Research September 22, 2015 Closing the Malware Gap: The Rise of Threat Extraction Attackers most commonly enter organizations through everyday means such as an emailed file. While these ...
Research September 22, 2015 Check Point and AirWatch Partner to Secure the Future of the Mobile Enterprise As cyberthreats become more sophisticated, it’s important to have a comprehensive mobile security strategy that ...
Research September 21, 2015 XCodeGhost: The First Wide-Scale Attack on iOS Apps Arrives XcodeGhost is a compromised version of the iOS developer platform, Xcode. This unofficial version of ...
Research September 21, 2015 BrainTest – A New Level of Sophistication in Mobile Malware Check Point Mobile Threat Prevention has detected two instances of a mobile malware variant infecting ...
Research September 15, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ultimatum In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research September 14, 2015 The Problem with Traditional Sandboxing Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, ...
Research September 10, 2015 Check Point IPS Protects Against Zero-Day Vulnerability in FireEye Appliances On September 6th, researcher Kristian Erik Hermansen publically disclosed a zero-day vulnerability in FireEye appliances. ...
Research September 10, 2015 Analysis of the Sality Gambling Campaign Check Point has a wide and global install base, from which we receive anonymized logs ...
Research September 9, 2015 The Sandbox Evolved: An Advanced Solution to Defeat the Unknown The modern threat landscape is one of constant evolution. Everything is changing before our eyes ...
Research September 8, 2015 WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users Introduction WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The ...