Check Point Blog

In The Wild: Breaking Mobile Security Paradigms… Again

Security researchers have shattered the mobile security paradigm once again. They’ve managed to bypass Android two-factor authentication, and iOS is proven vulnerable again both to exploits and malware. It has become very clear: traditional defenses are simply not enough. Users must implement advanced measures to stay safe. Two Factor Authentication Bypass: There’s No Place to Hide…

Read More
Security Insights April 29, 2016

Marcher Marches On: The Anatomy of a Banker Malware

Not very often do we have the chance to observe the full flow of an attack. Usually, we can analyze the malware itself and, in some cases, we manage to identify the infiltration vector. But today we’re laying out the full attack flow of the infamous Marcher mobile banker malware. Overview The Marcher banker malware…

Read More
Threat Research April 28, 2016

Check Point Threat Alert: CryptXXX Ransomware

CryptXXX ransomware has been observed in the wild as of March 2016, delivered via the Angler Exploit Kit and spread through the Bedep trojan. The ransomware is demanding a $500 ransom to be paid in order to recover the encrypted files on a machine, and provides the victim the possibility to decrypt one file for…

Read More
Threat Research April 26, 2016

Digging Deeper: How Ransomware and Malware use Microsoft Windows’ Known Binaries

Since Windows 7 is the most popular operating system (OS) among PCs, many malware choose to target it. Malware often do so by using Windows’ very own artifacts.  During 2015, Windows artifacts were increasingly abused for malicious operations. For attackers, this is an effective technique, since these artifacts are always present in a Windows environment.…

Read More
Threat Research

Android Security 2015 Year In Review: What Isn’t Google Telling You?

For the second year in a row, Google released its annual report which details “how Google Services protect the Android ecosystem.” On the surface, the Android Security 2015 Year In Review is a compelling argument for how Google’s advances in mobile security give users greater confidence that Android can protect sensitive data on smartphones and tablets.…

Read More
Security Insights April 25, 2016

In The Wild: Google Can’t Close the Door on Android Malware

Mobile Security Observations from the Check Point Research Team After its presentations about “SideStepper” and trends in mobile attacks in BlackHat Asia, the Check Point mobile research team wasn’t surprised to find that the trends it pointed out continue. Google Play has been infiltrated by malware yet again, and as our colleague Avi Bashan pointed…

Read More
Security Insights April 22, 2016

Forrester Names Check Point a ‘Leader’ in Automated Malware Analysis

Organizations are facing the latest variants of sophisticated malware every day, and it is evident that traditional solutions are no longer effective in detecting and stopping these new threats. At Check Point, we continuously strive to deliver advanced security solutions that protect businesses against known, unknown and zero-day attacks. That is why we are pleased…

Read More
Uncategorized April 21, 2016

Top 4 Ways Employees Compromise their Corporate Data via Cloud Services

Recent research by Gartner showed that “Through 2020, 95% of cloud security breaches will be the customer’s fault.” Massive cloud adoption by enterprises has given rise to a shared responsibility approach in securing cloud usage, where the service provider undertakes the responsibility of the infrastructure and the customer takes responsibility of the users, content and…

Read More
Security Insights April 20, 2016

Inside Nuclear’s Core: Analyzing the Nuclear Exploit Kit Infrastructure

Malware use different methods to propagate. Exploit kits (EKs) have been one the most common platforms for infecting end-users in the past few years. While there are several different EKs out in the wild, there are a few that stand out. One of these is the Nuclear Exploit Kit, which was introduced in 2010. As…

Read More
Threat Research

Unleash the Power of Security for Businesses of All Sizes

When we introduced the 15000 and 23000 series appliances in January, giving our large enterprise and data center network customers a giant step ahead of cyber threats and malware, it raised a logical question: what about businesses of other sizes and their networks? After all, smaller organizations and branch offices are ripe targets for cybercriminals…

Read More
Security Insights April 18, 2016