Research June 9, 2015 New Data: Volatile Cedar Malware Campaign At the end of March, we published a blog post and a ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
May 14, 2015 Analysis of the Havij SQL Injection tool Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The ...
April 20, 2015 Analyzing the Magento Vulnerability (Updated) Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento ...
April 8, 2015 The Curious Incident of the Phish in the Night-Time: a Forensic Case Study Names have been changed to protect the privacy of the individuals involved. On the ...
March 31, 2015 Volatile Cedar – Analysis of a Global Cyber Espionage Campaign Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in ...
March 26, 2015 Intelligence Report: Equation Group Executive Summary The Equation Group, active since 2001, is a highly advanced and secretive computer ...
March 24, 2015 CuckooDroid – Fighting the Tide of Android Malware The future is mobile. Few experts doubt this conclusion these days. The accelerating proliferation of ...
Security March 19, 2015 Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of ...
November 3, 2014 Plugging the Security Hole in a WordPress Plug-In Check Point researcher, Roi Paz recently discovered a critical vulnerability that would have enabled attackers to ...