Check Point Blog

Corporate Blog March 1, 2019

Explore the Attacker’s Paradise Beyond the Perimeter with Check Point at RSA Conference

Publish date: March 1, 2018   Next week, we are all coming together at one of the world’s most renowned cyber security conferences, RSA Conference 2019, March 4 – 8 at the San Francisco Moscone…

Read More
Blog Post February 28, 2019

Unleash the Power of Cloud Security – 300% Performance Improvement with CloudGuard IaaS

By Amir Kaushansky, Sr. Product Manager, Cloud Security   We all want a higher network performance. We all want a better price-performance ratio, and we all want all of it for free.   As desirable…

Read More
Blog Post February 27, 2019

Protecting Against WinRAR Vulnerabilities

A 19 year old, yet major, vulnerability was recently found by Check Point Research in the popular web application, WinRAR, that could potentially put over 500 million users at risk. The exploit works by simply…

Read More
Blog Post February 20, 2019

Report: Cloud, Mobile and IoT as Weakest Links

By Richard Clayton, Research Product Marketing In the first installment of this 2019 Security Report we reviewed the latest trends and threats facing the IT security industry today. In the second we took a deeper…

Read More
Research

Vol.3 – 2019 Security Report

  In the first installment of this 2019 Security Report we reviewed the latest trends and threats facing the IT security industry today. In the second we took a deeper look at the cyber crime underworld to get a grasp on the democratization of cyb...

Read More
Research

Extracting a 19 Year Old Code Execution from WinRAR

Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive,...

Read More
Research February 19, 2019

North Korea Turns Against New Targets?!

  Introduction Over the past few weeks, we have been monitoring suspicious activity directed against Russian-based companies that exposed a predator-prey relationship that we had not seen before. For the first time we were observing what seemed to...

Read More
Cloud February 13, 2019

Docker Security Hole Revealed: Mitigate CVE-2019-5736

by Marina Segal – Lead Product Manager, CloudGuard Dome9, Check Point and Amir Kaushansky – Product Manager, Cloud Security, Check Point  How it was Discovered: On February 11th, a critical vulnerability in runC binary was released.…

Read More
Corporate Blog

January 2019’s Most Wanted Malware: A New Threat Speaks Up

Check Point’s latest Global Threat Index sees emergence of SpeakUp – the Linux Trojan that’s undetectable by anti-virus software   In January, our researchers detected a new campaign exploiting Linux servers to distribute a backdoor…

Read More
Corporate Blog February 8, 2019

A Watershed Moment In The Threat Landscape

By Avi Rembaum, February 8th 2018   The phrase watershed moment is often overused. With our race to the cloud, the rapid rise in the number of devices connected to the Internet and a near…

Read More