Tags Check Point
Hacking tools used by North Korea's Lazarus Group aimed at Russian targets
Check Point cautions that while it’s “problematic” to definitively pinpoint who’s responsible for such an attack, its “analysis reveals intrinsic connections to the tactics, techniques and tools used by the North Korean APT group[.]”
Epic Games login tokens were susceptible to theft, research shows
Researchers say it was possible to hijack old Epic Games domains and use them break into other users' accounts.
'Man-in-the-disk' attack took advantage of Android data security flaws
Google acknowledged the problem and fixed it in several official apps, but other developers seem to have chosen to ignore it.
Report: 'Faxploit' hack can penetrate networks with just a fax number
Fax machines are a lot more ubiquitous and vulnerable than you may think, according to Check Point.
North Korea's favorite anti-virus software is just an old, ripped off Trend Micro product
Check Point researchers found that the North Korean software was constructed using a 10-year-old file scanning engine, which Trend Micro first created.
Hackers hide malware, porn ads inside gaming apps on Google Play Store
Infected apps for kids were downloaded over 3 million times to push illegitimate ads, scareware and effectively steal money from victims.