What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2016-09-07 13:00:06 Closing the Cloud Security Gaps (lien direct) Regardless of where your applications and data reside – whether in private, public or hybrid cloud environments – they are attractive targets. Protecting assets in the cloud requires the same comprehensive security used to protect your physical environments. However, the dynamic and elastic nature of the cloud make traditional security approaches ineffective, exposing organizations and […]
Checkpoint.webp 2016-09-01 17:15:51 Check Point Forensics: PokemonGo Ransomware\'s Hidden Unexpected User (lien direct) It was inevitable. Given the popularity of PokemonGo, ransomware developers have already attempted to trick users into downloading malware that claims to be PC versions of the popular mobile game. There are currently already two known ransomware variants that attempt to capitalize on the mobile games popularity by naming their executables pokemongo.exe. BleepingComputer has already […]
Checkpoint.webp 2016-08-31 19:15:00 DressCode Android Malware Discovered on Google Play (lien direct) The Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores. Check Point notified Google about the malicious apps, and some have already been removed from Google […]
Checkpoint.webp 2016-08-31 15:42:18 Check Point Spearheads Threat Prevention Security for Small and Medium Businesses (lien direct) Small and medium-sized business owners typically think the security that protects their large enterprises counterparts is well out of reach in terms of costs and complexities. However recent shifts in the threat landscape have them rethinking their security strategies. Cybercriminals are equal opportunists who leverage the same tactics used on bigger enterprises to target smaller […]
Checkpoint.webp 2016-08-30 21:08:08 Whaling: The Hunt for High Profile Business Targets (lien direct) What are whaling attacks? “Whaling” attacks, also called Business Email Compromise (BEC), are a newer form of phishing attack. Phishing attacks consist of messages sent to would-be victims that try to deceive them into clicking malicious links, or opening an attachment that contains malware. Phishing attacks have evolved drastically, in part due to growing awareness […]
Checkpoint.webp 2016-08-29 07:01:40 Beware of the Trident Exploits (lien direct) Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated zero-day attack on the iPhone of Ahmed Mansoor, a human rights activist in the United Arab Emirates. The Citizen Lab discovery exposed three zero-day exploits used by “Pegasus,” a lawful interception cyberespionage tool developed by the Israeli-based NSO Group and […]
Checkpoint.webp 2016-08-26 13:00:42 Web Scripting Language PHP-7 Vulnerable to Remote Exploits (lien direct) Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data in one big pot – the server. This allows attackers to focus on one target, instead of individual users, making it possible for them to achieve greater results. This approach has been extremely profitable for attackers with various goals ranging […]
Checkpoint.webp 2016-08-25 22:26:03 Advancing the Security of Your SDDC (lien direct) VMworld US is rapidly approaching and we've been busy gearing up for a great show! In fact, the product team has been especially busy building new features and capabilities into our vSEC Cloud Security product portfolio which we'll showcase during VMworld. While businesses of all sizes are making significant strides to virtualize networks and leverage […]
Checkpoint.webp 2016-08-24 17:00:07 The QuadRooter Domino Effect (lien direct) Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive data. Until a patch for a vulnerability is installed, an affected device is exposed. That’s why fixing vulnerabilities like QuadRooter […]
Checkpoint.webp 2016-08-24 13:00:44 The Evolution of Proxy (lien direct) When I entered the security market nearly 20 years ago, the philosophical and almost religious debate was whether proxy was a better technology than stateful inspection. Back then stateful firewalls were all about access control and proxy servers were interrupting a web connection to prevent direct internet exposure, and the “smart” ones were able to […]
Checkpoint.webp 2016-08-23 17:44:30 Phishing scams target everyone – even us! (lien direct) Phishing scams have been around for over twenty years. It appears unlikely that they will ever go away. Targeting anyone with an email address, they continue to be a persistent threat. Recently, even some of Check Point's executives were recently targeted. The below email, purportedly from PayPal, is an example of emails that potential victims […]
Checkpoint.webp 2016-08-22 19:05:59 Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files (lien direct) Every week we see new ransomware variants as cyber criminals continue to generate revenue from holding victims’ files for ransom. In July, a new ransomware was discovered that is an out-and-out scam. It does not encrypt any files; it simply deletes all user files. It then demands a ransom for recovery of the files, but […]
