Amid growing warnings from agencies like the FBI and DHS about Iranian cyber activity, Check Point Research is sharing fresh, real-world examples from the past few days to shed light on how these threats are playing out in practice. We’ve…
Tag: Check Point Blog
AI Evasion: The Next Frontier of Malware Techniques
Check Point Research identifies the first documented case of malware embedding prompt injection to evade AI detection. Check Point Research discovered the first known case of malware designed to trick AI-based security tools The malware embedded natural-language text into the…
Frost & Sullivan Report Validates Value of Consolidated Security
The endpoint security landscape is evolving faster than many security teams can keep up. While organizations are being overwhelmed with alert fatigue from multiple disconnected tools, a new Frost & Sullivan report underscores that the future of cyber security belongs…
PDFguard: AI Engine Against Growing Threats in PDFs
In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware through sophisticated social engineering tactics. Recognizing this escalating threat, Check Point introduces PDFguard, an advanced AI engine…
The illusion of control: Can we ever fully secure autonomous industrial systems?
In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven decision-making into operational technology (OT) systems has created the impression of tighter control, smarter response times and predictive efficiency. This feeling of having control might actually be…
Defeating PumaBot: How Check Point Quantum IoT Protect Nano Agent Shields Surveillance Devices
The threat at a glance Darktrace researchers have identified PumaBot, a Go-based Linux botnet that focuses on embedded surveillance cameras and other IoT devices.Unlike spray-and-pray botnets that scan the whole internet, PumaBot pulls a curated IP list from its C2…
Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
Nearly 20% of all data breaches in recent years involved a third-party vendor, and they weren’t minor. According to IBM’s Cost of a Data Breach Report, breaches tied to third-party access took an average of 26 days longer to identify…
The Hidden AI Threat to Your Software Supply Chain
AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned from intriguing gadgets to indispensable sidekicks for modern developers. A recent survey by Stack Overflow revealed that over 76% of developers now rely on these assistants, with…
Minecraft Players Targeted in Sophisticated Malware Campaign
Malicious Minecraft Mods Discovered: Check Point Research (CPR) uncovered a multistage malware campaign in which the malware itself was embedded within fake Minecraft mods, shared on GitHub to specifically target active players. Three-Stage Infection Chain: The attack involves a Java…
Without automation, external attack surface management misses the point
In cyber security, external attack surface management (ASM) is like tending a garden, helping you keep track of plants (your assets) as they grow. It enables you to monitor your assets and quickly identify risks to them—like pests attacking the…