By Asaf Avisar, Arie Olshtein and Shiri Yaakobson Highlights: In recent months, MemDive allowed our Threat Emulation engine to prevent various attempts of a shellcode-based packer, aiming to execute STOP ransomware and the RedLine Stealer. Check Point customers using Quantum…
Tag: Check Point Blog
August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI
Check Point Research reported on a new ChromeLoader campaign named “Shampoo” which targets Chrome browser users with malware-loaded fake ads. Meanwhile, the communications sector jumped up the list to the second most impacted industry over healthcare Our latest Global…
Getting to Know: Grant Asplund
For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his…
Phishing via Google Looker Studio
A burgeoning attack involving Google Looker Studio is making the rounds. In the last few weeks, we’ve seen over a hundred of these attacks. Google Looker Studio is a tool that converts information—slideshows, spreadsheets, etc—into visualized data, such as charts…
Addressing the Rising Threat of Web DDoS Tsunami Attacks in 2023
The first half of 2023 has seen a massive surge in Distributed Denial of Service (DDoS) attacks, unveiling a new level of sophistication, frequency, and size that organizations must confront. This rising threat is particularly exemplified by the popularity in…
Allowing cybercriminals to drive your car: 5 Tips for Keeping Your Electric Vehicle Secure
Cyberattacks to electric cars have increased by 380%, with a methodology focused on disrupting the proper functioning of their charging stations and the functions of the vehicle itself, as well as stealing data stored in them. Remote vehicle hijacking, potential…