What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2015-12-30 19:32:57 (Déjà vu) In The Wild: Mobile Cybercrime Goes Big in 2015 (lien direct) Cybercriminals made significant advances in the sophistication and number of attacks on mobile devices in 2015. As we head into a new year — and into new uncertainties for mobile security — let's remember a few of the most spectacular attacks to help us better understand what to be aware of in the months to […]
Checkpoint.webp 2015-12-29 15:00:58 Check Point Threat Alert: Outlook OLE Vulnerability (lien direct) Object Linking and Embedding (OLE), developed by Microsoft, allows users to embed and link to documents and other objects. However, a Remote-Command-Execution vulnerability was found in Microsoft Office that allows remote attackers to execute arbitrary code via a crafted email message processed by Outlook. Microsoft Outlook has a sandbox bypass vulnerability which allows an attacker […]
Checkpoint.webp 2015-12-21 21:00:01 Check Point Threat Alert: Joomla RCE Zero-Day (lien direct) On December 14, a new version of Joomla, an open-source content management system (CMS) which allows you to build websites and powerful online applications, was released to patch a critical 0-Day Remote Command Execution (RCE) vulnerability that affects all versions from 1.5 to 3.4. The vulnerability is due to lack of validation of input objects […]
Checkpoint.webp 2015-12-19 00:00:16 Angler EK Pushing TeslaCrypt (lien direct) In recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. TeslaCrypt is a relatively new ransomware, first reported in the beginning of 2015. Although it is not the most sophisticated malware, it is continuously maintained and updated by its authors, and still manages to spread through various infection vectors. In […] Tesla
Checkpoint.webp 2015-12-10 15:00:08 Check Point\'s Security Predictions for 2016: PoS (lien direct) The holiday season is here, and the retail industry is preparing for shoppers who are rushing to take advantage of sales and purchase gifts in-store or online. However, continuous point-of-sales (PoS) attacks have been making headlines in the last few years. In 2013, Target confirmed a massive credit card data breach that affected 40 million […]
Checkpoint.webp 2015-12-03 19:00:45 Singapore Mobile Device Users Are Under Cyber Attack (lien direct) On December 1, 2015, the Association of Banks in Singapore (ABS) announced information about a Trojan designed to steal financial information from mobile device users. Check Point researchers retrieved samples of this malware and conducted an in depth analysis. This banking malware is actually a tweaked version of an existing financial infostealer called “GMBot” (SHA256: […]
Checkpoint.webp 2015-12-03 14:00:57 Check Point Names Julie Parrish as Chief Marketing Officer (lien direct) Check Point today announced the appointment of Julie Parrish as the company's Chief Marketing Officer. As the newest member of our executive team, Parrish will lead the company’s global marketing organization, overseeing strategic initiatives to drive awareness and demand for the Check Point's expanding portfolio of industry-leading security solutions. Prior to joining Check Point, Parrish […] Guideline
Checkpoint.webp 2015-12-01 19:09:52 Check Point\'s Security Predictions for 2016 (lien direct) At the beginning of last year, Check Point's top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS. These predictions did come true – and they continue to remain a significant threat today. We're nearing the end of 2015, but […]
Checkpoint.webp 2015-11-19 19:06:06 Check Point Threat Alert: Web Shells (lien direct) Web shells can be used to obtain unauthorized access and can lead to wider network compromise. Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to a significant number of cyber incidents. This alert describes the frequent use of web shells as an exploitation vector and Check Point's IPS […] Guideline
Checkpoint.webp 2015-11-19 18:30:26 CyberDay 2015 Recap: A Day of Ideas and Insights (lien direct) CyberDay 2015 Recap: A Day of Ideas and Insights When CSO and Check Point partnered up to create a security thought leadership event for c-level executives, we had high hopes. Yesterday, November 18, those hopes were exceeded as about 200 people gathered in New York City. The purpose: to help today's security leaders share the […] Guideline
Checkpoint.webp 2015-11-11 15:00:39 Vulnerabilities Continue to Put Mobile Devices at Risk (lien direct) Smartphones and tablets have become the most important possessions we carry every day, and everyone should be able to take advantage of the benefits these devices bring without worrying about cybercrime. The convenience and versatility of mobility has also led more organizations to allow employees to use their own devices at work. In fact, according […]