Checkpoint.webp 2016-08-18 13:00:21 July\'s Top 10 Most Wanted Malware (lien direct) Check Point Software Technologies today revealed the number of active malware families decreased by 5 percent in July, as the company disclosed the most prevalent malware families attacking organizations' networks in the month. During July, Check Point detected 2,300 unique and active malware families attacking business networks, a 5 percent increase compared to June, with […]
Checkpoint.webp 2016-08-16 13:00:25 CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service (lien direct) Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of private and enterprise users alike. Ransomware has become a global problem. According to the FBI, the accumulated revenue in the […]
Checkpoint.webp 2016-08-07 20:53:21 QuadRooter: New Android Vulnerabilities in Over 900 Million Devices (lien direct) Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas. What is QuadRooter? QuadRooter is a […]
Checkpoint.webp 2016-08-02 13:00:50 SandBlast Receives ‘Recommended’ Rating Once Again (lien direct) Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created each day1, traditional security solutions don't stand a chance in this cat and mouse game. Organizations are constantly striving to ensure protections are top notch to defend their organizations against ever-persistent cyber attackers. An essential ingredient to successfully block unknown […]
Checkpoint.webp 2016-08-02 13:00:18 Secure Every Click – Check Point SandBlast™ Agent for Browsers (lien direct) Internet users expect near-instant and unconstrained access to web content when browsing. Unfortunately, the web poses one of the greatest threats to enterprises today. Malware may be hidden in web-downloaded content or webmail attachments. Your employees may unknowingly become victims of phishing, social engineering, and other malware-less attacks aimed at stealing corporate passwords and sensitive […]
Checkpoint.webp 2016-07-26 13:00:42 Ransomware: what you need to know (lien direct) In recent years, there has been a surge of ransomware attacks. It's been reported all over security blogs, tech websites and in the news. Unfortunately, these attacks show no signs of slowing. If anything, they are getting worse. Cryptolocker, the first famous ransomware, was observed in the wild in 2013. From then until mid-2015, there […]
Checkpoint.webp 2016-07-22 14:00:51 Securely Embrace the Hybrid Cloud (lien direct) The trend in enterprise IT is to move from a hardware-centric to an application-centric network model, enabling businesses to streamline processes and improve end-user experiences, all while enhancing their competitive positioning. As a result, IT organizations are under tremendous pressure to rapidly transform in order to keep pace with these new business demands. This need […]
Checkpoint.webp 2016-07-21 20:00:34 The Cure for Your Private Cloud Security Blues (lien direct) Hot off the heels of Cisco Live! in Las Vegas, there's a continued buzz about the Cisco Application Centric Infrastructure (ACI) and how it is helping organizations transform from legacy to next-generation private cloud data centers. In fact, front-and-center to this year's event was the desire to transform Cisco offerings and make them more cloud-like, […]
Checkpoint.webp 2016-07-20 16:36:37 Check Point Forensics: CTB-Faker Ransomware (lien direct) SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it, providing comprehensive analysis of the security incident. In addition to the blog, we are thrilled to now provide you with access to […]
Checkpoint.webp 2016-07-18 18:00:37 (Déjà vu) Top 10 Most Wanted Malware (lien direct) Check Point Software Technologies today published its latest Threat Index, revealing the number of active malware families increased by nearly two-thirds in the first half of 2016, led by the number of threats to business networks and mobile devices. During June, Check Point detected 2,420 unique and active malware families attacking business networks, a 61 […]
Checkpoint.webp 2016-07-14 13:00:35 Ransomware’s Motto: The Simpler, The Scarier, The Better (lien direct) A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of different variants. Check Point researchers have been analyzing ransomware for almost two years, and it has been a fascinating study. We can easily follow the trends, common aspects, and differences between ransomware families. […]
Checkpoint.webp 2016-07-13 15:48:52 Stop Before You (Pokemon) GO (lien direct) The excitement over the new game Pokemon GO has taken the world by storm. Because it’s available only in limited countries right now, some people may be tempted to download the app from sources other than Google Play or the Apple App Store. Getting apps from unofficial sources can expose you to malicious apps that […]
Checkpoint.webp 2016-07-11 13:00:21 Malware\'s Constant Evolution Requires Advanced Protections (lien direct) Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or at least stay hidden long enough to complete their malicious goals. In this blog we review some of the cutting-edge techniques attackers use to bypass defenses and the techniques we use to protect […]
Checkpoint.webp 2016-07-11 09:13:18 (Déjà vu) DIY Attribution, Classification, and In-depth Analysis of Mobile Malware (lien direct) The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for multiple malware campaigns during the last year, including Volatile Cedar, Rocket-Kitten, and the Nuclear Exploit Kit. In fact, the PC […]
