searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Check Point

Get our top stories in your inbox

Locky hidden in image file hitting Facebook, LinkedIn users

November 25, 2016

Malware masquerading as an image file is still spreading on Facebook, LinkedIn, and other social networks. Check Point researchers have apparently discovered how cyber crooks …

Ransomware families and volume of attacks continue to rise

September 20, 2016

Both the number of variants of ransomware and volume of malware attacks were on the rise in August, according to Check Point. During August, the number of active ransomware …

The inner workings of the Cerber ransomware campaign

August 17, 2016

Check Point’s research team has analysed the inner workings of Cerber, the world’s biggest ransomware-as-a-service scheme. Cerber execution flow Cerber is a ransomware …

New vulnerabilities affect over 900 million Android devices, enable complete control of devices

August 8, 2016

Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …

Malware families attacking business networks continue to grow

June 21, 2016

The number of active global malware families increased by 15 percent in May 2016, according to Check Point. They detected 2,300 unique and active malware families attacking …

Vulnerabilities in Facebook Chat and Messenger exploitable with basic HTML knowledge

June 7, 2016

Check Point’s security research team has discovered vulnerabilities in Facebook’s standard online Chat function, and its separately downloaded Messenger app. The …

Check Point finds dangerous vulnerabilities in LG mobile devices

May 31, 2016

Check Point found two vulnerabilities which can be used to elevate privileges on LG mobile devices to attack them remotely. These vulnerabilities are unique to LG devices, …

Severe and unpatched eBay vulnerability allows attackers to distribute malware

February 2, 2016

Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …

EZCast TV streaming stick leaves home networks vulnerable to attack

January 8, 2016

Check Point researchers have discovered a vulnerability in the EZCast TV streaming stick that enables hackers to take full control of home networks. EZCast, which has five …

Posts navigation

1 … 4 5 6 7 8

Featured news

  • Replace Barracuda ESG appliances, company urges
  • June 2023 Patch Tuesday forecast: Don’t forget about Apple
  • Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

Replace Barracuda ESG appliances, company urges

June 2023 Patch Tuesday forecast: Don’t forget about Apple

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

Cl0p announces rules for extortion negotiation after MOVEit hack

AI: Interpreting regulation and implementing good practice

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us