• Check Point Research Publications
October 9, 2024

Introduction Beginning in early August, Check Point Research observed a cyber-enabled disinformation campaign primarily targeting ...

  • Check Point Research Publications

Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks

September 30, 2024

Research by:  Jiri Vinopal Have you ever wondered why there are so many vulnerable drivers and what might be causing them to be ...

  • Check Point Research Publications
September 26, 2024

Key takeaways Check Point Research (CPR) uncovered a malicious app on Google Play designed to steal ...

  • Check Point Research Publications
September 25, 2024

Introduction DLL Hijacking — a technique for forcing legitimate applications to run malicious code — ...

  • Check Point Research Publications
Iranian malware attack
September 11, 2024

Key Findings Check Point Research discovered a new set of malware called  Veaty  and  ...

  • Check Point Research Publications
  • Threat Research
August 16, 2024

Key takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of ...

  • Check Point Research Publications
  • Threat Research
August 14, 2024

Executive Summary Research by Erez Goldberg Server-Side Template Injection (SSTI) vulnerabilities ...

  • Check Point Research Publications
July 25, 2024

Research by: hasherezade Highlights: Process Injection is one of the important techniques ...

Page 1

POPULAR POSTS