You searched for Check Point Software | SC Media

Your search for Check Point Software returned 31 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for Check Point Software returned 31 results

Sort Results:

Relevant Recent
Malware, Security News

Agent Smith Android malware infiltrates 25 million devices

A new variant of mobile malware dubbed “Agent Smith” has already infected 25 million devices, 15 million of which are in India. Check Point researchers discovered the malware disguised as a Google-related application that leverages known Android exploits and automatically replaces installed apps with malicious imitations without users’ knowledge or interaction, according to a July…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Fake Facebook political pages tricked Libyans into downloading RATs

A mysterious hacker has for years been tricking Libyan citizens into infecting themselves with mobile and desktop malware by luring them to weaponized Facebook pages that impersonate key local figures and purport to deliver news of interest to the civil war-torn nation’s people. Researchers from Check Point Software Technologies have traced the campaign – dubbed…
Cloud Security, Gaming, Network Security, Security News, Vulnerabilities, Web Services Security, E-Commerce Security

Pair of vulnerabilities could have enabled takeover of EA gamer accounts

Prolific video game developer Electronic Arts Inc. (aka EA Games) has reportedly patched a pair of vulnerabilities that attackers could have exploited to hijack millions of player accounts, access their payment card information and make fraudulent purchases. The first flaw could have allowed actors to hijack an EA Games subdomain, while the other could have…
Cybercrime, Finance, Phishing, Security News

Phishing operation picking on Canadian banks since at least 2017

Researchers recently discovered a large-scale phishing email operation that has been targeting primarily customers of Canadian banking chains since at least 2017. The emails generally attempt to trick recipients into revealing their credentials on a phishing page that utilizes a lookalike domain and impersonates a log-in screen. Researchers with Check Point Software Technologies uncovered the…
Coronavirus, Cybercrime, Malware, Security News

Foreign APT groups use coronavirus phishing lures to drop RAT malware

Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for knowledge concerning this pandemic. The perpetrators, and their victims, are based all over the world, as evidenced by two recently discovered global APT-style campaigns designed to spread remote access trojans. Fake Indian Health Advisory spreads…
Cybercrime, Malware, Retail, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Magecart attack on e-commerce service impacts Sesame Street store and many more

Magecart hackers found out how to get to Sesame Street’s online store – and in all likelihood thousands more merchants – by initially compromising e-commerce and shopping cart service provider Volusion to deliver the credit card-skimming code. Israel-based security researcher Marcel Afrahim, who for his day job works as a research developer at Check Point…
Malware, Security News

ShadowHammer code found in several video games

An adjunct to the ShadowHammer campaign has been uncovered that has video games being implanted with malware in a similar manner as was done with ASUS computers. Kaspersky Labs’ GReAT team previously disclosed ShadowHammer in March, after discovering the supply chain attack in January, but this time it tracked a case from the creator of…
Malware, Security News

Bird Miner cryptominer targets Macs, emulates Linux

A new cryptominer, dubbed Bird Miner, has been spotted in the wild targeting Mac devices and running via Linux emulation under the guise of a production software tool. Malwarebytes researchers described Bird Miner as “somewhat stealthy” due to its instructions to bail out at multiple points if Activity Monitor is running and because of its…
Android Hack mobile security
Mobile Security, Security News

Millions of Android phones vulnerable to phishing attacks

More than half of the Android mobile phones in use are susceptible to an advanced text-based phishing attack that only requires a cybercriminal make a $10 investment. Check Point researchers found malicious actors using a remote agent to trick phone owners into accepting new phone settings that hand over various levels of control to the…
Cybercrime, Security News

Credential stuffing: Bigger and badder than ever

Credential stuffing has been around since 2014 enticing cybercriminals with a hefty return on investment and usage has increased of late as even more payment account credentials are stolen and sold on the dark web. Recorded Future just issued a report that looks at the economic environment surrounding credential stuffing and some of the tools…
Next post in Cybercrime