
The Danger in Clicking 'OK' [CPRadio]
In the grand scheme of cybersecurity, the design issue in Foxit PDF Reader was really very minor. But it revealed a much larger and more imp...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.Produced by PI Media LTD

In the grand scheme of cybersecurity, the design issue in Foxit PDF Reader was really very minor. But it revealed a much larger and more imp...

Once every year, Check Point releases an annual report reviewing the biggest events and trends in cybersecurity. In this episode we'll break...

For years now, Iran’s state-sponsored hackers have been some of the most prolific in the world. But prolific does not necessarily mean sophi...

Once a year, Check Point Research releases a “mid-year report”: a summary of the first half of the calendar year in cybersecurity, including...

Between corporations, governments, and the rest of us, billions are spent every year trying to secure cyberspace. Which makes it almost unbe...

For all the ridiculous spam calls in the world, but a small percentage of them are actually, legitimately, convincing. According to the Kore...

In July 2021, several prominent human rights activists in Azerbaijan received the same phishing email that delivered them spyware, capable o...

In 2022, government APTs wiped out entire computer systems, hackers turned good software evil, and ransomware evolved into something entirel...

Today's AI can beat humans at Jeopardy, chess, recognizing faces and diagnosing medical conditions. As of last Fall it can write malware, to...

Earlier this Fall, some users of the OpenSea trading platform posted dire messages to Twitter: all of the NFTs in their wallets were gone. T...

For decades, hacktivism has been associated with groups like Anonymous. Recently, though, something has changed. An entirely new kind of hac...

Every year, ordinary people lose money in blockchain hacks. Could it be that this technology is simply insecure by nature? Or is there somet...

How was the use of cyber manifested in the Russia-Ukraine war? Will Microsoft block VB macros? We'll discuss all this and more while reviewi...

On March 23rd, 2022, individuals working at the most important defense research institutes in Russia all received variations of the same ema...

Five years ago today, the world witnessed the most destructive ransomware attack ever. Its name was Wannacry, and it changed everything. Wha...

The Conti group tallied over 700 victims, including many multi-million-dollar corporate, government and healthcare organizations. Then, in t...

Did you know that in 2021 there has been a 40% increase in weekly average number of cyber attacks compared to 2020? That is just one of the...

You own some pretty "smart" computers. The laptop on your desk, the phone in your pocket, the system that runs your car. But you're also sur...

It seemed like a totally normal day--people went to work, to school, to get away for an early weekend. Then, across the country of Iran, tra...

In this episode of “Cyber Academy" we will talk about the CVE database. What's a CVE? What do the numbers attached to the CVE mean? Are they...

Check Point Research (CPR) finds security flaws in Atlassian, a platform used by 180,000 customers worldwide to engineer software and manage...

In this episode of "Cyber Academy" we will talk about viruses, worms and trojans. What is the difference between these three types of malwar...

Last May, in one of the most brazen attacks ever attempted, cybercriminals from Eastern Europe shut down the supply of gasoline to most of t...

In this episode of “Cyber Academy, we will talk about Botnets. What are Botnets used for? How does the Botmaster, the attacker, control the...

Would you use a computer without any kind of antivirus? Would you put your personal photos on that device? Use it to text and email? Access...

In our previous episodes, you heard the term "vulnerabilities" more than once. But what exactly does it mean? What stands behind this big wo...

In 2020 hospitals were hit with ransomware, corporations with phishing attacks, and we saw one of the biggest hacks ever conceived: the Sola...

When the Pfizer and Moderna vaccines were first approved, almost nobody could get one. Meanwhile, on the darknet, cybercriminals were offeri...

In the summer of 2016, a group of anonymous hackers hacked into the NSA and released some of the most powerful exploits ever developed. The...

The recent SolarWinds breach was one of the most sophisticated, complex cyber operations in history. By the end 18,000 companies, including...

A man goes on Dubai T.V to discuss national security in the Middle East. 1,000 miles north, a social activist uses Telegram to organize anti...

DNS is the phone book of the internet--it's how your computer knows where to go to reach the website you want to visit. It's no stretch to s...

Most people place their virtual assistants in their living room or bedroom. This makes it very easy to interact with cyberspace while you're...

When Gal Elbaz came across a modest GIF parser sitting in a remote corner of GitHub, he wasn't exactly looking for trouble. But he found it....

Major tech companies understand that their brands are only as strong as they are safe to use, so they set bounties on vulnerabilities: hundr...

In 2015, Khalifa Haftar--a fierce military general, known as "Libya's most potent warlord"--began an operation to take over the state of Lib...

A new kind of man-in-the-middle attack is emerging, and it may just be the most lucrative method of hacking ever conceived.

The first publicized case of Ccoronavirus in the United States occurred in late February, 2020. Almost immediately, a different spread began...

Phishing is the oldest trick in the book—we're all familiar with it by now. Yet for the past few years, Canadian companies had been falling...

It began with a "Google" security email. But the trail of breadcrumbs traced back to something much, much bigger: a laser-targeted hacking c...

Last year, iOS, Zynga, Facebook and Capital One were hacked. Personal information from over a billion people were exposed in data breaches,...

The world's premier cyber espionage agency built one of the world's most advanced cyber tools. When it was leaked, most of the security sect...

The most popular video game in the world has a problem: a black market economy has developed around its in-game currency. Cybercriminals are...

The Middle East is a turbulent and explosive region, to put it mildly – and that is why when Aseel Kial, a Malware Analyst at CheckPoint, ca...

What happens if a single baby monitor can be hacked? Powerful ransomware has caused outages in hospitals across the world, putting thousands...