Check Point Blog

Threat Research April 13, 2017

The Unbearable Lightness of Operating Web-Based Attacks: How easy it is to steal money from IE 8.0-11.0 users

Looking back at the past year, there is no doubt that the malware-as-a-service industry, which sells and trades malware samples, attack tools, and a variety of services, is thriving. It means that cyber criminals with…

Read More
Threat Research June 26, 2015

Microsoft Word Intruder RTF Sample Analysis

By Omri Herscovici, Security Researcher   Background Check Point researchers obtained a sample of a malicious Word document that was used in an attack attempt against one of our customers. The sample itself is a Rich Text…

Read More
Threat Research May 27, 2015

CapTipper – Malicious HTTP Traffic Explorer

The Problem   In recent years, the Internet has experienced a large number of “drive-by” attacks, mostly by exploit kits. Exploit kits are a type of malicious toolkit which exploit security holes, such as insecure…

Read More