What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2017-08-15 12:30:49 ZoneAlarm Anti-Ransomware Earns “Editor\'s Choice” from PC magazine (lien direct) A recent review in PC magazine by Lead Analyst, Neil J. Rubenking approaches one of cyber security's latest growing concerns, ransomware. Various comparison tests of anti-ransomware products were conducted while specifically focusing on Check Point's consumer anti-ransomware product, ZoneAlarm. ZoneAlarm by Check Point is based on the same technology of its enterprise grade product, SandBlast […] Guideline
Checkpoint.webp 2017-08-11 23:52:38 “The Next WannaCry” Vulnerability is Here – Let\'s Stop it before it\'s too Late (lien direct) This Tuesday, Microsoft released a security patch including 48 fixes, 25 of which are defined as “critical”. While Microsoft updates happen every month, this one reveals an especially dangerous vulnerability – CVE-2017-8620. Behind this dull name hides a severe flaw affecting all current versions of Windows, which enables attackers to spread a contagious attack between […] Wannacry
Checkpoint.webp 2017-08-02 13:00:30 (Déjà vu) CSO Gives SandBlast Mobile a Rave Review (lien direct) I was delighted to read David Strom's extremely favorable product review of Check Point SandBlast Mobile in CSO magazine a few weeks ago. Strom really puts SandBlast Mobile through the paces in the review, and in the process provides security and IT leaders facing the challenge of securing mobility in their organizations with a great […] Guideline
Checkpoint.webp 2017-07-31 23:02:15 Are You Prepared for the Next Attack? (lien direct) A WAKE-UP CALL From WannaCry and Petya to the most recent attacks today, #LeakTheAnalyst and HBO-it is now apparent that anyone or any organization is a target for cyber criminals. Attacks continue to grow at an alarming rate – in volume, sophistication and impact. As of May 2017, Check Point products are detecting over 17 million […] Wannacry
Checkpoint.webp 2017-07-31 13:00:35 Re-Thinking the Cyber Consolidation Paradigm (lien direct) The Battle of Consolidation vs. Best-of-Breed, does more security mean better security? You're probably frequently scrutinizing whether or not your own organization's cyber security is being properly managed. We're constantly being bombarded with news of the latest cyber security attacks and hoping there are no gaps in our own organization's security. With every new ransomware […]
Checkpoint.webp 2017-07-20 15:00:28 JavaScript Lost in the Dictionary (lien direct) Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was not caught by traditional AV solutions. Even today, on the fourth day of this campaign, when Check Point has already […]
Checkpoint.webp 2017-07-19 13:00:10 Introducing Check Point SandBlast Mobile for Microsoft Intune (lien direct) If your enterprise is using Microsoft EMS and is looking to further secure mobile devices while ensuring employee's privacy and productivity, you'd be happy to know that Check Point has teamed with Microsoft Intune to secure enterprise mobility. Today, Check Point announces the collaboration with Microsoft which allows Check Point's SandBlast Mobile security solution to […]
Checkpoint.webp 2017-07-17 13:00:44 June\'s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organizations (lien direct) Check Point's latest Global Threat Impact Index revealed that 28% of organizations globally were affected by the Roughted malvertising campaign during June. A large-scale malvertising campaign, RoughTed is used to deliver links to malicious websites and payloads such as scams, adware, exploit kits and ransomware. It began to spike in late May before continuing to […]
Checkpoint.webp 2017-07-13 22:00:30 Cloudy Forecast: Are you Naked in the Cloud? (lien direct) What do high-clearance government employees, telecommunication customers and WWE fans all have in common? While this sounds like the beginning of a joke, in reality what unifies all of them is the fact that their personal, sensitive data is now part of an alarming statistic; the increasing frequency of data breaches in popular cloud services. […]
Checkpoint.webp 2017-07-13 16:00:23 OSX/Dok Refuses to Go Away and It\'s After Your Money (lien direct) Following up on our recent discovery of the new OSX/Dok malware targeting macOS users, we'd like to report that the malicious actors behind it are not giving up yet. They are aiming at the victim's banking credentials by mimicking major bank sites. The fake sites prompt the victim to install an application on their mobile […]
Checkpoint.webp 2017-07-12 15:00:46 Check Point: A Leader in Vision and Execution (lien direct) Following the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are.  What seemed to be “good enough solutions” until now simply isn't enough in today's world. But still, many continue to add solutions that are focused on detecting attacks rather than preventing them. This approach lets the […] Wannacry
Checkpoint.webp 2017-07-09 05:00:27 Hacked in Translation – “Director\'s Cut” – Full Technical Details (lien direct) Background Recently, Check Point researchers revealed a brand new attack vector – attack by subtitles. As discussed in the previous post and in our demo, we showed how attackers can use subtitles files to take over users’ machines, without being detected. The attack vector entailed a number of vulnerabilities found in prominent streaming platforms, including […]