Checkpoint.webp 2015-11-10 21:30:26 Advanced Security For The SDDC That\'s Really Advanced (lien direct) Data center virtualization has come a long way – from concept to a reality in a few short years. The latest evolution, virtualizing the network, lets data center operators treat the underlying infrastructure as a pool of resources – compute, storage and network capacity – that can be called upon to dynamically bring up new […]
Checkpoint.webp 2015-11-09 13:59:43 Rocket Kitten: A Campaign With 9 Lives (lien direct) The customized malware and creative phishing techniques of cyber-espionage groups prove that there is a recurring industry problem. Cyber criminals can evade detection by making minimal changes to bypass most current protection solutions. Since early 2014, the attacker group dubbed 'Rocket Kitten' has been actively targeting organizations through malware infections and spear phishing campaigns. After […]
Checkpoint.webp 2015-11-06 15:00:11 Why it\'s a Smart Idea to Use Threat Intelligence (lien direct) When It Comes to Security, Do You Have 'Evidence-Based Knowledge'? Recently, I participated in an interesting Twitter chat. One of the questions posed: What keeps you up at night? The responses varied, but the one common thread was that malware is constantly evolving, making things scarily unpredictable. It's the reason why intelligence is key to […]
Checkpoint.webp 2015-11-05 18:54:11 Check Point Discovers Critical vBulletin 0-Day (lien direct) vBulletin is a commercial forum and blog platform developed by vBulletin Solutions, Inc. It was created over 10 years ago and is written in PHP. It is the world's most popular forum platform, powering ~78% out of the forums in the top 100K web-sites. Currently there are estimated to be over 40,000 live sites using […]
Checkpoint.webp 2015-11-04 15:00:45 “Offline” Ransomware Encrypts Your Data without C&C Communication (lien direct) Early in September, Check Point obtained a sample of a ransomware. When the sample was run, the following message, written in Russian, appeared:   Translation: “Your files are encrypted, if you wish to retrieve them, send 1 encrypted file to the following mail address: Seven_Legion2@aol.com ATTENTION!!! You have 1 week to mail me, after which […]
Checkpoint.webp 2015-11-03 22:10:40 Phishing for Employees in Russia (lien direct) During the period August 27-30, 2015, Check Point sensors recorded a large amount of logs generated by the IPS protection “PHP Print Remote Shell Command Execution.” This was an interesting anomaly, as we do not usually see high volume of logs from this protection. We started investigating the logs received from all sources, and noticed […]
Checkpoint.webp 2015-11-03 15:00:48 Context-Aware Network Security (lien direct) Defense in depth is a concept that is hard to argue with; put as many security mechanisms in place to make it difficult if not impossible for the bad guys to gain access to your network. Much of the security “sprawl” we see today is a direct result of this strategy – deploy the best […]
Checkpoint.webp 2015-10-27 20:59:38 One Step Ahead (lien direct) What are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway: Hamilton. I was fascinated by how precarious the fate of our independence was had it not been for the forward-looking […]
Checkpoint.webp 2015-10-21 21:22:37 ThreatCloud IntelliStore Marketplace – A new actionable approach to Threat Intelligence (lien direct) Cyber threats have significantly increased in number and in complexity. With malware evolving constantly, we require a steady stream of information on emerging threats to optimize our security systems in place. There are several vendors that provide threat intelligence , but none that offer a platform with customizable and actionable intelligence, including specialized feeds by […]
Checkpoint.webp 2015-10-20 15:30:46 Digging for Groundhogs: Holes in Your Linux Server (lien direct) In July 2015, Check Point's Incident Response team was contacted by a customer after they noticed strange file system activities occurring in one of their Linux based DNS BIND servers. This strange behavior consisted of a large number of peculiar files being written into sensitive system directories.   A thorough analysis of the infected system […]
Checkpoint.webp 2015-10-14 14:00:44 (Déjà vu) The Future Of Financial Cybersecurity (lien direct) October is Cybersecurity Awareness Month, and it starts with large attacks against two prominent financial organizations – An Experian breach, which affected 15 million T-Mobile customers; and Scottrade, which compromised the information of approximately 4.6 million customers. The reality is that there are still huge gaps in companies' security programs in financial institutions, and unless […] ★★★★★
