What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2017-01-24 14:00:36 Charger Malware Calls and Raises the Risk on Google Play (lien direct) Several weeks ago, Check Point Mobile Threat Prevention detected and quarantined the Android device of an unsuspecting customer employee who downloaded and installed a 0day mobile ransomware from Google Play dubbed “Charger.” This incident demonstrates how malware can be a dangerous threat to your business, and how advanced behavioral detection fills mobile security gaps attackers […]
Checkpoint.webp 2017-01-23 14:00:51 A Whale of a Tale: HummingBad Returns (lien direct)   Check Point researchers have found a new variant of the HummingBad malware hidden in more than 20 apps on Google Play. The infected apps in this campaign were downloaded several million times by unsuspecting users. Check Point informed the Google Security team about the apps, which were then removed from Google Play. This new […]
Checkpoint.webp 2017-01-19 20:57:11 What\'s the Proteus Botnet and how does it work? (lien direct)   The Proteus botnet emerged toward the end of November 2016.  Only a few samples of it were found in the wild and, at the moment, it doesn't seem to have a widespread campaign.  So, what does it do? It launches a multi-layered attack on an infected machine where it runs several processes aimed at […]
Checkpoint.webp 2017-01-16 14:00:56 Malware Takes a Christmas Break in December\'s Global Threat Index (lien direct) Global malware attacks decreased by 8% in December compared with the previous month, with the popular Locky ransomware recording a huge 81% decrease per week, according to the latest monthly Global Threat Index from Check Point's Threat Intelligence Research Team. This isn't an invitation to businesses to sit back and relax, however. Our team predicts […]
Checkpoint.webp 2017-01-06 14:00:05 SWIFT Attacks Require Swift Investigations (lien direct)   SWIFT, the global financial messaging system, issued an alert message regarding new customer's compromised environments by sophisticated adaptive attackers in an attempt to send fraudulent payment instructions. This resulted in February this year when a successful attack of over $1 billion transactions was made from Bangladesh's central bank resulted in $81 million in unrecoverable […]
Checkpoint.webp 2017-01-04 21:56:23 The Right Security Architecture (lien direct) When it comes to maintaining the best security, size doesn't matter. Big or small, the dynamics of how companies secure their data have evolved as the security landscape has changed. In the past, security was focused on the perimeter, but today, it must be pervasive: everywhere, in everything and must move from simple access control […]
Checkpoint.webp 2017-01-03 17:48:48 Looking for a New Employee? Beware of a New Ransomware Campaign (lien direct) Despite trying to brand itself as a new malware, GoldenEye, the latest Petya variant, is very similar to older versions and differs mostly in its “golden” motif. The most prominent change, however, is how the campaign spreads the ransomware. The current campaign used to distribute GoldenEye has a job application theme. It is therefore aimed […]
Checkpoint.webp 2016-12-29 18:08:02 How We Found Two New Ransomware Families and Built Their Decryptors (lien direct) Ransomware is one of the most common and effective attack methods today, and it seems this trend isn't going to change anytime soon. This last November, we found that ransomware attacks are surging, with our Global Threat Index showing that the number of ransomware attacks using Locky and Cryptowall increased by 10%. Today, Check Point's […]
Checkpoint.webp 2016-12-27 17:05:53 Check Point discovers three Zero-Day Vulnerabilities in web programming language PHP 7 (lien direct) PHP 7, the latest release of the popular web programming language that powers more than 80% of websites, offers great advantages for website owners and developers. Some of them include doubling the performance and adding numerous functionalities. Yet for hackers, it represents a completely fresh attack vector, where they can find previously undisclosed vulnerabilities. During […]
Checkpoint.webp 2016-12-15 11:32:22 No More Ransom! Check Point adds firepower to the global ransomware battle (lien direct) If you didn't know what ransomware was at the start of this year, chances are that you do now. It's been the biggest cybersecurity story of 2016 for both businesses and consumers. Back in February, a Hollywood hospital was forced to pay $17,000 in bitcoin to get its systems back online after an attack; while over […]
Checkpoint.webp 2016-12-14 14:00:27 Cloud Security Predictions and Trends (lien direct) It's that most wonderful time of the year – the time where I like to take a look back and reflect on what the year has been as well as look forward to take a peek into next year. With the start of every new year we see many exciting new trends. But if the […]
Checkpoint.webp 2016-12-13 23:00:48 An In-depth Look at the Gooligan Malware Campaign (lien direct) Check Point mobile threat researchers today published a technical paper that provides deep technical analysis of the Gooligan Android malware campaign, which was first announced on November 30. The paper discusses the ins and outs of how more than one million Google accounts were breached, potentially exposing messages, documents, photos, and other sensitive data. A […]
