Research February 9, 2024 January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats Researchers uncovered a large cyber threat distributor known as VexTrio, which serves as a major ...
Research February 8, 2024 MalDocs in Word and Excel: A Persistent Cybersecurity Challenge Highlights · Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 ...
Research February 1, 2024 Generative AI is the Pride of Cybercrime Services Cybercriminals Officially Utilize Generative AI for Spam Campaigns, Social Media Impersonation and Verification Services Highlights: ...
Research January 16, 2024 Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, ...
Research January 10, 2024 Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023 The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one ...
Research January 9, 2024 December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates Researchers discovered a revival of the Qbot malware, which was detected in phishing attempts directed ...
Crypto December 22, 2023 Navigating the Perilous Waters of Crypto Phishing Attacks By Oded Vanunu, Dikla Barda, Roman Zaikin Key Highlights: · Check Point Research Unveils Rise ...
Research December 12, 2023 November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus Researchers reported on a new AsyncRAT campaign where malicious HTML files were being used to ...
Crypto December 5, 2023 Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000% By Oded Vanunu, Dikla Barda, Roman Zaikin Unmasking Deceptive Tactics: A recent investigation by Check ...
Research December 4, 2023 Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel Highlights: · Expanded Cyber Frontline: Recent developments in cyber warfare reveal a shift in the ...