Checkpoint.webp 2017-07-06 13:00:10 (Déjà vu) How the CopyCat malware infected Android devices around the world (lien direct) Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months. The malware, dubbed CopyCat by Check Point mobile threat researchers, uses a novel technique to generate and steal ad […]
Checkpoint.webp 2017-07-04 00:58:04 BROKERS IN THE SHADOWS – Part 2: Analyzing Petya\'s DoublePulsarV2.0 Backdoor (lien direct) Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important distinctions in this case, however, are that the attacks targets specific victims, and are used solely for destruction. While Petya may look […] Wannacry
Checkpoint.webp 2017-06-28 15:02:08 Preventing Petya – stopping the next ransomware attack (lien direct) Check Point's Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks.  It appears to be using the 'EternalBlue' exploit which May's WannaCry attack also exploited.  It was first signaled by attacks on […] Wannacry
Checkpoint.webp 2017-06-27 15:35:48 Threat Brief: Petya Ransomware A Global Attack Spreading Fast (lien direct) A massive attack erupted today (June 27) worldwide, with a high concentration of hits in Ukraine – including the Ukrainian central bank, government offices and private companies. While the malware used is yet undetermined, some researchers are speculating it to be a variant of Petya, a ransomware that encrypts the entire hard-drive rather than each […]
Checkpoint.webp 2017-06-22 19:52:53 Securing the Cloud: Ward Off Future Storms (lien direct) A recent incident has left the voting records of 198 million Americans exposed. The data included the names, dates of birth, addresses, and phone numbers of voters from both parties. It also included voter's positions on various political issues and their projected political preference. Although it is not unusual to collect this type of information, […]
Checkpoint.webp 2017-06-20 13:00:09 May\'s Most Wanted Malware: Fireball and Wannacry Impact More Than 1 in 4 Organizations Globally (lien direct) Check Point's latest Global Threat Impact Index revealed more than one in four organizations globally was affected by the Fireball or Wannacry attacks during May– in the company's latest Global Threat Impact Index.   The top three malware families that impacted networks globally were zero-day, previously unseen attacks.  Fireball impacted one in five organizations worldwide, […] Wannacry
Checkpoint.webp 2017-06-08 19:24:44 Check Point Infinity NGFW Earns Recommended in NSS Labs 2017 NGFW Group Test (lien direct) I am pleased to report we achieved another NSS Recommended in the recent NGFW Group Test! This is our 6th NGFW Recommended since 2011 and our 14th NSS Recommended overall. Participating in credible, independent 3rd party testing is an important investment for us at Check Point. Independent testing provides valuable “point in time” feedback for […]
Checkpoint.webp 2017-06-08 13:55:04 Chain Reaction:  The New Wave of Mobile Attacks (lien direct) The main purpose of any business is to grow and be more successful – and that applies to criminal organizations just as much as it does to legitimate companies.  Cybercriminals have found that attacks specifically targeting smartphones and tablets, particularly those that incorporate a ransomware payload, are effective and profitable – which is why the […]
Checkpoint.webp 2017-06-08 11:47:27 Jaff Ransomware (lien direct) Authors: Check Point Threat Intelligence   Last month, Check Point researchers were able to spot the distribution of Jaff Ransomware by the Necurs Botnet. The ransomware was spread using malicious PDF files that had an embedded docm file, which in its turn downloaded an encoded executable. After the downloaded file was decoded, the ransomware encrypted […]
Checkpoint.webp 2017-06-01 13:00:20 FIREBALL – The Chinese Malware of 250 Million Computers Infected (lien direct) Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware,  Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities:  the ability of running any code on victim computers–downloading any file or malware, and […]
Checkpoint.webp 2017-05-25 16:39:19 BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools (lien direct) Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in the wrong hands. On April 14, 2017, a group known as the Shadow Brokers released a large portion of the stolen cyber […]
Checkpoint.webp 2017-05-25 13:00:25 The Judy Malware: Possibly the largest malware campaign found on Google Play (lien direct) Check Point researchers discovered another widespread malware campaign on Google Play, Google's official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The malware uses infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it. […]
Checkpoint.webp 2017-05-23 13:00:02 Hacked in Translation – from Subtitles to Complete Takeover (lien direct) Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim's media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time […]
Checkpoint.webp 2017-05-22 13:00:12 Check Point R80.10 Maximizes Security and Minimizes Operational Overhead for CCI Nice Côte D\'Azur, Creating a “WOW” Effect (lien direct) Security threats and attackers continue to adapt their techniques, making it more difficult than ever for organizations to protect themselves. When the CCI Nice Côte D'Azur upgraded to Check Point's R80.10 Security Management, it increased threat prevention performance, efficiency, and visibility while reducing operational overhead.   In a recent chat with Frédéric Achache, IT Projects Manager […]
