Check Point Blog

OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities

Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges on LG mobile devices to attack them remotely at the LayerOne 2016 conference in Los Angeles. LG issued fixes for both vulnerabilities which Check Point made LG aware of before disclosing them publicly. These vulnerabilities are unique to LG devices which…

Read More
Uncategorized May 29, 2016

Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls

Today’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and highly mobile workforces put a ton of pressure on security teams to keep networks and data protected. At the same time, the tools and techniques used by cybercriminals to target enterprise data continues to rapidly evolve. When reflecting on the…

Read More
iOS Security May 27, 2016

Attacks on SMB are a sure thing, according to the latest Verizon report

It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. The 2016 Data Breach Investigations Report reveals just how much (Check Point contributed to the report). The report covers a large number of SMBs. 521 small businesses were surveyed and 447 confirmed they suffered a security breach with data loss…

Read More
Security Insights

CryptXXX Ransomware: Simple, Evasive, Effective

CryptXXX emerged a few weeks ago and it’s been sneaky! It’s most impressive feature is the simplicity of its evasion techniques, which are giving it an advantage over most security systems. This has resulted in a very low detection rate for new samples and a high success rate on the malware’s part. According to the…

Read More
Threat Research

Spam-Riding Dropper Packs a One-Two Ransomware, Adware Punch

The Most Trusty Attack Vector Shady random strangers on the internet often have an uncanny ability to make you believe that you should have expected to hear from them. You may be savvy enough to brush off the ‘Nigerian Prince in Distress’ and the ‘Thousands of Hot Singles in Your Area Waiting to Meet You’…

Read More
Threat Research May 26, 2016

Weaponized WordPress Tools

WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from its  free plugins and themes that are easily installed over the basic platform. These add-ons allow WordPress users to personalize and expand their websites and blogs.…

Read More
Threat Research May 25, 2016

Hack In The Box: Malware Disguises Itself To Infiltrate Your Device

No user would intentionally allow malware onto a mobile device, so it’s obvious why malicious apps disguise themselves to trick users into inviting them in. In many cases, malware tries to persuade the user into going even further by asking for various permissions that can enable malicious actions. Malware tries to do as much damage…

Read More
Security Insights

TeslaCrypt Ransomware Shuts Down: One Down, Plenty to Go

In a surprising turn of events, the creators of the notorious TeslaCrypt ransomware shut down their operation and revealed the master key for decrypting all files. They even said they are sorry, as displayed in the image below. Figure 1: TeslaCrypt Shut Down Message   The motive behind this step remains unclear. The attackers could…

Read More
Threat Research May 24, 2016

The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle

Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took place mainly to avoid signature-based detection employed by many security vendors. To understand how this is achieved, one must first understand what scripting really is. Scripting languages are programs that support automated execution of tasks, which could be executed manually…

Read More
Threat Research

In The Wild: Malware in Google Play is as Prevalent and Pesky as Ever

Not a week passes without new malware found on Google Play and this week was no different. Among the malware found are both new and old samples, including a known malicious banker and a new type of malware making its first appearance on Google Play. Also, Google has patched more vulnerabilities, which is no coincidence…

Read More
Security Insights May 20, 2016