Check Point Blog

Research July 3, 2017

BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor

Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important distinctions in…

Read More
Research June 21, 2017


On June 20th Check Point published an IPS signature providing virtual patching for the Siemens SIPROTEC DoS vulnerability. This IPS signature can help protect against a new malware, CrashOverride, also known as Industroyer– that is…

Read More
Research May 25, 2017

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in the wrong…

Read More
Research October 18, 2016

Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year

Great news! I’m glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs…

Read More
Research September 7, 2016

Email from PayPal? Don’t Get Attached!

Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such as your university, your Internet service provider, or your bank. These messages usually direct you to a spoofed website, have a…

Read More
Research November 19, 2015

Check Point Threat Alert: Web Shells

Web shells can be used to obtain unauthorized access and can lead to wider network compromise. Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to a significant number…

Read More
Research October 2, 2015

A Solution for the Evolving Threat Landscape

The threat landscape has severely changed over the last few years, and organizations have to constantly keep up with sophisticated threats and advanced tactics of cybercriminals. With multiple tools at hackers’ disposal, new threat variants…

Read More
Research September 10, 2015

Check Point IPS Protects Against Zero-Day Vulnerability in FireEye Appliances

On September 6th, researcher Kristian Erik Hermansen publically disclosed a zero-day vulnerability in FireEye appliances. This vulnerability impacts customers running HX 2.1.x and DMZ 2.1.x versions of the FireEye HX endpoint security platform, and appears…

Read More
Research August 5, 2015

Threat Alert: BIND DNS Server TKEY Vulnerability

Recent Bind9 Vulnerability could be used to shut down large parts of the Internet   The Check Point Incident Response Team (CPIRT) has received numerous reports of automated scans across the internet attempting to exploit…

Read More
Research July 9, 2015

Check Point Threat Alert: Hacking Team

EXECUTIVE SUMMARY   Hacking Team is an Italian company that provides security services and tools to governments and law enforcement organizations.   The company experienced a data breach on Monday, July 6th, resulting in 400…

Read More