Check Point Blog

Corporate Blog August 15, 2017

Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies

    Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud.  Many of these companies are leading international…

Read More
Corporate Blog August 11, 2017

“The Next WannaCry” Vulnerability is Here – Let’s Stop it before it’s too Late

This Tuesday, Microsoft released a security patch including 48 fixes, 25 of which are defined as “critical”. While Microsoft updates happen every month, this one reveals an especially dangerous vulnerability – CVE-2017-8620. Behind this dull…

Read More
Corporate Blog July 31, 2017

Are You Prepared for the Next Attack?

A WAKE-UP CALL From WannaCry and Petya to the most recent attacks today, #LeakTheAnalyst and HBO—it is now apparent that anyone or any organization is a target for cyber criminals. Attacks continue to grow at…

Read More
Corporate Blog July 17, 2017

June’s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organizations

Check Point’s latest Global Threat Impact Index revealed that 28% of organizations globally were affected by the Roughted malvertising campaign during June. A large-scale malvertising campaign, RoughTed is used to deliver links to malicious websites…

Read More
Corporate Blog July 8, 2017

Hacked in Translation – “Director’s Cut” – Full Technical Details

Research by Omri Herscovici and Omer Gull Background Recently, Check Point researchers revealed a brand new attack vector – attack by subtitles. As discussed in the previous post and in our demo, we showed how…

Read More
Corporate Blog June 28, 2017

Preventing Petya – stopping the next ransomware attack

Check Point’s Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks.  It…

Read More
Corporate Blog June 8, 2017

Anatomy of the Jaff Ransomware Campaign

Last month, Check Point researchers were able to spot the distribution of Jaff Ransomware by the Necurs Botnet. The ransomware was spread using malicious PDF files that had an embedded docm file, which in its…

Read More
Mobile Malware May 25, 2017

The Judy Malware: Possibly the largest malware campaign found on Google Play

Check Point researchers discovered another widespread malware campaign on Google Play, Google’s official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The…

Read More
Security Insights May 19, 2017

Security Brief for Connected Automotives

Introduction       The question of which companies will dominate the automotive industry in coming years is being decided in the contest to produce Internet-connected cars. Intel predicts 120 million vehicles with varying degrees…

Read More
Threat Research May 17, 2017

Check Point Reveals Global WannaCry Ransomware Infection Map at CPX Europe 2017

Check Point researchers have been investigating the ransomware campaign in detail since it was first reported. With a new Check Point WannaCry Ransomware Infection Map, the researchers were able to track 34,300 attack attempts in…

Read More