Check Point Research Publications

Christmas is Coming: The Criminals Await

By Dikla Barda, Roman Zaikin and Oded Vanunu Black Friday symbolizes the start of the end of year shopping season. During this period, online shopping...

IoTroop Botnet: The Full Investigation

Last week, thanks to the Check Point web sensor network, our researchers discovered a new and massive IoT Botnet, ‘IoTroop’. Due to the urgency...

Bad Rabbit: The Full Research Investigation

What is this all about? Earlier this week a new ransomware attack dubbed ‘Bad Rabbit’ broke out and has so far affected The Ukraine, Russia,...

A New IoT Botnet Storm is Coming

Key Points: A massive Botnet is forming to create a cyber-storm that could take down the internet. An estimated million organizations have already been...

The Perfect ‘Inside Job’ Banking Malware

Researchers:  Mark Lechtik and Raman Ladutska The Brazilian cyberspace is known to be a whole ecosystem of its own and, although the banking malware that...

September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings

Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks during September, with the ransomware impacting 11.5% of organizations...

EternalBlue – Everything There Is To Know

code {background-color: white; padding: 0; margin:0; color: #47484D;font-weight: bold;} u {color: #47484D;} .highlight {background-color:yellow;} h3 {color: #47484D;font-weight: bold;} h4 {font-weight: bold;} Introduction Since the revelation of...

August’s Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money

Check Point’s latest Global Threat Index has revealed that banking trojans were extensively used by cyber-criminals during August with three main variants appearing in...

ExpensiveWall: A dangerous ‘packed’ malware on Google Play that will hit you in your...

Check Point’s mobile threat research team identified a new variant of an Android malware that sends fraudulent premium SMS messages and charges for fake...

Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions

With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware and ransomware, quality security products have become a commodity...
×

Subscribe to Cyber Intelligence Reports for the most current news and insights.