Check Point Research

Check Point Research Latest Research by our Team

  • Iranian Educated Manticore Targets Leading Tech Academics
    by samanthar@checkpoint.com on June 25, 2025 at 12:55 pm

    Key findings Introduction For the last few years, Check Point Research has been monitoring the activity of the Iranian APT group, Educated Manticore. This group aligns with activity tracked by the wider security community as APT42, Charming Kitten, or Mint Sandstorm, and is believed to operate on behalf of the Islamic Revolutionary Guard Corps’ Intelligence The post Iranian Educated Manticore Targets Leading Tech Academics appeared first on Check Point Research.

  • In the Wild: Malware Prototype with Embedded Prompt Injection
    by samanthar@checkpoint.com on June 25, 2025 at 12:09 pm

    In this write-up we present a malware sample found in the wild that boasts a novel and unusual evasion mechanism — an attempted prompt injection (ā€Ignore all previous instructionsā€¦ā€) aimed to manipulate AI models processing the sample. The sample gives the impression of an isolated component or an experimental proof-of-concept, and we can only speculate The post In the Wild: Malware Prototype with Embedded Prompt Injection appeared first on Check Point Research.

  • 23rd June – Threat Intelligence Report
    by eladleon@checkpoint.com on June 23, 2025 at 2:14 pm

    For the latest discoveries in cyber research for the week of 23rd June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Scania, a Swedish manufacturer of heavy trucks and engines, has suffered a data breach that resulted in the theft of insurance claim documents from its Financial Services systems via compromised credentials of The post 23rd June – Threat Intelligence Report appeared first on Check Point Research.

  • Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
    by samanthar@checkpoint.com on June 18, 2025 at 1:09 pm

    Research by:Ā JaromĆ­r HořejŔí (@JaromirHorejsi), Antonis Terefos (@Tera0017) Key Points Introduction Minecraft is a popular video game with a massive global player base, with over 200 million monthly active players. The game has also sold over 300 million copies, making it one of the best-selling video games ever. Minecraft supports mods (user-created modifications), which enrich the The post Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data appeared first on Check Point Research.

  • 16th June – Threat Intelligence Report
    by lorenf on June 16, 2025 at 12:52 pm

    For the latest discoveries in cyber research for the week of 16th June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES One of South Korea’s largest ticketing platforms Yes24 has been a victim of a ransomware attack that resulted in a four-day service outage, disrupting online bookings for concerts, e-book access, and community The post 16th June – Threat Intelligence Report appeared first on Check Point Research.

  • From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
    by alexeybu on June 12, 2025 at 12:59 pm

    Key Takeaways Introduction Discord is a heavily used, widely trusted platform favored by gamers,Ā communities,Ā businesses and others who need to connect securely and quickly.Ā But what if your trusted platform unknowingly becomes a trap? Check Point Research uncovered a flaw in Discord’s invitation system whichĀ allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting The post From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery appeared first on Check Point Research.

  • CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage
    by samanthar@checkpoint.com on June 10, 2025 at 5:31 pm

    Notorious APT group, Stealth Falcon, attacks high-profile targets in the Middle East with a .url fileĀ that uses aĀ LOLBin (Living off the Land Binary) to execute malware from an actor-controlled WebDAV server with a technique we named RemoteĀ Path InterceptionĀ by Search Order Hijacking. The post CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage appeared first on Check Point Research.

  • 9th June – Threat Intelligence Report
    by lorenf on June 9, 2025 at 8:55 am

    For the latest discoveries in cyber research for the week of 9th June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES American tax company, Optima Tax Relief, has disclosed a ransomware attack that resulted in the theft of 69GB of sensitive data, including corporate records and customer case files containing personal information such The post 9th June – Threat Intelligence Report appeared first on Check Point Research.

  • 2nd June – Threat Intelligence Report
    by lorenf on June 2, 2025 at 3:30 pm

    For the latest discoveries in cyber research for the week of 2nd June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES IT management software company ConnectWise confirmed that a sophisticated nation-state cyberattack had compromised its environment, affecting a limited number of customers using its ScreenConnect remote access tool. The company launched a forensic The post 2nd June – Threat Intelligence Report appeared first on Check Point Research.

  • 26th May – Threat Intelligence Report
    by andreyy@checkpoint.com on May 26, 2025 at 12:58 pm

    For the latest discoveries in cyber research for the week of 26th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Cellcom, a Wisconsin-based wireless provider, has been impacted by a cyberattack that resulted in widespread outages of voice and SMS services beginning on May 14, 2025. The incident disrupted communication for customers The post 26th May – Threat Intelligence Report appeared first on Check Point Research.

  • The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
    by samanthar@checkpoint.com on May 20, 2025 at 1:05 pm

    ​ Ā  The post The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website appeared first on Check Point Research.

  • 19th May – Threat Intelligence Report
    by andreyy@checkpoint.com on May 19, 2025 at 3:04 pm

    For the latest discoveries in cyber research for the week of 19th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Fashion giant Dior confirmed a data breach that exposed customer information from its Fashion and Accessories line. The leaked data includes names, gender, phone numbers, email addresses, postal addresses, and purchase history The post 19th May – Threat Intelligence Report appeared first on Check Point Research.

  • 12th May – Threat Intelligence Report
    by tomersp@checkpoint.com on May 12, 2025 at 1:53 pm

    For the latest discoveries in cyber research for the week of 12th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The UK’s Legal Aid Agency has suffered a cyberattack. The agency, which operates under the Ministry of Justice to provide billions in legal aid funding, has stated that financial information relating to The post 12th May – Threat Intelligence Report appeared first on Check Point Research.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.