Check Point Mobile Research Team Looks Back On 2017

February 18, 2018 3:06 am

February 18, 2018 The mobile world is extremely dynamic and changes rapidly, so it’s always a little hectic to follow its lead. For this reason, we try to stop every once in a... Click to Read More

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

February 15, 2018 11:44 am

February 15, 2018 The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these... Click to Read More

A New Rig Exploit Kit Campaign Dropping XMRig Miner

February 8, 2018 8:08 am

February 8, 2018 Cryptocurrency values may be tumbling but cyber criminals are still hedging their bets on its long term returns. Check Point researchers have discovered a new malvertising campaign leading to the... Click to Read More

DorkBot: An Investigation

February 4, 2018 12:06 pm

Research By: Mark Lechtik – February 4, 2018 Overview: DorkBot is a known malware that dates back to 2012. It is thought to be distributed via links on social media, instant messaging applications or... Click to Read More

H2 2017 Global Threat Intelligence Trends Report

January 25, 2018 5:28 am

February 25, 2018 2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat... Click to Read More

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

January 12, 2018 6:00 am

Research by: Elena Root & Bogdan Melnykov – February 12, 2018 Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside around 60 game apps,... Click to Read More

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

January 11, 2018 2:08 pm

January 11, 2018 In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of... Click to Read More

Exploiting CVE-2018-0802 Office Equation Vulnerabilty Demo Video

January 9, 2018 11:35 am

January 9, 2018 Check Point Software Technologies Research Team discovered a new vulnerability (CVE-2018-0802) in the Office Equation 3.0 process (EQNEDT32.EXE). This is a POC video of the vulnerability being exploited while bypassing... Click to Read More

LightsOut Mobile Malware Demo Video

January 9, 2018 11:10 am

 Video demo of how the malware works How It Works

Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability

January 9, 2018 10:38 am

By: Omer Gull and Netanel Ben Simon – January 9, 2018 Background A few weeks ago, a vulnerability in the Office Equation 3.0 process (EQNEDT32.EXE) was discovered by Embedi. For a couple of reasons... Click to Read More