Entry Thumbnail

Injection for an athlete

After yet another workout where my sports watch completely lost GPS, I’d had enough. I decided to dig into its firmware and pinpoint the problem. I couldn’t find it published anywhere. No download section, no public archive, nothing. So, I changed tactics and went in through the Android app instead, […]

Posted by
Entry Thumbnail

The State of Ransomware – Q3 2025

Key Findings During the third quarter of 2025, we monitored more than **85 active data leak sites** (DLS) that collectively listed **1,592 new victims**. Compared to the **1,607 victims reported in Q2** 2025, the publication rate remained stable though it is still **notably higher** than the 1,270 victims recorded in […]

Posted by
Entry Thumbnail

Introducing HTTP Anomaly Rank

Director of Research **Published:** 11 November 2025 at 14:41 UTC **Updated:** 11 November 2025 at 14:41 UTC If you’ve ever used Burp Intruder or Turbo Intruder, you’ll be familiar with the ritual of manually digging through thousands of responses by repeatedly sorting the table via length, status code, etc. I’ve […]

Posted by
Entry Thumbnail

How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation

_By: Dikla Barda, Roaman Zaikin & Oded Vanunu_ On November 3, 2025, Check Point Research’s blockchain monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. The attacker exploited arithmetic precision loss in pool invariant calculations to drain **$128.64 million** across six blockchain networks in under 30 minutes. The […]

Posted by