By Gal Fenighstein, Threat Intelligence Introduction The election process, all over the world, has been modernized. From online voter registration forms to debates waged on social media all the way to electronic voting…
Read MoreObserving Ransomware’s Evolution in Delivery Tactics Written by Check Point’s Incident Response Team Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…
Read MoreEvery month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and patterns in the global cyber threat landscape. And every month, the top spots are filled by illicit cryptomining malware.…
Read MoreCheck Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations feel the impact of large scale Ramnit campaign There was a significant increase in attacks using the Ramnit banking…
Read MoreH.G.Wells once said that advertising is merely a legalized form of lying. In the age of digital marketing, though, it seems that threat actors have taken the saying a step further and created an illegal…
Read MoreWhen it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations – as well as the security community – constantly challenged. From taking advantage of the Blockchain to developing new attack…
Read MoreSandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria We are pleased to announce that Forrester Research recognized Check Point as a Leader in…
Read MoreMobile malware focused cyber-criminals are fast adapters, and tend to follow rising trends in order to reach a wider audience. Today’s current trend is cryptocurrencies. There are several ways in which cyber criminals are…
Read MoreKeeping track of the World Cup can get overwhelming. Cyber criminals are keenly aware of this pain point, seeking to use the buzz around the World Cup as cover for their sneaky attacks. …
Read MoreHaving already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking…
Read More