Research June 15, 2016 Trust No One – A Cyberworld Survival Guide Cybercriminals are professional scammers; their specialty is tricking users into helping them achieve their malicious ...
Research May 17, 2016 Inside Nuclear’s Core: Unraveling a Ransomware-as-a-Service Infrastructure The Check Point Research team has uncovered the entire operation of one of the world’s ...
Research May 9, 2016 Viking Horde: A New Type of Android Malware on Google Play The Check Point research team uncovered a new Android malware campaign on Google Play it ...
Research April 20, 2016 Inside Nuclear’s Core: Analyzing the Nuclear Exploit Kit Infrastructure Malware use different methods to propagate. Exploit kits (EKs) have been one the most common ...
Research April 15, 2016 KOVTER RANSOMWARE – THE EVOLUTION: From Police Scareware to Click Frauds and then to Ransomware In terms of cyber security research, the Kovter malware family is very interesting. A wide-spread ...
Research April 13, 2016 The Next Battleground – Critical Infrastructure Cyber threats have dramatically developed throughout the years. From simple worms to viruses, and finally ...
Research April 13, 2016 Check Point Threat Alert: Badlock Vulnerability EXECUTIVE SUMMARY An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for ...
Research April 12, 2016 New Technologies Pose New Threats Technology has changed our lives for the better; there is no doubt about it. However, ...
Research April 11, 2016 Decrypting the Petya Ransomware Petya is a relatively new ransomware variant that first appeared on the cyber-crime scene at ...
Research April 11, 2016 New Locky Variant Implements Evasion Techniques Following Check Point’s recent discovery of a new communication scheme implemented by the Locky ransomware, ...