Check Point Blog

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after…

Read More
Corporate Blog August 16, 2018

Quickly Gauge Your Security’s Generation With This 5-Question Quiz

by Bob Matlow, Cyber Security Advocate   The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have adapted to this new reality by launching multi-vector, polymorphic, globally-scaled attacks – but IT professionals are lagging behind. Only 3 percent…

Read More
Corporate Blog

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution…

Read More
Uncategorized August 15, 2018

Faxploit: Breaking the Unthinkable

In ground breaking research, dubbed ‘Faxploit’, Check Point researchers show how cyber criminals could infiltrate any home or corporate network by exploiting all-in-one printer-fax machines. A fax number is the only thing required to carry out the attack. HP all-in-one printer fax machines were used as the test case, and close cooperation with the company…

Read More
Corporate Blog August 12, 2018

Man-in-the-Disk: A New Attack Surface for Android Apps

Recently, our researchers came across a shortcoming in the way Android apps use storage resources. Careless use of External Storage by applications may open the door to an attack resulting in any number of undesired outcomes, such as silent installation of unrequested, potentially malicious, apps to the user’s phone, denial of service for legitimate apps,…

Read More
Corporate Blog

FakesApp: Using WhatsApp to Spread Scams and Fake News

In a disturbing revelation, Check Point researchers have discovered a vulnerability in WhatsApp that allows a threat actor to intercept and manipulate messages sent by those in a group or private conversation. By doing so, attackers can put themselves in a position of immense power to not only steer potential evidence in their favor, but…

Read More
Corporate Blog August 8, 2018

Black Hat USA 2018: Take the Check Point Cyber Challenge

Next week, the doors to Black Hat USA 2018 open at Mandalay Bay in Las Vegas.   In booth #764 in the Business Hall, Check Point will showcase our newest, most powerful security solutions for preventing today’s fifth generation network, cloud, and mobile threats. Visit our exhibit to learn about the five generations of cyber attacks…

Read More
Corporate Blog August 3, 2018

Dan Yerushalmi appointed as Head of Global Sales and Strategy

We are excited to announce that Dan Yerushalmi has been appointed as Check Point’s new head of global sales and strategy.   Dan joined Check Point earlier this year with extensive sales, operations and strategy experience throughout his career, making him a natural fit for this important role in our company. Over the last two…

Read More
Corporate Blog July 30, 2018

Malvertising: The Illegal Form of Lying

H.G.Wells once said that advertising is merely a legalized form of lying. In the age of digital marketing, though, it seems that threat actors have taken the saying a step further and created an illegal form of lying out of the online advertising industry.   In an alarming discovery by Check Point Research, threat actors…

Read More
Corporate Blog

Combatting Fifth Generation Cyberattacks: Introducing SandBlast Mobile 3.0 and New 23900 Security Gateway

We can count on one thing when it comes to protecting businesses from cyberattacks. Threat actors will always exploit the softest part of their targets. Today, in the fifth generation of cyberattacks, this fact rings more true than ever. Multi-vector attacks that probe enterprise networks and connected devices and change rapidly to avoid detection are…

Read More
Android July 26, 2018