Research September 19, 2018 The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and ...
Security July 12, 2018 Cyber Attack Trends: 2018 Mid-Year Report When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations ...
Research June 7, 2018 May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, ...
Research August 17, 2017 Cyber Attack Trends: Mid-Year Report 2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods ...
Research May 16, 2017 CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry Using the NSA exploit EternalBlue released by the Shadow Brokers, the WannaCry ransomware developers have ...
Research May 14, 2017 WannaCry – Paid Time Off? Let us open with a TL;DR – DO NOT pay the ransom demanded by the ...
Research October 21, 2016 September’s ‘Most Wanted’ Malware List: Ransomware in Top 3 for First Time The Check Point Research Team revealed this week that ransomware attacks continued to rise in ...
Research June 7, 2016 FACEBOOK MaliciousChat Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online ...
Research April 4, 2016 New Locky Ransomware Variant Implementing Changes in Communication Patterns Recently, Check Point published a detailed report describing Locky, an emerging new ransomware threat, which ...
Research November 6, 2015 Why it’s a Smart Idea to Use Threat Intelligence When It Comes to Security, Do You Have ‘Evidence-Based Knowledge’? Recently, I participated in an ...