Check Point Blog

Threat Research May 23, 2017

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take…

Read More
Security Insights May 22, 2017

Check Point R80.10 Maximizes Security and Minimizes Operational Overhead for CCI Nice Côte D’Azur, Creating a “WOW” Effect

Security threats and attackers continue to adapt their techniques, making it more difficult than ever for organizations to protect themselves. When the CCI Nice Côte D’Azur upgraded to Check Point’s R80.10 Security Management, it increased…

Read More
Threat Research May 15, 2017

New Kill-Switch, New Sinkhole

Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware. In the last few hours we witnessed a stunning hit rate…

Read More
Threat Research May 11, 2017

JAFF – A New Ransomware is in town, and it’s widely spread by the infamous Necurs Botnet

Necurs, one of the largest botnets, went offline during the holiday period of 2016 and through the beginning of 2017. However it returned only to shortly peak late in April, spreading Locky using malicious PDF…

Read More
Threat Research May 10, 2017

DiamondFox modular malware – a one-stop shop

Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with Terbium Labs, a Dark Web Data Intelligence company. The report includes a review of the malware’s sales procedure and customer…

Read More
Threat Research May 9, 2017

Android Permission Security Flaw

Check Point researchers spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types…

Read More
Threat Research May 5, 2017

Debug Instrumentation via Flash ActionScript

Browser plug-ins have always been an attractive target for attackers to exploit. In the last couple of years, the most prevalent attack platform was undoubtedly – Flash. With 250+ CVEs in 2016 alone, and incorporation in…

Read More
Threat Research May 4, 2017

Update – OSX/Dok Campaign

Our ongoing investigation of the OSX/DOK campaign has led us to detect several new variants of this malware. These new variants have the same functionality as the previous ones, and are designed to give the…

Read More
Security Insights April 26, 2017

Securing the Connected Car Steps Up a Gear

“Here in my car, I feel safest of all …” That line from Gary Numan’s hit single, ‘Cars’ sums up the way many of us feel when we’re driving: safe and protected in the privacy…

Read More
Security Insights April 20, 2017

Check Point Infinity – The Security Architecture of the Future – Today

Infinity is boundless.  Unfortunately so are your IT demands and security expectations.  The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be…

Read More