Check Point Blog

April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities

After analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all across the world, as cyber-criminals are taking advantage of insufficient security practices by targeting unpatched vulnerabilities.   April 2018 marked…

Read More
Corporate Blog May 14, 2018

Check Point’s 2018 Security Report

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it is clear that we are at an inflection point and transitioning to the next generation of the cyber-threat landscape. In our 2018…

Read More
Corporate Blog April 16, 2018

Preventing crypto-mining attacks: four key steps that’ll keep you safe

  We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers to exploit the CPU power of their victims in order for crypto-mining operations. Our research shows that these cryptojacking attacks…

Read More
Corporate Blog March 21, 2018

Meet The Hackers: A Series On Mobile Malware

Over the past year, every company in the world has experienced a mobile malware attack.   Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about which mobile malwares are prevalent and how the different variants operate, it’s critical to understand why attackers choose to target…

Read More
Corporate Blog February 26, 2018

Account Hijacks Affect Everybody, Even ‘Top Dogs’

Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the adoption of modern IT technology, it’s not surprising to see why today’s businesses are being pushed ever faster towards to…

Read More
Corporate Blog October 31, 2017

Check Point IoT Blog Series: First, Do No Harm. Securing Healthcare IoT Devices

“When a hacker takes control of all networked medical devices at a hospital in Dallas and threatens to kill one patient every hour if his demands are not met, the Cyber team must find the source and figure out how they accessed an airtight security system.” That’s the plot summary of an episode of crime…

Read More
Corporate Blog October 2, 2017

Layered protection is a must. Here’s why.

Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances make it clear that there’s no singular point solution that can act as a “magic bullet”. Companies have been approaching…

Read More
Corporate Blog August 30, 2017

Cyber Attack Trends: Mid-Year Report

2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions.  In 2016, we witnessed sophisticated new malware emerging on a regular basis, exposing new capabilities, distribution methods, and attack services offered for sale through multiple platforms. 2017 is shedding light on a…

Read More
Corporate Blog August 17, 2017

ZoneAlarm Anti-Ransomware Earns “Editor’s Choice” from PC magazine

A recent review in PC magazine by Lead Analyst, Neil J. Rubenking approaches one of cyber security’s latest growing concerns, ransomware. Various comparison tests of anti-ransomware products were conducted while specifically focusing on Check Point’s consumer anti-ransomware product, ZoneAlarm. ZoneAlarm by Check Point is based on the same technology of its enterprise grade product, SandBlast…

Read More
Corporate Blog August 15, 2017

“The Next WannaCry” Vulnerability is Here – Let’s Stop it before it’s too Late

This Tuesday, Microsoft released a security patch including 48 fixes, 25 of which are defined as “critical”. While Microsoft updates happen every month, this one reveals an especially dangerous vulnerability – CVE-2017-8620. Behind this dull name hides a severe flaw affecting all current versions of Windows, which enables attackers to spread a contagious attack between…

Read More
Corporate Blog August 11, 2017