Check Point Blog

The Check Point 2017 Global Threat Intelligence Trends Report

2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place between threat actors and security experts. In our H2 2017 Global Threat Intelligence Trends Report, we reveal that cyber-criminals are…

Read More
Corporate Blog January 31, 2018

H2 2017 Global Threat Intelligence Trends Report

2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place between threat actors and security experts. In …

Read More
Research January 25, 2018

Growing a Global Company: Recapping Gil Shwed’s Interviews with Forbes and Inc

If you ask any Check Point researcher or engineer for one word that describes what Check Point does best, you’ll get a wide range of answers — anything from “cybersecurity” to “cyber-security” to the rebels that’ll say “cyber security”.   But if you ask the press, you’ll get a very different answer. Growth.   Over…

Read More
Corporate Blog January 19, 2018

December’s Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide

Check Point’s latest Global Threat Index reveals the rise of crypto-mining malware targeting enterprises   During the month of December 2017, crypto-mining malware rapidly rose in Check Point’s Global Threat Index’s top ten most prevalent malware.   Crypto-mining malware refers to cybercriminals hijacking the victim’s CPU or GPU power and existing resources to mine cryptocurrency.…

Read More
Corporate Blog January 15, 2018

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Research by: Elena Root & Bogdan Melnykov Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside around 60 game apps, several of which are intended to be used by children. According to Goo…

Read More
Research January 12, 2018

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children.   Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended for children.…

Read More
Corporate Blog

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks worldwide to find vulnerable web servers in ord…

Read More
Research January 11, 2018

Exploiting CVE-2018-0802 Office Equation Vulnerabilty Demo Video

Check Point Software Technologies Research Team discovered a new vulnerability (CVE-2018-0802) in the Office Equation 3.0 process (EQNEDT32.EXE). This is a POC video of the vulnerability being exploited while bypassing the new ASLR mitigation added by …

Read More
Research January 9, 2018

LightsOut Mobile Malware Demo Video

 Video demo of how the malware works How It Works The post LightsOut Mobile Malware Demo Video appeared first on Check Point Research.

Read More
Research

Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability

By: Omer Gull and Netanel Ben Simon Background A few weeks ago, a vulnerability in the Office Equation 3.0 process (EQNEDT32.EXE) was discovered by Embedi. For a couple of reasons this event raised a few eyebrows. First, the process was a 32bit applica…

Read More
Research