Research March 7, 2017 Check Point Comments on Recent Advanced Threats Today’s publication by WikiLeaks shows how advanced hacking techniques, including extremely sophisticated exploit tools, are ...
March 1, 2017 Check Point R80 Just Made Neopharm’s Security Management Simpler It’s becoming more challenging than ever to manage security across expanding networks, new technologies, and ...
Research February 21, 2017 2016 H2 Global and Regional Threat Intelligence Trends Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social ...
Research February 14, 2017 Cyber Threat Alliance Marks New Era in Industry Collaboration and Customer Protection The announcement by the Cyber Threat Alliance (CTA) at the RSA Conference is an important ...
Research February 8, 2017 Hummingbad Overtaken as Leading Mobile Malware in January’s Global Threat Impact Index Hummingbad has been overtaken as the leading mobile malware for the first time since February ...
Research January 24, 2017 Charger Malware Calls and Raises the Risk on Google Play Several weeks ago, Check Point Mobile Threat Prevention detected and quarantined the Android device of ...
Research January 4, 2017 The Right Security Architecture When it comes to maintaining the best security, size doesn’t matter. Big or small, the ...
Research January 3, 2017 Looking for a New Employee? Beware of a New Ransomware Campaign Despite trying to brand itself as a new malware, GoldenEye, the latest Petya variant, is ...
Research December 29, 2016 How We Found Two New Ransomware Families and Built Their Decryptors Ransomware is one of the most common and effective attack methods today, and it seems ...
Research December 27, 2016 Check Point discovers three Zero-Day Vulnerabilities in web programming language PHP 7 PHP 7, the latest release of the popular web programming language that powers more than ...