Check Point Blog

Threat Research April 8, 2015

The Curious Incident of the Phish in the Night-Time: a Forensic Case Study

Names have been changed to protect the privacy of the individuals involved.   On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had…

Read More
Security Insights March 27, 2015

What Can We Learn from Clinton’s “Email-gate”?

Hillary Clinton has been scrutinized for using her private email account for Department of State-related correspondence. The so-called “email-gate” has put Mrs. Clinton in a hot-spot forcing her to provide explanations to what appears to…

Read More
Threat Research March 19, 2015

Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus

Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of a crucial component in the Windows operating system, and demonstrated the use of such an attack by revealing a previously…

Read More
Threat Research December 9, 2014

How we Collect Infections by the Numbers?

We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack…

Read More
Threat Research November 20, 2014

New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition

If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the…

Read More
Threat Research November 26, 2013

Check Point Threat Emulation Finds “Joke-of-the-day” Chain Letter is No Joke

Summary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a macro in order to change the computer’s background “as a joke”. Like other email chain letters, the message propagates when…

Read More
Threat Research November 14, 2013

Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention

Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…

Read More
Threat Research November 1, 2013

Threat Emulation Exposes Widespread Malware Campaign

Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…

Read More