Checkpoint.webp 2016-07-08 22:41:38 Jigsaw Ransomware Decryption (lien direct)   The Jigsaw ransomware was first spotted in April 2016, and has since received a bit of traction. It became infamous thanks to an image of the Jigsaw killer from the movie 'Saw' displayed on the ransom note (hence its name), and its unique way of persuading victims to comply – if payments aren't made […]
Checkpoint.webp 2016-07-05 18:53:12 Check Point Forensic Files: Cerber Ransomware Distribution using Office DOTM files (lien direct) The start of a series This blog entry is the first in a new series featuring reports from Check Point SandBlast Agent Forensics. The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it. SandBlast Forensics identifies, […]
Checkpoint.webp 2016-07-01 17:20:07 From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign (lien direct) For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign. HummingBad is a malware Check Point discovered in February 2016 that establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps. Yingmob […]
Checkpoint.webp 2016-06-29 17:32:06 SandBlast Protects Customers from Widespread Cerber Ransomware Attack (lien direct) Starting at 6:44am UTC on June 22nd, Avanan, a partner of Check Point, detected a large-scale ransomware attack against its Cloud Security Platform customers across multiple companies. We believe this attack was only detected by SandBlast – Check Point's Zero Day Protection solution. The attack included a very nasty ransomware called Cerber, which spreads through phishing […]
Checkpoint.webp 2016-06-27 13:00:27 The Malware-as-a-Service Industry (lien direct) Several recent developments have brought the malware infrastructure-as-a-service industry into the spotlight, reminding everyone how prominent it is in the cybercrime arena. The infrastructures that create malware exploit kits are so immense that the global threat landscape can be completely altered when one of them is downed. According to Kafeine, a leading exploit kit researcher, […] Guideline
Checkpoint.webp 2016-06-24 16:00:54 Effective Security Management in a Software Defined World (lien direct) Software defined infrastructure (SDx) along with use of private and public clouds completely transforms the way IT departments manage enterprise data centers and workloads. Automation is a key component of software defined networking (SDN), bringing network, server, security management and other IT functions or teams together. In the past when organizations deployed new applications, the application […]
Checkpoint.webp 2016-06-23 13:00:27 The Infamous Nuclear Exploit Kit Shuts Down (lien direct) In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one of the largest attack infrastructures observed in the wild today, was recently the subject of a thorough investigation conducted by the Check Point Threat Intelligence and […]
Checkpoint.webp 2016-06-22 16:24:33 Intel Spot On with CET (lien direct) Intel has recently published a specification for a new technology meant to detect and block malware at the processor level. The technology, developed with the help of Microsoft, is called Control-flow Enforcement Technology (CET), and its main purpose is to prevent any attempt to use Return-Oriented Programming (ROP) or Jump-Oriented Programming (JOP) for exploits. This […]
Checkpoint.webp 2016-06-20 13:00:58 Cerber Ransomware Targets U.S., Turkey and the UK in Two Waves (lien direct) New ransomware families appear on a regular basis, each with a different method of operation. The Cerber ransomware, which has a sophisticated implementation process, uses a very interesting tactic in its attacks. It operates in surges with relatively low activity in between them. We have detected two such spikes in Cerber's activity, the first in […]
Checkpoint.webp 2016-06-17 16:45:03 Tales from the Trenches: Modern Malware Requires Modern Investigation Techniques (lien direct) The Check Point Incidence Response team was called in to assist a company who suffered a severe breach in their network, which was not previously protected by Check Point's advanced protections. The team began to investigate and was extremely impressed by the malware's tactics and sophisticated evasion techniques. The malware's evasive nature required the team […]
Checkpoint.webp 2016-06-17 15:23:37 In The Wild: Mobile Malware Implements New Features (lien direct) Malware developers just won't stand still. They continue developing malware as they go, sometimes to adapt to the changing threat landscape, and sometimes simply to improve their capabilities. Recently, two examples of such advancements presented themselves, one in Triada's code and one in Viking Horde's. Triada's Trident is Getting Stronger As if the original malware […]
Checkpoint.webp 2016-06-15 15:00:37 Trust No One – A Cyberworld Survival Guide (lien direct) Cybercriminals are professional scammers; their specialty is tricking users into helping them achieve their malicious goals. Attackers use many different tactics, including spam, phishing emails, and fake ads. In each case, the unsuspecting user plays an active role in his own victimization when he clicks a link or opens an attachment. Recently, an unconventional campaign […]
