Research April 20, 2016 Top 4 Ways Employees Compromise their Corporate Data via Cloud Services Recent research by Gartner showed that “Through 2020, 95% of cloud security breaches will be ...
Research April 20, 2016 Inside Nuclear’s Core: Analyzing the Nuclear Exploit Kit Infrastructure Malware use different methods to propagate. Exploit kits (EKs) have been one the most common ...
Research April 18, 2016 Unleash the Power of Security for Businesses of All Sizes When we introduced the 15000 and 23000 series appliances in January, giving our large enterprise ...
Research April 15, 2016 KOVTER RANSOMWARE – THE EVOLUTION: From Police Scareware to Click Frauds and then to Ransomware In terms of cyber security research, the Kovter malware family is very interesting. A wide-spread ...
Research April 13, 2016 The Next Battleground – Critical Infrastructure Cyber threats have dramatically developed throughout the years. From simple worms to viruses, and finally ...
Research April 13, 2016 Check Point Threat Alert: Badlock Vulnerability EXECUTIVE SUMMARY An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for ...
Research April 12, 2016 New Technologies Pose New Threats Technology has changed our lives for the better; there is no doubt about it. However, ...
Research April 11, 2016 Decrypting the Petya Ransomware Petya is a relatively new ransomware variant that first appeared on the cyber-crime scene at ...
Research April 11, 2016 New Locky Variant Implements Evasion Techniques Following Check Point’s recent discovery of a new communication scheme implemented by the Locky ransomware, ...
Research April 11, 2016 Security Management for Critical Infrastructure Environments The mission of protecting industrial control systems (ICS) is so vital that it cannot be ...