Checkpoint.webp 2017-05-19 13:00:57 Security Brief for Connected Automotives (lien direct) Introduction       The question of which companies will dominate the automotive industry in coming years is being decided in the contest to produce Internet-connected cars. Intel predicts 120 million vehicles with varying degrees of automation will be on our roads by 2030. (Shot, 2016).The development and popular adoption of automotive data connectivity and autonomous […]
Checkpoint.webp 2017-05-17 13:00:55 April\'s Most Wanted Malware: Exploit Kit Attacks Continue, While Slammer Worm Resurfaces Again (lien direct) Check Point's latest Global Threat Impact Index detected a continued increase in the number of organizations being targeted with Exploit Kits, as Rig EK became the most prevalent form of attack, while there was also a resurgence in the Slammer worm detected, with 4% of businesses impacted.   Slammer resurfaced following a short hiatus, jumping […]
Checkpoint.webp 2017-05-17 13:00:11 Check Point Reveals Global WannaCry Ransomware Infection Map at CPX Europe 2017 (lien direct) Check Point researchers have been investigating the ransomware campaign in detail since it was first reported. With a new Check Point WannaCry Ransomware Infection Map, the researchers were able to track 34,300 attack attempts in 97 countries. The average pace as of today is one attempt in every three second – indicating a slight decline […] Wannacry
Checkpoint.webp 2017-05-16 16:48:44 CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry (lien direct) Using the NSA exploit EternalBlue released by the Shadow Brokers, the WannaCry ransomware developers have added their names to malware lore. Given the number of institutions hit and the amount of media generated, it seemed appropriate to show what the ransomware actually does on a system through our SandBlast Agent Forensics product. The WannaCry outbreak […] Wannacry
Checkpoint.webp 2017-05-16 13:01:19 The mobile banker threat – from end to end (lien direct) One of the most dangerous threats targeting mobile users is the banking malware. These malicious pieces of code are designed to steal financial information and transfer funds to their own accounts. Over the years, perpetrators successfully managed to overcome all obstacles set before them, such as the 2-Factor-Authentication security mechanism and defenses set in different […]
Checkpoint.webp 2017-05-15 19:00:14 WannaCry – New Kill-Switch, New Sinkhole (lien direct) Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware. In the last few hours we witnessed a stunning hit rate of 1 connection per second. Registering the domain activated the kill-switch, and these thousands of to-be victims are safe from […] Wannacry
Checkpoint.webp 2017-05-14 18:29:09 WannaCry – Paid Time Off? (lien direct) Let us open with a TL;DR – DO NOT pay the ransom demanded by the WannaCry ransomware! Now, let us explain why: As of this writing , the 3 bitcoin accounts associated with the WannaCry ransomware have accumulated more than $33,000 between them. Despite that, not a single case has been reported of anyone receiving their […] Wannacry
Checkpoint.webp 2017-05-12 19:08:39 Global Outbreak of WannaCry (lien direct) [Updated May 15, 2017] On May 12, 2017 the Check Point Incident Response Team started tracking a wide spread outbreak of the WannaCryp ransomware. We have reports that multiple global organizations are experiencing a large scale ransomware attack which is utilizing SMB to propagate within their networks.  To complicate matters there are a number of […] Wannacry
Checkpoint.webp 2017-05-11 14:47:29 JAFF – A New Ransomware is in town, and it\'s widely spread by the infamous Necurs Botnet (lien direct) Necurs, one of the largest botnets, went offline during the holiday period of 2016 and through the beginning of 2017. However it returned only to shortly peak late in April, spreading Locky using malicious PDF documents. Today, May 11, Necurs started spreading a new ransomware called JAFF. Check Point's global sensors have spotted as many […]
Checkpoint.webp 2017-05-10 13:00:30 DiamondFox modular malware – a one-stop shop (lien direct) Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with Terbium Labs, a Dark Web Data Intelligence company. The report includes a review of the malware's sales procedure and customer reviews, as well as a full technical analysis of its multiple plugins. For the full DiamondFox report click here. Check […]
Checkpoint.webp 2017-05-09 13:00:02 (Déjà vu) Android Permission Security Flaw (lien direct) Check Point researchers spotted a flaw in one of Android's security mechanisms. Based on Google's policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types of attacks, including ransomware, banking malware and adware. Check Point reported this flaw to Google, which responded that this issue […]
Checkpoint.webp 2017-05-08 13:00:18 The Devil\'s Bargain: Security or Productivity? (lien direct) With so much riding on cyber security, those of us charged with providing it must make a devil's bargain between conflicting priorities: maintain productivity by letting users receive and transmit information quickly, or protect information at the cost of unacceptable latency. The dilemma arises from the nature of today's threats. In the original threat-signature model, […]
