Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

What founders can learn from Anjuna’s layoffs and recovery

Volkswagen is dropping the all-electric ID.4 in the U.S

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    ChatGPT finally offers $100/month plan

    10 April 2026

    AWS boss explains why investing billions in both Anthropic and OpenAI is an okay conflict

    9 April 2026

    Poke makes using AI agents as easy as sending a text

    9 April 2026

    Last 3 days to save up to $500 on your Disrupt 2026 Pass

    8 April 2026

    I can’t help but root for tiny open source AI model maker Arcee

    8 April 2026
  • Apps

    The EFF is the latest organization to leave X

    10 April 2026

    Last 2 days to save up to $500 on your Disrupt 2026 ticket

    9 April 2026

    Canva Doubles Down on AI and Marketing Automation with Simtheory, Ortto Acquisitions

    9 April 2026

    Atlassian launches visual AI tools and third-party agents in Confluence

    8 April 2026

    Chrome is finally adding a better way to deal with too many open tabs

    8 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026
  • Hardware

    Amazon is ending support for older Kindle devices

    9 April 2026

    Intel signs Elon Musk’s Terafab chip project

    8 April 2026

    The Xiaomi 17 Ultra has some impressive extras that make taking photos really fun

    6 April 2026

    In Japan, the robot doesn’t come for your job. fills the one no one wants

    6 April 2026

    Peter Thiel’s big bet on solar-powered cow collars

    5 April 2026
  • Media & Entertainment

    Spotify now allows everyone to turn off videos in its app

    9 April 2026

    As YouTube expands into TV, it sees more interactive video across all formats

    9 April 2026

    Tubi is the first streamer to launch a native app on ChatGPT

    8 April 2026

    Binge is a movie watching app that warns you about skips in real time

    7 April 2026

    Netflix is ​​expanding into kids’ games with a new standalone app

    6 April 2026
  • Security

    VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

    10 April 2026

    Hackers steal and leak sensitive LAPD police documents

    9 April 2026

    The developer of WireGuard VPN cannot send software updates after Microsoft locks the account

    9 April 2026

    Hack-for-hire group caught targeting Android devices and iCloud backups

    8 April 2026

    Iranian hackers are targeting critical US infrastructure, US agencies warn

    8 April 2026
  • Startups

    What founders can learn from Anjuna’s layoffs and recovery

    10 April 2026

    Former Tesla engineer’s startup taps Pronto to help automate a copper mine

    9 April 2026

    Databricks co-founder wins prestigious ACM award, says ‘AGI is already here’

    9 April 2026

    Why a former AirPods engineer is now building heat pumps

    8 April 2026

    AI startup Rocket offers McKinsey-style reporting at a fraction of the cost

    7 April 2026
  • Transportation

    Volkswagen is dropping the all-electric ID.4 in the U.S

    10 April 2026

    Waymo robotaxis tracks potholes and shares that data with Waze users

    9 April 2026

    Self-driving car in Texas hits and kills mother duck, sparking neighborhood outrage

    9 April 2026

    Hermeus raises $350 million to build unmanned hypersonic fighters

    8 April 2026

    Waymo opens robotaxi service in Nashville, partners with Lyft

    7 April 2026
  • Venture

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026

    Collide Capital Raises $95M to Back Future-of-Work Fintech Startups

    9 April 2026

    VC Eclipse has a new $1.3 billion fund to back — and build — “natural AI” startups

    8 April 2026

    The AI ​​gold rush is pulling private wealth into riskier, older bets

    7 April 2026

    Save up to $500 on tickets this week for Disrupt 2026

    6 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Zero-day flaw in Check Point VPNs is ‘extremely easy’ to exploit
Security

Zero-day flaw in Check Point VPNs is ‘extremely easy’ to exploit

techtost.comBy techtost.com30 May 202403 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Zero Day Flaw In Check Point Vpns Is 'extremely Easy' To
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity firm Check Point says attackers are exploiting a zero-day vulnerability in its enterprise VPN products to infiltrate its customers’ corporate networks.

The tech maker has yet to say who is responsible for the cyberattacks or how many of its customers are affected by hacks linked to the vulnerability, which security researchers say is “extremely easy” to exploit.

In a blog post this week, Check Point said the vulnerability in Quantum network security devices allows a remote attacker to obtain sensitive credentials from an affected device, which can give attackers access to the victim’s wider network. Check Point said attackers began exploiting the flaw around April 30. A zero-day bug is when a vendor does not have time to fix the bug before it is exploited.

The company urged customers to install patches to repair the defect.

Check Point has more than 100,000 customers, according to its website. A Check Point representative did not return a request for comment asking how many of its customers are affected by the exploit.

Check Point is the latest security company in recent months to disclose a security vulnerability in its security products, the very technologies designed to protect companies from cyberattacks and digital intrusions.

These network security devices sit at the edge of a company’s network and serve as digital gatekeepers for which users are allowed in, but they tend to contain security flaws that in some cases can easily bypass their security defenses and lead to compromise of the client’s network.

Several other business and security vendors, including Ivanti, ConnectWise and Palo Alto Networks, have rushed in recent months to fix flaws in their enterprise-grade security products that malicious attackers have exploited to undermine customer networks to steal data. All of these bugs are high severity in nature, largely due to how easy they were to exploit.

In the case of the Check Point vulnerability, security research firm watchTowr Labs reported on it vulnerability analysis that the bug was “extremely easy” to exploit once it was discovered.

The flaw, which watchTowr Labs described as a path vulnerability, means it’s possible for an attacker to remotely trick an affected Check Point device into returning files that should be protected and off-limits, such as passwords to access root- operating system level of the device.

“This is much more powerful than the vendor advice seems to imply,” said WatchTowr Labs researcher Aliz Hammond.

The US cybersecurity agency CISA has announced that it has added the Check Point vulnerability to its public list of known exploit vulnerabilities. In brief remarks, the government cyber agency said the vulnerability in question is frequently exploited by malicious cyber actors and that these types of flaws pose “significant risks to federal business.”

Check checkpoint cyber security easy exploit extremely flaw point VPN VPNs vulnerability zeroday
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFunding for AI startups is incremental as Switzerland’s EthonAI raises $16.5 million
Next Article Spotify offers refunds for Car Thing as it faces lawsuit over streaming device bricking
bhanuprakash.cg
techtost.com
  • Website

Related Posts

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

10 April 2026

Hackers steal and leak sensitive LAPD police documents

9 April 2026

The developer of WireGuard VPN cannot send software updates after Microsoft locks the account

9 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

VeraCrypt encryption software developer says Windows users may experience startup problems after Microsoft shuts down its account

10 April 2026

What founders can learn from Anjuna’s layoffs and recovery

10 April 2026

Volkswagen is dropping the all-electric ID.4 in the U.S

10 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash app launches ‘pay later’ feature for P2P transfers

3 April 2026

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026
Startups

What founders can learn from Anjuna’s layoffs and recovery

Former Tesla engineer’s startup taps Pronto to help automate a copper mine

Databricks co-founder wins prestigious ACM award, says ‘AGI is already here’

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.