March 31, 2015 Volatile Cedar – Analysis of a Global Cyber Espionage Campaign Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in ...
December 9, 2014 How we Collect Infections by the Numbers? We have to admit there are advantages to being one of largest data security companies ...
April 9, 2014 It’s Alive: The Resurgence of ZeroAccess Botnet Check Point Malware Research Group, 04/02/2014 Summary Through leveraging Check Point’s ThreatCloud security intelligence, in ...
April 8, 2014 Threat Emulation Identifies Spear Phishing Attack Using Near-Zero-Day Malware Summary On October 22, 2013, Check Point’s ThreatCloud Threat Emulation service analyzed suspicious documents sent ...
November 26, 2013 Check Point Threat Emulation Finds “Joke-of-the-day” Chain Letter is No Joke Summary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a ...
November 14, 2013 Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently ...
November 1, 2013 Threat Emulation Exposes Widespread Malware Campaign Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document ...