Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in Lebanon with political ties. Beginning in late 2012, the carefully orchestrated attack campaign we call Volatile Cedar has been targeting…
Read MoreWe have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack…
Read MoreCheck Point Malware Research Group, 04/02/2014 Summary Through leveraging Check Point’s ThreatCloud security intelligence, in recent weeks, our vulnerability research team has detected a spike in ZeroAccess botnet activity. This is surprising given that this…
Read MoreSummary On October 22, 2013, Check Point’s ThreatCloud Threat Emulation service analyzed suspicious documents sent by email to end users at a media company. Analysis of the malware, which was intercepted through a Message Transport…
Read MoreSummary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a macro in order to change the computer’s background “as a joke”. Like other email chain letters, the message propagates when…
Read MoreSummary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…
Read MoreSummary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…
Read More