Latest Trends For: check point research

Vulnerabilities in WhatsApp can allow attackers to intercept and manipulate user messages

Vulnerabilities in WhatsApp can allow attackers to intercept and manipulate user messages - Cybersecurity news
Apparently, these security issues were revealed to WhatsApp last year. The three possible attack modes leverage social engineering tricks to fool users and to spread false information to different WhatsApp groups.

Recent DanaBot campaigns observed with new ransomware module

Recent DanaBot campaigns observed with new ransomware module - Cybersecurity news
Recent DanaBot campaigns observed with a new ransomware module. DanaBot campaigns targeted at European countries also drop a ransomware executable onto target systems. The trojan also comes with new plugins, configuration files, and other updates.

Malicious attachment disguised as top-secret US document leveraged to target organizations in Europe

Malicious attachment disguised as top-secret US document leveraged to target organizations in Europe - Cybersecurity news
Malicious attachment disguised as a top-secret US document was leveraged to target organizations in Europe. The campaign is used against several financial service firms and embassies in Europe. The infection process starts with attackers sending phishing emails to the targets.

PreAmo adware affects 90 million Android devices in new ad-fraud campaign

PreAmo adware affects 90 million Android devices in new ad-fraud campaign - Cybersecurity news
PreAmo adware has affected 90 million Android devices in a new ad-fraud campaign. Six fake apps claiming to boost the functionalities of smartphones are being used to distribute adware named ‘PreAmo’. The campaign is used to make money out of three ad agencies, namely Presage, Admob and Mopub.

Xiaomi's pre-installed security app Guard Provider exposes users to MitM attacks

Xiaomi's pre-installed security app Guard Provider exposes users to MitM attacks - Cybersecurity news
Xiaomi's pre-installed security app ‘Guard Provider’ could expose users to MitM attacks. The vulnerability is due to insecure network traffic to and from ‘Guard Provider’ and the use of multiple SDKs. Increased use of multiple SDKs within the same app makes could cause problems such as crashes, viru ... Read More

Major security flaws in Likud app can enable attackers to access personal details of party members

Major security flaws in Likud app can enable attackers to access personal details of party members - Cybersecurity news
Major security flaws in Likud app can enable attackers to access personal details of party members. The hackers can access information such as political opinion, social contacts, demographic data, telephone numbers, and physical addresses. Besides the Lukid app, researchers also found flaws in the L ... Read More

A new Monero mining campaign found targeting organizations across the globe

A new Monero mining campaign found targeting organizations across the globe - Cybersecurity news
A new Monero mining campaign has been found targeting organizations across the globe. The mining campaigns have been active since January 2019. The campaign uses two specific trojans - Trojan.Win32.Fsysna and a variant of Monero mining malware - to further the attack process.

Android Adware ‘SimBad’ detected in 206 Android apps with almost 150 million installs

Android Adware ‘SimBad’ detected in 206 Android apps with almost 150 million installs - Cybersecurity news
Android Adware ‘SimBad’ detected in 206 Android apps with almost 150 million installs. The list of commands performed by the adware includes removing the icon from the launcher, displaying background ads, opening URLs, opening Google Play and 9Apps, installing other malware, and more. Check Point re ... Read More

Ultrasound machines using outdated Windows 2000 version are vulnerable to hack

Ultrasound machines using outdated Windows 2000 version are vulnerable to hack - Cybersecurity news
Ultrasound machines using outdated Windows 2000 version are vulnerable to hack. This can allow cybercriminals to hack the machines and retrieve or alter records stored on them. The attackers can also access patient images, alter the information displayed and infect the vulnerable machines with ranso ... Read More

Vulnerability in Windows Deployment Services could allow attackers to hijack Windows server installations

Vulnerability in Windows Deployment Services could allow attackers to hijack Windows server installations - Cybersecurity news
Vulnerability in Windows Deployment Services could allow attackers to hijack Windows server installations. The vulnerability affects all Windows servers 2008 and later and the WDS component. The bug has been patched by Microsoft in November.

Security bug in Joomla hands cybercriminals a playground for attack campaigns

Security bug in Joomla hands cybercriminals a playground for attack campaigns - Cybersecurity news
Security bug in Joomla hands cybercriminals a playground for attack campaigns. Joomla is believed to still contain an old remote code execution (RCE) flaw in its platform. The attacker exploited this flaw and used malicious PHP code to compromise websites as well as bypassed the CMS’ mail service.

WinRAR housed an age-old security bug which was finally fixed in latest update

WinRAR housed an age-old security bug which was finally fixed in latest update - Cybersecurity news
WinRAR housed an age-old security bug which was finally fixed in its latest update. The popular file-archiving tool had a serious security bug that allowed attackers to compromise user systems using malicious archives. It is estimated that over 500 million WinRAR users are affected by this vulnerabi ... Read More

Cryptojacking and malware-as-a-service get popular, ransomware attacks observe a dip

Cryptojacking and malware-as-a-service get popular, ransomware attacks observe a dip - Cybersecurity news
Cryptojacking and malware-as-a-service got popular while ransomware attacks observed a dip in 2018. A trend report by CheckPoint Research indicates that attackers have increasingly moved to cryptojacking, while malware-as-a-service has also gained popularity among attackers in 2018. The report also ... Read More

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags