Introduction Since October 2023, Check Point Research (CPR) has actively monitored and hunted state-sponsored threats targeting Israeli organizations with destructive attacks using wipers and ransomware. Among these threats, Void Manticore (aka Storm-842) stands out as an Iranian threat actor known for conducting destructive attacks and leaking information through the online persona ’Karma’ (sometime written as KarMa). […]| Check Point Research
Harmony Endpoint| Check Point Software
Cloud Email Security & Office Suite Protection Preventing zero-day threats from attacking your cloud mailboxes and Microsoft Office suites.| Check Point Software
Research by: hasherezade Highlights Introduction Rhadamanthys is an information stealer with a diverse set of modules and an interesting multilayered design. In our last article on Rhadamanthys [1], we focused on the custom executable formats used by this malware and their similarity to a different family, Hidden Bee, which is most likely its predecessor. In […]| Check Point Research
Zero-day protection technology prevents advanced 5th generation cyberattacks. SandBlast prevents threats across your network, endpoints, and mobile devices.| Check Point Software