FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Check Point Research

19 articles

Check Point Research Zero-Day Check Point 4d ago

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Key Points Introduction At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia ca...

1 IOC

Check Point Research →

Check Point Research General 5d ago

ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime

Key Takeaways What Happened AI assistants now handle some of the most sensitive data people own. Users discuss symptoms and medical history.

Check Point Research →

Check Point Research Data Breach Check Point Intel 5d ago

30th March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Iranian s...

Check Point Research →

Check Point Research Malware 6d ago

AI Threat Landscape Digest January-February 2026

KEY FINDINGS AI-assisted malware development has reached operational maturity.VoidLink framework, which is modular, professionally engineered, and fully func...

Check Point Research →

Check Point Research Data Breach Check Point Intel Mar 23

23rd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 23rd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Navia Ben...

T1041

Check Point Research →

Check Point Research General Check Point Intel Mar 16

16th March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES United St...

Check Point Research →

Check Point Research Campaigns Check Point Mar 12

“Handala Hack” – Unveiling Group’s Modus Operandi

Key Findings Introduction Handala Hack, also tracked by Check Point Research as Void Manticore, is an Iranian threat actor that is known for multiple destruc...

Check Point Research →

Check Point Research General Check Point Mar 10

Iranian MOIS Actors & the Cyber Crime Connection

Key Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, service...

Check Point Research →

Check Point Research Ransomware Check Point Intel Mar 9

9th March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES AkzoNobel,...

Check Point Research →

Check Point Research General Mar 4

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Key Findings Introduction As highlighted in the Cyber Security Report 2026, cyber operations have increasingly become an additional tool in interstate confli...

T1598

Check Point Research →

Check Point Research Campaigns Check Point Mar 3

Silver Dragon Targets Organizations in Southeast Asia and Europe

Key Findings Introduction In recent months, Check Point Research (CPR) has been tracking a sophisticated, Chinese-aligned threat group whose activity demonst...

Check Point Research →

Check Point Research General Check Point Intel Mar 2

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resor...

Check Point Research →

Check Point Research CVE Check Point Feb 25

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

By Aviv Donenfeld and Oded Vanunu Executive Summary Check Point Research has discovered critical vulnerabilities in Anthropic’s Claude Code that allow attack...

T1190 T1041 2 IOCs

Check Point Research →

Check Point Research General Check Point Feb 23

2025: The Untold Stories of Check Point Research

Introduction Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Wh...

Check Point Research →

Check Point Research Data Breach Check Point Intel Feb 23

23rd February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 23rd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES France...

Check Point Research →

Check Point Research TTPs Feb 17

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Key Points Introduction AI is rapidly becoming embedded in day-to-day enterprise workflows, inside browsers, collaboration suites, and developer tooling. As ...

T1598

Check Point Research →

Check Point Research Data Breach Check Point Intel Feb 16

16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch ...

Check Point Research →

Check Point Research Operational Technology Check Point Intel Feb 9

9th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romania...

Check Point Research →

Check Point Research CVE Check Point Intel Feb 4

Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia

Key Points Introduction Check Point Research has identified several campaigns targeting multiple countries in the Southeast Asian region. These related activ...

1 IOC

Check Point Research →

FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA