Check Point Blog

Research September 12, 2017

BlueBorne: A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device

The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control…

Read More
Research July 20, 2017

JavaScript Lost in the Dictionary

Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was…

Read More
Harmony July 19, 2017

Introducing Check Point SandBlast Mobile for Microsoft Intune

If your enterprise is using Microsoft EMS and is looking to further secure mobile devices while ensuring employee’s privacy and productivity, you’d be happy to know that Check Point has teamed with Microsoft Intune to…

Read More
Research July 12, 2017

Check Point: A Leader in Vision and Execution in Two Gartner Magic Quadrants

Following the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are.  What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But…

Read More
Research June 20, 2017

May’s Most Wanted Malware: Fireball and Wannacry Impact More Than 1 in 4 Organizations Globally

Check Point’s latest Global Threat Impact Index revealed more than one in four organizations globally was affected by the Fireball or Wannacry attacks during May– in the company’s latest Global Threat Impact Index.   The…

Read More
Research April 20, 2017

Check Point Infinity – The Security Architecture of the Future – Today

Infinity is boundless.  Unfortunately so are your IT demands and security expectations.  The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be…

Read More
Research February 27, 2017

Check Point’s SandBlast Wins SC Media Award

At the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing campaigns were top of mind, and attendees were looking for solutions to prevent the latest threats from attacking their networks.…

Read More
Research February 6, 2017

Check Point Prevention at the Movies, Rogue One: Data Loss on a Galactic Scale

  The Client: The Galactic Empire   The situation: Security researchers at Check Point have attributed an attack on the client to a hacking group calling itself the “Rebel Alliance.” Researchers have identified the motive driving…

Read More
Corporate Blog November 15, 2016

Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World!

Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found…

Read More
Research September 27, 2016

Signature-based security solutions can leave networks defenseless for months

Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass…

Read More