Research April 4, 2025 Tax Season Scams: How to Protect Yourself from Cyber Security Threats Tax season is a critical time of year, not only for tax authorities but also ...
Research April 2, 2025 The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs Over 400 billion PDF files were opened last year, and 16 billion documents were edited ...
Research March 24, 2025 The Rise of VanHelsing RaaS: A New Player in the Ransomware Landscape VanHelsing RaaS is a burgeoning ransomware-as-a-service (RaaS) platform that launched on March 7, 2025. Participants, ...
Research March 11, 2025 Dark Storm Team Claims Responsibility for Cyber Attack on X Platform – What It Means for the Future of Digital Security In a stark reminder of the growing threat posed by hacktivist groups, the pro-Palestinian Dark ...
Research March 10, 2025 The Growing Danger of Blind Eagle: One of Latin America’s Most Dangerous Cyber Criminal Groups Targets Colombia Executive Summary Check Point Research (CPR) has uncovered a series of ongoing, targeted cyber campaigns ...
Research February 27, 2025 Unmasking Hacktivist Groups: A Modern Approach to Attribution Hacktivism has evolved from grassroots digital protests to sophisticated, state-sponsored cyber operations. Check Point Research ...
Research February 25, 2025 Securing Latin America in 2025: How AI and Cyber Threat Intelligence Are Reshaping the Cyber Security Landscape Under the dazzling lights of Las Vegas, Check Point unveiled its forward-thinking strategy for safeguarding ...
Harmony February 24, 2025 How hunting for vulnerable drivers unraveled a widespread attack Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest ...
Research February 21, 2025 Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in ...
Email Security February 21, 2025 Cyber Criminals Using URL Tricks to Deceive Users Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused ...