News

Check Point Research
research.checkpoint.com > 2026 > 9th-march-threat-intelligence-report

9th March – Threat Intelligence Report

2+ hour, 1+ min ago  (473+ words) For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES AkzoNobel, a Netherlands-based global paint manufacturer, has confirmed a cyberattack affecting one of its United States sites. The…...

Check Point Research
research.checkpoint.com > 2026 > 2nd-march-threat-intelligence-report

2nd March – Threat Intelligence Report

1+ week, 2+ hour ago  (569+ words) For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a United States-based casino and hotel operator, has confirmed that employee data was accessed following an…...

Check Point Research
research.checkpoint.com > 2026 > rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

1+ week, 5+ day ago  (1612+ words) By Aviv Donenfeld and Oded Vanunu Claude Code, Anthropic's AI-powered command-line development tool, represents a significant target in this landscape. As a leading agentic tool within the developer ecosystem, its adoption by technology professionals and integration into enterprise workflows means…...

Check Point Research
research.checkpoint.com > 2026 > 23rd-february-threat-intelligence-report

23rd February – Threat Intelligence Report

2+ week, 10+ hour ago  (504+ words) For the latest discoveries in cyber research for the week of 23rd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES France's Ministry of Economy has disclosed a data breach resulted from an unauthorized access to the national bank…...

Check Point Research
research.checkpoint.com > 2026 > ai-in-the-middle-turning-web-based-ai-services-into-c2-proxies-the-future-of-ai-driven-attacks

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

2+ week, 6+ day ago  (829+ words) We then connect the technique to the broader trajectory: once AI services can be used as a stealthy transport layer, the same interface can also carry prompts and model outputs that act as an external decision engine, a stepping stone…...

Check Point Research
research.checkpoint.com > 2026 > 16th-february-threat-intelligence-report

16th February – Threat Intelligence Report

3+ week, 1+ hour ago  (499+ words) For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider Odido was hit by a data breach following unauthorized access to its customer management system....

Check Point Research
research.checkpoint.com > 2026 > 9th-february-threat-intelligence-report

9th February – Threat Intelligence Report

1+ mon, 6+ hour ago  (809+ words) For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romania's national oil pipeline operator, Conpet, has suffered a cyberattack that disrupted its IT systems and took its…...

Check Point Research
research.checkpoint.com > 2026 > 2nd-february-threat-intelligence-report

2nd February – Threat Intelligence Report

1+ mon, 1+ week ago  (532+ words) For the latest discoveries in cyber research for the week of 2nd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES MicroWorld Technologies, maker of eScan antivirus, has suffered a supply-chain compromise. Malicious updates were pushed via the legitimate…...

Check Point Research
research.checkpoint.com > 2026 > voidlink-the-cloud-native-malware-framework

VoidLink: The Cloud-Native Malware Framework

1+ mon, 3+ week ago  (775+ words) The framework's intended use remains unclear, and as of this writing, no evidence of real-world infections has been observed. The way it is built suggests it may ultimately be positioned for commercial use, either as a product offering or as…...

Check Point Research
research.checkpoint.com > 2026 > inside-gobruteforcer-ai-generated-server-defaults-weak-passwords-and-crypto-focused-campaigns

Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns

2+ mon, 2+ day ago  (1659+ words) The malicious toolkit is usually split into two parts. The first is an IRC bot that enables remote control of the compromised host, including command execution and updates. The second is a bruteforcer that is fetched later and used to…...