Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies has released its latest Brand Phishing Ranking for Q2 2024. The ranking highlights the brands most frequently imitated by cybercriminals in their attempts to deceive individuals and steal personal information or payment credentials. For the second quarterRead More…

In the digital age, where communication is largely facilitated through email, the security of email platforms is of paramount importance. Check Point Research recently conducted a comprehensive analysis of Outlook, the widely used email client in Microsoft Office, shedding light on three major attack vectors: the Obvious, the Normal, andRead More…

Criminal activities surged in the first half of the year, with Check Point Research (CPR) reporting an 8% increase in global weekly cyberattacks in the second quarter, marking the highest volume in two years. Familiar threats such as ransomware and hacktivism have evolved, with criminal gangs modifying their methods andRead More…

Check Point Research (CPR), the Threat Intelligence arm of Check Point Software has unveiled its 2023 Mid-Year Security Report. The report uncovers an unsettling 8% surge in global weekly cyberattacks in the second quarter, the most significant increase in two years, highlighting how attackers have cunningly combined next-gen AI technologies withRead More…

Check Point Research investigated a sequence of targeted cyberattacks against European foreign affairs entities and attributed them to a Chinese state-sponsored Advanced Persistent Threat (APT) group dubbed “Camaro Dragon” by CPR. This activity has significant infrastructure overlaps with activities publicly linked to “Mustang Panda”.Read More…

Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies Ltd. and a leading provider of cyber security solutions globally, has published its Brand Phishing Report for Q1 2023. The report highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personalRead More…