Research November 24, 2016 ImageGate: Check Point uncovers a new method for distributing malware through images Check Point researchers identified a new attack vector, named ImageGate, which embeds malware in image ...
Research November 23, 2016 A Complex Web: Bitcoin Mixing Services Check Point’s Threat Intelligence Analysis team often comes across attackers who seek payment from their ...
Security November 21, 2016 October’s ‘Most Wanted’ Malware List Shows Attacks on the Rise Check Point’s Threat Intelligence Research Team revealed today that the number of malware attacks increased ...
Security November 15, 2016 Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World! Recently, David Strom and Network World decided to put our zero-day protection technology to the ...
Research November 11, 2016 Clearing the fog: a vision of security for hybrid clouds Have you ever driven on a high road or mountain pass that’s shrouded by low ...
Research November 8, 2016 Denied! Dealing with Global Distributed Denial of Service Cyber security has recently reached yet a new level of public awareness, as the world ...
Research November 2, 2016 Beware! Malware Targeting Endpoints on the Rise Ahead All you need to do is listen to the news and you know that the ...
Security October 28, 2016 Global Trends of the ‘Most Wanted’ Malware The malware world continues to develop rapidly and dynamically. On a daily basis new malware ...
Research October 25, 2016 Check Point’s Cyber Security Predictions for 2017 2016 proved to be another year of devastating data breaches, spanning across multiple industries, across ...
Research October 24, 2016 6 Tips to Outsmart the Phishermen Brian Kernighan once said, “If you don’t understand viruses, phishing, and similar cyber threats, you ...