Vulnerabilities in Amazon Alexa opened access to user data for outsiders
In June this year, researchers from Check Point discovered a number of…
Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the BLM (Black…
Italian IT company CloudEyE collaborated with ransomware operators
For about four years, the Italian company CloudEyE was engaged in a…
The number of “coronavirus” cyberattacks increased to 5,000 per day
Check Point experts estimated that the number of “coronavirus” cyberattacks increased to…
Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the most active…
Researchers hacked TikTok app via SMS
Check Point experts found many issues in one of the world's most…
Check Point named the most dangerous malware of November 2019
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a…