Recently, we published our research on how threat actors are taking advantage of well-known cloud services to download malicious payloads. This technique has also been observed in phishing attacks, where cloud storage services are used…
Read MoreOver the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud. Many of these companies are leading international…
Read MoreAt the beginning of last year, Check Point’s top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS. These predictions…
Read MoreThe customized malware and creative phishing techniques of cyber-espionage groups prove that there is a recurring industry problem. Cyber criminals can evade detection by making minimal changes to bypass most current protection solutions. Since early…
Read MoreDuring the period August 27-30, 2015, Check Point sensors recorded a large amount of logs generated by the IPS protection “PHP Print Remote Shell Command Execution.” This was an interesting anomaly, as we do not…
Read MoreToday, ransomware like Cryptolocker is hitting organizations around the globe. At Check Point, we can help prevent these ransomware attacks through a multi-layered approach to security. The current round of ransomware is coming in through…
Read MoreAt the end of March, we published a blog post and a whitepaper about a cyber-espionage campaign dubbed “Volatile Cedar.” This campaign has successfully penetrated targets world-wide, using a variety of attack…
Read MoreBackground Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. It’s easy, cheap and difficult to trace, and “service providers” can be found throughout the “dark” Web. As a result,…
Read MoreNames have been changed to protect the privacy of the individuals involved. On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had…
Read MoreWhen IT professionals and business owners think about their security strategies, they often forget about one of the easiest assets for cyber criminals to attack: their websites. From consumer brands to small businesses to large…
Read More