Research June 29, 2016 SandBlast Protects Customers from Widespread Cerber Ransomware Attack Starting at 6:44am UTC on June 22nd, Avanan, a partner of Check Point, detected a ...
Research June 27, 2016 The Malware-as-a-Service Industry Several recent developments have brought the malware infrastructure-as-a-service industry into the spotlight, reminding everyone how ...
Research June 24, 2016 Effective Security Management in a Software Defined World Software defined infrastructure (SDx) along with use of private and public clouds completely transforms the ...
Research June 23, 2016 The Infamous Nuclear Exploit Kit Shuts Down In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit ...
Security June 22, 2016 Intel Spot On with CET Intel has recently published a specification for a new technology meant to detect and block ...
Research June 21, 2016 Top 10 Most Wanted Malware Today Check Point published its Threat Index for May, revealing the number of active global ...
Research June 20, 2016 Cerber Ransomware Targets U.S., Turkey and the UK in Two Waves New ransomware families appear on a regular basis, each with a different method of operation. ...
Research June 17, 2016 Tales from the Trenches: Modern Malware Requires Modern Investigation Techniques The Check Point Incidence Response team was called in to assist a company who suffered ...
Research June 17, 2016 In The Wild: Mobile Malware Implements New Features Malware developers just won’t stand still. They continue developing malware as they go, sometimes to ...
Research June 15, 2016 Trust No One – A Cyberworld Survival Guide Cybercriminals are professional scammers; their specialty is tricking users into helping them achieve their malicious ...