Check Point Blog

Welcome to the Check Point Blog where you will find posts tagged in two categories:

  • Threat Research: Research findings, threat intelligence, and perspectives from Check Point’s research teams
  • Security Insights: Perspectives on current events and the security landscape from Check Point thought leaders


Get started by choosing a category, or read them all!

Sort blog posts by:  

October’s ‘Most Wanted’ Malware List Shows Attacks on the Rise

 
Check Point’s Threat Intelligence Research Team revealed today that the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organizations’ networks. The team found that both the number of active malware families and number of attacks increased by 5% during the period, pushing the number of attacks on business networks to near peak levels, as seen earlier this year. Locky ransomware attacks continued to rise, moving it up from third to second place, while the Zeus banking trojan moved up two spots, returning it to the top three. The reason for Locky’s continued growth is ...

Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World!

 
Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found SandBlast to be a comprehensive yet easy to manage solution, which is worth the cost for effective protection against unknown malware.   Challenge No. 1: Can Zero-Day Attacks Be Detected? “No matter what virus package we tried, SandBlast caught it, cleaned it, and stopped the exploit from propagating.” In his extensive testing, David lodged multiple attacks against our SandBlast Threat Prevention Solutions. And guess what! SandBlast stopped all of ...

Clearing the fog: a vision of security for hybrid clouds

 
Have you ever driven on a high road or mountain pass that’s shrouded by low cloud? You’re at the familiar controls of your vehicle, but you can’t easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. Progress can be hazardous unless you take extra precautions. The feeling will be familiar to many organizations’ IT teams as they transition some of their business applications and data to the cloud. The majority of organizations don’t have a large, centralized cloud deployment that has completely replaced their physical networks simply because this type of wholesale migration is costly and involves a great deal of planning, resources and risk. ...

Denied! Dealing with Global Distributed Denial of Service

 
Cyber security has recently reached yet a new level of public awareness, as the world learned that an army of bots hosted on internet connected cameras were able to cause outages to well-known internet services such as Twitter, Amzaon, Spotify and Netflix. The global Distributed Denial of Service (DDoS) attack on DYN, a large DNS infrastructure company, caused the downtime, may not have shocked internet security professionals, but it gave yet another demonstration of the fragility of the Internet grid. Fortunately it was not as damaging as it could have been.   The internet is a platform of innovation and inspiration. We can all invent, develop and release our work for free or ...

Beware! Malware Targeting Endpoints on the Rise Ahead

 
All you need to do is listen to the news and you know that the cyber threat landscape in 2016 has gotten much worse. But what types of threats are driving companies to take action? And what actions are they taking? To answer these questions, and more, we turned to SANS Institute, the leading organization for cybersecurity research, training and certification to conduct an in-depth survey of more than 300 enterprise customers across the globe. The survey, known as the 2016 SANS Threat Landscape Survey, explores the current state of the threat landscape and how these security threats are impacting organizations. In particular, it examines the types and the nature of threats attacking ...

Global Trends of the ‘Most Wanted’ Malware

 
The malware world continues to develop rapidly and dynamically. On a daily basis new malware appears, accelerating the cat-and-mouse game between attackers and defenders. As a result, it’s more important than ever for cyber security professionals to stay up-to-date about the ever-changing threat landscape in order to provide organizations with the highest level of protection. To keep you in the know, Check Point has created the H1 2016 Global and Regional Trends of the ‘Most Wanted’ Malware report, which provides an overview of the malware landscape in the top categories – ransomware, banking and mobile – based on threat intelligence data drawn from Check Point’s ThreatCloud ...

Check Point’s Cyber Security Predictions for 2017

 
2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. According to the Identity Theft Resource Center, as of October 19th of this year there were 783 reported breaches, exposing more than 29 million records (please note this number does not include the majority of breaches in which companies did not report the number of records affected). What does this tell us? Data breaches are becoming more prevalent and attack trends show no evidence of slowing down. Again, we see ...

6 Tips to Outsmart the Phishermen

 
Brian Kernighan once said, “If you don't understand viruses, phishing, and similar cyber threats, you become more susceptible to them.” With cyber scams constantly increasing in sophistication, this statement is especially true today. So, what exactly is phishing? In a phishing attack, a hacker creates an email that appears to be legitimate and sends it to one or more individuals or employees. Their goal – trick users into clicking on a malicious link or attachment, or divulging login credentials through deceptive websites, allowing the thief to easily bypass defenses and giving them access the network or important business and financial assets. Unfortunately, hackers are ...

September’s ‘Most Wanted’ Malware List: Ransomware in Top 3 for First Time

 
The Check Point Research Team revealed this week that ransomware attacks continued to rise in September. For the first time since the team launched the Threat Index, ransomware moved into the top three position of the most prevalent malware, with the Locky ransomware accounting for 6 percent of all recognized attacks globally during the month. The relative presence of ransomware attacks, within the total number of global attacks, increased by 13 percent. In line with recent trends, the number of active malware families remained high, with three new entries making the top ten, including Chanitor, a downloader for malicious payloads, the Blackhole exploit kit, and Nivdort, a multipurpose bot. ...

Phishing: Reeling in Enterprises for Hefty Profits

 
Can you believe that phishing, the scam that tricks users into giving away sensitive information like their credit card numbers and bank login credentials, is still with us after more than twenty years? Phishing is still here because criminals keep devising new ways to make it work. However, new phishing methods take more effort, but yield only modest returns. To increase their returns, some criminals are dropping phishing schemes that attack large masses of random users and are replacing them with narrowly focused attacks targeting a few high-value employees at enterprises. These attacks are called “spear phishing.” Spear phishing uses social engineering and deception to steal ...