Check Point Blog

Corporate Blog November 2, 2018

Democracy Under Attack: Summarizing the Elections Threat Landscape

By Gal Fenighstein, Threat Intelligence   Introduction   The election process, all over the world, has been modernized. From online voter registration forms to debates waged on social media all the way to electronic voting…

Read More
Research October 23, 2018

When Ransomware Stopped Working Harder and Started Working Smarter

Observing Ransomware’s Evolution in Delivery Tactics   Written by Check Point’s Incident Response Team   Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…

Read More
Research September 19, 2018

The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper

Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and patterns in the global cyber threat landscape.   And every month, the top spots are filled by illicit cryptomining malware.…

Read More
Corporate Blog September 11, 2018

August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat

Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations feel the impact of large scale Ramnit campaign   There was a significant increase in attacks using the Ramnit banking…

Read More
Corporate Blog July 30, 2018

Malvertising: The Illegal Form of Lying

H.G.Wells once said that advertising is merely a legalized form of lying. In the age of digital marketing, though, it seems that threat actors have taken the saying a step further and created an illegal…

Read More
Corporate Blog July 12, 2018

Cyber Attack Trends: 2018 Mid-Year Report

When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations – as well as the security community – constantly challenged. From taking advantage of the Blockchain to developing new attack…

Read More
Corporate Blog June 21, 2018

Forrester Research names Check Point Software a Leader in Endpoint Security Suites

SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in…

Read More
Corporate Blog June 20, 2018

Can You Hear The Digging? The Dangers of Mobile Mining

Mobile malware focused cyber-criminals are fast adapters, and tend to follow rising trends in order to reach a wider audience. Today’s current trend is cryptocurrencies.   There are several ways in which cyber criminals are…

Read More
Corporate Blog June 18, 2018

Cyber-Criminals Are On The Offensive During the World Cup: Wallchart Phishing Campaign Exploits Soccer Fans

Keeping track of the World Cup can get overwhelming.   Cyber criminals are keenly aware of this pain point, seeking to use the buzz around the World Cup as cover for their sneaky attacks.  …

Read More
Corporate Blog June 14, 2018

Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution

Having already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking…

Read More