Check Point Blog

Threat Research August 16, 2014

Practical Attacks Against VDI and Augmenting Mobile Security

The following content “Practical Attacks Against VDI and Augmenting Mobile Security” was part of a Black Hat USA 2014 Presentation Last week at Black Hat, Michael Shaulov, CEO and CoFounder of Lacoon and Daniel Brodie,…

Read More
Threat Research August 13, 2014

Are Malicious Configuration Profiles iOS’ Achilles Heel?

As part of our ongoing efforts to protect our clients from all types of mobile threats, Lacoon researches Malicious iOS Configuration Profiles. We have been able to gain many insights from this research and to…

Read More
Threat Research August 12, 2014

Mobile Security Weekly – Android Threats Stack Up

On the heels of BlackHat USA, perhaps it’s hardly surprising that this week has been especially full of malware. Much like the demonstrations and presentations at Blackhat, this week’s stories highlight attackers’ technical prowess as…

Read More
Threat Research August 11, 2014

Check Point Protects from the HAVEX Malware Targeting ICS/SCADA Systems

Dragonfly Cyber Espionage campaign overview Havex is a Remote Administration Tool (RAT) used recently by the “dragonfly” cyber espionage group. They were using the Havex malware to target Industrial Control Systems (ICS) and SCADA systems…

Read More
Threat Research

GOZ – Is it game over, Zeus?

Overview Zeus is a highly sophisticated family of Trojans that seeks to steal banking information and accounts from victims. Zeus targets popular operating systems such as Windows and Android and is usually distributed to end-users…

Read More
Threat Research

Protecting computers from the damages of RAMDO Click Fraud Trojan

Details Ramdo is a family of Trojan horses which performs click fraud. This type of Trojan program is used to increase the number of visits on certain websites or to boost the number of hits…

Read More
Threat Research

Don’t Become the Next Code Spaces: Learn best practices for using cloud services securely

Overview Code Spaces, which offered source code repositories and project management services hosted in Amazon’s Web Services for developers, was forced to cease operations in June after failing to meet the demands of cyber-extortionists. The…

Read More
Threat Research August 4, 2014

VDI Solutions: Background, Threats & Mitigation

Accompanying our upcoming presentation at Blackhat in Las Vegas on August 6-7, this post discusses some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provides some insights into the…

Read More
Threat Research August 2, 2014

Mobile Security Weekly – Countdown to Blackhat US

This week has been eventful for all sorts of reasons. First, we’re excited to have officially launched the Lacoon Mobile Threat Management Platform. Second, with Blackhat US around the corner, we’re all busy and set…

Read More
Threat Research July 29, 2014

Android ‘Fake ID’ can Impersonate your Trusted Apps

Google bug 13678484, aka Android ‘Fake ID’, was just disclosed. What is this vulnerability all about? In a nutshell, this vulnerability enables a threat actor to compromise specific applications or sensitive device data by falsifying…

Read More