Check Point Blog

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after…

Read More
Corporate Blog August 16, 2018

Quickly Gauge Your Security’s Generation With This 5-Question Quiz

by Bob Matlow, Cyber Security Advocate   The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have adapted to this new reality by launching multi-vector, polymorphic, globally-scaled attacks – but IT professionals are lagging behind. Only 3 percent…

Read More
Corporate Blog

Faxploit: Breaking the Unthinkable

In ground breaking research, dubbed ‘Faxploit’, Check Point researchers show how cyber criminals could infiltrate any home or corporate network by exploiting all-in-one printer-fax machines. A fax number is the only thing required to carry out the attack. HP all-in-one printer fax machines were used as the test case, and close cooperation with the company…

Read More
Corporate Blog August 12, 2018

Man-in-the-Disk: A New Attack Surface for Android Apps

Recently, our researchers came across a shortcoming in the way Android apps use storage resources. Careless use of External Storage by applications may open the door to an attack resulting in any number of undesired outcomes, such as silent installation of unrequested, potentially malicious, apps to the user’s phone, denial of service for legitimate apps,…

Read More
Corporate Blog

FakesApp: Using WhatsApp to Spread Scams and Fake News

In a disturbing revelation, Check Point researchers have discovered a vulnerability in WhatsApp that allows a threat actor to intercept and manipulate messages sent by those in a group or private conversation. By doing so, attackers can put themselves in a position of immense power to not only steer potential evidence in their favor, but…

Read More
Corporate Blog August 8, 2018

Black Hat USA 2018: Take the Check Point Cyber Challenge

Next week, the doors to Black Hat USA 2018 open at Mandalay Bay in Las Vegas.   In booth #764 in the Business Hall, Check Point will showcase our newest, most powerful security solutions for preventing today’s fifth generation network, cloud, and mobile threats. Visit our exhibit to learn about the five generations of cyber attacks…

Read More
Corporate Blog August 3, 2018

Dan Yerushalmi appointed as Head of Global Sales and Strategy

We are excited to announce that Dan Yerushalmi has been appointed as Check Point’s new head of global sales and strategy.   Dan joined Check Point earlier this year with extensive sales, operations and strategy experience throughout his career, making him a natural fit for this important role in our company. Over the last two…

Read More
Corporate Blog July 30, 2018

Malvertising: The Illegal Form of Lying

H.G.Wells once said that advertising is merely a legalized form of lying. In the age of digital marketing, though, it seems that threat actors have taken the saying a step further and created an illegal form of lying out of the online advertising industry.   In an alarming discovery by Check Point Research, threat actors…

Read More
Corporate Blog

Google Next 2018: Cloud and Mobile Security Showcase

Google Next 2018 (#GoogleNext18) is almost upon us and we’re delighted to return as a Velocity Partner for this year’s conference. Check Point has a great show planned, so if you plan to be at the Moscone Center in San Francisco July 24 – 26, we invite you to come spend some time with us.…

Read More
Corporate Blog July 18, 2018

Cyber Attack Trends: 2018 Mid-Year Report

When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations – as well as the security community – constantly challenged. From taking advantage of the Blockchain to developing new attack methods in the thriving mobile arena, threat actors utilize all the latest technologies to achieve their malicious goals.   In…

Read More
Corporate Blog July 12, 2018