Hacker News
- Malicious VSCode extensions with more than 45k installs https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors/ 186 comments
- Vulnerabilities in chips in 37% of smartphones https://blog.checkpoint.com/2021/11/24/check-point-research-discover-vulnerabilities-in-smartphones-chips-embedded-in-37-of-smartphones-around-the-world/ 59 comments
- Over 400 vulnerabilities on Qualcomm’s Snapdragon chip https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ 114 comments
- Fixing critical vulnerabilities in Apache's remote desktop https://blog.checkpoint.com/2020/07/02/hole-y-guacamole-fixing-critical-vulnerabilities-in-apaches-popular-remote-desktop-gateway/ 8 comments
- Hacked from a lightbulb https://blog.checkpoint.com/2020/02/05/the-dark-side-of-smart-lighting-check-point-research-shows-how-business-and-home-networks-can-be-hacked-from-a-lightbulb/ 39 comments
- Fireball – Chinese malware that has infected over 250M computers worldwide http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/ 5 comments
- The Judy Malware: Possibly the largest malware campaign found on Google Play http://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/ 84 comments
- Malicious Subtitles Threaten Kodi, VLC and Popcorn Time Users http://blog.checkpoint.com/2017/05/23/hacked-in-translation/ 224 comments
- Vulnerability That Allowed Hackers to Take Over WhatsApp and Telegram Accounts http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/ 41 comments
- Preinstalled Malware Targeting Mobile Users http://blog.checkpoint.com/2017/03/10/preinstalled-malware-targeting-mobile-users/ 64 comments
- More Than 1M Google Accounts Breached by Gooligan http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/ 168 comments
- Viking Horde: A New Type of Android Malware on Google Play http://blog.checkpoint.com/2016/05/09/viking-horde-a-new-type-of-android-malware-on-google-play/ 37 comments
- EBay Platform Exposed to Severe Vulnerability http://blog.checkpoint.com/2016/02/02/ebay-platform-exposed-to-severe-vulnerability/ 5 comments
- Magento vulnerability analysis http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ 10 comments
- Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors/ 5 comments vscode
- Check Point Research exposes security vulnerabilities on Chess.com https://blog.checkpoint.com/2023/03/16/checkmate-check-point-research-exposes-security-vulnerabilities-on-chess-com/ 26 comments chess
- Largest Mobile Chipset Manufacturers used Vulnerable Audio Decoder, 2/3 of Android users’ Privacy around the World were at Risk - Check Point Software https://blog.checkpoint.com/2022/04/21/largest-mobile-chipset-manufacturers-used-vulnerable-audio-decoder-2-3-of-android-users-privacy-around-the-world-were-at-risk/ 12 comments privacy
- Check Point Research discover vulnerabilities in smartphones chips embedded in 37% of smartphones around the world https://blog.checkpoint.com/2021/11/24/check-point-research-discover-vulnerabilities-in-smartphones-chips-embedded-in-37-of-smartphones-around-the-world/ 43 comments android
- Criminals using malicious NFT to empty wallets https://blog.checkpoint.com/2021/10/13/check-point-software-prevents-theft-of-crypto-wallets-on-opensea-the-worlds-largest-nft-marketplace/ 13 comments cryptocurrency
- New Qualcomm chip vulnerability https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril 8 comments netsec
- More Than 1 Million Google Accounts Breached by Gooligan | Check Point Blog http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/ 3 comments technology
- More Than 1 Million Google Accounts Breached by Gooligan | Check Point Blog http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/ 54 comments sysadmin
- More Than 1 Million Google Accounts Breached by Gooligan http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/ 6 comments worldnews
- QuadRooter: New Android Vulnerabilities in Over 900 Million Devices http://blog.checkpoint.com/2016/08/07/quadrooter/ 5 comments programming
- eBay Informed of Severe Vulnerability, Decides Not To Fix It http://blog.checkpoint.com/2016/02/02/ebay-platform-exposed-to-severe-vulnerability/ 73 comments programming
- Iranian Cyber-Espionage Group Exposed: Malware Author Identity Unmasked [pdf] http://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf 3 comments netsec
- vBulletin Unauthenticated RCE White Paper http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ 13 comments netsec
- Finding Vulnerabilities in Core WordPress - XSS in shortcode processing http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/ 3 comments netsec
- WhatsApp web app allows arbitrary execution of code on Windows by sending a malicious vCard http://blog.checkpoint.com/2015/09/08/whatsapp-maliciouscard-vulnerabilities-allowed-attackers-to-compromise-hundreds-of-millions-of-whatsapp-users/ 19 comments netsec
- WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users http://blog.checkpoint.com/2015/09/08/whatsapp-maliciouscard-vulnerabilities-allowed-attackers-to-compromise-hundreds-of-millions-of-whatsapp-users/ 6 comments netsec
- Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part II – Supremacy http://blog.checkpoint.com/2015/08/11/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-ii-supremacy/ 6 comments netsec
- Magento Vulnerability - A Cascade of String Based Exploits http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ 3 comments programming
- Analyzing the Magento RCE Vulnerability http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ 5 comments netsec