Checkpoint.webp 2016-06-08 16:51:11 Hack In The Box: Mobile Attackers Are Listening In (lien direct) While most mobile attacks require some level of interaction with the user, Man-in-The-Middle (MiTM) attacks can achieve their goal without the user ever knowing they occurred. This type of attacks allows attackers to eavesdrop, intercept and alter traffic between your device and any other counterpart. There are several ways by which hackers can execute such […]
Checkpoint.webp 2016-06-07 07:01:21 (Déjà vu) FACEBOOK MaliciousChat (lien direct) Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile application. Following Check Point's responsible disclosure, Facebook promptly fixed the vulnerability.   What is this vulnerability? The vulnerability allows a malicious user to change a conversation thread in the Facebook Online Chat & Messenger App. By abusing this vulnerability, […]
Checkpoint.webp 2016-06-06 13:00:23 Zcrypt: The Ransomware Virus Hybrid (lien direct) A recent piece of ransomware has emerged that is causing quite the stir. The reason – it is in fact a virus and can infect users even through USB devices. The technology itself is not new, but when implemented by ransomware the results could be severe. Given this, now is a good time for people […]
Checkpoint.webp 2016-06-03 16:21:04 In The Wild: Never a Dull Moment with Mobile Malware (lien direct) Mobile malware learns fast. Every time new security measures come along, malware somehow manages to find a way to overcome them. This week we bring you such a story, with further details about Viking Horde, a botnet found by Check Point on Google Play. The malware is capable of bypassing even Android's latest OS security […]
Checkpoint.webp 2016-06-01 15:47:49 Hack In The Box: Mobile Malware Goes In For The Kill (lien direct) For attackers, installing a Trojan on your mobile device is the best way to attack it. Mobile malware provides attackers with a full arsenal of capabilities they can use to conduct several types of attacks including surveillance, info-stealing, ransomware, fraud, and much more. Surveillance malware, for instance, can track location, extract call logs, files, and […]
Checkpoint.webp 2016-05-29 19:00:53 OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities (lien direct) Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges on LG mobile devices to attack them remotely at the LayerOne 2016 conference in Los Angeles. LG issued fixes for both vulnerabilities which Check Point made LG aware of before disclosing them publicly. These vulnerabilities are unique to LG devices which […]
Checkpoint.webp 2016-05-27 17:16:35 Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls (lien direct) Today's enterprise networks are more complex than ever. Cloud computing, floods of connected devices and highly mobile workforces put a ton of pressure on security teams to keep networks and data protected. At the same time, the tools and techniques used by cybercriminals to target enterprise data continues to rapidly evolve. When reflecting on the […]
Checkpoint.webp 2016-05-27 14:00:25 Attacks on SMB are a sure thing, according to the latest Verizon report (lien direct) It's not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. The 2016 Data Breach Investigations Report reveals just how much (Check Point contributed to the report). The report covers a large number of SMBs. 521 small businesses were surveyed and 447 confirmed they suffered a security breach with data loss […]
Checkpoint.webp 2016-05-27 13:00:42 CryptXXX Ransomware: Simple, Evasive, Effective (lien direct) CryptXXX emerged a few weeks ago and it's been sneaky! It's most impressive feature is the simplicity of its evasion techniques, which are giving it an advantage over most security systems. This has resulted in a very low detection rate for new samples and a high success rate on the malware's part. According to the […]
Checkpoint.webp 2016-05-26 13:00:16 Spam-Riding Dropper Packs a One-Two Ransomware, Adware Punch (lien direct) The Most Trusty Attack Vector Shady random strangers on the internet often have an uncanny ability to make you believe that you should have expected to hear from them. You may be savvy enough to brush off the 'Nigerian Prince in Distress' and the 'Thousands of Hot Singles in Your Area Waiting to Meet You' […]
Checkpoint.webp 2016-05-25 23:20:09 Weaponized WordPress Tools (lien direct) WordPress is a free, open source content management system (CMS) for creating websites, and is considered to be the most popular blogging system in use. WordPress’ appeal to website developers stems from its  free plugins and themes that are easily installed over the basic platform. These add-ons allow WordPress users to personalize and expand their websites and blogs. […]
Checkpoint.webp 2016-05-25 16:57:39 Hack In The Box: Malware Disguises Itself To Infiltrate Your Device (lien direct) No user would intentionally allow malware onto a mobile device, so it's obvious why malicious apps disguise themselves to trick users into inviting them in. In many cases, malware tries to persuade the user into going even further by asking for various permissions that can enable malicious actions. Malware tries to do as much damage […]
Last update at: 2024-04-29 10:07:48
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter