The Latest in IT Security

Posts Tagged ‘Check Point research’

The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. “One of the main characteristics […] is the modular attack which gives the attackers the ability to change […]

Read more ...

Formbook, an “infostealer” malware that can harvest web browser credentials, take screenshots, log keystrokes and download and run executive files, is now the most prevalent threat around today, a new report has claimed. This is according to the Global Threat Index for August 2021research paper published by Check Point Research, which found Formbook affected 4.5% […]

Read more ...

Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, through it, take remote control of all the LG SmartThinQ home appliances. These appliances include dishwashers, refrigerators, microwaves, dryers, and robotic vacuum cleaners. Read More

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments