Check Point Blog

One Step Ahead

What are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway: Hamilton. I was fascinated by how precarious the fate of our independence was had it not been for the forward-looking…

Read More
Security Insights October 27, 2015

ThreatCloud IntelliStore Marketplace – A new actionable approach to Threat Intelligence

Cyber threats have significantly increased in number and in complexity. With malware evolving constantly, we require a steady stream of information on emerging threats to optimize our security systems in place. There are several vendors that provide threat intelligence , but none that offer a platform with customizable and actionable intelligence, including specialized feeds by…

Read More
Security Insights October 21, 2015

Digging for Groundhogs: Holes in Your Linux Server

In July 2015, Check Point’s Incident Response team was contacted by a customer after they noticed strange file system activities occurring in one of their Linux based DNS BIND servers. This strange behavior consisted of a large number of peculiar files being written into sensitive system directories.   A thorough analysis of the infected system…

Read More
Threat Research October 20, 2015

Our Mission To Cure The Healthcare Security Epidemic

The healthcare industry has taken a major beating in terms of cyber security attacks. In the past two years, there has been a myriad of breaches, compromising the personal health information (PHI) of millions. According to the Identity Theft Resource Center, 42.5 percent of all data breaches were in the healthcare industry. The Center also…

Read More
Security Insights October 19, 2015

Check Point: a Leader In Mobile Data Protection Solutions for 9 Years Running

As enterprise workforces become increasingly mobile, it’s critical organizations secure mobile data on laptops, smartphones and tablets from advanced attacks. Without the right protection, these devices can give cybercriminals easy access to valuable content and critical information. Check Point is proud to be named a leader for the 9th consecutive year in the 2015 Gartner…

Read More
Security Insights October 15, 2015

The Future Of Financial Cybersecurity

October is Cybersecurity Awareness Month, and it starts with large attacks against two prominent financial organizations – An Experian breach, which affected 15 million T-Mobile customers; and Scottrade, which compromised the information of approximately 4.6 million customers. The reality is that there are still huge gaps in companies’ security programs in financial institutions, and unless…

Read More
Security Insights October 14, 2015

Israeli Public Sector Targeted by Zeus Trojan Hidden in a Word Document

Two months ago, a malicious Rich Text Format (RTF) document came to the attention of Check Point Threat Intelligence & Research via a worried high-profile client in the public sector. The file had been sent to many employees, several of whom opened the file; as a result, their machines became infected. Check Point took actions…

Read More
Threat Research October 9, 2015

Managing the Sheer Complexity of Data Center Security

The modern IT system is one of the most complex entities in the business landscape. Every device, server and component tied to the network must be managed and monitored. That’s a significant job for any IT department, but things can become especially complicated when it comes to enterprise data centers. Intricate and dynamic, the construction…

Read More
Security Insights October 8, 2015

A Solution for the Evolving Threat Landscape

The threat landscape has severely changed over the last few years, and organizations have to constantly keep up with sophisticated threats and advanced tactics of cybercriminals. With multiple tools at hackers’ disposal, new threat variants are released every day. According to Check Point’s 2015 Security Report, organizations were hit with 106 new forms of malware…

Read More
Security Insights October 2, 2015

iOS Core Application Design Flaw May Expose Apple ID Credentials

Check Point alerted Apple to a privacy issue in iOS core applications that may expose a user’s credentials even though the user performed a sign out. The fix is now available through the iOS 9 release. Introduction iOS is a mobile operating system created and developed by Apple and distributed exclusively for Apple hardware. It…

Read More
Threat Research October 1, 2015