New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries on March 10, 2026 Posted by The Hacker News
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows on March 10, 2026 Posted by The Hacker News
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction on March 10, 2026 Posted by The Hacker News
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852 on February 25, 2026 samanthar@checkpoint.com
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia on February 4, 2026 samanthar@checkpoint.com
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun on January 20, 2026 samanthar@checkpoint.com
GachiLoader: Defeating Node.js Malware with API Tracing on December 17, 2025 samanthar@checkpoint.com
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation on December 16, 2025 samanthar@checkpoint.com