Research July 7, 2015 Who Really Controls Your Online Store? Check Point researchers Avi Gimpel, Liad Mizrachi and Oded Vanunu recently discovered critical vulnerabilities in ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...
Research July 2, 2015 Matsnu: A Deep Dive Check Point researcher Stanislav Skuratovich recently analyzed a malware called “Matsnu”, an x86 infector that ...
Research June 30, 2015 Stopping the Next Massive Cyberattack – Step 5: Incident Response Plans The Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report ...
Research June 26, 2015 Microsoft Word Intruder RTF Sample Analysis By Omri Herscovici, Security Researcher Background Check Point researchers obtained a sample of a malicious ...
Research June 19, 2015 Zero-Day Flaw Victimizes Apple iOS and OSX Apps Researchers this week disclosed zero-day flaws in Apple’s iOS and OSX operating systems that allowed ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research June 16, 2015 Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty This month, Check Point released its annual security report—a trove of statistics and trends culled ...
Research June 10, 2015 Critical Infrastructure is at Risk! Almost all of today’s modern conveniences, such as electricity, transportation, water systems, and manufactured products, ...
Research June 9, 2015 New Data: Volatile Cedar Malware Campaign At the end of March, we published a blog post and a ...