Check Point Blog

Blog Post June 19, 2019

Check Point’s Threat Emulation Stops Large-Scale Phishing Campaign in Germany

Research by: Kobi Eisenkraft, Moshe Hayun, published June 19th 2019   Introduction   During the first week of June 2019, Check Point researchers encountered a new, large-scale phishing campaign targeting German companies across all industries.…

Read More
Blog Post February 6, 2019

Report: Under the Hood of Cyber Crime

By Richard Clayton, Research Product Marketing   Since the dawn of the internet, a cyber crime ecosystem has been developing right beneath our fingertips. And much like the maturing of the Internet, this ecosystem has…

Read More
Blog Post January 21, 2019

Threat Trends Analysis Report

By Richard Clayton, Research Product Marketing 2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed…

Read More
Blog Post December 10, 2018

The Ransomware Doctor Without A Cure

By Richard Clayton, Research Product Marketing When individuals and organizations alike rely so much on their computers to get work done, there is nothing they hate more than being held hostage by ransomware and often…

Read More
Research November 8, 2018

The Spy Drone In Your Cloud

In the 19th Century the undercover operations of the Great Game captured the imagination of European adventurers. In the 20th Century, it was the Cold War that made people worldwide fear for who was listening in. In…

Read More
Corporate Blog October 23, 2018

When Ransomware Stopped Working Harder and Started Working Smarter

Observing Ransomware’s Evolution in Delivery Tactics   Written by Check Point’s Incident Response Team   Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…

Read More
Corporate Blog September 19, 2018

The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper

Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and patterns in the global cyber threat landscape.   And every month, the top spots are filled by illicit cryptomining malware.…

Read More
Corporate Blog June 7, 2018

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the…

Read More
Corporate Blog May 14, 2018

April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities

After analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all…

Read More
Corporate Blog April 24, 2018

Fifth Generation Phishing Kits Have Arrived

“Give a man a fish and you feed him for a day. Teach a man to fish and you feed him for a lifetime.” – Maimonides (1135-1204).   With online phishing kits being the all-in-one…

Read More