Research April 18, 2016 Unleash the Power of Security for Businesses of All Sizes When we introduced the 15000 and 23000 series appliances in January, giving our large enterprise ...
Research April 15, 2016 KOVTER RANSOMWARE – THE EVOLUTION: From Police Scareware to Click Frauds and then to Ransomware In terms of cyber security research, the Kovter malware family is very interesting. A wide-spread ...
Research April 13, 2016 The Next Battleground – Critical Infrastructure Cyber threats have dramatically developed throughout the years. From simple worms to viruses, and finally ...
Research April 13, 2016 Check Point Threat Alert: Badlock Vulnerability EXECUTIVE SUMMARY An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for ...
Research April 12, 2016 New Technologies Pose New Threats Technology has changed our lives for the better; there is no doubt about it. However, ...
Research April 11, 2016 Decrypting the Petya Ransomware Petya is a relatively new ransomware variant that first appeared on the cyber-crime scene at ...
Research April 11, 2016 New Locky Variant Implements Evasion Techniques Following Check Point’s recent discovery of a new communication scheme implemented by the Locky ransomware, ...
Research April 11, 2016 Security Management for Critical Infrastructure Environments The mission of protecting industrial control systems (ICS) is so vital that it cannot be ...
Security April 8, 2016 Malvertising: When Advertising Becomes Dangerous Over the last several months, the BBC, the New York Times, and other major news ...
Research April 8, 2016 Qihoo 360: Just the Tip of the Whitelisted Malware Iceberg The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be ...