Check Point Blog

Ransomware: what you need to know

In recent years, there has been a surge of ransomware attacks. It’s been reported all over security blogs, tech websites and in the news. Unfortunately, these attacks show no signs of slowing. If anything, they are getting worse. Cryptolocker, the first famous ransomware, was observed in the wild in 2013. From then until mid-2015, there…

Read More
Threat Research July 26, 2016

Securely Embrace the Hybrid Cloud

The trend in enterprise IT is to move from a hardware-centric to an application-centric network model, enabling businesses to streamline processes and improve end-user experiences, all while enhancing their competitive positioning. As a result, IT organizations are under tremendous pressure to rapidly transform in order to keep pace with these new business demands. This need…

Read More
Uncategorized July 22, 2016

The Cure for Your Private Cloud Security Blues

Hot off the heels of Cisco Live! in Las Vegas, there’s a continued buzz about the Cisco Application Centric Infrastructure (ACI) and how it is helping organizations transform from legacy to next-generation private cloud data centers. In fact, front-and-center to this year’s event was the desire to transform Cisco offerings and make them more cloud-like,…

Read More
Security Insights July 21, 2016

Check Point Forensics: CTB-Faker Ransomware

SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it, providing comprehensive analysis of the security incident. In addition to the blog, we are thrilled to now provide you with access to…

Read More
Threat Research July 20, 2016

Top 10 Most Wanted Malware

Check Point Software Technologies today published its latest Threat Index, revealing the number of active malware families increased by nearly two-thirds in the first half of 2016, led by the number of threats to business networks and mobile devices. During June, Check Point detected 2,420 unique and active malware families attacking business networks, a 61…

Read More
Threat Research July 18, 2016

Ransomware’s Motto: The Simpler, The Scarier, The Better

A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of different variants. Check Point researchers have been analyzing ransomware for almost two years, and it has been a fascinating study. We can easily follow the trends, common aspects, and differences between ransomware families.…

Read More
Uncategorized July 14, 2016

Stop Before You (Pokemon) GO

The excitement over the new game Pokemon GO has taken the world by storm. Because it’s available only in limited countries right now, some people may be tempted to download the app from sources other than Google Play or the Apple App Store. Getting apps from unofficial sources can expose you to malicious apps that…

Read More
Uncategorized July 13, 2016

Malware’s Constant Evolution Requires Advanced Protections

Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or at least stay hidden long enough to complete their malicious goals. In this blog we review some of the cutting-edge techniques attackers use to bypass defenses and the techniques we use to protect…

Read More
Threat Research July 11, 2016

DIY Attribution, Classification, and In-depth Analysis of Mobile Malware

The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for multiple malware campaigns during the last year, including Volatile Cedar, Rocket-Kitten, and the Nuclear Exploit Kit. In fact, the PC…

Read More
Security Insights

Jigsaw Ransomware Decryption

  The Jigsaw ransomware was first spotted in April 2016, and has since received a bit of traction. It became infamous thanks to an image of the Jigsaw killer from the movie ‘Saw’ displayed on the ransom note (hence its name), and its unique way of persuading victims to comply – if payments aren’t made…

Read More
Threat Research July 8, 2016