Checkpoint.webp 2016-12-13 14:00:08 Ransomware Attacks Spike Globally in November\'s \'Most Wanted\' Malware List (lien direct) Ransomware attacks continued to rise worldwide during November, according to the latest monthly Global Threat Index from Check Point's Threat Intelligence Research Team.   Ransomware attacks using the Locky and Cryptowall variants both increased by 10% in November from the previous month.   The research team found that both the number of active malware families and […]
Checkpoint.webp 2016-12-01 21:40:00 The Internet of ransomware Things (lien direct) San Francisco's Municipal Railway (MUNI) riders got to ride for free over the last weekend (Nov 25th-26th), after what appears as a ransomware hit the agency's payment system. The alleged attack sought $73,000 in ransom for stolen city data. “Personal information of MUNI customers were not compromised as part of this incident,” Paul Rose, a […]
Checkpoint.webp 2016-11-30 13:50:20 More Than 1 Million Google Accounts Breached by Gooligan (lien direct) As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Our research exposes how […]
Checkpoint.webp 2016-11-28 14:00:42 Check Point vSEC Achieves AWS Security Competency (lien direct) Check Point has attained Amazon Web Services (AWS) Security Competency. This shines a light Check Point's expertise in delivering advanced threat prevention security to help protect customer data and workloads in the AWS Cloud. vSEC for AWS provides consolidated and consistent security policy management, enforcement and reporting across on-premise and cloud workloads, making migration to […]
Checkpoint.webp 2016-11-24 18:21:22 Two thanksgiving presents from the leading ransomware (lien direct) Cerber and Locky, the two most popular ransomwares out there, have launched new variants to the wild simultaneously. The new ransomware versions released perform slender, yet very interesting, changes that may affect the way they are being detected.   CERBER 5.0 Uses New IP Ranges as well as Old Ones The actors behind Cerber, like other […]
Checkpoint.webp 2016-11-24 14:00:31 ImageGate: Check Point uncovers a new method for distributing malware through images (lien direct) Check Point researchers identified a new attack vector, named ImageGate, which embeds malware in image and graphic files. Furthermore, the researchers have discovered the hackers' method of executing the malicious code within these images through social media applications such as Facebook and LinkedIn. According to the research, the attackers have built a new capability to […]
Checkpoint.webp 2016-11-23 22:53:01 A Complex Web: Bitcoin Mixing Services (lien direct) Check Point's Threat Intelligence Analysis team often comes across attackers who seek payment from their victims in Bitcoins – especially following ransomware attacks such as Cerber. Once they get paid for their criminal exploits, these actors employ all sorts of Bitcoin mixers and tumblers to cover their tracks. We decided to analyze these mixing services […]
Checkpoint.webp 2016-11-21 14:00:15 October\'s \'Most Wanted\' Malware List Shows Attacks on the Rise (lien direct) Check Point's Threat Intelligence Research Team revealed today that the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organizations' networks. The team found that both the number of active malware families and number of attacks increased by 5% […]
Checkpoint.webp 2016-11-15 22:00:10 Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World! (lien direct) Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found SandBlast to be a comprehensive yet easy to manage solution, which is worth the cost for effective protection against unknown […]
Checkpoint.webp 2016-11-11 22:15:41 Clearing the fog: a vision of security for hybrid clouds (lien direct) Have you ever driven on a high road or mountain pass that's shrouded by low cloud? You're at the familiar controls of your vehicle, but you can't easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. Progress can be hazardous unless you take extra precautions. The feeling will be familiar to […]
Checkpoint.webp 2016-11-08 14:00:52 Denied! Dealing with Global Distributed Denial of Service (lien direct) Cyber security has recently reached yet a new level of public awareness, as the world learned that an army of bots hosted on internet connected cameras were able to cause outages to well-known internet services such as Twitter, Amzaon, Spotify and Netflix. The global Distributed Denial of Service (DDoS) attack on DYN, a large DNS […]
Checkpoint.webp 2016-11-02 13:00:32 Beware! Malware Targeting Endpoints on the Rise Ahead (lien direct) All you need to do is listen to the news and you know that the cyber threat landscape in 2016 has gotten much worse. But what types of threats are driving companies to take action? And what actions are they taking? To answer these questions, and more, we turned to SANS Institute, the leading organization […] Guideline
Checkpoint.webp 2016-10-28 13:00:01 Global Trends of the \'Most Wanted\' Malware (lien direct) The malware world continues to develop rapidly and dynamically. On a daily basis new malware appears, accelerating the cat-and-mouse game between attackers and defenders. As a result, it's more important than ever for cyber security professionals to stay up-to-date about the ever-changing threat landscape in order to provide organizations with the highest level of protection. […]
