Research June 3, 2015 Stopping the Next Massive Cyberattack – Step 3: Implement Security Controls After assessing network strengths and weaknesses and building a properly segmented network, the next step ...
Research June 2, 2015 New Vulnerabilities Discovered In WordPress Not Just Another Broken Link… Introduction Check Point researcher Dikla Barda recently discovered ...
Research May 22, 2015 Stopping the Next Massive Cyberattack – Step 2: Segmentation When it comes to cybersecurity, conducting a thorough assessment of your current environment to identify ...
May 20, 2015 Check Point Threat Alert: Logjam Executive Summary A major flaw was discovered with SSL and was named “Logjam”. The flaw ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
Research May 12, 2015 The 1st Step to Stopping the Next Massive Cyberattack: Assess Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices ...
Security May 7, 2015 The Latest SQL Injection Trends SQL injection attacks, in which malicious SQL statements are inserted into an entry field for ...
Research May 6, 2015 Using Collaboration to Stop the Next Massive Cyberattack Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization ...
Research April 24, 2015 Stopping the Next Massive Cyberattack Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, ...
April 20, 2015 Analyzing the Magento Vulnerability (Updated) Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento ...