Research May 6, 2015 Using Collaboration to Stop the Next Massive Cyberattack Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization ...
April 20, 2015 Analyzing the Magento Vulnerability (Updated) Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento ...
April 16, 2015 Check Point Threat Alert – Simda Overview The Simda botnet is a network of computers infected with self-propagating malware which ...
April 15, 2015 Check Point Threat Alert: AAEH/Beebone Overview AAEH, also known as BeeBone, is a family of polymorphic downloaders created with ...
April 8, 2015 The Curious Incident of the Phish in the Night-Time: a Forensic Case Study Names have been changed to protect the privacy of the individuals involved. On the ...
March 13, 2015 Shiver Me Timbers! DDoS Attacks Caused by Pirate Bay Trackers and DNS Misconfigurations? In January of 2015 the Check Point Incident Response team (CPIR) had two DDoS attack ...
December 18, 2014 Misfortune Cookie: The Hole in Your Internet Gateway What is the Misfortune Cookie vulnerability? Misfortune Cookie is a critical vulnerability that allows an ...