• Check Point Research Publications
  • Threat Research

From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery

June 12, 2025

Key Takeaways Check Point Research uncovered an active malware campaign exploiting expired and released Discord invite links. ...

  • Check Point Research Publications

CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage

June 10, 2025

.wp-block-image img{ border-radius: 12px; border: 3px solid #656597; box-sizing: border-box; overflow: hidden; } ...

  • Check Point Research Publications
May 20, 2025

Research by: Jaromír Hořejší ( @JaromirHorejsi ) Key Points AI media generation is a ...

  • Check Point Research Publications
Inferno Drainer
May 7, 2025

Key Takeaways Check Point Research uncovered a sophisticated phishing campaign that abuses Discord ...

  • Check Point Research Publications
April 30, 2025

Artificial intelligence is rapidly reshaping the cyber security landscape—but how exactly is it being used, ...

  • Check Point Research Publications
April 16, 2025

Key Points CVE-2025-24054 is a vulnerability related to NTLM hash disclosure via spoofing , which ...

  • Check Point Research Publications
April 15, 2025

Highlights Check Point Research has been tracking an advanced phishing campaign conducted by APT29, a ...

  • Check Point Research Publications
April 14, 2025

Research by: hasherezade Key Points Process Injection is one of the important techniques in ...

Page 1

POPULAR POSTS