Research August 25, 2015 Certifi-gate Found in the Wild on Google Play New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, ...
Research August 18, 2015 JavaScript Hooking as a Malicious Website Research Tool One of the top Internet threats today is drive-by download attacks which originate from exploits ...
Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research August 11, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part II – Supremacy In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research August 4, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part I In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 13, 2015 Threat Alert: OPM Tools EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the ...
Research July 9, 2015 Check Point Threat Alert: Hacking Team EXECUTIVE SUMMARY Hacking Team is an Italian company that provides security services and tools ...
Research July 7, 2015 Who Really Controls Your Online Store? Check Point researchers Avi Gimpel, Liad Mizrachi and Oded Vanunu recently discovered critical vulnerabilities in ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...