You searched for Check Point Software/ | SC Media

Your search for Check Point Software/ returned 70 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove

Your search for Check Point Software/ returned 70 results

Sort Results:

Relevant Recent
Cybercrime, Ransomware, Security News

Company’s ransomware decryption service is a sham, researchers report

A Russian company that claims to specialize in decrypting ransomware is actually just secretly brokering deals with the malware distributors and charging victims for this middle-man service, researchers say. The so-called IT consulting firm, known as Dr. Shifro, advertises that it can fix systems affected by such malicious encryptors as Cryakl, Scarab, Bomber, and Dharma/Crisis.…
Cybercrime, Malware, Mobile Security, Security News

Malicious SDK installs SimBad adware on apps downloaded millions of times

The developers of 210 mobile applications found on the Google Play Store were apparently tricked into building their programs using a malicious software developer kit that secretly implanted adware in their apps. The apps, many of which were packaged as driving or racing simulator games, were downloaded nearly 150 million times by Android device users,…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

North Korean hackers allegedly pick on Russian targets for a change

The reputed North Korean APT actor known as Lazarus Group (aka Hidden Cobra) typically focuses its hacking efforts on South Korea, Japan and the U.S., but one of its suspected campaigns from last January surprisingly appears to have targeted Russian businesses with its signature Lazarus backdoor malware. Taking place from Jan. 26-31, the phishing campaign…
Malware, Security News

Agent Smith Android malware infiltrates 25 million devices

A new variant of mobile malware dubbed “Agent Smith” has already infected 25 million devices, 15 million of which are in India. Check Point researchers discovered the malware disguised as a Google-related application that leverages known Android exploits and automatically replaces installed apps with malicious imitations without users’ knowledge or interaction, according to a July…
Cryptocurrency, Security News

Persistence and scale signature moves of new Monero miner campaign

A new Monero cryptomining campaign has been detected in the wild being spread and operating in a manner more consistent with ransomware and other attacks that retain a level of persistence than has been seen before. Check Point researchers said these mining operations have been on-going since mid-January using two specific trojans, Trojan.Win32.Fsysna and an…
Government/Defense, Security News

U.S., Israel move to harden aviation assets from cyberattack

The defense and aviation industries are taking a fresh and harder look at how well their top-of-the-line aircraft are protected from cyberattacks. In the U.S. the Lockheed-Martin F-35 is the recent focus of attention due to the fighter plane’s overwhelming dependence upon software to handle everything from weapons deployment to resupply, reported the Military Times.…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Cybercrime, Security News, Vulnerabilities

Hack U: Ariana Grande file is one of 100+ ways attackers are exploiting WinRAR bug

Researchers from McAfee have observed more than 100 different exploits for a now-patched 19-year-old remote code execution vulnerability in the WinRAR compression tool ever since the path traversal bug was disclosed last month. One of the more unique exploit attempts to infect unpatched victims with malware using a bootlegged copy of Ariana Grande’s “Thank U,…
Network Security, Secondary Featured, Security News, Vulnerabilities

Microsoft sounds alarm to fix wormable bug “SIGRed”

Microsoft Corporation on Patch Tuesday addressed 123 vulnerabilities — 18 of them critical — including a “wormable” flaw in Windows DNS Service that could be leveraged to execute remote code in the context of the Local System Account and then spread malware across various network devices. Officially designated CVE-2020-1350, the wormable flaw is caused by…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Fake Facebook political pages tricked Libyans into downloading RATs

A mysterious hacker has for years been tricking Libyan citizens into infecting themselves with mobile and desktop malware by luring them to weaponized Facebook pages that impersonate key local figures and purport to deliver news of interest to the civil war-torn nation’s people. Researchers from Check Point Software Technologies have traced the campaign – dubbed…
Next post in Phishing