Check Point Blog

Welcome to the Check Point Blog where you will find posts tagged in two categories:

  • Threat Research: Research findings, threat intelligence, and perspectives from Check Point’s research teams
  • Security Insights: Perspectives on current events and the security landscape from Check Point thought leaders


Get started by choosing a category, or read them all!

Sort blog posts by:  

The Skinner adware rears its ugly head on Google Play

 
A new member of the ever growing adware-found-on-Google-Play-list has been found. Previous members include Viking Horde, DressCode and CallJam, among many others. The malware, dubbed "Skinner", was embedded inside an app which provides game related features. The app was downloaded by over 10,000 users, and managed to hide on Google Play for over two months. Skinner tracks the user's location and actions, and can execute code from its Command and Control server without the user's permission. The app was removed from the play store after we contacted the Google security team. While Adware are a common threat to users, Skinner displayed new elaborate tactics used to evade detection and ...

Check Point Comments on Recent Advanced Threats

 
Today’s publication by WikiLeaks shows how advanced hacking techniques, including extremely sophisticated exploit tools, are more readily available than you’d think; they’re available to everyone, including governments. These tools provide new surveillance capabilities allowing them to hack into enterprise and military networks, smartphones, tablets and even IoT devices such as Smart TVs. Check Point researchers have been tracking these exploits since the news was first released. What is not released yet is the code detail.  Since the information was retrieved from early 2016, most of the mobile devices that have been targeted so far are older operating system versions of Android ...

Introducing Check Point vSEC for Google Cloud Platform

 
Cloud Security Puzzle – Solved! If you are deploying workloads (like web servers) or migrating back office apps into Google Cloud Platform (GCP), you will be happy to know that you can now do it securely in a turn-key way without sacrificing the agility & business elasticity provided by GCP. Check Point’s vSEC cloud security solution delivers advanced security that is virtually built into the Google environment using Google’s APIs. Together, Google and Check Point enable a multilayer security solution that comprehensively protects customers’ assets and data in the cloud with advanced threat prevention security. Why do we really need another security layer? While the ...

Choice, Flexibility and Advanced Security – Now with Google Cloud Platform

 
As a general rule of thumb, it has been a long accepted strategy in IT to avoid vendor lock in, or trusting too much in a single equipment provider that you get stuck because changing to another vendor would be too costly or inconvenient. This is especially true with public cloud providers, and fear of vendor lock in is often cited as a major road block to further cloud adoption. So how do you eliminate the risks of putting all your IT eggs in a single virtual network basket? One approach to solving this dilemma is a multi-cloud strategy. A multi-cloud approach provides benefits beyond simply eliminating financial risk; it can also help businesses redefine their software ...

Check Point Software Continues Impressive Run on Industry Recognition by Joining CRN 2017 Security 100 Elite Vendors

 
These past few months have seen great momentum for Check Point. The CRN 2017 Security 100 List was just released and Check Point tops the list as one of the 25 Coolest Network Security Vendors in the Network Security category. CRN publishes this list every year to help channel businesses find the vendor that provides “the perfect mix of technology and incentives to partner with.” The companies on CRN's Security 100 list have demonstrated creativity and innovation in product development, as well as a strong commitment to delivering those offerings through a vibrant channel of solution providers. If you really want to see where “the bits meet the bandwidth” in cyber security, ...

Check Point Honored as Coolest Cloud Security Vendor by CRN

 
We are very excited to announce today that CRN has named Check Point to its 100 Coolest Cloud Computing Vendors of 2017 list. This annual lineup recognizes the most innovative cloud technology suppliers in each of five categories: infrastructure, platforms and development, security, storage and software. Check Point is recognized as a cool vendor in CRN’s Cloud security category. As more companies make the move to adopt the cloud, the importance of cloud security vendors and their offerings is at an all-time high. According to research firm Gartner's predictions for 2016, security needs to be top of mind for companies as they extend their business processes to the cloud. That includes ...

Check Point R80 Just Made Neopharm’s Security Management Simpler

 
It’s becoming more challenging than ever to manage security across expanding networks, new technologies, and with growing business requirements. With the risk posed by modern threats, security teams need far more agility and visibility to efficiently manage it all. The Neopharm Group found what it needed—clear visibility, management efficiency and a way to reduce operational overhead—through Check Point’s R80 Security Management. I recently sat down with Amir Shay, the IT and Security Manager of the Neopharm Group. Through its family of companies, Neopharm Group is engaged in the research and development, manufacturing, marketing and sales of a broad range of products in the ...

Check Point’s SandBlast Wins SC Media Award

 
At the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing campaigns were top of mind, and attendees were looking for solutions to prevent the latest threats from attacking their networks. Check Point’s mission has and always will be to safeguard our customers with the best solutions possible against cyber threat actors. Our efforts were recognized at the SC Media Awards, our zero-day protection technology SandBlast was named Best Advanced Persistent Threat (APT) Protection. If you’re reading our blog, there’s a good chance you already know this: The threat landscape today is more complex and dynamic than ever before. Organizations face targeted ...

2016 H2 Global and Regional Threat Intelligence Trends

 
Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same time, prominent malware and attack methods continue to evolve, bypassing existing security solutions, and tailoring attacks against the largest companies in the world. The devices we use every day are now subject to compromise and can be leveraged for attacks. Even the recent U.S. elections were targeted with significant attacks. The Check Point 2016 H2 Global Threat Intelligence Trends report provides you with the best overview of the cyber landscape; threats, data breaches, trends, attacks and predictions, based on data ...

Android: the Perils of Popularity

 
Despite the long lines you see stretching from stores when a new iPhone comes out, Android phones rule. According to IDC, Android’s market share hovers at over 80 percent while iOS has a market share in the teens. Android’s popularity — and vulnerability to attacks — arise from Google’s decision to make Android an open OS. Being an open OS lets many manufacturers make devices that can run Android. However this leads to OS fragmentation when several vendors each release several models over several years resulting in thousands of active versions of Android. This wouldn’t be a big deal except each version has software vulnerabilities that must be patched. At best, it can take ...