Checkpoint.webp 2016-10-25 13:00:34 Check Point\'s Cyber Security Predictions for 2017 (lien direct) 2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. According to the Identity Theft Resource Center, as of October 19th of this year […]
Checkpoint.webp 2016-10-24 13:00:07 6 Tips to Outsmart the Phishermen (lien direct) Brian Kernighan once said, “If you don’t understand viruses, phishing, and similar cyber threats, you become more susceptible to them.” With cyber scams constantly increasing in sophistication, this statement is especially true today. So, what exactly is phishing? In a phishing attack, a hacker creates an email that appears to be legitimate and sends it […]
Checkpoint.webp 2016-10-21 13:00:33 September\'s \'Most Wanted\' Malware List: Ransomware in Top 3 for First Time (lien direct) The Check Point Research Team revealed this week that ransomware attacks continued to rise in September. For the first time since the team launched the Threat Index, ransomware moved into the top three position of the most prevalent malware, with the Locky ransomware accounting for 6 percent of all recognized attacks globally during the month. […]
Checkpoint.webp 2016-10-19 13:00:39 Phishing: Reeling in Enterprises for Hefty Profits (lien direct) Can you believe that phishing, the scam that tricks users into giving away sensitive information like their credit card numbers and bank login credentials, is still with us after more than twenty years? Phishing is still here because criminals keep devising new ways to make it work. However, new phishing methods take more effort, but […]
Checkpoint.webp 2016-10-18 11:02:19 Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year (lien direct) Great news! I'm glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs in 2011. The previous two tests this year measured our Next Generation Firewall capabilities and the Breach Detection System (advanced […]
Checkpoint.webp 2016-10-14 18:39:17 Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention (lien direct) Next week, Check Point will be at SecTor, Canada's premier IT security education conference. The conference brings the world's brightest (and darkest) minds together to identify, discuss, dissect and debate the latest digital threats facing corporations today. The conference has assembled a line-up of industry experts who will share some of the most engaging, educational […]
Checkpoint.webp 2016-10-14 17:53:38 Android Updates: Hurry Up and Wait   (lien direct) Google, device makers and carriers take too long to update Android vulnerabilities. In fact, while it takes Apple just days to update iOS when it finds a vulnerability, Threatpost points out that it can take Google weeks or even months to do the same for Android. Apple needed only ten days to fix Trident vulnerabilities in iOS, but it took Google […]
Checkpoint.webp 2016-10-12 17:11:01 4 Tips on How to Respond to a Ransomware Attack (lien direct) Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” In the world of cyber security, it is indeed essential that organizations take steps to prevent ransomware from attacking their organizations and taking their data hostage. However, despite even the most extravagant and precautious preparations, some attacks may still get through. Knowing […]
Checkpoint.webp 2016-10-07 13:00:59 Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment (lien direct) At the Virus Bulletin conference yesterday in Denver, Check Point researchers Stanislav Skuratovich and Aliaksandr Chailytko gave a talk detailing how cyber security professionals can defeat sandbox evasion. In case you weren’t able to attend the conference, we’ve provided a summary of their presentation below. The malware world is a dynamic one. As soon as sandboxes appeared, […]
Checkpoint.webp 2016-10-06 18:57:59 5 Tips to Fight Back Against Ransomware (lien direct) Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? What is it, you ask? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to protect themselves from cyber threats. As the largest network cyber security vendor globally, Check Point […]
Checkpoint.webp 2016-10-06 13:00:17 Great Crypto Failures – When Malware Goes Wrong (lien direct) Yesterday at the Virus Bulletin conference in Denver, Check Point researchers Yaniv Balmas and Ben Herzog presented “Great Crypto Failures”, a lecture about the cryptography mishaps made by cyber criminals. Cryptography is a major part of many malware functionalities today. It's used to disguise malware, allow it to bypass security measures, create a communication channel […]
Checkpoint.webp 2016-10-05 17:16:32 The Cloud: Rethinking IT Security Roles (lien direct) Whether you lead a team of IT professionals-or are the team-tasks like swapping power supplies and tinkering with the datacenter's air conditioning are quickly transitioning to people in cloud-computing centers. Cisco estimates 83 percent of data center traffic will become cloud traffic by 2019.[i] Moving to the cloud is a significant change from static hardware-based […] Guideline
Checkpoint.webp 2016-09-29 13:00:06 Antivirus Isn\'t Dead, But It\'s No Panacea (lien direct) It should come as no surprise that antivirus solutions on their own are not equipped to deal with many of the threats we see today. Norton Antivirus stated as much back in 2014 when it famously declared, “Antivirus is dead.” The claim was not an indication that such products would be discontinued, but more an […]
