Check Point Blog

Research October 23, 2018

When Ransomware Stopped Working Harder and Started Working Smarter

Observing Ransomware’s Evolution in Delivery Tactics   Written by Check Point’s Incident Response Team   Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…

Read More
Corporate Blog September 24, 2018

Protecting Small Businesses from Massive Attacks: Check Point Infinity Recognized by Gartner

Seven Straight Years of a Leader in Gartner’s UTM Magic Quadrant   Small and medium sized businesses have a target on their backs – cyber criminals have hacked over half of all small and medium…

Read More
Research April 13, 2018

March’s Most Wanted Malware:  Cryptomining Malware That Works Even Outside the Web Browser on the Rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session   Check Point recently published its monthly Global Threat Index, revealing a surge…

Read More
Corporate Blog February 1, 2018

How Can Your Business Score Touchdowns Without An Offensive Line?

What the Philadelphia Eagles Can Teach Us About Cyber-Security   Imagine your founding CTO resigning … right before your company’s biggest annual conference. How do you adapt, maintain momentum, and bring home wins?   The…

Read More
Business and Technology November 13, 2017

October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat

Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…

Read More
Research November 7, 2017

Check Point IoT Blog Series: ‘Home, Smart Home’ – But How Secure Is It?

The smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as…

Read More
Corporate Blog October 26, 2017

HomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances

The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world’s spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based…

Read More
Research September 12, 2017

BlueBorne: A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device

The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control…

Read More
Corporate Blog August 31, 2017

Would you Rather be Reactive or Proactive?

In today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after…

Read More
Research August 30, 2017

Layered protection is a must. Here’s why.

Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…

Read More