Research April 4, 2022 Once Again, Check Point Software Positions as a Leader across Multiple G2 Leadership Quadrants By Amit Sharon, Head of Customer Experience, Check Point Software Check Point Software customers from ...
Crypto December 16, 2021 Phorpiex botnet is back with a new Twizt: Hijacking Hundreds of crypto transactions Check Point Research (CPR) spots a botnet variant that has stolen nearly half a million ...
Crypto November 4, 2021 Scammers used Google Ads to Steal ~ $500k Worth of Cryptocurrency Check Point Research (CPR) warns of scammers using Google Ads to steal crypto wallets, after ...
Research July 21, 2020 How scammers are hiding their phishing trips in public clouds Recently, we published our research on how threat actors are taking advantage of well-known cloud ...
Research March 6, 2019 PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services Research By: Omer Gull Introduction Many large organizations use Windows Deployment Services (WDS) to ...
Research March 5, 2019 Jmail Breaker: Profiting from Joomla’s Mail Service Research By: Asaf G. and Adi I. Joomla! is one of the most popular ...
Research March 4, 2019 MacOS Malware Pedia Research by: Ofer Caspi With a massive growth in new malware and infections, MacOS security ...
Research March 3, 2019 A New InfoStealer Campaign Targets APAC Windows Servers Research by: Arie Olshtein, Moshe Hayun, Arnold Osipov As time goes by, malware writers invent ...
Research February 20, 2019 Report: Cloud, Mobile and IoT as Weakest Links By Richard Clayton, Research Product Marketing In the first installment of this 2019 Security Report ...
Research February 20, 2019 Vol.3 – 2019 Security Report In the first installment of this 2019 Security Report we reviewed the latest trends ...