Securing the Cloud May 24, 2018 Static Code Analysis of Your Infrastructure-as-Code (IAC) Templates Post originally published on AWS startup blog Infrastructure-as-Code (IaC) has emerged as an essential strategy ...
Research May 23, 2018 Handling BSODs in Your Sandbox: A Useful Addition to Your Emulation Toolbox In our malware laboratory sandbox, we emulate a large number of samples each day. These ...
Security May 15, 2018 One Year Later: WannaCry, The Dawn Of A New Generation Of Cyber-Attacks A year ago today, after multiple days of digital bombardment, the cyber-security world changed forever. ...
Research May 14, 2018 April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities After analysing April’s threat data from a global network of sensors and millions of data ...
Research May 8, 2018 Remote Code Execution Vulnerability on LG Smartphones Research by: Slava Makkaveev Background A few months ago, Check Point Research discovered two vulnerabilities ...
Security May 8, 2018 Telegram: The New Channel of Choice for Conducting Cyber Crime The Dark Web is a hive of illicit activity. From illegal guns and drug dealing ...
Research May 7, 2018 Telegram: Cyber Crime’s Channel of Choice Introduction The Dark Web is a hive of illicit activity. From illegal guns and drug ...
Securing the Cloud May 7, 2018 Always Stay Compliant with Dome9 Continuous Compliance! Data security and compliance is a never-ending task. The dynamic nature of the cloud environment ...
Research May 1, 2018 SiliVaccine: Inside North Korea’s Anti-Virus By: Mark Lechtik and Michael Kajiloti Revealed: In an exclusive piece of research, Check Point ...
Security May 1, 2018 SiliVaccine: A Special Report Into North Korea’s Anti-Virus Revealed: In an exclusive piece of research, Check Point Researchers have carried out a revealing ...