A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.
Produced by PI Media LTD
Brought to you by PI Media of CPradio
Major tech companies understand that their brands are only as strong as they are safe to use, so they set bounties on vulnerabilities: hundreds of thousands of dollars, a million dollars, to any programmer who can find a hole in their sites. White hat hackers comb every line of code ...
In 2015, Khalifa Haftar--a fierce military general, known as "Libya's most potent warlord"--began an operation to take over the state of Libya. He led an insurgent army, slowly taking over the country's southern lands, headed straight for the capital of Tripoli. All the while, 'Khalifa Haftar' on Facebook was publishing ...
A new kind of man-in-the-middle attack is emerging, and it may just be the most lucrative method of hacking ever conceived. ...
The first publicized case of Ccoronavirus in the United States occurred in late February, 2020. Almost immediately, a different spread began: hackers, leveraging the global panic to spread new kinds of malicious cyber threats. Whether the new, COVID-related malware succeeded would ...
Phishing is the oldest trick in the book—we're all familiar with it by now. Yet for the past few years, Canadian companies had been falling victim to an ordinary phishing campaign. What made this threat different? ...