Check Point Blog

Corporate Blog February 13, 2019

January 2019’s Most Wanted Malware: A New Threat Speaks Up

Check Point’s latest Global Threat Index sees emergence of SpeakUp – the Linux Trojan that’s undetectable by anti-virus software   In January, our researchers detected a new campaign exploiting Linux servers to distribute a backdoor…

Read More
Corporate Blog February 8, 2019

A Watershed Moment In The Threat Landscape

By Avi Rembaum, February 8th 2018   The phrase watershed moment is often overused. With our race to the cloud, the rapid rise in the number of devices connected to the Internet and a near…

Read More
Blog Post February 6, 2019

Report: Under the Hood of Cyber Crime

By Richard Clayton, Research Product Marketing   Since the dawn of the internet, a cyber crime ecosystem has been developing right beneath our fingertips. And much like the maturing of the Internet, this ecosystem has…

Read More
Corporate Blog January 31, 2019

Hackers Exposed: CPX 360 Cyber Security Summit and Expo 2019 in Las Vegas

By Peter Alexander, Chief Marketing Officer   We are all highly anticipating a phenomenal 2019 CPX 360 Cybersecurity Summit and Expo at Mandalay Bay Resort and Casino, Feb. 4-6 in Las Vegas. As one of…

Read More
Corporate Blog January 29, 2019

Forrester’s 2019 State of Endpoint Security: Focusing On Threat Prevention

by Lloyd Tanaka, Product Marketing Manager   28th JANUARY, 2019:   Meeting endpoint security challenges will take center stage for many enterprises in 2019 says Forrester Research in their latest endpoint research. The potency and…

Read More
Corporate Blog January 22, 2019

Introducing Maestro – The Industry’s First Hyperscale Network Security Solution

Imagine you had a house – three bedrooms, two stories, one bathroom on a single-family lot. And now imagine that you wanted to expand this property – you want four stories, multiple units, many bathrooms.…

Read More
Blog Post January 21, 2019

Threat Trends Analysis Report

By Richard Clayton, Research Product Marketing 2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed…

Read More
Corporate Blog January 18, 2019

Check Point Forensic Files: GandCrab Returns with Friends (Trojans)

Following our previous post about GandCrab, in this post we show how another variant of this well-known ransomware is observed by Check Point’s SandBlast Agent (SBA) Behavioral Guard and analyzed through the lens of a…

Read More
Blog Post January 16, 2019

Fortnite’s Vulnerability: Only the Secure Survive

By Richard Clayton, Research Product Marketing   For the last two hundred years, Darwin’s ‘Survival of the Fittest’ theory of natural selection has shaped our view of man’s existence on earth. In the last couple…

Read More
Corporate Blog January 14, 2019

December 2018’s Most Wanted Malware: Where there’s SmokeLoader, there’s Fire

Check Point’s researchers saw SmokeLoader rise to the top 10 ‘Most Wanted’ Malware list in December after a sudden boost in activity. Mainly used to load other malware, such as Trickbot Banker, AZORult Infostealer and…

Read More