Checkpoint.webp 2017-05-04 17:00:20 Update – OSX/Dok Campaign (lien direct) Our ongoing investigation of the OSX/DOK campaign has led us to detect several new variants of this malware. These new variants have the same functionality as the previous ones, and are designed to give the attackers complete access to all victim communications. This includes communication encrypted by SSL, by redirecting the victims' traffic through a […]
Checkpoint.webp 2017-05-03 13:00:26 Debug Instrumentation via Flash ActionScript (lien direct) Browser plug-ins have always been an attractive target for attackers to exploit. In the last couple of years, the most prevalent attack platform was undoubtedly – Flash. With 250+ CVEs in 2016 alone, and incorporation in practically every exploit kit, Flash exploits are everywhere and deserve our attention. As researchers, we stumble upon many cases where […]
Checkpoint.webp 2017-05-02 13:00:16 GDPR – here\'s what you need to do right now (lien direct) By now you may have heard of GDPR, the new European General Data Protection Regulation.  It's a complex, and evolving piece of legislation that comes into effect in May 2018.  It doesn't matter whether your organization has any presence in the EU, or where your applications and data are processed and stored.  If your organization […]
Checkpoint.webp 2017-05-01 13:00:14 Getting your emails blocked? Don\'t forget the semicolon; (lien direct) Due to their common use in websites, JavaScript files are not detected by traditional Anti-Virus software. Scanning JavaScript files while browsing is virtually impossible due to its performance impact and probable high false positive rate, due to most sites using obfuscated JavaScript as a benign method to protect their intellectual property. To detect such attacks, […]
Checkpoint.webp 2017-04-27 18:03:30 OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic (lien direct) People often assume that if you're running OSX, you're relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all versions of OSX, has 0 detections on VirusTotal (as […]
Checkpoint.webp 2017-04-27 05:00:03 Securing the Connected Car Steps Up a Gear (lien direct) “Here in my car, I feel safest of all …” That line from Gary Numan's hit single, 'Cars' sums up the way many of us feel when we're driving: safe and protected in the privacy of our vehicles. But cars are increasingly connected to the outside world. Features that were once only available on premium […]
Checkpoint.webp 2017-04-25 19:30:00 Banking trojans are on the rise: here\'s how to avoid being robbed (lien direct) Banking trojans are helping cybercriminals to commit the perfect crime:  stealing money from the accounts of unsuspecting victims, almost untraceably and at minimal risk.  As such it's no surprise that from June to December 2016, banking trojans were only fractionally behind ransomware in being the most prevalent type of malware, and in Asia-Pacific countries they […] ★★
Checkpoint.webp 2017-04-24 20:47:10 FalseGuide misleads users on GooglePlay (lien direct) Update: Since April 24, when the article below was first published, Check Point researchers learned that the FalseGuide attack is far more extensive than originally understood. Five additional apps containing the malware were found on Google Play, developed by “Анатолий Хмеленко.” The apps were uploaded to the app store as early as November 2016, meaning […] ★★★★★
Checkpoint.webp 2017-04-21 13:00:25 (Déjà vu) Introducing SandBlast Mobile: comprehensive mobile threat protection (lien direct) Just how susceptible are mobile devices to attacks in enterprise environments? It's safe to say that mobile cyberattacks beset every business. For 12 months, Check Point analyzed data from 850 companies around the world, and discovered some surprising insights: 100% of the organizations had at least one mobile malware attack The average number of mobile […] ★★★★★
Checkpoint.webp 2017-04-20 16:00:43 Check Point Infinity – The Security Architecture of the Future – Today (lien direct) Infinity is boundless.  Unfortunately so are your IT demands and security expectations.  The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be a force to unify and harness the promise of these new technologies for the benefit of business operations and customers.  […]
Checkpoint.webp 2017-04-17 13:00:12 When you look at files from your cloud, are they looking back at you? (lien direct) When your users look at files served from your cloud platform, files that have tracking pixels could be looking back - revealing more than you should to outsiders about users and infrastructure. Security researchers are finding tracking pixels implicated in attacks on enterprises. So, if your IT workloads are on a cloud platform, you should […]
Checkpoint.webp 2017-04-13 13:00:37 The Unbearable Lightness of Operating Web-Based Attacks: How easy it is to steal money from IE 8.0-11.0 users (lien direct) Looking back at the past year, there is no doubt that the malware-as-a-service industry, which sells and trades malware samples, attack tools, and a variety of services, is thriving. It means that cyber criminals with low technical skills can easily purchase attack tools from more advanced hackers, vastly increasing the number of potential attackers, attacks, […]
Last update at: 2024-05-31 16:10:23
See our sources.
My email:

To see everything: RSS Twitter