/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Check Point

@checkpointsw
10 posts
2022-04-24
.@_CPResearch_ identified #vulnerabilities in the audio decoders of the world's two largest chip manufacturers, which could have led an attacker to remotely get access to media & audio conversations.@arstechnica shared CPR's findings. Details, here:https://arstechnica.com/ ... #ALHACK
2022-04-24 View on X
Ars Technica

Researchers detail a patched RCE flaw in the Apple Lossless Audio Codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced ALAC in 2011

Flaw could be exploited with malicious audio file.  —  Security researchers said they uncovered a vulnerability that could have allowed hackers … Source: Check Point Software .

.@_CPResearch_ discovered vulnerabilities in the #ALAC format that could have led an attacker to remotely get access to its media and audio conversations. CPR estimates that over two-thirds of the world's phones were vulnerable at some point: https://blog.checkpoint.com/ ... #ALHACK https://twitter.com/...
2022-04-24 View on X
Ars Technica

Researchers detail a patched RCE flaw in the Apple Lossless Audio Codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced ALAC in 2011

Flaw could be exploited with malicious audio file.  —  Security researchers said they uncovered a vulnerability that could have allowed hackers … Source: Check Point Software .

2022-04-23
.@_CPResearch_ identified #vulnerabilities in the audio decoders of the world's two largest chip manufacturers, which could have led an attacker to remotely get access to media & audio conversations.@arstechnica shared CPR's findings. Details, here:https://arstechnica.com/ ... #ALHACK
2022-04-23 View on X
Ars Technica

Researchers detail newly patched RCE flaw in a widely used audio codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced the codec in 2011

Flaw could be exploited with malicious audio file.  —  Security researchers said they uncovered a vulnerability … Source: Check Point Software .

.@_CPResearch_ discovered vulnerabilities in the #ALAC format that could have led an attacker to remotely get access to its media and audio conversations. CPR estimates that over two-thirds of the world's phones were vulnerable at some point: https://blog.checkpoint.com/ ... #ALHACK https://twitter.com/...
2022-04-23 View on X
Ars Technica

Researchers detail newly patched RCE flaw in a widely used audio codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced the codec in 2011

Flaw could be exploited with malicious audio file.  —  Security researchers said they uncovered a vulnerability … Source: Check Point Software .

2021-12-15
What happened?: On Dec. 10th, an acute remote code execution vulnerability was reported in the #Apache logging package Log4j 2 versions 2.14.1. Exploiting this vulnerability allows threat actors to control #java-based web servers and launch #RCE attacks: https://blog.checkpoint.com/ ... https://twitter.com/...
2021-12-15 View on X
CyberScoop

CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career

A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate netwo...

What happened?: On Dec. 10th, an acute remote code execution vulnerability was reported in the #Apache logging package Log4j 2 versions 2.14.1. Exploiting this vulnerability allows threat actors to control #java-based web servers and launch #RCE attacks: https://blog.checkpoint.com/ ... https://twitter.com/...
2021-12-15 View on X
Wall Street Journal

Microsoft and cybersecurity company Mandiant say hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw

Researchers call it one of the most dire cybersecurity threats to emerge in years and could enable devastating attacks

2021-11-26
@_CPResearch_ discovered vulnerabilities in the global smartphone chip leader since Q3 2020, #MediaTek's chips, placed 37% of all #smartphones. If exploited, attackers could potentially spy on users from an #Android app. Details, here: https://blog.checkpoint.com/ ... #cybersecurity https://twitter.com/...
2021-11-26 View on X
PCMag

Check Point details MediaTek DSP firmware vulnerabilities in some Android smartphones that could be exploited to eavesdrop; MediaTek released patches in October

2021-03-13
Closely monitoring the revelation of four #zeroday vulnerabilities currently affecting #Microsoft Exchange Servers, @_CPResearch_ reports over 1800 exploits and attack attempts on hundreds of organizations worldwide. Get the details: https://blog.checkpoint.com/ ... #MicrosoftExchange https://twitter.com/...
2021-03-13 View on X
VICE

Researcher publishes a proof of concept on GitHub that uses vulnerabilities exploited by hackers to breach Microsoft Exchange servers; GitHub deleted the code

Lorenzo Franceschi-Bicchierai / VICE :

2020-08-13
Check Point researchers demonstrate how hackers could remove and install skills on a victim's Alexa @amazon account via subdomains. Read Turning @Alexa99 bad: @_CPResearch_ finds #vulnerabilities. https://research.checkpoint.com/ ... https://twitter.com/...
2020-08-13 View on X
ZDNet

Researchers say a now-patched Alexa vulnerability could have been exploited to hand over users' personal data, voice recordings, banking data history, and more

Subdomains belonging to the service were found to be harboring CORS errors and vulnerable to XSS attacks.

2019-09-25
Russian Secret Weapon Against U.S. 2020 Election Revealed In New #Cyberwarfare Report - Check Point and @IntezerLabs researchers pulled 2,500 samples from Russian #malware databases and combed those specimens for code matches. via @Forbes: https://www.forbes.com/... https://twitter.com/...
2019-09-25 View on X
ZDNet

Report: analysis of ~2,000 malware samples attributed to Russian state-sponsored hacking groups shows that the groups rarely share code with one another

A first-of-its-kind research project highlights the connections between nearly 2,000 samples of Russian APT malware.