Check Point Blog

Blog Post March 19, 2019

Check Point Forensic Files: A New Monero CryptoMiner Campaign

By Marcel Afrahim and Charles Bettan, Endpoint Security Researchers, March 19th 2019 Sand Blast Agent Forensics team have noticed a new variant of the Monero mining malware spreading throughout organizations worldwide. Interestingly, this malware showed…

Read More
Blog Post March 13, 2019

Mobile Supply Chain Attacks Are More Than Just an Annoyance

By Richard Clayton, Check Point Research Marketing   Mark Twain once wrote there are few things harder to put up with than the annoyance of a good example. He would have had a hard time…

Read More
Blog Post March 11, 2019

February 2019’s Most Wanted Malware: Coinhive Quits While Still at the Top

By Check Point’s Threat Intelligence team, published March 11th   In February 2019, Coinhive led the global threat index for the 15th successive month, having announced that it will cease operation on the 8th March…

Read More
Blog Post March 7, 2019

UltraHack: The Security Risks of Medical IoT

IoT devices make our lives easier. Smart home technology, for example, can help users improve energy efficiency by enabling them to turn appliances on and off with the tap of a touchscreen. Likewise, organizations across…

Read More
Corporate Blog March 6, 2019

Check Point SandBlast Agent Earns ‘NSS Recommended’ Status in Advanced Endpoint Protection Test

AEP Test highlights:   100% HTTP block rate 100% Email block rate 100% Offline threats block rate 100% Evasions block rate 00% False positives   We’re pleased to announce that Check Point SandBlast Agent, our…

Read More

PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services

Research By: Omer Gull   Introduction Many large organizations use Windows Deployment Services (WDS) to install customized operating systems on new machines in the network. The Windows Deployment Services is usually, by its nature, accessible to a...

Read More
Research March 5, 2019

Jmail Breaker: Profiting from Joomla’s Mail Service

  Research By: Asaf G. and Adi I. Joomla! is one of the most popular CMS platforms and is used by hundreds of thousands of organizations worldwide. Over the years, many vulnerabilities were found in the product, such as Joomla Core Sterilizer Cros...

Read More
Research March 4, 2019

MacOS Malware Pedia

Research by: Ofer Caspi With a massive growth in new malware and infections, MacOS security awareness is now more important than ever, and yet many people believe that if they are using MacOS they are “safe” and should not be concerned about getting in...

Read More
Blog Post

Check Point’s 2019 Security Report

2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed the past year was quieter, this…

Read More
Research March 3, 2019

A New InfoStealer Campaign Targets APAC Windows Servers

Research by: Arie Olshtein, Moshe Hayun, Arnold Osipov As time goes by, malware writers invent new methods to bypass security products. During our research, we came across an attack targeting Windows servers in APAC and revealed the attackers infrastru...

Read More