Check Point Blog

Corporate Blog May 14, 2018

April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities

After analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all…

Read More
Corporate Blog April 16, 2018

Check Point’s 2018 Security Report

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it is clear…

Read More
Corporate Blog March 21, 2018

Preventing crypto-mining attacks: four key steps that’ll keep you safe

  We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers…

Read More
Corporate Blog February 26, 2018

Meet The Hackers: A Series On Mobile Malware

Over the past year, every company in the world has experienced a mobile malware attack.   Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about…

Read More
Corporate Blog October 31, 2017

Account Hijacks Affect Everybody, Even ‘Top Dogs’

Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…

Read More
Corporate Blog October 2, 2017

Check Point IoT Blog Series: First, Do No Harm. Securing Healthcare IoT Devices

“When a hacker takes control of all networked medical devices at a hospital in Dallas and threatens to kill one patient every hour if his demands are not met, the Cyber team must find the…

Read More
Corporate Blog August 30, 2017

Layered protection is a must. Here’s why.

Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…

Read More
Corporate Blog August 17, 2017

Cyber Attack Trends: Mid-Year Report

2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions.  In 2016, we witnessed sophisticated new malware emerging on a regular basis,…

Read More
Corporate Blog August 15, 2017

ZoneAlarm Anti-Ransomware Earns “Editor’s Choice” from PC magazine

A recent review in PC magazine by Lead Analyst, Neil J. Rubenking approaches one of cyber security’s latest growing concerns, ransomware. Various comparison tests of anti-ransomware products were conducted while specifically focusing on Check Point’s…

Read More
Corporate Blog August 11, 2017

“The Next WannaCry” Vulnerability is Here – Let’s Stop it before it’s too Late

This Tuesday, Microsoft released a security patch including 48 fixes, 25 of which are defined as “critical”. While Microsoft updates happen every month, this one reveals an especially dangerous vulnerability – CVE-2017-8620. Behind this dull…

Read More