April 8, 2015 The Curious Incident of the Phish in the Night-Time: a Forensic Case Study Names have been changed to protect the privacy of the individuals involved. On the ...
Research March 27, 2015 What Can We Learn from Clinton’s “Email-gate”? Hillary Clinton has been scrutinized for using her private email account for Department of State-related ...
Security March 19, 2015 Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of ...
December 9, 2014 How we Collect Infections by the Numbers? We have to admit there are advantages to being one of largest data security companies ...
November 20, 2014 New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition If you protect your network with something other than Check Point, you may not be ...
November 26, 2013 Check Point Threat Emulation Finds “Joke-of-the-day” Chain Letter is No Joke Summary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a ...
November 14, 2013 Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently ...
November 1, 2013 Threat Emulation Exposes Widespread Malware Campaign Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document ...