Check Point Blog

Business and Technology November 13, 2017

October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat

Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…

Read More
Research May 10, 2017

DiamondFox modular malware – a one-stop shop

Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with Terbium Labs, a Dark Web Data Intelligence company. The report includes a review of the malware’s sales procedure and customer…

Read More
Research March 22, 2017

Ransomware– Not Only File Encryption

Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. While most ransomware families prevent the victims from accessing their documents, pictures, databases and other files by…

Read More
Research March 14, 2017

Merry X-Mas Ransomware Decryption Tool

Merry X-Mas is a ransomware that was first spotted in the wild on January 3, 2017. Upon successful infection, the ransomware encrypts victims’ files and presents a “Merry Christmas” ransom note with a holiday-themed design…

Read More
Research February 21, 2017

2016 H2 Global and Regional Threat Intelligence Trends

Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same time, prominent malware and attack methods continue to evolve, bypassing…

Read More
Research September 9, 2016

(Ir)responsible Disclosure

Computers have become an essential part of our lives, and in some cases, they are even responsible for keeping us alive. Our dependency to use computers for medical treatments such as diagnostic equipment, medical monitors…

Read More
Research May 25, 2016

Weaponized WordPress Tools

WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from its  free plugins and themes that…

Read More
Research April 13, 2016

Check Point Threat Alert: Badlock Vulnerability

EXECUTIVE SUMMARY An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for Linux & UNIX. Attackers could launch a man-in-the-middle-attack and downgrade the authentication level of DCE/RPC channels, allowing them to impersonate…

Read More
Research April 6, 2016

Congrats! More than 7000 applications in your database

Security managers will appreciate Check Point’s Application Control Software Blade. With more than 7000 pre-defined and supported applications, Check Point provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT…

Read More
Corporate Blog March 8, 2016

Top Malware Families Found in January 2016 Show DDoS on the Rise

Distributed denial of service (DDoS) attacks are common threats that companies of all sizes have to continuously face. The size of DDoS attacks targeting businesses has been getting bigger every year, and from the amount…

Read More