Research October 9, 2015 Israeli Public Sector Targeted by Zeus Trojan Hidden in a Word Document Two months ago, a malicious Rich Text Format (RTF) document came to the attention of ...
Research September 14, 2015 The Problem with Traditional Sandboxing Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, ...
Research September 10, 2015 Analysis of the Sality Gambling Campaign Check Point has a wide and global install base, from which we receive anonymized logs ...
Research September 2, 2015 Introducing Check Point SandBlast Zero-Day Protection Cyber threats are continuing to evolve, and hackers are finding new ways to hide malware ...
Research August 31, 2015 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices Introduction Ransomware has been a well-known method of attack in the PC world for quite ...
Research August 27, 2015 Leadership, Validation, Innovation and Continuous Improvement From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day ...
Research August 18, 2015 JavaScript Hooking as a Malicious Website Research Tool One of the top Internet threats today is drive-by download attacks which originate from exploits ...
Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 8, 2015 Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many ...