#checkpoint — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #checkpoint, aggregated by home.social.
-
From #CheckPoint Research:
Zara Supply Chain Attack
#Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Zara Supply Chain Attack
#Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Zara Supply Chain Attack
#Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Zara Supply Chain Attack
#Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Zara Supply Chain Attack
#Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026
Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.
In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.
https://checkpoint.zoom.us/webinar/register/9317780160575/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026
Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.
In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.
https://checkpoint.zoom.us/webinar/register/9317780160575/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026
Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.
In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.
https://checkpoint.zoom.us/webinar/register/9317780160575/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026
Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.
In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.
https://checkpoint.zoom.us/webinar/register/9317780160575/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact
Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.
In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.
https://checkpoint.zoom.us/webinar/register/9817774181414/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact
Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.
In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.
https://checkpoint.zoom.us/webinar/register/9817774181414/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact
Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.
In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.
https://checkpoint.zoom.us/webinar/register/9817774181414/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact
Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.
In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.
https://checkpoint.zoom.us/webinar/register/9817774181414/WN_igax1D5CRnepHYfSm_QuzA#/registration
-
From #CheckPoint #CheckMates:
Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.
Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.
- What makes BEC one of the most effective and costly attack vectors
- How to reduce response time without increasing operational complexity
- Why AI-driven email security is necessary to detect and prevent BEC attacks
https://engage.checkpoint.com/how-to-stop-a-bec-attack-with-ai
- What makes BEC one of the most effective and costly attack vectors
-
From #CheckPoint #CheckMates:
Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.
Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.
- What makes BEC one of the most effective and costly attack vectors
- How to reduce response time without increasing operational complexity
- Why AI-driven email security is necessary to detect and prevent BEC attacks
https://engage.checkpoint.com/how-to-stop-a-bec-attack-with-ai
- What makes BEC one of the most effective and costly attack vectors
-
From #CheckPoint #CheckMates:
Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.
Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.
- What makes BEC one of the most effective and costly attack vectors
- How to reduce response time without increasing operational complexity
- Why AI-driven email security is necessary to detect and prevent BEC attacks
https://engage.checkpoint.com/how-to-stop-a-bec-attack-with-ai
- What makes BEC one of the most effective and costly attack vectors
-
From #CheckPoint #CheckMates:
Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.
Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.
- What makes BEC one of the most effective and costly attack vectors
- How to reduce response time without increasing operational complexity
- Why AI-driven email security is necessary to detect and prevent BEC attacks
https://engage.checkpoint.com/how-to-stop-a-bec-attack-with-ai
- What makes BEC one of the most effective and costly attack vectors
-
Análisis de los Resultados Trimestrales de Check P…
Check Point ha experimentado una caída del 19% en sus acciones tras la publicación de resultados trimestrales que no cumplieron las expectativas del mercado.
https://norvik.tech/news/analisis-check-point-resultados-trimestrales-2026
#Technology #CheckPoint #ResultadosTrimestrales #CaidaAcciones #Tecnologia #NorvikTech #DesarrolloSoftware #TechInnovation
-
VECT Ransomware is a Wiper, Not Ransomware — Don’t Bother Paying, Says Check Point Research
You can read their blog post at https://blog.checkpoint.com/security/vect-ransomware-why-paying-wont-get-your-files-back/ or their full report at https://research.checkpoint.com/2026/vect-ransomware-by-design-wiper-by-accident/
(h/t, @cybernews)
I contacted VECT and asked them for their response to #CheckPoint's report. Their response was, um... short? :)
#infosecurity #ransomware #decryption #decryptor #VECT #wiper
-
VECT: Ransomware by design, Wiper by accident
Check Point Research discovered critical flaws in VECT 2.0 ransomware affecting Windows, Linux, and ESXi platforms. A fundamental encryption implementation error causes files larger than 128 KB to be permanently destroyed rather than encrypted. The malware uses ChaCha20-IETF cipher but only saves one of four decryption nonces required for large files, making recovery impossible even after ransom payment. VECT's encryption speed modes are non-functional, thread scheduling degrades performance, and anti-analysis code is unreachable. Despite partnerships with TeamPCP and BreachForums for distribution, the technical implementation demonstrates amateur execution behind a professional facade. The nonce-handling flaw exists across all platform variants since initial deployment, effectively transforming this ransomware into a wiper for enterprise assets including VM disks, databases, and backups.
Pulse ID: 69f0e1a5f1a168738b4eda1a
Pulse Link: https://otx.alienvault.com/pulse/69f0e1a5f1a168738b4eda1a
Pulse Author: AlienVault
Created: 2026-04-28 16:34:45Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AWS #ChaCha20 #CheckPoint #CyberSecurity #Encryption #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RAT #RansomWare #Windows #bot #AlienVault
-
The #Strangest #Internet #Checkpoint on #YouTube Nobody is somebody #yt
-
#TechIsShitDispatch
When #Microsoft365 sends me an email telling me I have messages in quarantine, and I click on the button in the email to block the sender of one of the messages, it takes _22 seconds_ for the web page with the block button to load.
