thumbnail Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
thumbnail The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture
thumbnail Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
thumbnail Into the Trash: Analyzing LitterDrifter
thumbnail Chinese Threat Actors Targeting Europe in SmugX Campaign
thumbnail Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
thumbnail Rorschach – A New Sophisticated and Fast Ransomware
thumbnail Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
thumbnail Check Point Research analyzes files on the Dark Web and finds millions of records available
thumbnail Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
thumbnail Bumblebee: increasing its capacity and evolving its TTPs
thumbnail XLoader Botnet: Find Me If You Can
thumbnail New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store
thumbnail Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk