What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2018-05-15 13:00:04 One Year Later: WannaCry, The Dawn Of A New Generation Of Cyber-Attacks (lien direct) A year ago today, after multiple days of digital bombardment, the cyber-security world changed forever.   Over one weekend, the notorious ransomware attack that would become widely known as WannaCry infected more than 200,000 machines around the world, causing billions of dollars in damages. Ransomware attacks occur all the time, but the speed and the […] Wannacry
Checkpoint.webp 2018-05-14 13:00:02 April\'s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities (lien direct) After analysing April's threat data from a global network of sensors and millions of data points, Check Point researchers published the latest Global Threat Index today. Crypto-mining malware remains a growing threat to organizations all across the world, as cyber-criminals are taking advantage of insufficient security practices by targeting unpatched vulnerabilities.   April 2018 marked […]
Checkpoint.webp 2018-05-08 13:00:03 Telegram: The New Channel of Choice for Conducting Cyber Crime (lien direct) The Dark Web is a hive of illicit activity. From illegal guns and drug dealing to the Ransomware-as-a-Service programs, buyers and sellers can use this medium to trade and exchange both knowledge and products.   The take-down of such Dark Web market places, Hansa Market and Alpha Bay, by various American and European law enforcement […]
Checkpoint.webp 2018-05-01 13:00:00 SiliVaccine: A Special Report Into North Korea\'s Anti-Virus (lien direct) Revealed: In an exclusive piece of research, Check Point Researchers have carried out a revealing investigation into North Korea's home-grown anti-virus software, SiliVaccine.          One of several interesting factors is that a key component of SiliVaccine's code is a 10-year-old copy of one of Trend Micro’s, a Japanese company, software components.   […]
Checkpoint.webp 2018-04-29 15:05:02 Cryptomining to The Dark Side (lien direct) Key Findings: A once legitimate video download software site, OSDSoft, has moved into crypto-mining. Around 6000 machines have been infected in just a few months. Distributed by a fraudulent Adobe Flash Player update service, the malware is mining $700 of Monero crypto currency for the perpetrator each day. Check Point researchers have recently discovered a […]
Checkpoint.webp 2018-04-29 07:11:03 The Problem With Two-Factor Authentication (lien direct) Organizations, large and small, are moving to the cloud en masse. While the cloud offers clear benefits, there are also challenges when it comes to security. In the first post of this cloud security series, we outlined these challenges and explained the risks behind these challenges not being properly addressed.   In this second part […]
Checkpoint.webp 2018-04-24 13:00:00 Fifth Generation Phishing Kits Have Arrived (lien direct) “Give a man a fish and you feed him for a day. Teach a man to fish and you feed him for a lifetime.” – Maimonides (1135-1204).   With online phishing kits being the all-in-one DIY fishing pack for those new to this illicit activity, low-tech scammers are taking Maimonides' proverb to heart.   Phishing […]
Checkpoint.webp 2018-04-16 13:00:04 (Déjà vu) Check Point\'s 2018 Security Report (lien direct) 2017 was a pivotal year that surprised many in the IT security industry.   From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it is clear that we are at an inflection point and transitioning to the next generation of the cyber-threat landscape.   In […]
Checkpoint.webp 2018-04-16 13:00:04 Kicking off RSA 2018: Check Point\'s integration with Cloud Passage (lien direct) With RSA 2018 kicking off today in San Francisco, we're excited to announce that the CloudPassage and Check Point integration will be showcased at our booth (N 3635). With dynamically-applied, finely-tuned sets of protection, this integration enables cloud security that meshes with the cloud's agility and dynamism.   The same principles used to protect physical […]
Checkpoint.webp 2018-04-13 13:00:03 March\'s Most Wanted Malware:  Cryptomining Malware That Works Even Outside the Web Browser on the Rise (lien direct) Check Point's latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session   Check Point recently published its monthly Global Threat Index, revealing a surge of cryptomining malware attacks throughout March – specifically, an endpoint cryptomining malware known as the XMRig variant.   First seen […] ★★★
Checkpoint.webp 2018-04-12 13:00:02 Bracing for the next Atlanta: Preventing Cyber-Attacks on Major Cities (lien direct) Two weeks ago, the city of Atlanta suffered a large scale cyber-attack.   All court dates had to be rescheduled, all city job applications had to be suspended until further notice, and some law enforcement officials reportedly had to write reports by hand. Six days after the attack, the city's computer system was still down. […]
Checkpoint.webp 2018-04-05 13:00:05 (Déjà vu) Google\'s 2017 Android Security Report Shines Light on ExpensiveWall (lien direct) Google recently published its 2017 security report for the Android ecosystem, a comprehensive overview of the constantly evolving mobile threat landscape, which indicates that Trojans, spyware, and hostile downloaders account for a large portion of mobile threats today. Among the eight notable Android malware campaigns cited by Google in the report was ExpensiveWall, a malware discovered by […]
Checkpoint.webp 2018-03-21 13:00:00 Preventing crypto-mining attacks: four key steps that\'ll keep you safe (lien direct)   We recently published an overview of the rapid rise in mining attacks, how these attacks work, and their impact on businesses around the world.   The rise of in cryptocurrency values has incentivized hackers to exploit the CPU power of their victims in order for crypto-mining operations. Our research shows that these cryptojacking attacks […]
Checkpoint.webp 2018-03-15 13:00:04 Ransomware Goes Agile. SandBlast Has It Covered. (lien direct) The GandCrab ransomware has already infected over 50,000 victims and extorted up to $600k in just two months. The malware developers update GandCrab in real time. In 2018, even ransomware is agile. SandBlast Agent is able to detect each new variant of GrandCrab, regardless how often it changes.   2018 started with a bang for […]
Checkpoint.webp 2018-03-12 13:00:05 Not a Bitcoin owner? You could (still) be at risk (lien direct) Crypto-Mining Attacks and Their Impact On Businesses It's difficult to not notice the recent surge in reports on crypto-mining attacks. Spreading through Facebook Messenger and YouTube ads while infecting thousands of websites, the recent surge in crypto-mining attacks has been grabbing headlines. The word “crypto-mining” indicates some form of association with crypto-currency – are they […] Threat
Checkpoint.webp 2018-03-12 13:00:04 February\'s Most Wanted Malware: Cryptomining Malware Digs Deeper into Enterprises\' Computing Resources (lien direct) Check Point's latest Global Threat Index reveals that cryptomining malware continues to severely impact organizations   During the month of February, cryptominers affected 42% of organizations around the world, according to Check Point's Global Threat Index's monthly Top Ten Most Prevalent Malware.   In February, Coinhive retained its spot as the most prevalent malware with […]
Checkpoint.webp 2018-02-26 14:00:02 Meet The Hackers: A Series On Mobile Malware (lien direct) Over the past year, every company in the world has experienced a mobile malware attack.   Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about which mobile malwares are prevalent and how the different variants operate, it's critical to understand why attackers choose to target […]
Checkpoint.webp 2018-02-15 19:51:04 Crypto-Miners Now Target Jenkins Servers (lien direct) It's one thing to discover a $10 note on the street, it's quite another to happen upon $3 million in a Monero crypto-currency wallet. The Check Point research team recently came across such a finding and traced it to what can safely be called one of the biggest malicious mining operations ever discovered.   For […]
Checkpoint.webp 2018-02-15 14:01:00 January\'s Most Wanted Malware: Cryptomining Malware Continues to Cripple Enterprise CPU Power (lien direct) Check Point's latest Global Threat Index reveals continued increase in the use of cryptomining malware among hackers   In January, cryptomining malware continued to be the most prevalent with Coinhive retaining its most wanted spot impacting 23 percent of organizations, followed by Fireball in second and Rig Exploit Kit in third impacting 17 percent of […]
Checkpoint.webp 2018-02-08 14:00:57 SandBlast Mobile delivers new Orange Mobile Threat Protection service (lien direct) >Mobile devices are critical to every organization's digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network.   In fact, 20% of all businesses have been breached and an even larger number has no idea whether they've experienced a mobile attack, according […]
Checkpoint.webp 2018-02-07 14:00:59 Check Point CloudGuard Family is Here: Complete Gen V Cyber Protection for the Cloud (lien direct) >Some big news erupted today in Las Vegas at Check Point CPX 360° with the announcement of the immediate release of CloudGuardtm, Check Point's new family of cloud security products. With CloudGuard solutions, enterprises are protected against Gen V cyberattacks on cloud infrastructure workloads (IaaS), services and software-as-a-service (SaaS) applications.   The CloudGuard cloud security […]
Checkpoint.webp 2018-02-04 19:41:36 SandBlast Protects Against Flash Zero-Day Vulnerability (lien direct) >In recent days, a critical Adobe Flash zero-day vulnerability has been discovered to be exploited in the wild. Attacks are reportedly being distributed by embedding malicious Flash objects into Microsoft Excel documents. Once infected, it allows the responsible hacking group to take full control of infected machines. When the Flash object is triggered, it installs […]
Checkpoint.webp 2018-02-01 14:00:29 How Can Your Business Score Touchdowns Without An Offensive Line? (lien direct) >What the Philadelphia Eagles Can Teach Us About Cyber-Security   Imagine your founding CTO resigning … right before your company's biggest annual conference. How do you adapt, maintain momentum, and bring home wins?   The Philadelphia Eagles experienced the American football version of this nightmare scenario when their star quarterback, Carson Wentz, tore his knee […]
Checkpoint.webp 2018-02-01 02:57:51 The Check Point 2017 Global Threat Intelligence Trends Report (lien direct) >2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place between threat actors and security experts. In our H2 2017 Global Threat Intelligence Trends Report, we reveal that cyber-criminals are […]
Checkpoint.webp 2018-01-19 14:00:25 Growing a Global Company: Recapping Gil Shwed\'s Interviews with Forbes and Inc (lien direct) >If you ask any Check Point researcher or engineer for one word that describes what Check Point does best, you'll get a wide range of answers — anything from “cybersecurity” to “cyber-security” to the rebels that'll say “cyber security”.   But if you ask the press, you'll get a very different answer. Growth.   Over […]
Checkpoint.webp 2018-01-15 14:00:50 December\'s Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide (lien direct) >Check Point's latest Global Threat Index reveals the rise of crypto-mining malware targeting enterprises   During the month of December 2017, crypto-mining malware rapidly rose in Check Point's Global Threat Index's top ten most prevalent malware.   Crypto-mining malware refers to cybercriminals hijacking the victim's CPU or GPU power and existing resources to mine cryptocurrency. […]
Checkpoint.webp 2018-01-12 14:00:53 Malware Displaying Porn Ads Discovered in Game Apps on Google Play (lien direct) >In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we've seen them begin to focus on games and apps intended for children.   Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended for children. […]
Checkpoint.webp 2018-01-09 01:53:07 How The Spectre/Meltdown Vulnerabilities Work (lien direct) >Following the discovery of the Spectre and Meltdown vulnerabilities recently found in Intel, AMD and ARM processors, in this post we will try to simplify what the problem is, how it could affect your business and what actions can be taken to protect against it. It is important to begin by clarifying that despite their […]
Checkpoint.webp 2018-01-09 01:52:57 Mitigating CPU Vulnerabilities: Removing the OS Blindfold (lien direct) >OS Level Solutions Are Not Enough The recent Meltdown and Spectre vulnerabilities target weaknesses of the CPU rather than the Operating System, or the applications that run on it. (See here for background on how these vulnerabilities work). Since they do not involve the Operating System, solutions that monitor at that level, such as traditional […]
Checkpoint.webp 2018-01-05 14:00:24 LightsOut: Shining a Light On Malicious Flashlight Apps on Google Play (lien direct) >Check Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user's decision to disable ads showing outside of a legitimate context, and then, in many of the apps, hides its icon to hinder efforts to remove it. This is a purely […]
Checkpoint.webp 2017-12-21 19:53:17 Huawei Routers Exploited to Create New Botnet (lien direct) >A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of thousands of attempts to exploit it have already been found in the wild. The delivered payload has been identified as OKIRU/SATORI which is an updated variant of Mirai. The suspected threat actor behind the attack is an amateur nicknamed 'Nexus […] Satori
Checkpoint.webp 2017-12-20 22:44:05 NSS Recommends Check Point for Advanced Threat Prevention (lien direct) >Check Point’s NSS BPS Test Highlights: Lowest TCO per Mpbs Highest security effectiveness with 100% block rate Results achieved via a single, consolidated gateway We are pleased to announce that Check Point achieved NSS Recommended in the recent NSS Labs Breach Prevention System (BPS) test. Using a single consolidated 15600 gateway, Check Point achieved the […]
Checkpoint.webp 2017-12-13 14:00:31 What Lies Ahead? Cyber-Security Predictions for 2018 (lien direct) >Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we're ready for it.”  The past year certainly took us by surprise when the WannaCry and Petya ransomware outbreaks hit businesses globally, causing unprecedented disruption, while serious new vulnerabilities such as BlueBorne were discovered in almost every connected […] Wannacry
Checkpoint.webp 2017-12-11 14:00:11 November\'s Most Wanted Malware: Return of Necurs Botnet Brings New Ransomware Threat (lien direct) >During the month of November, the Necurs botnet has returned to Check Point's Global Threat Index's top ten most prevalent malware. Check Point researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that was first seen in June 2017. The […]
Checkpoint.webp 2017-12-01 19:46:47 Webinar: Examining the latest trends in enterprise mobile cyberattacks (lien direct) >The explosive proliferation of personal smartphones and tablets in the workplace exposes companies to increased risk of cyberattacks. How bad can it be? Threats to mobile users are myriad and powerful, and hackers are ultimately capable of compromising any device, accessing sensitive data at any time. For the past year Check Point mobile threat researchers analyzed data […]
Checkpoint.webp 2017-11-30 21:09:11 77% of Android Devices Still Endanger Users Due to Design Flaws (lien direct) >Researchers have discovered a design flaw in Android that can be used to remotely capture screenshots or record audio… without the user's knowledge or consent. The attack relies on the MediaProjection service in Android, which has these extensive capabilities, and was made available for the use of non-propriety apps since Android version 5.0 (Lollipop). While […]
Checkpoint.webp 2017-11-24 13:57:42 Uber Takes Cloud Security For A Ride (lien direct) >Cloud security has had a rough ride of it recently, and this past week its driver was the $68bn global transportation company, Uber. Earlier this week, it was revealed that the personal details of Uber's 57 million drivers and had been stolen back in 2016. The company then made matters worse by not reporting the […] Uber
Checkpoint.webp 2017-11-22 21:15:48 Check Point Security Credentials Validated with Cyber Essentials Plus Awards (lien direct) >Check Point is proud to announce that we have received two 'Cyber Essentials Plus' awards under the British Government's Cyber Essentials Accreditation Scheme. The British Ambassador to Israel, David Quarrey, officially presented the accreditations as part of the UK Government's Cyber Essentials Scheme. Launched in 2014, the Cyber Essentials Scheme serves as part of the […]
Checkpoint.webp 2017-11-20 10:00:30 The Danger Behind Santa\'s Beard (lien direct) >Santa's beard is usually white, the colour of purity and innocence. However, cyber-criminals targeting online shoppers enjoying the run up to the Black Friday and Christmas holidays this year could be trying to take advantage of that innocence. Researchers at Check Point recently discovered that criminals have a new way to trick merry online shoppers […]
Checkpoint.webp 2017-11-17 13:40:33 (Déjà vu) New research: Mobile malware hits every business (lien direct) >Every business has experienced at least one mobile cyberattack in the past year, according to a new study published today by Check Point mobile threat researchers. The report, entitled Mobile Cyberattacks Impact Every Business, is the first study to document the volume and impact of mobile attacks across corporate and public enterprise environments. The landmark […]
