Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 16, 2015 Some Lessons from the Hacking Team Breach Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, ...
Research July 13, 2015 Threat Alert: OPM Tools EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the ...
Research July 9, 2015 Check Point Threat Alert: Hacking Team EXECUTIVE SUMMARY Hacking Team is an Italian company that provides security services and tools ...
Research July 8, 2015 Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...
Research June 30, 2015 Stopping the Next Massive Cyberattack – Step 5: Incident Response Plans The Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research June 16, 2015 Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty This month, Check Point released its annual security report—a trove of statistics and trends culled ...