Check Point Blog

Blog Post February 6, 2019

Report: Under the Hood of Cyber Crime

By Richard Clayton, Research Product Marketing   Since the dawn of the internet, a cyber crime ecosystem has been developing right beneath our fingertips. And much like the maturing of the Internet, this ecosystem has…

Read More
Research February 5, 2019

Reverse RDP Attack: Code Execution on RDP Clients

Research by: Eyal Itkin Overview Used by thousands of IT professionals and security researchers worldwide, the Remote Desktop Protocol (RDP) is usually considered a safe and trustworthy application to connect to remote computers. Whether it is used to ...

Read More
Research February 4, 2019

SpeakUp: A New Undetected Backdoor Linux Trojan

  Check Point Research has discovered a new campaign exploiting Linux servers to implant a new Backdoor Trojan. Dubbed ‘SpeakUp’, the new Trojan exploits known vulnerabilities in six different Linux distributions. The attack targets worldwide serv...

Read More
Corporate Blog January 31, 2019

Hackers Exposed: CPX 360 Cyber Security Summit and Expo 2019 in Las Vegas

By Peter Alexander, Chief Marketing Officer   We are all highly anticipating a phenomenal 2019 CPX 360 Cybersecurity Summit and Expo at Mandalay Bay Resort and Casino, Feb. 4-6 in Las Vegas. As one of…

Read More
Corporate Blog January 29, 2019

Forrester’s 2019 State of Endpoint Security: Focusing On Threat Prevention

by Lloyd Tanaka, Product Marketing Manager   28th JANUARY, 2019:   Meeting endpoint security challenges will take center stage for many enterprises in 2019 says Forrester Research in their latest endpoint research. The potency and…

Read More
Corporate Blog January 22, 2019

Introducing Maestro – The Industry’s First Hyperscale Network Security Solution

Imagine you had a house – three bedrooms, two stories, one bathroom on a single-family lot. And now imagine that you wanted to expand this property – you want four stories, multiple units, many bathrooms.…

Read More
Blog Post January 21, 2019

Threat Trends Analysis Report

By Richard Clayton, Research Product Marketing 2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed…

Read More
Research

Report: 2019 Threat Trends Analysis

  2018 introduced a challenging threat landscape. Threat actors consistently improved their cyber weapons, adopted new methods and adapted their attacks to emerging technologies. And although it may have seemed the past year was quieter, this is f...

Read More
Corporate Blog January 18, 2019

Check Point Forensic Files: GandCrab Returns with Friends (Trojans)

Following our previous post about GandCrab, in this post we show how another variant of this well-known ransomware is observed by Check Point’s SandBlast Agent (SBA) Behavioral Guard and analyzed through the lens of a…

Read More
Research January 16, 2019

Hacking Fortnite Accounts

Research by: Alon Boxiner, Eran Vaknin and Oded Vanunu Played in a virtual world, players of ‘Fortnite’, the massively popular game from game developer Epic Games, are tasked with testing their endurance as they battle for tools and weapons that will k...

Read More