SandBlast File Analysis
Instant Security Assessment
Live Threat Map
Check Point Research Publications
Remote Code Execution Vulnerability on LG Smartphones
May 8, 2018
Research by: Slava Makkaveev Background A few months ago, Check Point Research discovered two vulnerabilities that reside in the default keyboard on all mainstream LG smartphone...
Telegram: Cyber Crime’s Channel of Choice
May 7, 2018
Introduction The Dark Web is a hive of illicit activity. From illegal guns and drug dealing to the Ransomware-as-a-Service programs buyers and sellers can use...
SiliVaccine: Inside North Korea’s Anti-Virus
May 1, 2018
By: Mark Lechtik and Michael Kajiloti Revealed: In an exclusive piece of research, Check Point Researchers have carried out a revealing investigation into North Korea’s...
A Crypto Mining Operation Unmasked
April 29, 2018
Introduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been...
MMap Vulnerabilities – Linux Kernel
April 29, 2018
By: Eyal Itkin As part of our efforts in identifying vulnerabilities in different products, from time to time we also review the Linux Kernel, mainly...
NTLM Credentials Theft via PDF Files
April 26, 2018
Just a few days after it was reported that malicious actors can exploit a vulnerability in MS outlook using OLE to steal a Windows...
A New Phishing Kit on the Dark Net
April 24, 2018
Check Point Research and the cyber intelligence company, CyberInt, have collaborated to discover the next generation in phishing kits, currently being advertised on the...
Check Point’s 2018 Security Report
April 15, 2018
2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile...
Uncovering Drupalgeddon 2
April 12, 2018
By Eyal Shalev, Rotem Reiss and Eran Vaknin Abstract Two weeks ago, a highly critical (25/25 NIST rank) vulnerability, nicknamed Drupalgeddon 2 (SA-CORE-2018-002 / CVE-2018-7600), was disclosed...
Return of the Festi Rootkit
April 3, 2018
Festi, a once popular rootkit is back in the wild, distributed mainly by the RIG exploit kit. A long known Windows rootkit, Festi dates back...
Page 1 of 7
Subscribe to Cyber Intelligence Reports for the most current news and insights.
Edit with Live CSS