Research June 26, 2015 Microsoft Word Intruder RTF Sample Analysis By Omri Herscovici, Security Researcher Background Check Point researchers obtained a sample of a malicious ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research June 16, 2015 Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty This month, Check Point released its annual security report—a trove of statistics and trends culled ...
Research June 9, 2015 New Data: Volatile Cedar Malware Campaign At the end of March, we published a blog post and a ...
Research June 2, 2015 New Vulnerabilities Discovered In WordPress Not Just Another Broken Link… Introduction Check Point researcher Dikla Barda recently discovered ...
May 20, 2015 Check Point Threat Alert: Logjam Executive Summary A major flaw was discovered with SSL and was named “Logjam”. The flaw ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
May 14, 2015 Analysis of the Havij SQL Injection tool Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The ...
May 12, 2015 The Microsoft Help File (.chm) May Enslave You “Microsoft Compiled HTML Help” is a Microsoft proprietary online help format that consists of a ...
Security May 7, 2015 The Latest SQL Injection Trends SQL injection attacks, in which malicious SQL statements are inserted into an entry field for ...