Introduction DLL Hijacking — a technique for forcing legitimate applications to run malicious code — ...
Key Findings Check Point Research discovered a new set of malware called Veaty and ...
Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of ...
Executive Summary Research by Erez Goldberg Server-Side Template Injection (SSTI) vulnerabilities ...
Research by: hasherezade Highlights: Process Injection is one of the important techniques ...
Research by: Antonis Terefos ( @Tera0017 ) Key Points Check Point Research identified a ...
Research by Dikla Barda, Roman Ziakin and Oded Vanunu Check Point’s Threat Intel blockchain system ...
Key Findings MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and ...