Check Point Blog

More Than 1 Million Google Accounts Breached by Gooligan

As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Our research exposes how…

Read More
Threat Research November 30, 2016

Check Point vSEC Achieves AWS Security Competency

Check Point has attained Amazon Web Services (AWS) Security Competency. This shines a light Check Point’s expertise in delivering advanced threat prevention security to help protect customer data and workloads in the AWS Cloud. vSEC for AWS provides consolidated and consistent security policy management, enforcement and reporting across on-premise and cloud workloads, making migration to…

Read More
Security Insights November 28, 2016

Two Thanksgiving Presents from the Leading Ransomware

Cerber and Locky, the two most popular ransomwares out there, have launched new variants to the wild simultaneously. The new ransomware versions released perform slender, yet very interesting, changes that may affect the way they are being detected. CERBER 5.0 Uses New IP Ranges as well as Old Ones The actors behind Cerber, like other actors…

Read More
Threat Research November 24, 2016

ImageGate: Check Point uncovers a new method for distributing malware through images

Check Point researchers identified a new attack vector, named ImageGate, which embeds malware in image and graphic files. Furthermore, the researchers have discovered the hackers’ method of executing the malicious code within these images through social media applications such as Facebook and LinkedIn. According to the research, the attackers have built a new capability to…

Read More
Threat Research

A Complex Web: Bitcoin Mixing Services

Check Point’s Threat Intelligence Analysis team often comes across attackers who seek payment from their victims in Bitcoins – especially following ransomware attacks such as Cerber. Once they get paid for their criminal exploits, these actors employ all sorts of Bitcoin mixers and tumblers to cover their tracks. We decided to analyze these mixing services…

Read More
Threat Research November 23, 2016

October’s ‘Most Wanted’ Malware List Shows Attacks on the Rise

Check Point’s Threat Intelligence Research Team revealed today that the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organizations’ networks. The team found that both the number of active malware families and number of attacks increased by 5%…

Read More
Uncategorized November 21, 2016

Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World!

Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found SandBlast to be a comprehensive yet easy to manage solution, which is worth the cost for effective protection against unknown…

Read More
Uncategorized November 15, 2016

Clearing the fog: a vision of security for hybrid clouds

Have you ever driven on a high road or mountain pass that’s shrouded by low cloud? You’re at the familiar controls of your vehicle, but you can’t easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. Progress can be hazardous unless you take extra precautions. The feeling will be familiar to…

Read More
Security Insights November 11, 2016

Denied! Dealing with Global Distributed Denial of Service

Cyber security has recently reached yet a new level of public awareness, as the world learned that an army of bots hosted on internet connected cameras were able to cause outages to well-known internet services such as Twitter, Amzaon, Spotify and Netflix. The global Distributed Denial of Service (DDoS) attack on DYN, a large DNS…

Read More
Security Insights November 8, 2016

Beware! Malware Targeting Endpoints on the Rise Ahead

All you need to do is listen to the news and you know that the cyber threat landscape in 2016 has gotten much worse. But what types of threats are driving companies to take action? And what actions are they taking? To answer these questions, and more, we turned to SANS Institute, the leading organization…

Read More
Threat Research November 2, 2016