Check Point Blog

Threat Research May 16, 2017

CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry

Using the NSA exploit EternalBlue released by the Shadow Brokers, the WannaCry ransomware developers have added their names to malware lore. Given the number of institutions hit and the amount of media generated, it seemed…

Read More
Uncategorized November 15, 2016

Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World!

Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found…

Read More
Security Insights September 8, 2016

Pixel Tracking: A Hacker’s Tool

What is pixel tracking? It’s challenging to justify the effectiveness of an email campaign if you can’t measure its success. So, what do you do? You use pixel tracking, a seemingly innocent sales tool that…

Read More
Threat Research August 22, 2016

Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files

Every week we see new ransomware variants as cyber criminals continue to generate revenue from holding victims’ files for ransom. In July, a new ransomware was discovered that is an out-and-out scam. It does not…

Read More
Threat Research June 17, 2016

Tales from the Trenches: Modern Malware Requires Modern Investigation Techniques

The Check Point Incidence Response team was called in to assist a company who suffered a severe breach in their network, which was not previously protected by Check Point’s advanced protections. The team began to…

Read More
Threat Research June 6, 2016

Zcrypt: The Ransomware Virus Hybrid

A recent piece of ransomware has emerged that is causing quite the stir. The reason – it is in fact a virus and can infect users even through USB devices. The technology itself is not…

Read More
Threat Research May 24, 2016

TeslaCrypt Ransomware Shuts Down: One Down, Plenty to Go

In a surprising turn of events, the creators of the notorious TeslaCrypt ransomware shut down their operation and revealed the master key for decrypting all files. They even said they are sorry, as displayed in…

Read More
Security Insights February 9, 2016

Introducing Check Point SandBlast Agent

As the modern workplace continues to evolve, it becomes increasingly important that individual end-user devices are protected from advanced threats. In most organizations today, endpoint device protection is still limited to traditional antivirus solutions that…

Read More