CheckPoint.com
Publications
Threat Research
CPRadio
Attack Reports
Tools
SandBlast File Analysis
How-To Guides
URL Categorization
Instant Security Assessment
Live Threat Map
About Us
Contact Us
Subscribe
MENU
Latest Publication
Now Patched Vulnerability in WhatsApp could have led to data exposure of users
September 2, 2021
Check Point Research Publications
Recent Publications
Indra — Hackers Behind Recent Attacks on Iran
August 14, 2021
Do you like to read? I can take over your Kindle with an e-book
August 6, 2021
Stealth is never enough, or Revealing Formbook successor’s C&C infrastructure
August 2, 2021
Mid-Year Attack Trends Report Reveals A 29% Increase In Cyberattacks Against Organizations Globally
July 29, 2021
Time-proven tricks in a new environment: the macOS evolution of Formbook
July 27, 2021
Top prevalent malware with a thousand campaigns migrates to macOS
July 21, 2021
IndigoZebra APT continues to attack Central Asia with evolving tools
July 1, 2021
A supply-chain breach: Taking over an Atlassian account
June 24, 2021
Fuzzing the Office Ecosystem
June 8, 2021
SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor
June 3, 2021
Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations
May 27, 2021
Melting Ice – Tracking IcedID Servers with a few simple steps
May 26, 2021
Mobile app developers’ misconfiguration of third party services leave personal data of over 100 million exposed
May 20, 2021
The Need to Protect Public AWS SSM Documents – What the Research Shows
May 11, 2021
1
2
3
4
5
6
…
15
Next »
Check Point Blog
Achilles: Small chip, big peril.
How scammers are hiding their phishing trips in public clouds
Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix Vanity URL issue
Nexus Zeta – From Suspicious Alerts to Conviction
As organizations get back to business, cyber criminals look for new angles to exploit
×