Check Point Blog

Cloud Security October 12, 2018

I am safe with Dome9 IAM Ad-Hoc Permission Elevation for AWS Environments

If you work in the cloud, you probably know how many security risks there are out there these days. Hackers are always praying, or someone from your team can misconfigure the environment and expose it…

Read More
Corporate Blog October 11, 2018

Safe Classrooms Start With A Safe Web: Check Point Presents SandBlast for Education

The 21st century student has the world at their fingertips.   They can access the entire collection of human knowledge just by typing a question into Google. They can mingle with their classmates from down…

Read More
Corporate Blog October 8, 2018

Check Point Named Leader in Gartner Magic Quadrant for Enterprise Network Firewalls

With the average data breach costing businesses $3.8 million, enterprises need to secure their network with nothing short of the best of the best.   Check Point is proud to announce, that for the sixteenth…

Read More
Corporate Blog October 4, 2018

Bloomberg: “China’s Big Hack”- Check Point Responds

Today Bloomberg published a breaking story, “The Big Hack: How China Used a Tiny Chip to infiltrate America’s Top Companies,” detailing a major attack on US servers by the PLA, infiltrating the supply chain of…

Read More
Research October 3, 2018

Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware

In this part we show how to deal with obfuscated Windows API calls in Ngioweb malware using Labeless and x64dbg without reconstructing API-resolving algorithm. If you’re new to all this Labeless stuff, though, please refer to the previous articles in t...

Read More
Research

Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.

In this part we show how to decrypt strings present in the module of Boleto malware – without reconstructing the decryption algorithm. If you’re new to all this Labeless stuff though, please refer to the previous articles in this series as they will be...

Read More
Research

Labeless Part 4: Scripting

In this part of our Labeless series, we will discuss the theory behind Labeless scripting. If, however, you’re new to all this Labeless stuff, please refer to the previous articles in this series as they will be helpful in explaining on what’s going on...

Read More
Cloud Security October 2, 2018

Get NIST Cybersecurity Framework Support with Dome9

NIST Cybersecurity Framework (CSF) was a collaboration effort of industry experts and government. This framework is considered to be flexible and useful for protection of critical infrastructure. Based on NIST CSF website – “NIST CSF…

Read More
Corporate Blog

AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection

Check Point is pleased to announce its SandBlast Agent solution passed AV-TEST Institute’s lab tests with excellent results and has been named a “Top Product” by the independent IT security organization. This announcement comes on…

Read More
Corporate Blog October 1, 2018

Prevent Ransomware With These Five Tips: Kicking Off National Cyber Security Awareness Month

Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to…

Read More