Check Point Blog

Cyber Attack Trends: 2018 Mid-Year Report

When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations – as well as the security community – constantly challenged. From taking advantage of the Blockchain to developing new attack methods in the thriving mobile arena, threat actors utilize all the latest technologies to achieve their malicious goals.   In…

Read More
Corporate Blog July 12, 2018

Forrester Research names Check Point Software a Leader in Endpoint Security Suites

SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in its newly published report, “The Forrester Wave™: Endpoint Security Suites, Q2 2018”.   “Check Point offers a fully featured, traditional…

Read More
Corporate Blog June 21, 2018

Can You Hear The Digging? The Dangers of Mobile Mining

Mobile malware focused cyber-criminals are fast adapters, and tend to follow rising trends in order to reach a wider audience. Today’s current trend is cryptocurrencies.   There are several ways in which cyber criminals are taking advantage of the current frenzy surrounding cryptocurrencies. Some mobile miners look to secretly mine these digital currencies without the…

Read More
Corporate Blog June 20, 2018

Cyber-Criminals Are On The Offensive During the World Cup: Wallchart Phishing Campaign Exploits Soccer Fans

Keeping track of the World Cup can get overwhelming.   Cyber criminals are keenly aware of this pain point, seeking to use the buzz around the World Cup as cover for their sneaky attacks.   Check Point researchers have identified a phishing campaign targeting soccer fans, using the email subject line of ““World_Cup_2018_Schedule_and_Scoresheet_V1.86_CB-DL-Manager.”  This type…

Read More
Corporate Blog June 18, 2018

Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution

Having already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking at how an in depth approach to defense is required to prevent account takeovers.   As discussed, the primary method…

Read More
Corporate Blog June 14, 2018

Championship Basketball, Championship Cybersecurity: Lessons from the Golden State Warriors

Immovable object, meet unstoppable force. Led by two-time league MVP Stephen Curry, the Golden State Warriors are chasing basketball history. They’ve broken the record for wins in a regular season, they’ve scored and defended at all-time percentages, and they’ve won two championships in the past three years — nearly sweeping LeBron James and the Cleveland…

Read More
Corporate Blog June 8, 2018

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the impact of the Coinhive cyptominer increased by nearly 50% during the month, affecting 22% of all organizations around the world…

Read More
Corporate Blog June 7, 2018

What The NBA Finals Can Teach Us About Cyber Security

If LeBron James didn’t play basketball, he’d be just as menacing as a cyber-hacker.   And if Stephen Curry wasn’t shooting three-pointers before he turned three years old, he’d be just as effective at Check Point as he is as a point guard.   The NBA Finals are on, and for the fourth consecutive year,…

Read More
Corporate Blog June 6, 2018

March’s Most Wanted Malware:  Cryptomining Malware That Works Even Outside the Web Browser on the Rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session   Check Point recently published its monthly Global Threat Index, revealing a surge of cryptomining malware attacks throughout March – specifically, an endpoint cryptomining malware known as the XMRig variant.   First seen…

Read More
Corporate Blog April 13, 2018

Preventing crypto-mining attacks: four key steps that’ll keep you safe

  We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers to exploit the CPU power of their victims in order for crypto-mining operations. Our research shows that these cryptojacking attacks…

Read More
Corporate Blog March 21, 2018