Checkpoint.webp 2016-09-28 13:00:32 Ransomware: Steal Smarter, Not Harder (lien direct) Occasionally, even cybercriminals must revamp their “product lines.” They do this when their bread-and-butter malware stops making money due to new security measures, or if they invent a better way to rip people off. Check Point security researchers have caught criminals in the act ramping up ransomware attacks while scaling back banking Trojans. We believe […]
Checkpoint.webp 2016-09-27 16:51:52 Signature-based security solutions can leave networks defenseless for months (lien direct) Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass traditional security solutions the malware was finally detected by a major enterprise email solution provider. The sample, a Cerber variant, […]
Checkpoint.webp 2016-09-22 17:50:07 Gartner Recognizes the Importance of Mobile Threat Defense (lien direct) HummingBad. Stagefright. QuadRooter. Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend – one that our research team encounters daily – is illustrated in the Gartner Market Guide for Mobile Threat Defense Solutions.* […]
Checkpoint.webp 2016-09-21 22:42:16 (Déjà vu) On Their Best Behavior: Securing iOS and Android in the Enterprise (lien direct) In today's business environment, using mobile devices isn't just a business requirement, it's an employee expectation. But for some organizations, these devices present security challenges that prevent or limit their ability to support a fully mobile enterprise. It's not enough that they just deploy or manage iOS and Android devices, they also need to defend […]
Checkpoint.webp 2016-09-20 14:00:51 Will your virtual data traffic take the detour around firewalls? (lien direct) We're going to need a new term to talk about “data centers.” I say this because virtualization in public and private form factors means the locations of processors and other resources you use on-demand don't sit statically in a data center anymore. Virtual resources dart around like bees in a field of clover. When will […]
Checkpoint.webp 2016-09-19 13:00:32 August\'s Top 10 Most Wanted Malware (lien direct) Today, Check Point revealed that both the number of variants of ransomware and volume of malware attacks were on the rise in August, as the company disclosed the most prevalent malware families attacking organizations' networks in the period. During August, the number of active ransomware families grew by 12 percent while the number of detected […]
Checkpoint.webp 2016-09-16 14:00:41 In The Wild: App Stores Are No Sanctuary for Mobile Malware (lien direct) Most mobile users rely on Google Play and the Apple App Store for their safety and assume that by downloading only highly-rated apps from these stores keeps them safe from mobile malware. In the past, this might have been a good strategy, but today it doesn't always work. Breaking the Myth: Google Play The Check […]
Checkpoint.webp 2016-09-09 22:16:26 (Ir)responsible Disclosure (lien direct) Computers have become an essential part of our lives, and in some cases, they are even responsible for keeping us alive. Our dependency to use computers for medical treatments such as diagnostic equipment, medical monitors and even life support is greater than ever. Technology has given the medical sector new and inspirational ways to continue […]
Checkpoint.webp 2016-09-08 17:30:29 CallJam Android Malware Found on Google Play (lien direct) Keeping Android smartphones and tablets safe from malicious apps is a constant battle for enterprises, end users, and for Google. Despite Google's efforts to prevent cybercriminals from infiltrating Google Play, the Check Point mobile research team has discovered new Android malware there it calls CallJam. CallJam malware includes a premium dialer to generate fraudulent phone […]
Checkpoint.webp 2016-09-08 17:00:56 Life After QuadRooter: Measuring The Impact (lien direct) Following Check Point's disclosure of QuadRooter at Black Hat USA on August 7, the free QuadRooter scanner app was downloaded over half a million times. The results of the scans Check Point collected show that almost two thirds of scanned devices were affected. These reports also offer a unique opportunity to analyze a large sample […]
Checkpoint.webp 2016-09-08 13:00:58 Pixel Tracking: A Hacker\'s Tool (lien direct) What is pixel tracking? It's challenging to justify the effectiveness of an email campaign if you can't measure its success. So, what do you do? You use pixel tracking, a seemingly innocent sales tool that helps sales and marketing teams track their campaigns. Tracking pixels are embedded into emails and load when the recipient opens […]
Checkpoint.webp 2016-09-07 22:58:22 Email from PayPal? Don\'t Get Attached! (lien direct) Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such as your university, your Internet service provider, or your bank. These messages usually direct you to a spoofed website, have a malicious attachment, or otherwise get you to divulge private information. The perpetrators then use this information to commit identity theft. […]
Last update at: 2024-04-29 09:07:44
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter