Check Point Blog

August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat

Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations feel the impact of large scale Ramnit campaign   There was a significant increase in attacks using the Ramnit banking trojan during August, according to our latest Global Threat Index. Ramnit has doubled its global impact over the past few…

Read More
Corporate Blog September 11, 2018

Check Point is a Leader in 2018 Next-Generation Firewall NFGW Test by NSS Labs

NSS Labs recently conducted and published the results of its 2018 Next Generation Firewall (NGFW) Group Test.  At Check Point, we pride ourselves on our “sense of urgency” to move quickly to protect against new vulnerabilities and attacks, and in a follow-on public test conducted at NSS Labs in August, 2018, we delivered outstanding results*:…

Read More
Corporate Blog September 6, 2018

Architect-ed for Automation: AWS Transit VPCs with Check Point CloudGuard

There are a number of reasons why organizations are drawn to AWS for their public cloud needs; increased business agility, improved process efficiencies and lower networking costs to name a few. And, if the latest AWS quarterly earnings are any indication, this trend shows no sign of slowing down any time soon.   Check Point…

Read More
Corporate Blog August 31, 2018

AI and Cybersecurity: combining data with human expertise

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and AI-based medical diagnostics and prognoses.   But can artificial intelligence be used effectively…

Read More
Corporate Blog August 30, 2018

File-less Malware No Match For SandBlast Agent

File-less malware attacks are on the rise. As a result, much has been written on this sophisticated form of attack, which is able to evade traditional anti-virus solutions due them not needing to install any malware to infect the victim’s machine. Instead, they take advantage of existing vulnerabilities in every computer and uses common system…

Read More
Corporate Blog August 23, 2018

VMworld 2018: Possible begins with agile and automated security

It’s August in Vegas and things are really starting to heat up, especially now that VMworld 2018 (#VMworld) is right around the corner! Taking place on August 26 – 30, VMWorld is shaping up to be quite a showcase of all things virtual networking and beyond! We are thrilled to be returning as a Gold…

Read More
Corporate Blog August 20, 2018

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after…

Read More
Corporate Blog August 16, 2018

Quickly Gauge Your Security’s Generation With This 5-Question Quiz

by Bob Matlow, Cyber Security Advocate   The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have adapted to this new reality by launching multi-vector, polymorphic, globally-scaled attacks – but IT professionals are lagging behind. Only 3 percent…

Read More
Corporate Blog

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution…

Read More
Uncategorized August 15, 2018

Faxploit: Breaking the Unthinkable

In ground breaking research, dubbed ‘Faxploit’, Check Point researchers show how cyber criminals could infiltrate any home or corporate network by exploiting all-in-one printer-fax machines. A fax number is the only thing required to carry out the attack. HP all-in-one printer fax machines were used as the test case, and close cooperation with the company…

Read More
Corporate Blog August 12, 2018