Check Point Blog

In The Wild: Mobile Cybercrime Goes Big in 2015

Cybercriminals made significant advances in the sophistication and number of attacks on mobile devices in 2015. As we head into a new year — and into new uncertainties for mobile security — let’s remember a few of the most spectacular attacks to help us better understand what to be aware of in the months to…

Read More
Threat Research December 30, 2015

Check Point Threat Alert: Outlook OLE Vulnerability

Object Linking and Embedding (OLE), developed by Microsoft, allows users to embed and link to documents and other objects. However, a Remote-Command-Execution vulnerability was found in Microsoft Office that allows remote attackers to execute arbitrary code via a crafted email message processed by Outlook. Microsoft Outlook has a sandbox bypass vulnerability which allows an attacker…

Read More
Threat Research December 29, 2015

Check Point Threat Alert: Joomla RCE Zero-Day

On December 14, a new version of Joomla, an open-source content management system (CMS) which allows you to build websites and powerful online applications, was released to patch a critical 0-Day Remote Command Execution (RCE) vulnerability that affects all versions from 1.5 to 3.4. The vulnerability is due to lack of validation of input objects…

Read More
Threat Research December 21, 2015

Angler EK Pushing TeslaCrypt

In recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. TeslaCrypt is a relatively new ransomware, first reported in the beginning of 2015. Although it is not the most sophisticated malware, it is continuously maintained and updated by its authors, and still manages to spread through various infection vectors. In…

Read More
Threat Research December 18, 2015

Check Point’s Security Predictions for 2016: PoS

The holiday season is here, and the retail industry is preparing for shoppers who are rushing to take advantage of sales and purchase gifts in-store or online. However, continuous point-of-sales (PoS) attacks have been making headlines in the last few years. In 2013, Target confirmed a massive credit card data breach that affected 40 million…

Read More
Security Insights December 10, 2015

In The Wild: Mobile Security Observations from the Check Point Research Team

We already know mobile threats are becoming more and more sophisticated every day. As cyber criminals exploit new vulnerabilities, they also discover new techniques that make it easier to attack our smartphones and tablets. Most end users don’t fully understand the risks, and can be easily tricked into circumventing on-device protections. That means if they’re…

Read More
Threat Research December 4, 2015

Singapore Mobile Device Users Are Under Cyber Attack

On December 1, 2015, the Association of Banks in Singapore (ABS) announced information about a Trojan designed to steal financial information from mobile device users. Check Point researchers retrieved samples of this malware and conducted an in depth analysis. This banking malware is actually a tweaked version of an existing financial infostealer called “GMBot” (SHA256:…

Read More
Threat Research December 3, 2015

Check Point Names Julie Parrish as Chief Marketing Officer

Check Point today announced the appointment of Julie Parrish as the company’s Chief Marketing Officer. As the newest member of our executive team, Parrish will lead the company’s global marketing organization, overseeing strategic initiatives to drive awareness and demand for the Check Point’s expanding portfolio of industry-leading security solutions. Prior to joining Check Point, Parrish…

Read More

Check Point’s Security Predictions for 2016

At the beginning of last year, Check Point’s top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS. These predictions did come true – and they continue to remain a significant threat today. We’re nearing the end of 2015, but…

Read More
Security Insights December 1, 2015