Research July 21, 2020 How scammers are hiding their phishing trips in public clouds Recently, we published our research on how threat actors are taking advantage of well-known cloud ...
Research August 15, 2017 Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies Over the past 4 months, over 4,000 organizations globally have been targeted by ...
Research December 1, 2015 Check Point’s Security Predictions for 2016 At the beginning of last year, Check Point’s top predicted security threats for 2015 included ...
Research November 9, 2015 Rocket Kitten: A Campaign With 9 Lives The customized malware and creative phishing techniques of cyber-espionage groups prove that there is a ...
Research November 3, 2015 Phishing for Employees in Russia During the period August 27-30, 2015, Check Point sensors recorded a large amount of logs ...
Research July 26, 2015 Current Wave of Ransomware Today, ransomware like Cryptolocker is hitting organizations around the globe. At Check Point, we can ...
Research June 9, 2015 New Data: Volatile Cedar Malware Campaign At the end of March, we published a blog post and a ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
April 8, 2015 The Curious Incident of the Phish in the Night-Time: a Forensic Case Study Names have been changed to protect the privacy of the individuals involved. On the ...
December 23, 2014 Your Website Should Reflect Your Brand – Not an Attacker’s When IT professionals and business owners think about their security strategies, they often forget about ...