Research August 16, 2016 CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business ...
Research July 26, 2016 Ransomware: what you need to know In recent years, there has been a surge of ransomware attacks. It’s been reported all ...
Security July 14, 2016 Ransomware’s Motto: The Simpler, The Scarier, The Better A lot has been said about the ransomware epidemic. The number of infections worldwide increases ...
Research July 11, 2016 Malware’s Constant Evolution Requires Advanced Protections Malware developers are fast learners. They adapt to new security measures in record time and ...
Research June 21, 2016 Top 10 Most Wanted Malware Today Check Point published its Threat Index for May, revealing the number of active global ...
Research June 7, 2016 FACEBOOK MaliciousChat Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online ...
Research May 27, 2016 CryptXXX Ransomware: Simple, Evasive, Effective CryptXXX emerged a few weeks ago and it’s been sneaky! It’s most impressive feature is ...
Research May 26, 2016 Spam-Riding Dropper Packs a One-Two Ransomware, Adware Punch The Most Trusty Attack Vector Shady random strangers on the internet often have an uncanny ...
Research May 24, 2016 TeslaCrypt Ransomware Shuts Down: One Down, Plenty to Go In a surprising turn of events, the creators of the notorious TeslaCrypt ransomware shut down ...
Research May 24, 2016 The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took ...