Research September 21, 2015 XCodeGhost: The First Wide-Scale Attack on iOS Apps Arrives XcodeGhost is a compromised version of the iOS developer platform, Xcode. This unofficial version of ...
Research September 21, 2015 BrainTest – A New Level of Sophistication in Mobile Malware Check Point Mobile Threat Prevention has detected two instances of a mobile malware variant infecting ...
Research September 15, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ultimatum In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research September 14, 2015 The Problem with Traditional Sandboxing Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, ...
Research September 10, 2015 Check Point IPS Protects Against Zero-Day Vulnerability in FireEye Appliances On September 6th, researcher Kristian Erik Hermansen publically disclosed a zero-day vulnerability in FireEye appliances. ...
Research September 10, 2015 Analysis of the Sality Gambling Campaign Check Point has a wide and global install base, from which we receive anonymized logs ...
Research September 9, 2015 The Sandbox Evolved: An Advanced Solution to Defeat the Unknown The modern threat landscape is one of constant evolution. Everything is changing before our eyes ...
Research September 8, 2015 WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users Introduction WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The ...
Research September 2, 2015 Introducing Check Point SandBlast Zero-Day Protection Cyber threats are continuing to evolve, and hackers are finding new ways to hide malware ...
Research August 31, 2015 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices Introduction Ransomware has been a well-known method of attack in the PC world for quite ...