Drilling Down on Uncle Sam’s Proposed TP-Link Ban – Krebs on Security

#Ciberseguridad – Seis vulnerabilidades en Microsoft Windows

Check Point Research, la división de Inteligencia de Amenazas Check Point® Software Technologies Ltd. ha identificado seis nuevas vulnerabilidades en Microsoft Windows, una de ellas catalogada como crítica. Estos fallos podrían provocar la caída total de sistemaspermitir la ejecución de código malicioso o exponer información sensible en redes corporativas (Fuente Check Point Research Latam).

Siguiendo el procedimiento de divulgación responsable, Check Point Software ha informado de forma privada a Microsoft, que publicó las actualizaciones de seguridad correspondientes el pasado martes 12 de agostoLos clientes de Check Point Software ya están protegidos, gracias a las soluciones de la compañía que detectan y bloquean activamente intentos de explotación de estas vulnerabilidades.

Uno de los hallazgos más destacados es, probablemente, la primera vulnerabilidad divulgada públicamente en un componente del kernel de Windows desarrollado en Rust. Este fallo puede provocar un bloqueo completo del sistema, obligando a un reinicio forzoso y desconectando instantáneamente a los usuarios. Aunque Rust se diseñó para mejorar la seguridad frente a errores de memoria, este caso demuestra que incluso tecnologías avanzadas requieren vigilancia constante y parches proactivos.

Otras dos vulnerabilidades graves (CVE-2025-30388 y CVE-2025-53766) permiten a un atacante ejecutar código malicioso al interactuar con un archivo manipulado, lo que podría facilitar la instalación de malwareherramientas de control remoto o la toma total del sistema.

Las tres vulnerabilidades restantes provocan fugas de información por corrupción de memoria. Una de ellas (CVE-2025-47984) puede filtrar contenido de memoria directamente a través de la red, lo que incrementa el riesgo al no requerir acceso físico al dispositivo.

Recomendaciones para empresas y usuarios:

  • Instalar inmediatamente las actualizaciones de seguridad publicadas por Microsoft en agosto.
  • Mantener activas las soluciones de seguridad capaces de detectar y bloquear intentos de explotación antes de que los parches estén disponibles.
  • Adoptar una estrategia proactiva de ciberseguridad que combine actualizaciones regulares y sistemas de detección avanzada.

“El descubrimiento de estas seis vulnerabilidades en Windows, incluida la primera detectada en un componente del kernel escrito en Rust, refleja la complejidad de asegurar incluso los sistemas más consolidados”, afirma Eusebio Nieva, director técnico de Check Point Software para España y Portugal. “La aplicación inmediata de los parches y el uso de soluciones de protección avanzadas son esenciales para minimizar riesgos y evitar interrupciones en la operativa empresarial”.

#arielmcorg #checkPointResearch #ciberseguridad #infosertec #malware #PORTADA #windows

🧱 That Minecraft mod? It might be malware.

Check Point Research uncovered a multistage attack targeting players through fake mods on GitHub.

🕵️‍♂️ Stolen data
💰 Compromised wallets
💻 Infected devices

With over 200M monthly players, Minecraft isn’t just a game — it’s a new cyber battleground.

🔎 Read the report: https://blog.checkpoint.com/research/minecraft-players-targeted-in-sophisticated-malware-campaign

#Minecraft #CyberSecurity #CheckPointResearch #GamingThreats

🚨 New Threat Intelligence Report: May 19, 2025

Check Point Research's latest report highlights a 94% surge in weekly cyberattacks targeting telecommunications infrastructure in Q1 2025, driven by the growing reliance on 5G, AI, and automation.

Additionally, a sophisticated phishing campaign has been identified, using fake email quarantine alerts to steal credentials, with 32,000 malicious emails sent to over 6,000 customers.

Stay informed and protect your organization by reading the full report: https://research.checkpoint.com/2025/19th-may-threat-intelligence-report/

#CyberSecurity #ThreatIntel #CheckPointResearch #EmployeeAmbassadors #Phishing

19th May – Threat Intelligence Report - Check Point Research

For the latest discoveries in cyber research for the week of 19th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Fashion giant Dior confirmed a data breach that exposed customer information from its Fashion and Accessories line. The leaked data includes names, gender, phone numbers, email addresses, postal addresses, and purchase history […]

Check Point Research

🚨 Cybersecurity Alert: Check Point Research's 12th May Threat Intelligence Report

Check Point Research's latest Threat Intelligence Report highlights significant cyber incidents from the past week including a UK-based education giant, a medical device manufacturer, an airline and more.

These incidents underscore the persistent threats across various sectors.

🔗 For a comprehensive overview, read the full report here: https://research.checkpoint.com/2025/12th-may-threat-intelligence-report/

#CyberSecurity #ThreatIntelligence #CheckPointResearch #DataBreach #CyberAttack #Infosec

12th May – Threat Intelligence Report - Check Point Research

For the latest discoveries in cyber research for the week of 12th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The UK’s Legal Aid Agency has suffered a cyberattack. The agency, which operates under the Ministry of Justice to provide billions in legal aid funding, has stated that financial information relating to […]

Check Point Research

🔍 Stay Ahead of Emerging Cyber Threats

This week's Threat Intelligence Report from Check Point Research highlights significant cyber incidents affecting major organizations across healthcare, retail, and enterprise.

These incidents underscore the evolving threat landscape and the importance of robust cybersecurity measures.

📄 Read the full report: https://research.checkpoint.com/2025/5th-may-threat-intelligence-report/

#CyberSecurity #ThreatIntelligence #CheckPointResearch

5th May – Threat Intelligence Report - Check Point Research

For the latest discoveries in cyber research for the week of 5th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Three major UK retailers – Co-op, Harrods and Marks & Spencer (M&S) – were hit by cyberattacks that disrupted operations and compromised sensitive data. The attacks are believed linked to the Scattered […]

Check Point Research
Banshee Stealer Variante zielt auf macOS-User ab

Sicherheitsforscher haben eine neue Variante der auf macOS ausgerichteten Schadsoftware namens Banshee Stealer entdeckt.

TARNKAPPE.INFO
In my new blog for #CheckPointResearch I propose a new injection technique, using the Thread Name API - check it out! 💙 : https://research.checkpoint.com/2024/thread-name-calling-using-thread-name-for-offense // #ThreadNameCalling #processInjection
Thread Name-Calling - using Thread Name for offense - Check Point Research

Research by: hasherezade Highlights: Introduction Process injection is one of the important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purposes such as: Due to the fact that interference in the memory of a process by malicious modules can cause a lot of damage, all sorts of AV […]

Check Point Research
Check Point: Microsoft am meisten genutzte Phishing-Marke

Microsoft, Amazon & Google stehen an der Spitze der am häufigsten imitierten Marken für Phishing-Betrug in Q4-2023 laut Check Point Research.

Tarnkappe.info
Google Collections-Phishing: Neue Betrugsmasche breitet sich aus

Cyberkriminelle haben eine neue und sehr raffinierte Methode gefunden, ihre Opfer in Sicherheit zu wiegen: Google Collections-Phishing.

Tarnkappe.info