Cybersecurity

Web Check: Open-source intelligence for any website – Help Net Security

Web Check offers thorough open-source intelligence and enables users to understand a website’s infrastructure and security posture, equipping them with the knowledge to understand, optimize, and secure their online presence. Unlike similar services, Web Check is free. There’s no signup, tracking, logging, or ads. Anyone can deploy their instance easily. Web Check features Web Check […]

Cybersecurity

QR Code-based Phishing Attains 587% Hike, Reports Check Point | Cyware Hacker News

Check Point’s Harmony Email team has reported a dramatic escalation in QR code phishing attacks (aka quishing), with a 587% spike recorded from August to September 2023. This surge reflects a troubling trend as threat actors increasingly employ the attack tactic to compromise user credentials. What’s happening? The attacks, predominantly quishing and QRLJacking, involve QR […]

Cybersecurity

Stayin’ Alive – Targeted Attacks Against Telecoms and Government Ministries in Asia – Check Point Research

Introduction In the last few months, Check Point Research has been tracking “Stayin’ Alive”, an ongoing campaign that has been active since at least 2021. The campaign operates in Asia, primarily targeting the Telecom industry, as well as government organizations. The “Stayin’ Alive” campaign consists of mostly downloaders and loaders, some of which are used […]

Cybersecurity

Guarding Against the Unseen: Investigating a Stealthy Remcos Malware Attack on Colombian Firms – Check Point Research

Research by: Niv Asraf Abstract In the last two months, Check Point researchers encountered a new large-scale phishing campaign that recently targeted more than 40 prominent companies across multiple industries, in Colombia. The attackers’ objective was to discreetly install the notorious “Remcos” malware on victims’ computers. Remcos, a sophisticated “Swiss Army Knife” RAT, grants attackers […]

Cybersecurity

Crypto Phishing Attacks Abuse Google Looker Studio | Cyware Hacker News

Check Point researchers have discovered hackers exploiting Google Looker Studio to create fraudulent cryptocurrency phishing websites. These phishing sites target digital asset holders, leading to compromised accounts and financial losses. Google Looker Studio (previously known as Data Studio, is an online tool for converting data from spreadsheets and various sources into customizable reports.  Scam tactics […]