thumbnail Microsoft Dynamics 365 Customer Voice Phishing Scam
thumbnail The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
thumbnail VanHelsing, new RaaS in Town
thumbnail Banshee: The Stealer That "Stole Code" From MacOS XProtect
thumbnail Cracking the Code: How Banshee Stealer Targets macOS Users
thumbnail FunkSec – Alleged Top Ransomware Group Powered by AI
thumbnail Google Calendar Notifications Bypassing Email Security Policies
thumbnail Gaming Engines: An Undetected Playground for Malware Loaders
thumbnail CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
thumbnail Unmasking Styx Stealer: How a Hacker's Slip Led to an Intelligence Treasure Trove - Check Point Research
thumbnail Stargazers Ghost Network
thumbnail Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
thumbnail Rafel RAT, Android Malware from Espionage to Ransomware Operations
thumbnail Check Point - Wrong Check Point (CVE-2024-24919)
thumbnail Foxit PDF “Flawed Design” Exploitation
thumbnail Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
thumbnail The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture
thumbnail Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
thumbnail Into the Trash: Analyzing LitterDrifter
thumbnail Chinese Threat Actors Targeting Europe in SmugX Campaign
thumbnail Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
thumbnail Rorschach – A New Sophisticated and Fast Ransomware
thumbnail Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
thumbnail Check Point Research analyzes files on the Dark Web and finds millions of records available
thumbnail Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
thumbnail Bumblebee: increasing its capacity and evolving its TTPs
thumbnail XLoader Botnet: Find Me If You Can
thumbnail New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store
thumbnail Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk