Tags Check Point

Hacking tools used by North Korea's Lazarus Group aimed at Russian targets

by Jeff Stone • 3 months ago

Check Point cautions that while it’s “problematic” to definitively pinpoint who’s responsible for such an attack, its “analysis reveals intrinsic connections to the tactics, techniques and tools used by the North Korean APT group[.]”

Epic Games login tokens were susceptible to theft, research shows

by Zaid Shoorbajee • 4 months ago

Researchers say it was possible to hijack old Epic Games domains and use them break into other users' accounts.

'Man-in-the-disk' attack took advantage of Android data security flaws

by Patrick Howell O'Neill • 9 months ago

Google acknowledged the problem and fixed it in several official apps, but other developers seem to have chosen to ignore it.

Report: 'Faxploit' hack can penetrate networks with just a fax number

by Zaid Shoorbajee • 9 months ago

Fax machines are a lot more ubiquitous and vulnerable than you may think, according to Check Point.

North Korea's favorite anti-virus software is just an old, ripped off Trend Micro product

by Chris Bing • 1 year ago

Check Point researchers found that the North Korean software was constructed using a 10-year-old file scanning engine, which Trend Micro first created.

Hackers hide malware, porn ads inside gaming apps on Google Play Store

by Patrick Howell O'Neill • 1 year ago

Infected apps for kids were downloaded over 3 million times to push illegitimate ads, scareware and effectively steal money from victims.

TwitterFacebookLinkedInRedditGoogle Gmail