Check Point Blog

Threat Research July 20, 2016

Check Point Forensics: CTB-Faker Ransomware

SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it, providing comprehensive…

Read More
Threat Research July 5, 2016

Check Point Forensic Files: Cerber Ransomware Distribution using Office DOTM files

The start of a series This blog entry is the first in a new series featuring reports from Check Point SandBlast Agent Forensics. The concept is quite simple: we run a malware sample on a…

Read More
Threat Research June 17, 2016

Tales from the Trenches: Modern Malware Requires Modern Investigation Techniques

The Check Point Incidence Response team was called in to assist a company who suffered a severe breach in their network, which was not previously protected by Check Point’s advanced protections. The team began to…

Read More