CATEGORIES

Check Point’s 2018 Security Report

April 15, 2018

 

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it is clear we are at an inflection point and transitioning to the next generation of the cyber-threat landscape.

In Check Point Research’s 2018 Security Report, you will gain an understanding as to why the World Economic Forum recently placed cyber-attacks as one of the top three global risks for this year and beyond. As we enter the fifth generation of cyber security, the report highlights how threat actors are now effectively weaponizing malware as a way to cripple large institutions, affecting the health and lives of nation-states’ populations, as well as causing pain to many organizations’ bottom lines.

Data breaches have become common place with the size and frequency of such attacks showing no sign of slowing. Security gaps in mobile features and mobile app stores have also meant that many malware variants continue to roam freely, infecting millions of mobile devices worldwide.

GET YOUR 2018 SECURITY REPORT TODAY

In addition, the increasing popularity and meteoric rise in value of crypto-currencies took the world by storm and led to a significant increase in the distribution of crypto-miners to became a favorite monetizing attack vector.

The leak of alleged CIA cyber tools by hacktivist groups was seen to cast a long shadow over the global information security ecosystem as a whole. From election hacking to critical infrastructure sabotage, more evidence came to light of nation-state backed groups allegedly being behind some of the largest global cyber-attacks.

The 2018 Security Report looks back over the past year and helps you make sense of it. In turn you will realize how the cyber threat landscape now spans across country and industry along the multiple vectors of network, cloud and mobile, and uses state-sponsored technologies to do so.

>> GET YOUR 2018 SECURITY REPORT TODAY

POPULAR POSTS

BLOGS AND PUBLICATIONS

  • Check Point Research Publications
  • Global Cyber Attack Reports
  • Threat Research
February 17, 2020

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

  • Check Point Research Publications
August 11, 2017

“The Next WannaCry” Vulnerability is Here

  • Check Point Research Publications
January 11, 2018

‘RubyMiner’ Cryptominer Affects 30% of WW Networks