Check Point
-
News
Amateur Hackers Use ChatGPT to Create Malware
Check Point experts noticed that attackers (including amateur hackers with no programming experience) have already begun to use the OpenAI…
Read More » -
News
Xiaomi Smartphones with MediaTek Chips Are Vulnerable to Counterfeit Payments
Analysts have identified problems in the payment system that are present on Xiaomi smartphones with MediaTek chips, and which provide…
Read More » -
News
Chinese Hack Group Twisted Panda Spies on Russian Defence Developments
According to Check Point experts, Chinese hack group Twisted Panda attacked at least two research institutes in Russia and a…
Read More » -
News
First ransomware exploiting Log4Shell problem discovered
Experts warn that attacks on the vulnerability in the Log4j library are increasing: now the specialists of the Bitdefender company…
Read More » -
News
Chinese APTs are interested in Log4Shell vulnerability
Experts have already documented attempts to exploit the Log4Shell vulnerability by Chinese APTs to deliver ransomware and RATs. The vulnerability…
Read More » -
News
Moses Staff hack attacks Israeli organizations
A new hack group, Moses Staff, attacked Israeli organizations, hacked their networks, encrypted data, and then refused to negotiate a…
Read More » -
News
Check Point: the number of fake vaccination certificates sellers in Telegram increased 10 times
Check Point researchers continue to study the black market sellers of fake COVID-19 vaccination certificates. Experts write that there are…
Read More » -
News
Researchers find four vulnerabilities in Microsoft Office
Check Point researchers have identified four vulnerabilities affecting Microsoft Office products, including Excel and Office Online. The vulnerabilities arose in…
Read More » -
News
Chinese hackers use a new backdoor to spy on the country’s government from Southeast Asia
Check Point specialists discovered a spy operation carried out by Chinese hackers, during which they used a new backdoor of…
Read More » -
News
Due to the hackers’ mistake, the stolen data became available through Google
Hackers that attacked thousands of organizations around the world in a massive phishing campaign, forgot to protect their catch, as…
Read More »