Check Point Blog

Security Insights June 10, 2015

Critical Infrastructure is at Risk!

Almost all of today’s modern conveniences, such as electricity, transportation, water systems, and manufactured products, are managed by industrial control systems (ICS). Many of these systems are considered to be critical infrastructure and operate as…

Read More
Security Insights June 3, 2015

Stopping the Next Massive Cyberattack – Step 3: Implement Security Controls

After assessing network strengths and weaknesses and building a properly segmented network, the next step to stronger security is to implement security controls. Cybercriminals are using sophisticated methods to attack specific targets and steal valuable…

Read More
Security Insights May 22, 2015

Stopping the Next Massive Cyberattack – Step 2: Segmentation

When it comes to cybersecurity, conducting a thorough assessment of your current environment to identify potential weaknesses in your security network is only the first step toward a stronger security infrastructure. The next step is…

Read More
Threat Research May 20, 2015

Storm Kit – Changing the rules of the DDoS attack

Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. It’s easy, cheap and difficult to trace, and “service providers” can be found throughout the “dark” Web. As a result,…

Read More
Threat Research May 14, 2015

Analysis of the Havij SQL Injection tool

Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The name Havij means “carrot”, which is the tool’s icon. The tool is designed with a user-friendly GUI that makes it…

Read More
Security Insights May 12, 2015

The 1st Step to Stopping the Next Massive Cyberattack: Assess

Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices to reduce or eliminate security gaps. The first step to a successful security posture is to know what your current…

Read More
Threat Research May 7, 2015

The Latest SQL Injection Trends

SQL injection attacks, in which malicious SQL statements are inserted into an entry field for execution, are one of the most common attack vectors across the globe. SQL injections exploit security vulnerabilities in an application’s…

Read More
Security Insights May 6, 2015

Using Collaboration to Stop the Next Massive Cyberattack

Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization off-guard, or underprepared. While cybercriminals do engage in random attacks, often, the victim has been targeted. In these cases, the…

Read More
Security Insights April 16, 2015

Protecting Beyond the Point of Sale

The sad reality is that retail breaches are becoming too common. With over a billion credit cards in circulation in the US and over 7 billion worldwide, credit card data has become a prime target…

Read More