Checkpoint.webp 2017-11-17 13:30:37 SandBlast Mobile: The best mobile security solution just got better (lien direct) >If there's one thing we can count on it's the tenacity and resourcefulness of cybercriminals. SandBlast Mobile threat researchers recently identified two new trends emerging in the global hacking community. First, cybercriminals have recently begun developing mobile permutations of existing zero-day malware. One recent case involved a mobile remote access Trojan (mRAT) that was spotted […]
Checkpoint.webp 2017-11-13 16:23:49 October\'s Most Wanted Malware: Cryptocurrency Mining Presents New Threat (lien direct) >Check Point's latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet significant, actor in the threat landscape, allowing threat actors to extract substantial profits while victims' endpoints and networks suffer from […]
Checkpoint.webp 2017-11-07 14:00:11 Check Point IoT Blog Series: \'Home, Smart Home\' – But How Secure Is It? (lien direct) >The smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as pulling up an app on your phone. But beneath the surface of this always-on, seamlessly connected exterior, however, lie significant […]
Checkpoint.webp 2017-11-01 00:25:58 Account Hijacks Affect Everybody, Even \'Top Dogs\' (lien direct) >Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the 'cool factor' among IT professionals translating into the adoption of modern IT technology, it's not surprising to see why today's businesses are being pushed ever faster towards to […]
Checkpoint.webp 2017-10-26 13:00:09 HomeHack: How Hackers Could Have Taken Control of LG\'s IoT Home Appliances (lien direct) >The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world's spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based IoT technology against its inhabitants. The TV and stereo started switching on and off randomly, the water temperature in the […]
Checkpoint.webp 2017-10-24 20:39:57 Bad Rabbit – A New Ransomware Outbreak Targeting Ukraine and Russia. (lien direct) >On October 14th, the Ukrainian Security Service warned that a new large scale cyber-attack, similar to notPetya, might take place sometime between October 13 and 17. The attack arrived a few days later than expected; today (October 24th, 2017) the anticipated ransomware attack broke in Europe. Ukraine was the main target for this malware, with […] NotPetya
Checkpoint.webp 2017-10-23 22:16:24 Crypto Miners Part 2 (lien direct) >As mentioned in our previous blog post, the trend of online cryptocurrency mining is gaining momentum. The potential to mine cryptocurrency on anyone's' browser with ease and anonymity attracts website owners as well as threat actors — joining the fruitful mining pool of leading cryptocurrencies.   Machines all over the world mine cryptocurrencies and get […] Guideline
Checkpoint.webp 2017-10-23 15:15:50 Crypto Miners – The Silent CPU Killer of 2017 (lien direct) >The Pirate Bay, the world's largest BitTorrent indexer, is a massive online source for digital content– movies, games and software-and is among the top 100 most popular websites globally, according to Alexa. No stranger to controversy for its role in illegal downloads, a few weeks ago it was discovered that The Pirate Bay operators have […]
Checkpoint.webp 2017-10-19 21:08:16 A New IoT Botnet Storm is Coming (lien direct) >A massive Botnet is forming to create a cyber-storm that could take down the internet. An estimated million organizations have already been infected. The Botnet is recruiting IoT devices such as IP Wireless Cameras to carry out the attack. New cyber-storm clouds are gathering. Check Point Researchers have discovered of a brand new Botnet evolving […]
Checkpoint.webp 2017-10-18 16:47:23 Boleto: The Perfect \'Inside Job\' Banking Malware (lien direct) >The Brazilian cyberspace is known to be a whole ecosystem of its own and, although the banking malware that originates there has traditionally been somewhat basic, recent trends have indicated new and more refined tools for attack. Subsequently, what originally started in Brazil may well be about to spread to users of online banking worldwide. […]
Last update at: 2024-04-29 13:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter