Check Point Software Technologies Ltd. is an Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Wikipedia
Check Point Software Technologies
Check Point Software Technologies
YouTube Video

New YouTube videos detected.

  • Check Point's Avi Rembaum: Shedding Light on the Dark Web
    More information: http://pages.checkpoint.com/alphabay-dark-web.html Leveraging intelligence culled from the Dark Web will help boost information security for enterprises, says Avi Rembaum of Check Point Software Technologies. "What's really becoming far more important is leveraging the intelligence coming from that research and using it in an automated and effective way to harden corporate net...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • August’s Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
    Check Point’s latest Global Threat Index has revealed that banking trojans were extensively used by cyber-criminals during August with three main variants appearing in the top 10. The Zeus, Ramnit and Trickbot banking trojans all appeared in the top ten. The Trojans work by identifying when the victim is visiting a banking website, and then […] The post August’s Most Wanted Malware: Banking Trojan...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Does your mobile anti-virus app protect or infect you? The truth behind DU Antivirus Security
    With mobile attacks representing nearly 20% of all cyberattacks in the Americas during the first half of 2017, users are constantly warned to be aware of security risks affecting their data and privacy, and install security software to protect their device. But what happens when antivirus solutions can’t be trusted, and actually compromise users’ privacy? […] The post Does your mobile anti-virus a...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Global Outbreak of WannaCry
    [Updated May 17, 2017] On May 12, 2017 the Check Point Incident Response Team started tracking a wide spread outbreak of the WannaCryp ransomware. We have reports that multiple global organizations are experiencing a large scale ransomware attack which is utilizing SMB to propagate within their networks.  To complicate matters there are a number of […] The post Global Outbreak of WannaCry appeared...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • JAFF – A New Ransomware is in town, and it’s widely spread by the infamous Necurs Botnet
    Necurs, one of the largest botnets, went offline during the holiday period of 2016 and through the beginning of 2017. However it returned only to shortly peak late in April, spreading Locky using malicious PDF documents. Today, May 11, Necurs started spreading a new ransomware called JAFF. Check Point’s global sensors have spotted as many […] The post JAFF – A New Ransomware is in town, and it’s w...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • DiamondFox modular malware – a one-stop shop
    Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with Terbium Labs, a Dark Web Data Intelligence company. The report includes a review of the malware’s sales procedure and customer reviews, as well as a full technical analysis of its multiple plugins. For the full DiamondFox report click here. Check […] The post DiamondFox modu...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Android Permission Security Flaw
    Check Point researchers spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types of attacks, including ransomware, banking malware and adware. Check Point reported this flaw to Google, which responded that this issue […] The post Android Permissio...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • The Devil’s Bargain: Security or Productivity?
    With so much riding on cyber security, those of us charged with providing it must make a devil’s bargain between conflicting priorities: maintain productivity by letting users receive and transmit information quickly, or protect information at the cost of unacceptable latency. The dilemma arises from the nature of today’s threats. In the original threat-signature model, […] The post The Devil’s Ba...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Debug Instrumentation via Flash ActionScript
    Browser plug-ins have always been an attractive target for attackers to exploit. In the last couple of years, the most prevalent attack platform was undoubtedly – Flash. With 250+ CVEs in 2016 alone, and incorporation in practically every exploit kit, Flash exploits are everywhere and deserve our attention. As researchers, we stumble upon many cases where […] The post Debug Instrumentation via Fla...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Update – OSX/Dok Campaign
    Our ongoing investigation of the OSX/DOK campaign has led us to detect several new variants of this malware. These new variants have the same functionality as the previous ones, and are designed to give the attackers complete access to all victim communications. This includes communication encrypted by SSL, by redirecting the victims’ traffic through a […] The post Update – OSX/Dok Campaign appear...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic (updated)
    People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all versions of OSX, has 0 detections on VirusTotal (as […] The post OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Highlights from CEO Gil Shwed’s Quora session
    This week, our founder and CEO Gil Shwed participated in a fascinating Q&A session on Quora. He answered the Quora community’s top questions on cyber security, mobile security and innovation. Here are our editor’s pick highlights from his session. What will the field of cybersecurity look like in the next 10 years? In the coming […] The post Highlights from CEO Gil Shwed’s Quora session appeared f...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • ExpensiveWall: A dangerous ‘packed’ malware on Google Play that will hit your wallet
    Check Point’s mobile threat research team identified a new variant of an Android malware that sends fraudulent premium SMS messages and charges users’ accounts for fake services without their knowledge. According to Google Play data, the malware infected at least 50 apps and was downloaded between 1 million and 4.2 million times before the affected […] The post ExpensiveWall: A dangerous ‘packed’ ...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • BlueBorne: A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device
    The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent years and are worrying due […] The post BlueBorne: ...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions
    With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware and ransomware, quality security products have become a commodity in every business organization. Consequently a lot of thought is being invested in devising an appropriate information security strategy to combat these breaches and providing the best solutions possible. We have […] The post Beware ...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Would you Rather be Reactive or Proactive?
    In today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after the fact, providing remediation after the damage has already been done. Instead of waiting for the next attack to occur, […] The post Would you Rather be Reactive or Pro...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Layered protection is a must. Here’s why.
    Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances make it clear that there’s no singular point solution that can act as a “magic bullet”. Companies have been approaching […] The post Layered protection is a must. ...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Hey, you, get off of my cloud.
    A large corporation had great expectations for their next digital advertising campaign. This time, they wanted to try cloud technology. So, they signed up with Amazon Web Services (AWS).  Because it was the cloud, their IT experts architected and deployed the system for the campaign in record time.  They even set up an administrative console […] The post Hey, you, get off of my cloud. appeared fir...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Re-Thinking the Cyber Consolidation Paradigm
    The Battle of Consolidation vs. Best-of-Breed, does more security mean better security? You’re probably frequently scrutinizing whether or not your own organization’s cyber security is being properly managed. We’re constantly being bombarded with news of the latest cyber security attacks and hoping there are no gaps in our own organization’s security. With every new ransomware […] The post Re-Thin...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Hacked in Translation – “Director’s Cut” – Full Technical Details
    Background Recently, Check Point researchers revealed a brand new attack vector – attack by subtitles. As discussed in the previous post and in our demo, we showed how attackers can use subtitles files to take over users’ machines, without being detected. The attack vector entailed a number of vulnerabilities found in prominent streaming platforms, including […] The post Hacked in Translation – “D...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • How the CopyCat malware infected Android devices around the world
    Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months. The malware, dubbed CopyCat by Check Point mobile threat researchers, uses a novel technique to generate and steal ad […] The post How the CopyCat malware infe...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor
    Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important distinctions in this case, however, are that the attacks targeted mainly a specific country, and are used solely for destruction. While Petya […] The post BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Preventing Petya – stopping the next ransomware attack
    Check Point’s Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks.  It appears to be using the ‘EternalBlue’ exploit which May’s WannaCry attack also exploited.  It was first signaled by attacks on […] The post Preventing Petya – stopping the ne...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Threat Brief: Petya Ransomware, A Global Attack
    [updated 6/28] A worldwide attack erupted on June 27 with a high concentration of hits in Ukraine – including the Ukrainian central bank, government offices and private companies. The attack is distributing what seems to be a variant of Petya, an MBR ransomware. While the source of the attack has yet to be determined, many researchers […] The post Threat Brief: Petya Ransomware, A Global Attack ap...
Check Point Software Technologies
Check Point Software Technologies
Blog Post

New blog articles detected.

  • Securing the Cloud: Ward Off Future Storms
    A recent incident has left the voting records of 198 million Americans exposed. The data included the names, dates of birth, addresses, and phone numbers of voters from both parties. It also included voter’s positions on various political issues and their projected political preference. Although it is not unusual to collect this type of information, […] The post Securing the Cloud: Ward Off Future...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.