Check Point Blog

Threat Research April 13, 2017

The Unbearable Lightness of Operating Web-Based Attacks: How easy it is to steal money from IE 8.0-11.0 users

Looking back at the past year, there is no doubt that the malware-as-a-service industry, which sells and trades malware samples, attack tools, and a variety of services, is thriving. It means that cyber criminals with…

Read More
Security Insights September 27, 2016

Signature-based security solutions can leave networks defenseless for months

Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass…

Read More
Threat Research August 16, 2016

CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service

Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of…

Read More
Threat Research July 26, 2016

Ransomware: what you need to know

In recent years, there has been a surge of ransomware attacks. It’s been reported all over security blogs, tech websites and in the news. Unfortunately, these attacks show no signs of slowing. If anything, they…

Read More