Check Point Blog

Uncategorized November 21, 2016

October’s ‘Most Wanted’ Malware List Shows Attacks on the Rise

Check Point’s Threat Intelligence Research Team revealed today that the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking…

Read More
Threat Research October 21, 2016

September’s ‘Most Wanted’ Malware List: Ransomware in Top 3 for First Time

The Check Point Research Team revealed this week that ransomware attacks continued to rise in September. For the first time since the team launched the Threat Index, ransomware moved into the top three position of…

Read More
Threat Research June 23, 2016

The Infamous Nuclear Exploit Kit Shuts Down

In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one of the largest attack infrastructures observed…

Read More
Threat Research May 24, 2016

The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle

Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took place mainly to avoid signature-based detection employed by many security vendors. To understand how this is achieved, one must first…

Read More
Threat Research April 4, 2016

New Locky Ransomware Variant Implementing Changes in Communication Patterns

Recently, Check Point published a detailed report describing Locky, an emerging new ransomware threat, which was first reported on February 16, 2016. New characteristics related to its communication have now been observed in the wild.…

Read More