Security November 2, 2018 Democracy Under Attack: Summarizing the Elections Threat Landscape By Gal Fenighstein, Threat Intelligence Introduction The election process, all over the world, ...
Research October 23, 2018 When Ransomware Stopped Working Harder and Started Working Smarter Observing Ransomware’s Evolution in Delivery Tactics Written by Check Point’s Incident Response Team Four ...
Research September 19, 2018 The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and ...
Security September 11, 2018 August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations ...
Security July 30, 2018 Malvertising: The Illegal Form of Lying H.G.Wells once said that advertising is merely a legalized form of lying. In the age ...
Security July 12, 2018 Cyber Attack Trends: 2018 Mid-Year Report When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations ...
Security June 21, 2018 Forrester Research names Check Point Software a Leader in Endpoint Security Suites SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, ...
Security June 20, 2018 Can You Hear The Digging? The Dangers of Mobile Mining Mobile malware focused cyber-criminals are fast adapters, and tend to follow rising trends in order ...
Security June 18, 2018 Cyber-Criminals Are On The Offensive During the World Cup: Wallchart Phishing Campaign Exploits Soccer Fans Keeping track of the World Cup can get overwhelming. Cyber criminals are keenly aware ...
Security June 14, 2018 Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution Having already looked at the challenges of moving to the cloud, and how attackers gain ...