Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

daniel1820815@infosec.exchangeD

daniel1820815@infosec.exchange

@daniel1820815@infosec.exchange
About
Posts
4
Topics
4
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • #CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe.
    daniel1820815@infosec.exchangeD daniel1820815@infosec.exchange

    #CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe. Recent operations used the #GearDoor #backdoor with SSHcmd and SilverScreen, enabling remote access, covert screen capture, and stealthy control after #phishing and server exploitation.

    Link Preview Image
    Silver Dragon Targets Organizations in Southeast Asia and Europe - Check Point Research

    Latest Research by our Team

    favicon

    Check Point Research (research.checkpoint.com)

    Uncategorized checkpoint silverdragon apt41 geardoor backdoor

  • #CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations.
    daniel1820815@infosec.exchangeD daniel1820815@infosec.exchange

    #CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.

    Link Preview Image
    Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852 - Check Point Research

    Latest Research by our Team

    favicon

    Check Point Research (research.checkpoint.com)

    Uncategorized checkpoint vulnerabilities anthropic claude

  • #CheckPoint Research has published its Untold Stories of 2025, a compilation covering multiple notable campaigns that occurred during 2025.
    daniel1820815@infosec.exchangeD daniel1820815@infosec.exchange

    #CheckPoint Research has published its Untold Stories of 2025, a compilation covering multiple notable campaigns that occurred during 2025. These include exploitation of #Microsoft #SharePoint (“ToolShell”), and adversary-in-the-middle #phishing used to bypass MFA, as well as state-linked operations attributed to groups such as Camaro Dragon and COLDRIVER. The report also highlights evolving command-and-control techniques observed across Europe and Central Asia.

    Link Preview Image
    2025: The Untold Stories of Check Point Research - Check Point Research

    Latest Research by our Team

    favicon

    Check Point Research (research.checkpoint.com)

    Uncategorized checkpoint microsoft sharepoint phishing

  • #CheckPoint Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East.
    daniel1820815@infosec.exchangeD daniel1820815@infosec.exchange

    #CheckPoint Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East. It outlines the main TTPs these groups have recently used against targets in the Middle East and the United States and shares six defensive measures IT teams should take to help prevent attacks during the ongoing conflict.

    Link Preview Image
    What Defenders Need to Know about Iran’s Cyber Capabilities - Check Point Blog

    With the current Iran crisis at its peak, cyber activity is a relevant part of the threat picture alongside kinetic and political pressure. Iran’s

    favicon

    Check Point Blog (blog.checkpoint.com)

    Uncategorized checkpoint
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups