Phishers cast wide net with spoofed Google Calendar invites Not that you needed another reason to enable the 'known senders' setting Cyber-crime18 Dec 2024 | 17
Victims lose $70K to one single wallet-draining app on Google's Play Store Attackers got 10K people to download 'trusted' web3 brand cheat before Mountain View intervened Cyber-crime26 Sep 2024 | 22
Major sales and ops overhaul leads to much more activity ... for Meow ransomware gang You hate to see it Cyber-crime11 Sep 2024 | 1
Cybercrooks get cozy with BoxedApp to dodge detection Some of the biggest names in the game are hopping on the trend Research04 Jun 2024 | 2
Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes Plus: CISA pulls plug on couple of systems feared compromised Cyber-crime08 Mar 2024 | 2
Meet VexTrio, a network of 70K hijacked websites crooks use to sling malware, fraud Some useful indicators of compromise right here Cyber-crime10 Feb 2024 | 9
Raspberry Robin devs are buying exploits for faster attacks One of most important malware loaders to cybercrims who are jumping on vulnerabilities faster than ever Research08 Feb 2024 | 2
Cybercrims hop geofences, clamor for stolen ChatGPT Plus accounts Where there's a will… AI + ML15 Apr 2023 | 11
Russian criminals can't wait to hop over OpenAI's fence, use ChatGPT for evil Scriptkiddies rush to machine intelligence to make up for lack in skills Security18 Jan 2023 | 10
DHL named most-spoofed brand in phishing With Microsoft and LinkedIn close on shipping giant's heels Research24 Oct 2022 | 4
That 'clean' Google Translate app is actually Windows crypto-mining malware Ah, nothing like a classic Trojan horse Cyber-crime30 Aug 2022 | 20
Hiding a phishing attack behind the AWS cloud Scammers are using cloud services to create and host web pages that can be used to lure victims into handing over their credentials Security22 Aug 2022 | 7
To cut off all nearby phones with these Chinese chips, this is the bug to exploit Android patches incoming for NAS-ty memory overwrite flaw Research03 Jun 2022 | 28
China-linked Twisted Panda caught spying on Russian defense R&D Because Beijing isn't above covert ops to accomplish its five-year goals Security20 May 2022 | 30
Flaw could have granted criminals control over Ever Surf crypto wallets Check Point uncovers web vulnerability that could have led to cryptocurrency theft Security25 Apr 2022 | 1
Emotet reestablishes itself at the top of the malware world Botnet infrastructure shut down last year, now central to a fast-spreading email scam, researchers say Security21 Apr 2022 | 5
Star loses $500,000 NFT after crooks exploit Rarible market This isn't the moving-fast-and-breaking-things future we wanted Security15 Apr 2022 | 37
Check Point spreads AI goodness throughout its security portfolio GTC Evolving threat environment means preventative AI – and SmartNICs – are needed to improve protection Security24 Mar 2022 |
Russia's invasion of Ukraine tears open political rift between cybercriminals Is the West OK when the gun points the other way? Security15 Mar 2022 | 32
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public Check Point says Beijing 'reconstructed' Equation Group's hacking tool long before leak Security23 Feb 2021 | 39
Happy New Year: Jan 1, 2021 security cert expiration causes havoc for some Check Point VPN users Outdated clients stop working, organizations with thousands of end-points told to switch out .sys files Security05 Jan 2021 | 15
Iran's RampantKitten spy crew were snooping on expats and dissidents for six years So says Check Point, piecing together Telegram-busting malware clues Security18 Sep 2020 | 5
Nigerian spammer made 3X average national salary firehosing macro-laden Word docs at world+dog And his boss monitored him with a RAT Security17 Mar 2020 | 13
Check Point chap: Small firms don't invest in infosec then hope they won't get hacked. Spoiler alert: They get hacked Interview One vendor's security controls aren't enough, says Dan Wiley Security09 Mar 2020 | 35
VCs find exciting new way to blow $1m: Wire it directly to hackers after getting spoofed Who needs an elevator pitch when you have man-in-the-middle attack? Security05 Dec 2019 | 18
