Research July 13, 2015 Threat Alert: OPM Tools EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the ...
Research July 8, 2015 Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many ...
Research July 7, 2015 Who Really Controls Your Online Store? Check Point researchers Avi Gimpel, Liad Mizrachi and Oded Vanunu recently discovered critical vulnerabilities in ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...
Research June 30, 2015 Stopping the Next Massive Cyberattack – Step 5: Incident Response Plans The Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report ...
Research June 26, 2015 Microsoft Word Intruder RTF Sample Analysis By Omri Herscovici, Security Researcher Background Check Point researchers obtained a sample of a malicious ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research June 16, 2015 Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty This month, Check Point released its annual security report—a trove of statistics and trends culled ...
Research June 10, 2015 Critical Infrastructure is at Risk! Almost all of today’s modern conveniences, such as electricity, transportation, water systems, and manufactured products, ...
Research June 9, 2015 New Data: Volatile Cedar Malware Campaign At the end of March, we published a blog post and a ...