Research August 4, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part I In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research July 30, 2015 Check Point to Uncover Certifi-gate, A New Android Threat, at Black Hat USA 2015 Check Point to Uncover A New Threat to Millions of Android Devices Seizing control of ...
Research July 26, 2015 Current Wave of Ransomware Today, ransomware like Cryptolocker is hitting organizations around the globe. At Check Point, we can ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 21, 2015 SwiftKey Leaves Samsung Devices Susceptible to Cybercrime A vulnerability in the SwiftKey virtual keyboard pre-installed on the Samsung Galaxy S4 Mini, S4, ...
Research July 16, 2015 Some Lessons from the Hacking Team Breach Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, ...
Research July 13, 2015 Threat Alert: OPM Tools EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the ...
Research July 10, 2015 Adware or APT – SnapPea Downloader – An Android Malware that implements 12 different exploits On June 4th 2015, Check Point discovered multiple instances of a sophisticated mobile malware campaign. ...
Research July 9, 2015 Check Point Threat Alert: Hacking Team EXECUTIVE SUMMARY Hacking Team is an Italian company that provides security services and tools ...
Research July 8, 2015 Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many ...