July’s Top 10 Most Wanted Malware

 
Check Point Software Technologies today revealed the number of active malware families decreased by 5 percent in July, as the company disclosed the most prevalent malware families attacking organizations’ networks in the month. During July, Check Point detected 2,300 unique and active malware families attacking business networks, a 5 percent increase compared to June, with Conficker remaining the most commonly used malware.  Despite the overall decrease in active malware the prevalence of mobile malware increased, accounting for 9 percent of active malware – up by 50 percent from June.  For the fourth consecutive month HummingBad remained the most commonly used malware to attack ...

CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service

 
Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of private and enterprise users alike. Ransomware has become a global problem. According to the FBI, the accumulated revenue in the first three months of 2016 was over $209 million. One question that naturally arises is - where does all this money go? In some cases, the operation is run by a single attacker, with the malware developer also serving as the distributor and the only one to profit from the campaign. However, the ...

QuadRooter: New Android Vulnerabilities in Over 900 Million Devices

 
Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas. What is QuadRooter? QuadRooter is a set of four vulnerabilities affecting Android devices built using Qualcomm chipsets. Qualcomm is the world’s leading designer of LTE chipsets with a 65% share of the LTE modem baseband market. If any one of the four vulnerabilities is exploited, an attacker can trigger privilege escalations for the purpose of gaining root access to a ...

SandBlast Receives ‘Recommended’ Rating Once Again

 
Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created each day1, traditional security solutions don’t stand a chance in this cat and mouse game. Organizations are constantly striving to ensure protections are top notch to defend their organizations against ever-persistent cyber attackers. An essential ingredient to successfully block unknown malware and zero-day threats is an integrated, advanced sandbox, like Check Point SandBlast Zero-Day Protection. Sandblast inspects files in a safe, virtual environment to discover malicious behavior before it enters the network; and its advanced CPU-level detection identifies and stops ...

Secure Every Click – Check Point SandBlast™ Agent for Browsers

 
Internet users expect near-instant and unconstrained access to web content when browsing. Unfortunately, the web poses one of the greatest threats to enterprises today. Malware may be hidden in web-downloaded content or webmail attachments. Your employees may unknowingly become victims of phishing, social engineering, and other malware-less attacks aimed at stealing corporate passwords and sensitive data. Even the seemingly innocent reuse of corporate passwords by your employees for non-corporate web services puts your organization at risk. To further complicate matters, hackers constantly evolve their methods to evade detection by traditional signature-based security solutions. This ...