Check Point Blog

Corporate Blog June 8, 2018

Championship Basketball, Championship Cybersecurity: Lessons from the Golden State Warriors

Immovable object, meet unstoppable force.   Led by two-time league MVP Stephen Curry, the Golden State Warriors are chasing basketball history. They’ve broken the record for wins in a regular season, they’ve scored and defended…

Read More
Corporate Blog June 7, 2018

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the…

Read More
Corporate Blog June 6, 2018

What The NBA Finals Can Teach Us About Cyber Security

If LeBron James didn’t play basketball, he’d be just as menacing as a cyber-hacker.   And if Stephen Curry wasn’t shooting three-pointers before he turned three years old, he’d be just as effective at Check…

Read More
Corporate Blog April 13, 2018

March’s Most Wanted Malware:  Cryptomining Malware That Works Even Outside the Web Browser on the Rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session   Check Point recently published its monthly Global Threat Index, revealing a surge…

Read More
Corporate Blog March 21, 2018

Preventing crypto-mining attacks: four key steps that’ll keep you safe

  We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers…

Read More
Corporate Blog January 31, 2018

The Check Point 2017 Global Threat Intelligence Trends Report

2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place…

Read More
Corporate Blog January 12, 2018

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children.   Check Point Researchers have revealed a new and nasty malicious…

Read More
Corporate Blog December 21, 2017

Huawei Routers Exploited to Create New Botnet

A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of thousands of attempts to exploit it have already been found in the wild. The delivered payload has been identified as…

Read More
Corporate Blog December 13, 2017

What Lies Ahead? Cyber-Security Predictions for 2018

Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we’re ready for it.”  The past year certainly took us by surprise when the WannaCry and Petya ransomware…

Read More
Corporate Blog November 13, 2017

October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat

Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…

Read More