Check Point Blog

Join Check Point at Microsoft Ignite 2018: Discover Cloud Security and Connectivity

Microsoft Ignite 2018 (#MSIgnite) is almost here, and Check Point is delighted to be a Gold Sponsor again for this year’s conference. If you are making the trek out to Orlando and planning on attending, we invite you to come spend some time with us because have we got a great show planned! Our cloud, threat…

Read More
Corporate Blog September 18, 2018

Meet Black Rose Lucy, the Latest Russian MaaS Botnet

Research By: Feixiang He, Bogdan Melnykov, Andrey Polkovnichenko An organization needs to have a collaborative hiring process, advised Steve Jobs. Always a group to follow mainstream trends closely, in recent years we’ve seen cyber criminals take great…

Read More
Research September 13, 2018

August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat

Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations feel the impact of large scale Ramnit campaign   There was a significant increase in attacks using the Ramnit banking trojan during August, according to our latest Global Threat Index. Ramnit has doubled its global impact over the past few…

Read More
Corporate Blog September 11, 2018

Domestic Kitten: An Iranian Surveillance Operation

Chinese strategist Sun Tzu, Italian political philosopher Machiavelli and English philosopher Thomas Hobbes all justified deceit in war as a legitimate form of warfare. Preceding them all, however, were some in the Middle East who had already internali…

Read More
Research September 7, 2018

Check Point Is a Leader in 2018 Next-Generation Firewall NFGW Test by NSS Labs

NSS Labs recently conducted and published the results of its 2018 Next Generation Firewall (NGFW) Group Test.  At Check Point, we pride ourselves on our “sense of urgency” to move quickly to protect against new vulnerabilities and attacks, and in a follow-on public test conducted at NSS Labs in August, 2018, we delivered outstanding results*:…

Read More
Corporate Blog September 6, 2018

Architect-ed for Automation: AWS Transit VPCs with Check Point CloudGuard

There are a number of reasons why organizations are drawn to AWS for their public cloud needs; increased business agility, improved process efficiencies and lower networking costs to name a few. And, if the latest AWS quarterly earnings are any indication, this trend shows no sign of slowing down any time soon.   Check Point…

Read More
Corporate Blog August 31, 2018

Ransom Warrior Decryption Tool

On August 8th, a new ransomware, dubbed ‘RansomWarrior’, was found by the Malware Hunter Team. Going by the ransom note shown to its victims, RansomWarrior seems to have been developed by Indian hackers, who would appear to also not be so e…

Read More
Research August 30, 2018

AI and Cybersecurity: combining data with human expertise

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and AI-based medical diagnostics and prognoses.   But can artificial intelligence be used effectively…

Read More
Corporate Blog

CeidPageLock: A Chinese RootKit

Research by: Israel Gubi Over the last few weeks, we have been observing a rootkit named CEIDPageLock being distributed by the RIG Exploit kit. The rootkit was first discovered by 360 Security Center a few months ago, when it was detected trying to tam…

Read More
Research August 28, 2018

Interactive Mapping of APT-C-23

Research by: Aseel Kayal Last month, we investigated the renewal of a targeted attack against the Palestinian Authority, attributed to the APT-C-23 threat group. Although this campaign was initially discovered in early 2017, it is still active today an…

Read More
Research August 26, 2018