Recently, Check Point Research (CPR) uncovered a treasure trove of intelligence while investigating Styx Stealer, a potent new malware that can harvest sensitive information from browsers, instant messaging platforms like…
Tag: CheckPoint
Iran-Linked APT34 Targets Iraq: A New Cyber Espionage Campaign Unfolds
A new cybersecurity threat has emerged from the shadows, with Iranian-linked hackers setting their sights on Iraqi government organizations. This latest espionage campaign, unearthed by researchers at the Israeli cybersecurity…
Iranian Hacktivist Proxies: Expanding Cyber Warfare Beyond Israel
In a significant shift in cyber warfare tactics, Iranian hacktivist proxies, initially focused on Israel, are now extending their activities to include targets in other countries, particularly the United States,…
Deception Technology: An Emerging Frontier in Cybersecurity
Deception technology has emerged as a critical tool for organizations to defend against sophisticated cyber threats, according to Check Point Software. This innovative approach involves creating a network of honeypots…
2023 Cybersecurity Trends: The Rise of Weaponized Legitimate Tools
In a rapidly evolving cyber landscape, the basic layer of protection hinges on recognizing malicious tools and behaviors before they can wreak havoc. Security vendors are constantly researching and mapping…