Check Point Blog

Corporate Blog July 21, 2020

How scammers are hiding their phishing trips in public clouds

Recently, we published our research on how threat actors are taking advantage of well-known cloud services to download malicious payloads. This technique has also been observed in phishing attacks, where cloud storage services are used…

Read More
Corporate Blog September 11, 2018

August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat

Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations feel the impact of large scale Ramnit campaign   There was a significant increase in attacks using the Ramnit banking…

Read More
Corporate Blog August 16, 2018

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are…

Read More
Corporate Blog July 5, 2018

June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors

Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining Remains Tops on List   Over the past four months, banking Trojans have increased their global impact…

Read More
Corporate Blog June 21, 2018

Forrester Research names Check Point Software a Leader in Endpoint Security Suites

SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in…

Read More
Corporate Blog June 8, 2018

Championship Basketball, Championship Cybersecurity: Lessons from the Golden State Warriors

Immovable object, meet unstoppable force.   Led by two-time league MVP Stephen Curry, the Golden State Warriors are chasing basketball history. They’ve broken the record for wins in a regular season, they’ve scored and defended…

Read More
Corporate Blog June 6, 2018

What The NBA Finals Can Teach Us About Cyber Security

If LeBron James didn’t play basketball, he’d be just as menacing as a cyber-hacker.   And if Stephen Curry wasn’t shooting three-pointers before he turned three years old, he’d be just as effective at Check…

Read More
Corporate Blog June 5, 2018

Healthcare, Retail, and Finance: Gen V Attacks Affect All Industries

Fifth generation mega-attacks have changed the cyber security landscape forever.  As proven by the WannaCry and Petya ransomware attacks last year, using vulnerabilities and exploit tools stolen from intelligence agencies, attackers can now cause economic…

Read More
Corporate Blog March 21, 2018

Preventing crypto-mining attacks: four key steps that’ll keep you safe

  We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers…

Read More
Corporate Blog February 1, 2018

How Can Your Business Score Touchdowns Without An Offensive Line?

What the Philadelphia Eagles Can Teach Us About Cyber-Security   Imagine your founding CTO resigning … right before your company’s biggest annual conference. How do you adapt, maintain momentum, and bring home wins?   The…

Read More