Research October 9, 2015 Israeli Public Sector Targeted by Zeus Trojan Hidden in a Word Document Two months ago, a malicious Rich Text Format (RTF) document came to the attention of ...
Research September 15, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ultimatum In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research September 10, 2015 Analysis of the Sality Gambling Campaign Check Point has a wide and global install base, from which we receive anonymized logs ...
Research August 31, 2015 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices Introduction Ransomware has been a well-known method of attack in the PC world for quite ...
Research August 25, 2015 Certifi-gate Found in the Wild on Google Play New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, ...
Research August 18, 2015 JavaScript Hooking as a Malicious Website Research Tool One of the top Internet threats today is drive-by download attacks which originate from exploits ...
Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research August 11, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part II – Supremacy In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research August 4, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part I In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...