Check Point Blog

Security Insights September 27, 2016

Signature-based security solutions can leave networks defenseless for months

Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass…

Read More
Threat Research August 16, 2016

CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service

Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of…

Read More
Threat Research June 27, 2016

The Malware-as-a-Service Industry

Several recent developments have brought the malware infrastructure-as-a-service industry into the spotlight, reminding everyone how prominent it is in the cybercrime arena. The infrastructures that create malware exploit kits are so immense that the global…

Read More