The first 8 seconds is #Checkpoint deciding it's safe to redirect through to #Microsoft.
Then #M365 takes 14 seconds to load the page.
This is what Checkpoint and Microsoft consider acceptable performance. 🤦 -
#checkpoint basically says whoever is developing #public #internet facing software needs #AI to find #exploits before others find them (any program that exchanges messages)
#firewall #virusscanner #endpointprotection good but not enoughhttps://blog.checkpoint.com/artificial-intelligence/claude-mythos-wake-up-call-what-ai-vulnerability-discovery-means-for-cyber-defense/ #cyber #cybersecurity
-
#AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a #cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the #Anubis #ransomware group claimed it stole 170 GB of data, including employee and financial records.
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/
-
#AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a #cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the #Anubis #ransomware group claimed it stole 170 GB of data, including employee and financial records.
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/
-
#AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a #cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the #Anubis #ransomware group claimed it stole 170 GB of data, including employee and financial records.
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/
-
#AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a #cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the #Anubis #ransomware group claimed it stole 170 GB of data, including employee and financial records.
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/
-
#AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a #cyberattack affecting one of its United States sites. The company said the intrusion was contained, while the #Anubis #ransomware group claimed it stole 170 GB of data, including employee and financial records.
For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/
-
#CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe. Recent operations used the #GearDoor #backdoor with SSHcmd and SilverScreen, enabling remote access, covert screen capture, and stealthy control after #phishing and server exploitation.
-
#CheckPoint Research revealed that, amid the ongoing conflict with Iran, IP cameras in Israel, Qatar, Bahrain, Kuwait, the UAE, and Cyprus have been intensively targeted. Notably, these countries have also experienced significant missile activity from Iran. The findings align with the assessment that Iran incorporates compromised cameras into its operational doctrine, using them both to support missile operations and to conduct ongoing battle damage assessment (BDA).
-
Full disclosure: This email had to pass through #Microsoft365 and #Checkpoint to get to #Jira Service Desk, so I can't entirely rule out that it was one of them, rather than Jira, that corrupted the email text. But my guess would be Jira. 🤷
-
"For seemingly no reason at all, thousands of people were telling stories about themselves, unguarded even against the background toxicity of internet comment sections. Many of them used the word “checkpoint.”"
https://longreads.com/2026/02/26/internet-checkpoint-taia777-donkey-kong/
-
For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/2nd-march-threat-intelligence-report/
-
#CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.
-
#CheckPoint Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East. It outlines the main TTPs these groups have recently used against targets in the Middle East and the United States and shares six defensive measures IT teams should take to help prevent attacks during the ongoing conflict.
https://blog.checkpoint.com/research/what-defenders-need-to-know-about-irans-cyber-capabilities/
-
#CheckPoint researchers assessed three most significant financial-sector trends in 2025. #DDoS attacks surged 105%, data breaches and leaks rose 73%, and #ransomware incidents reached 451 cases with aggressive multi-extortion tactics. #Hacktivists drove DDoS attacks, and ransomware groups like #Qilin, #Akira, and #Cl0p scaled operations via shared tooling and third-party access.
-
#CheckPoint researchers assessed three most significant financial-sector trends in 2025. #DDoS attacks surged 105%, data breaches and leaks rose 73%, and #ransomware incidents reached 451 cases with aggressive multi-extortion tactics. #Hacktivists drove DDoS attacks, and ransomware groups like #Qilin, #Akira, and #Cl0p scaled operations via shared tooling and third-party access.
-
#CheckPoint researchers assessed three most significant financial-sector trends in 2025. #DDoS attacks surged 105%, data breaches and leaks rose 73%, and #ransomware incidents reached 451 cases with aggressive multi-extortion tactics. #Hacktivists drove DDoS attacks, and ransomware groups like #Qilin, #Akira, and #Cl0p scaled operations via shared tooling and third-party access.
-
#CheckPoint researchers assessed three most significant financial-sector trends in 2025. #DDoS attacks surged 105%, data breaches and leaks rose 73%, and #ransomware incidents reached 451 cases with aggressive multi-extortion tactics. #Hacktivists drove DDoS attacks, and ransomware groups like #Qilin, #Akira, and #Cl0p scaled operations via shared tooling and third-party access.
-
R82 fresh install, migrate_server import, policy installed.
It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.
If you know, you know.
-
R82 fresh install, migrate_server import, policy installed.
It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.
If you know, you know.
-
R82 fresh install, migrate_server import, policy installed.
It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.
If you know, you know.
-
R82 fresh install, migrate_server import, policy installed.
It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.
If you know, you know.
-
#CheckPoint Research revealed that #VoidLink, a recently exposed cloud-native #Linux #malware framework, is authored almost entirely by AI, likely under the direction of a single individual. The malware was produced predominantly through AI-driven development, reaching the first functional implant in under a week. From a methodology perspective, the actor used the model beyond coding, adopting an approach called Spec Driven Development (SDD).
https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/