Microsoft was impersonated in 38% of all brand phishing attacks in Q1 2024, according to new data from Check Point. This is an increase on the proportion of brand phishing attempts impersonating the tech giant compared to Q4 2023, when it made up 33% of cases. Google was the second most impersonated brand in Q1 […]
Web Check offers thorough open-source intelligence and enables users to understand a website’s infrastructure and security posture, equipping them with the knowledge to understand, optimize, and secure their online presence. Unlike similar services, Web Check is free. There’s no signup, tracking, logging, or ads. Anyone can deploy their instance easily. Web Check features Web Check […]
Out of the warehouse and into the gallery Dark basement with eye-frazzling visuals – check. Shadowy figures operating unstated musical gadgets behind a desk – check. Beats, bass and samples – check. Alcohol – hic. The ingredients, on a superficial level, are the same as a million nights we’ve spent in the capital. But even […]
We’re back with How I Play two-time veteran and German musician Stimming (check out his original episode, as well as his most recent How I Play featuring his Instant Mastering Chain). This time we’re taking a look at his intricate production process for his newest album Elderberry, released this fall on Awesome Soundwave. We sat […]
Check Point’s Threat Intel Blockchain system has revealed a new scam, shedding light on the persistent threat of Rug Pulls – a deceptive tactic causing financial losses for investors. The company’s system recently identified suspicious activities linked to a specific wallet address, exposing a sophisticated scheme that managed to pilfer almost $1m. Operated by the address […]
Check Point’s Harmony Email team has reported a dramatic escalation in QR code phishing attacks (aka quishing), with a 587% spike recorded from August to September 2023. This surge reflects a troubling trend as threat actors increasingly employ the attack tactic to compromise user credentials. What’s happening? The attacks, predominantly quishing and QRLJacking, involve QR […]
Introduction In the last few months, Check Point Research has been tracking “Stayin’ Alive”, an ongoing campaign that has been active since at least 2021. The campaign operates in Asia, primarily targeting the Telecom industry, as well as government organizations. The “Stayin’ Alive” campaign consists of mostly downloaders and loaders, some of which are used […]
Research by: Niv Asraf Abstract In the last two months, Check Point researchers encountered a new large-scale phishing campaign that recently targeted more than 40 prominent companies across multiple industries, in Colombia. The attackers’ objective was to discreetly install the notorious “Remcos” malware on victims’ computers. Remcos, a sophisticated “Swiss Army Knife” RAT, grants attackers […]
Check Point researchers have discovered hackers exploiting Google Looker Studio to create fraudulent cryptocurrency phishing websites. These phishing sites target digital asset holders, leading to compromised accounts and financial losses. Google Looker Studio (previously known as Data Studio, is an online tool for converting data from spreadsheets and various sources into customizable reports. Scam tactics […]
- 1
- 2