eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

227
active users

#checkpoint

0 posts0 participants0 posts today

Charging people for water like it's a commodity will fix our water infrastructure issues! Oh wait ...

"The issue stems from Watercare's smart meters, which it told Checkpoint more than 13,000 of are not working.

The water supplier also said they've known about problems with one type of smart meter since October last year, and the fault has so far affected around one third of the 40,000 meters installed since 2022."

#RNZ, #Checkpoint, 2025

rnz.co.nz/news/national/565150

RNZ · Problems with Auckland's Watercare bills after more than 13,000 smart meters not workingBy Checkpoint

via queer_hannover:

Selbsthilfegruppe für trans*, intersexuelle und queere Menschen sowie ihre Angehörigen – Unterstützung bei Anträgen, Gutachten und vielem mehr.

🤝 Trans* Selbsthilfegruppe
📅 21.06.2025, 19:30 Uhr
📍 andersraum, Asternstraße 2, Hannover
.
.
.
#Untenrum #SafeSpace #SexuelleGesundheit #Hannover #QueerCommunity #Beratung #RefugeesWelcome #GünstigeGetränke #LSBTIQ #SexPositivity #HannoverHbf #CheckPoint #Aidshilfe #Empowerment #Sexualaufklärung

Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage

Check Point Research (CPR) uncovered an active-weaponized Microsoft WebDAV zero‑day (CVE‑2025‑33053) exploited by the Stealth Falcon APT in a targeted campaign against defense and government organizations across the Middle East and Africa. The attack began with a spear-phishing-disguised .url file that hijacks the working-directory-based execution of legitimate Windows tools (LOLBins) to load malicious executables from a WebDAV server.

Pulse ID: 68494baf27507539fd31918c
Pulse Link: otx.alienvault.com/pulse/68494
Pulse Author: AlienVault
Created: 2025-06-11 09:26:07

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

"Check Point response to the BreachForum post on 30 March 2025"
⬇️
"On March 30th, 2025, a BreachForum post offered to sell alleged hacked Check Point data. This relates to an old, known, and pinpointed event from several months ago, which we addressed at the time and had no security implications.

This event included 3 organizations' tenants in a portal that does not include customers' systems, production or security architecture. The event did not include the description detailed in the post."
👇
support.checkpoint.com/results

Relted to "Alleged Sale of Check Point Software Technologies Network Access & Sensitive Data
Dark Web Informer - Cyber Threa"
👇
darkwebinformer.com/alleged-sa

support.checkpoint.comsk183307 - Check Point response to the BreachForum post on 30 March 2025Applies to: Other

A U.S. girl traveling to Houston for brain cancer treatment was reportedly detained by federal immigration agents and deported to Mexico, along with her parents and most of her siblings. Her parents were living in Texas without legal status.

houstonpublicmedia.org/article

Houston Public Media · American girl with brain cancer reportedly deported while on way to Houston for treatmentBy Adam Zuvanich

Went through my first #BorderPatrol #checkpoint here in #NewMexico. They are diverting all northbound #I25 traffic off the Interstate for a Border Patrol inspection. Every vehicle. There's no getting around it. Looked like the setup has been there at least for a couple of weeks? Maybe months. And they're totally racist as fuck too going about it. Elmer Fudd took one look at me and waved me through. Guess I was the right shade of white.

Inside Akira Ransomware’s Rust Experiment

"Check Point Research analyzed the construction and control flow of Akira ransomware’s Rust version that circulated in early 2024, which has specific features uniquely targeting ESXi server. Our analysis demonstrates how Rust idioms, boilerplate code, and compiler strategies come together to account for the complicated assembly.
The report outlines principles to follow when analyzing ITW Rust binaries in general.
We present an analysis of the design strategies used by the malware’s authors, as indicated by the assembly and parts of the reconstructed source code." (Source: Check Point Research)

#CheckPoint #Research #akira #ransomware

research.checkpoint.com/2024/i

Check Point Research · Inside Akira Ransomware's Rust Experiment - Check Point ResearchExecutive Summary Introduction Earlier this year, Talos published an update on the ongoing evolution of Akira ransomware-as-a-service (RaaS) that has become one of the more prominent players in the current ransomware landscape. According to this update, for a while in early 2024, Akira affiliates experimented with promoting a new cross-platform variant of the ransomware called […]

#SEC Charges Four Companies With Misleading Cyber Disclosures

"The Securities and Exchange Commission today charged four current and former public companies – #Unisys Corp., #Avaya Holdings Corp., #CheckPoint Software Technologies Ltd, and #Mimecast Limited – with making materially #misleading #disclosures regarding cybersecurity risks and intrusions. The SEC also charged Unisys with disclosure controls and procedures violations..."

#Lieferkette #SupplyChain
sec.gov/newsroom/press-release

www.sec.govSEC.gov | SEC Charges Four Companies With Misleading Cyber Disclosures