Check Point Blog

Cloud February 13, 2019

Docker Security Hole Revealed: Mitigate CVE-2019-5736

by Marina Segal – Lead Product Manager, CloudGuard Dome9, Check Point and Amir Kaushansky – Product Manager, Cloud Security, Check Point  How it was Discovered: On February 11th, a critical vulnerability in runC binary was released.…

Read More
Corporate Blog August 16, 2018

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are…

Read More
Corporate Blog June 7, 2018

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the…

Read More
Corporate Blog May 14, 2018

April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities

After analysing April’s threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all…

Read More
Corporate Blog February 1, 2018

How Can Your Business Score Touchdowns Without An Offensive Line?

What the Philadelphia Eagles Can Teach Us About Cyber-Security   Imagine your founding CTO resigning … right before your company’s biggest annual conference. How do you adapt, maintain momentum, and bring home wins?   The…

Read More
Corporate Blog January 5, 2018

LightsOut: Shining a Light On Malicious Flashlight Apps on Google Play

Check Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user’s decision to disable ads showing outside of a legitimate context,…

Read More
Corporate Blog November 13, 2017

October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat

Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…

Read More
Corporate Blog October 31, 2017

Account Hijacks Affect Everybody, Even ‘Top Dogs’

Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…

Read More
Corporate Blog October 26, 2017

HomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances

The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world’s spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based…

Read More
Corporate Blog October 12, 2017

September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings

Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks during September, with the ransomware impacting 11.5% of organizations globally over the course of the month. Locky has not appeared…

Read More