Egyptian government caught tracking opponents and activists through phone apps Intelligence services developed system, says security outfit Security04 Oct 2019 | 16
RIP, RDP... nearly: Security house Check Point punches holes in remote desktop tools 25 bugs, three Windows and Linux clients – endless pwnage Security05 Feb 2019 | 39
WhatsApp security snafu allows sneaky 'message manipulation' You could put words in people's mouths, claim researchers Security09 Aug 2018 | 30
'Mummy, what's felching?' Tot gets smut served by Android app Google’s Play Store fails again Security12 Jan 2018 | 73
Android apps punched out by Judy malware More than 36 million users feared infected Security30 May 2017 | 37
Android O-mg. Google won't kill screen hijack nasties on Android 6, 7 until the summer Try not to download anything nasty from the Play Store Security10 May 2017 | 52
Apple blocks comms-snooping malware Leaked developer certificate revoked, protection updated Security03 May 2017 | 14
Beware of geeks bearing gifts: Evil game guides infect 2 million Androids Google Play scanners asleep at the switch while morons tap away their security Security26 Apr 2017 | 8
Fake mobile base stations spreading malware in China 'Swearing Trojan' pushes phishing texts around carriers' controls Security23 Mar 2017 | 10
Malware infecting Androids somewhere in the supply chain Handsets leave the factory clean, then get dragged through the mud before they reach you Security12 Mar 2017 | 36
Ransomware scum: 'I believe I'm a good fit. See attachments' HR staffers, crap corporate spam filters, in VXer sights Security05 Jan 2017 | 38
Check Point chugs on: Profits and revenues up despite volatile market CEO warns that he's 'cautious as regards overall IT industry spending' On-Prem21 Apr 2016 | 1
Unpatched stealthy iOS MDM hack spells ruin for Apple tech enterprises Black Hat Asia Clicking 'OK' to ordinary and expected phishing prompt enough for complete iPhone compromise Security31 Mar 2016 | 17
Israeli security firms Check Point, CyberArk in talks – report Possible ‘Cyber Googleplex’ in the making, says paper Channel13 Jan 2016 | 2
Check Point snaps up mobile security outfit Lacoon Israeli firm buys its own solution to Bring-Your-Own-Device headaches Channel02 Apr 2015 | 1
Check Point buys bare-metal security upstart Hyperwise Sandbox-friendly securo-baby snapped up Channel18 Feb 2015 | 3
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk New claim: Homes, businesses menaced by vulnerable firmware Security18 Dec 2014 | 39
Nothing to sniff at: Cisco finishes $2.8bn gobble of Snort'ing guy's Sourcefire Biggest security purchase since Intel wolfed down McAfee Channel09 Oct 2013 | 5
Firewall tech pioneer Gil Shwed: Former teen sysadmin on today's infosec biz Feature Prince of State(ful) inspection 20 years on Security23 Apr 2013 | 8
Check Point bakes anti-malware tech into firewall bricks Software 'blades' whisper from scabbards. En garde Security12 Apr 2013 | 1
Major £30m cyberheist pulled off using MOBILE malware Eurograbber did just what it says on the tin Security07 Dec 2012 | 33
Lithe British youngsters prioritise fun over privacy and security Merrily allow themselves to be slurped and probed Security26 Jun 2012 | 41
Email cock-up blamed in Check Point domain expiry snafu Renewal alert 'sent to wrong address' Networks03 Apr 2012 | 15
Check Point in domain expiry snafu How to firewall off your website - the wrong way Networks02 Apr 2012 | 8
Survey: UK biz is using more encryption But users still shove unprotected USB sticks in holes... On-Prem17 Nov 2011 | 4
Check Point scoffs security dashboard firm Will add bells and whistles in a GRC/SIEM stylie Security31 Oct 2011 |
Check Point boss looks beyond 'weapons' for security defence Interview Right said Shwed Security13 May 2011 | 3
'Boil the ocean' data loss prevention needs to change Check Point slams security so complex you never get around to turning it on Security04 May 2011 | 12
USB stick with anti-terror training found outside police station Keychain cops Security06 Sep 2010 | 79
Check Point buys Nokia security appliance business Threat management huddles under one umbrella Channel23 Dec 2008 | 3