Research July 20, 2016 Check Point Forensics: CTB-Faker Ransomware SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on ...
Research July 18, 2016 Top 10 Most Wanted Malware Check Point Software Technologies today published its latest Threat Index, revealing the number of active ...
Research July 11, 2016 Malware’s Constant Evolution Requires Advanced Protections Malware developers are fast learners. They adapt to new security measures in record time and ...
Research July 11, 2016 DIY Attribution, Classification, and In-depth Analysis of Mobile Malware The security research community has been dealing with malware attribution and classification for decades. The ...
Research July 8, 2016 Jigsaw Ransomware Decryption The Jigsaw ransomware was first spotted in April 2016, and has since received a ...
Research July 5, 2016 Check Point Forensic Files: Cerber Ransomware Distribution using Office DOTM files The start of a series This blog entry is the first in a new series ...
Research July 1, 2016 From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of ...
Research June 29, 2016 SandBlast Protects Customers from Widespread Cerber Ransomware Attack Starting at 6:44am UTC on June 22nd, Avanan, a partner of Check Point, detected a ...
Research June 27, 2016 The Malware-as-a-Service Industry Several recent developments have brought the malware infrastructure-as-a-service industry into the spotlight, reminding everyone how ...
Research June 24, 2016 Effective Security Management in a Software Defined World Software defined infrastructure (SDx) along with use of private and public clouds completely transforms the ...