• Check Point Research Publications

Unveiling the Scam: How Fraudsters Abuse Legitimate Blockchain Protocols to Steal Your Cryptocurrency Wallet

July 23, 2024

Research by Dikla Barda, Roman Ziakin and Oded Vanunu Check Point’s Threat Intel blockchain system identified and alerted that in ...

  • Check Point Research Publications

New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns

July 15, 2024

Key Findings MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and Security (MOIS), has ...

  • Check Point Research Publications
July 9, 2024

by Haifei Li Introduction and Background Check Point Research recently discovered that threat ...

  • Check Point Research Publications
July 8, 2024

Author: Moshe Marelus Introduction In recent months, CPR has been investigating the usage of ...

  • Check Point Research Publications
  • Crypto
  • How To Guides
July 2, 2024

Introduction Cryptographic attacks, even more advanced ones, are often made more difficult to ...

  • Check Point Research Publications
June 3, 2024

Research by:  Jiri Vinopal Highlights: Check Point Research (CPR) reveals the ...

  • Check Point Research Publications
  • Threat Research
May 28, 2024

Packers or crypters are widely used to protect malicious software from detection and static analysis. These ...

  • Check Point Research Publications
May 23, 2024

Key Findings Sharp Dragon’s (Formerly referred to as Sharp Panda) operations continue, expanding ...

Page 1

POPULAR POSTS