Check Point Blog

Cloud Security October 29, 2018

AWS re:Invent

Dates: Nov. 26th – 30th, 2018 Dome9 Booth #2605 Learn More  Hero, let’s team-up in securing your cloud. While at AWS re:Invent, we would like an opportunity to share with you why our customers have…

Read More
Cloud Security October 23, 2018

US Voter Data Leaked via Misconfigured S3 Bucket

It was recently announced that the Tea Party PAC (or the Tea Party Patriots Citizen Fund (TPPCF)) publicly exposed around half a million US voters data through its Amazon S3 bucket. Read more about it…

Read More
Corporate Blog

When Ransomware Stopped Working Harder and Started Working Smarter

Observing Ransomware’s Evolution in Delivery Tactics   Written by Check Point’s Incident Response Team   Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…

Read More
Cloud Security October 22, 2018

Get CSA CCM Ready with Dome9

Register Here for an Upcoming Webinar on October 25th 2018: Easily Achieve Cloud Compliance using Dome9’s Automation of CSA’s Cloud Controls Matrix The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is designed to provide…

Read More
Cloud Security

How To Detect LibSSH Authentication Bypass for EC2 Instances

It was recently announced that a vulnerability in libssh, a popular library for supporting the Secure Shell (SSH) authentication protocol, left thousands of servers at risk of hijacking. Implications The vulnerability allows an attacker to…

Read More
Research October 17, 2018

The Emergence of the New Azorult 3.3

Research by: Israel Gubi During the last week, Check Point Research spotted a new version of Azorult in the wild being delivered through the RIG exploit kit, as well as other sources. Azorult is a long known information stealer and malware downloader, ...

Read More

National Cyber Security Awareness Month: Six Tips to Stop Phisherman

Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to…

Read More
Cloud Security October 15, 2018

Automatically Remediate Publicly Exposed S3 Buckets

In this blog, we will discuss how S3 bucket exposures are automatically remediated using an open source project called Dome9 CloudBots. What are Cloudbots? Back in June 2018, we released an open-source project called CloudBots. You…

Read More
Corporate Blog

September 2018’s Most Wanted Malware: Cryptomining Attacks Against Apple Devices On The Rise

Check Point’s latest Global Threat Index reveals a near four-fold increase in cryptomining malware targeting iPhone users   Check Point’s researchers detected a near-400% increase in crypto-mining malware attacks against iPhones. The surge was seen…

Read More
Research October 14, 2018

Godzilla Loader and the Long Tail of Malware

Research by: Ben Herzog To most victims, malware is a force of nature. Zeus, Wannacry, Conficker are all vengeful gods, out to punish the common man for clicking the wrong link. Even for a security analyst, it’s easy to fall into the kind of thin...

Read More