Check Point Blog

Corporate Blog December 10, 2018

The Ransomware Doctor Without A Cure

When individuals and organizations alike rely so much on their computers to get work done, there is nothing they hate more than being held hostage by ransomware and often hold a deep resistance to paying…

Read More
Research November 8, 2018

The Spy Drone In Your Cloud

In the 19th Century the undercover operations of the Great Game captured the imagination of European adventurers. In the 20th Century, it was the Cold War that made people worldwide fear for who was listening in. In…

Read More
Corporate Blog October 23, 2018

When Ransomware Stopped Working Harder and Started Working Smarter

Observing Ransomware’s Evolution in Delivery Tactics   Written by Check Point’s Incident Response Team   Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…

Read More
Corporate Blog September 19, 2018

The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper

Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and patterns in the global cyber threat landscape.   And every month, the top spots are filled by illicit cryptomining malware.…

Read More
Corporate Blog June 7, 2018

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the…

Read More
Corporate Blog May 14, 2018

April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities

After analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all…

Read More
Corporate Blog April 24, 2018

Fifth Generation Phishing Kits Have Arrived

“Give a man a fish and you feed him for a day. Teach a man to fish and you feed him for a lifetime.” – Maimonides (1135-1204).   With online phishing kits being the all-in-one…

Read More
Corporate Blog April 13, 2018

March’s Most Wanted Malware:  Cryptomining Malware That Works Even Outside the Web Browser on the Rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session   Check Point recently published its monthly Global Threat Index, revealing a surge…

Read More
Corporate Blog February 26, 2018

Meet The Hackers: A Series On Mobile Malware

Over the past year, every company in the world has experienced a mobile malware attack.   Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about…

Read More
Corporate Blog January 15, 2018

December’s Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide

Check Point’s latest Global Threat Index reveals the rise of crypto-mining malware targeting enterprises   During the month of December 2017, crypto-mining malware rapidly rose in Check Point’s Global Threat Index’s top ten most prevalent…

Read More