A single drop of blood contains billions of strands of DNA, carrying genetic instructions for the development, functioning, growth, and reproduction of all known organisms. DNA holds the building blocks of life. Similarly, the lines of malware code make…
Read MoreAfter analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all…
Read More2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it is clear…
Read MoreWe recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world. The rise of in cryptocurrency values has incentivized hackers…
Read MoreOver the past year, every company in the world has experienced a mobile malware attack. Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about…
Read MoreBeing “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…
Read More“When a hacker takes control of all networked medical devices at a hospital in Dallas and threatens to kill one patient every hour if his demands are not met, the Cyber team must find the…
Read MoreCyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…
Read More2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions. In 2016, we witnessed sophisticated new malware emerging on a regular basis,…
Read MoreA recent review in PC magazine by Lead Analyst, Neil J. Rubenking approaches one of cyber security’s latest growing concerns, ransomware. Various comparison tests of anti-ransomware products were conducted while specifically focusing on Check Point’s…
Read More