#checkpoint

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-02-05

🚨 Nation-state attackers are exploiting new vulnerabilities!

#CheckPoint Research uncovered highly targeted attacks against government and law enforcement agencies across the ASEAN region.

The previously untracked group, Amaranth-Dragon, is weaponizing newly disclosed vulnerabilities within days and tying activity to real-world political events.

👉 Read the research to understand what’s happening and why it matters: blog.checkpoint.com/research/a

#CyberSecurity #ThreatPrevention

IT FinanzmagazinIT_Finanzmagazin
2026-02-05

2025 erlebten Banken eine Verdopplung der Cyberangriffe: Koordinierte Kampagnen, Hacktivismus und Ransomware-as-a-Service dominieren die neue, hochprofessionelle Bedrohungslage. Besonders auffällig: DDoS-Attacken auf kritische Finanzdienste stiegen um 105 % und sind zunehmend geopolitisch motiviert.
...
it-finanzmagazin.de/von-hackti

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-02-04

#CheckPoint Research has published the 2026 #CyberSecurity Report, highlighting #AI as a force multiplier across attacks, fragmentation in #ransomware with data only extortion, and multi-channel #socialengineering attacks. It maps threat activity to geopolitics and identity driven paths, quantifies risky AI usage, and provides sector and regional breakouts.

research.checkpoint.com/2026/c

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-30

For the latest discoveries in cyber research for the week of 26th January, please download our Threat Intelligence Bulletin: research.checkpoint.com/2026/2

#CheckPoint #ThreatIntelligence

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-29

#CheckPoint researchers describe a #MicrosoftTeams #phishing campaign abusing guest invitations and finance-themed team names to mimic billing notices. More than 12K emails were observed hitting 6,135 users via invite emails with obfuscated text. The campaign targeted US-based organizations across manufacturing, technology, and education.

blog.checkpoint.com/email-secu

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-29

🏁 What happens when championship speed meets cyber protection?

We're excited to announce that we're teaming up with NASCAR powerhouse Hendrick Motorsports, with Corey Day and the No. 17 Chevrolet leading the charge!

Together, we're securing the digital systems behind modern racing — from data and connectivity to the technologies behind every lap — as Corey takes on the 2026 NASCAR O’Reilly Series season.

Learn more: checkpoint.com/press-releases/

#CheckPoint #CyberSecurity #NASCAR #PreventionFirst

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-28

#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.

research.checkpoint.com/2026/k

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-27

#CheckPoint Research revealed that #VoidLink, a recently exposed cloud-native #Linux #malware framework, is authored almost entirely by AI, likely under the direction of a single individual. The malware was produced predominantly through AI-driven development, reaching the first functional implant in under a week. From a methodology perspective, the actor used the model beyond coding, adopting an approach called Spec Driven Development (SDD).

research.checkpoint.com/2026/v

2026-01-26

Синхронизация файлов в PostgreSQL

В PostgreSQL устранили проблему невозможности выполнить контрольную точку на большом кэше буферов. В статье описываются условия возникновения проблемы, даётся пример диагностики статистики ввода-вывода в ситуациях, когда процесс checkpointer не успевает очищать свой круговой буфер. Также приводится алгоритм синхронизации файлов данных.

habr.com/ru/articles/988910/

#checkpoint #postgres #postgresql #buffer_cache

AllAboutSecurityallaboutsecurity
2026-01-25

China untersagt heimischen Firmen westliche Cybersecurity-Software

Dies geht aus einem exklusiven Beitrag von Reuters hervor.

all-about-security.de/china-un

art.in.oppositiondaisukeiguchi
2026-01-20

eye.on.palestine
とpalestine.pixel
イスラエル占領軍は本日午後、ラマッラー市北部のアタラ検問所を通過中だった青年を暴行した後、逮捕した。
Israeli occupation forces arrested a young man after assaulting him while he was passing through the Atara , north of the city of , this afternoon.

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-19

Did you miss the biggest #CheckMates event of the year?

The full recording of #CheckMatesFest2026 is now live on CheckMates.
Watch the complete celebration, hear insights from #CheckPoint leadership on what’s ahead, and catch the full R&D Q&A, including questions from the community.

If you couldn’t join us live on Wednesday, this is your chance to experience it all!

community.checkpoint.com/t5/Ge

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-19

🚨 MASS EXPLOITATION ALERT – PATCH NOW

If you use #HPE #OneView, your systems could already be compromised. #CheckPoint Research has detected an active exploitation campaign against a critical #vulnerability.

Attackers can execute commands on your systems without authentication. Government, financial, and industrial sectors are already being hit hard and need to act fast.

👉 Find out more in our full report: blog.checkpoint.com/research/p

#CyberSecurity

Chuck Darwincdarwin@c.im
2026-01-17

When the immune system detects a protein from a pathogen,
it’s supposed to dispatch killer T cells to eliminate the invader.

Some cancers can interfere with this process by hijacking the checkpoint proteins that keep our immune system from revving out of control
and using them to turn T cells off.

Starting in the mid-1990s, several research teams found success by treating mice with #checkpoint #inhibitors,
-- then a new class of drugs designed to keep tumor cells from concealing their identity and signaling, effectively, “nothing to see here.”

Thirty years on, checkpoint inhibitors have become a transformative tool in cancer treatment, especially for melanoma.

The research that went into developing checkpoint inhibitors showed conclusively that immune cells detect cancer much in the same way they identify other pathogens:

through differences in protein structure determined by DNA
—a crucial insight.

But as revolutionary as checkpoint inhibitors have been for immunotherapy, they don’t work for everyone
—far from it.

Some 80 percent of patients do not respond to this class of drugs.

Researchers are still trying to understand all the mechanisms that play a role in determining who does respond,
but one key factor is whether the immune system is able to recognize tumor cells on the basis of their mutations.

This is where mRNA vaccines come in.

#Jason #Luke, a melanoma researcher who now serves as chief medical officer of mRNA-medicine start-up #Strand #Therapeutics,
helped to design several ongoing clinical trials of mRNA vaccines for cancer.

He explains that both checkpoint inhibitors and mRNA vaccines build on our deep evolutionary adaptation for fighting pathogens
by identifying the proteins they shed in our bodies.

But checkpoint inhibitors are effective only if the patient’s immune system recognizes the cancer as a threat.

In contrast, mRNA vaccines have the potential to work even in patients whose cancers haven’t spurred much immune response.

The trick, Luke says, is using computational tools to decipher which of a given tumor’s mutations are most likely to be found by the immune system.

#MichaelMemoli
#WilliamColey #immunotherapy #stroma #MHC

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2026-01-15

#ManageMyHealth, New Zealand’s largest patient portal, has acknowledged a #cyberattack occurred in December 2025, that potentially exposed data of nearly 110K users. An alleged attacker, dubbed Kazu, claimed responsibility and demanded a $60,000 ransom.

Read the full Threat Intelligence Report from #CheckPoint here: research.checkpoint.com/2026/1

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst