be blocked by... Click to Read More

2022 Security Report: Software Vendors saw 146% Increase in Cyber Attacks in 2021, marking Largest Year-on-Year Growth

January 26, 2022 2:12 pm

Check Point Research’s (CPR) 2022 Security Report details the primary attack vectors and techniques witnessed by CPR during 2021. From supply chain attacks to ransomware, organizations experienced 50% more weekly cyber attacks than... Click to Read More

Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds

January 24, 2022 10:00 am

Research by Dikla Barda Roman Zaikin & Oded Vanunu Highlights Check Point Research (CPR) detects hackers creating new fraudulent tokens to lure victims into buying the tokens, and then ‘rug pulling’ all the... Click to Read More

Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk

January 5, 2022 1:56 pm

Research by: Golan Cohen Introduction Last seen in August 2021, Zloader, a banking malware designed to steal user credentials and private information, is back with a simple yet sophisticated infection chain. Previous Zloader... Click to Read More

Dive into the world of vulnerability research

November 30, 2021 1:40 pm

You’re curious, but taken aback by the cloud of terms to memorize, processes to follow and names to know? We’ve got you. The discovery of a high-impact vulnerability can equal money, power, prestige... Click to Read More

CPR alerts crypto wallet users of massive search engine phishing campaign that has resulted in at least half a million dollars being stolen

November 4, 2021 2:14 pm

By Dikla Barda, Roman Zaikin and Oded Vanunu Highlights: Check Point Research (CPR) spots multiple events in which crypto wallet users have gotten their funds stolen, resulting in over hundreds of thousands of... Click to Read More