Check Point Blog

Corporate Blog October 12, 2017

September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings

Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks during September, with the ransomware impacting 11.5% of organizations globally over the course of the month. Locky has not appeared…

Read More
Threat Research April 13, 2017

The Unbearable Lightness of Operating Web-Based Attacks: How easy it is to steal money from IE 8.0-11.0 users

Looking back at the past year, there is no doubt that the malware-as-a-service industry, which sells and trades malware samples, attack tools, and a variety of services, is thriving. It means that cyber criminals with…

Read More
Threat Research

March’s ‘Most Wanted’ Malware List: Exploit Kits Rise Again in Popularity

Old malware rarely dies:  it just lies dormant for a while.  This was one of the key findings of the Check Point Research Team’s latest Global Threat Impact Index, which saw a surge in the…

Read More
Security Insights February 13, 2017

Check Point’s 2017 Cyber Security Survey Shows Key Concerns and Opportunities among IT Professionals

The theme of the 2017 RSA Conference is ‘The Power of Opportunity’ inspired by an approach to learning taken by the Zen monk Shunryu Suzuki. He said that one should pursue even the most advanced…

Read More
Security Insights December 14, 2016

Cloud Security Predictions and Trends

It’s that most wonderful time of the year – the time where I like to take a look back and reflect on what the year has been as well as look forward to take a…

Read More
Security Insights October 14, 2016

Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention

Next week, Check Point will be at SecTor, Canada’s premier IT security education conference. The conference brings the world’s brightest (and darkest) minds together to identify, discuss, dissect and debate the latest digital threats facing…

Read More
Threat Research August 24, 2016

The QuadRooter Domino Effect

Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive…

Read More
Security Insights June 24, 2016

Effective Security Management in a Software Defined World

Software defined infrastructure (SDx) along with use of private and public clouds completely transforms the way IT departments manage enterprise data centers and workloads. Automation is a key component of software defined networking (SDN), bringing network,…

Read More
Security Insights May 27, 2016

Attacks on SMB are a sure thing, according to the latest Verizon report

It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. The 2016 Data Breach Investigations Report reveals just how much (Check Point contributed to the report). The report covers a…

Read More
Threat Research August 18, 2015

JavaScript Hooking as a Malicious Website Research Tool

One of the top Internet threats today is drive-by download attacks which originate from exploits kits, hacked websites, spam campaigns and more. As browsers are the main tool for navigating the web, the main attack…

Read More