Checkpoint.webp 2015-10-09 17:16:24 Israeli Public Sector Targeted by Zeus Trojan Hidden in a Word Document (lien direct) Two months ago, a malicious Rich Text Format (RTF) document came to the attention of Check Point Threat Intelligence & Research via a worried high-profile client in the public sector. The file had been sent to many employees, several of whom opened the file; as a result, their machines became infected. Check Point took actions […]
Checkpoint.webp 2015-10-08 14:00:48 Managing the Sheer Complexity of Data Center Security (lien direct) The modern IT system is one of the most complex entities in the business landscape. Every device, server and component tied to the network must be managed and monitored. That's a significant job for any IT department, but things can become especially complicated when it comes to enterprise data centers. Intricate and dynamic, the construction […]
Checkpoint.webp 2015-10-02 18:42:43 A Solution for the Evolving Threat Landscape (lien direct) The threat landscape has severely changed over the last few years, and organizations have to constantly keep up with sophisticated threats and advanced tactics of cybercriminals. With multiple tools at hackers' disposal, new threat variants are released every day. According to Check Point's 2015 Security Report, organizations were hit with 106 new forms of malware […]
Checkpoint.webp 2015-10-01 16:08:05 iOS Core Application Design Flaw May Expose Apple ID Credentials (lien direct) Check Point alerted Apple to a privacy issue in iOS core applications that may expose a user's credentials even though the user performed a sign out. The fix is now available through the iOS 9 release. Introduction iOS is a mobile operating system created and developed by Apple and distributed exclusively for Apple hardware. It […]
Checkpoint.webp 2015-09-22 18:44:19 Closing the Malware Gap: The Rise of Threat Extraction (lien direct) Attackers most commonly enter organizations through everyday means such as an emailed file. While these documents look innocuous, they can easily contain malicious content delivered in the form of macros, embedded Java script and even external website links. This kind of infection happens more frequently than you'd think. According to Check Point's 2015 Security Report, […]
Checkpoint.webp 2015-09-22 12:32:33 Check Point and AirWatch Partner to Secure the Future of the Mobile Enterprise (lien direct) As cyberthreats become more sophisticated, it’s important to have a comprehensive mobile security strategy that ties into your broader security infrastructure. That strategy should include solutions that are easy to deploy, simple to manage, and transparent to the end user in order to achieve greater success and to maximize security. To help customers achieve that […]
Checkpoint.webp 2015-09-21 19:56:32 XCodeGhost: The First Wide-Scale Attack on iOS Apps Arrives (lien direct) XcodeGhost is a compromised version of the iOS developer platform, Xcode. This unofficial version of Xcode was altered so that it injects malicious code into any app that was developed and compiled using it. How can an attacker use XcodeGhost? Infected apps are capable of receiving commands from the attacker through the server to perform […]
Checkpoint.webp 2015-09-21 14:51:12 BrainTest – A New Level of Sophistication in Mobile Malware (lien direct) Check Point Mobile Threat Prevention has detected two instances of a mobile malware variant infecting multiple devices within the Check Point customer base. The malware, packaged within an Android game app called BrainTest, had been published to Google Play twice. Each instance had between 100,000 and 500,000 downloads according to Google Play statistics, reaching an […]
Checkpoint.webp 2015-09-15 15:27:27 (Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part III – Ultimatum (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS attacks on […] Guideline
Checkpoint.webp 2015-09-14 17:51:37 The Problem with Traditional Sandboxing (lien direct) Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, anti-bot and firewalls. While these are essential elements in a comprehensive security program, today's advanced hackers use their knowledge and insight to design malware and attacks capable of evading detection by these traditional methods. According to the Check Point 2015 […]
Checkpoint.webp 2015-09-10 21:25:27 Check Point IPS Protects Against Zero-Day Vulnerability in FireEye Appliances (lien direct) On September 6th, researcher Kristian Erik Hermansen publically disclosed a zero-day vulnerability in FireEye appliances. This vulnerability impacts customers running HX 2.1.x and DMZ 2.1.x versions of the FireEye HX endpoint security platform, and appears to be concentrated in a PHP script on the appliance itself. If exploited, this vulnerability could lead to unauthorized remote […] Guideline
Checkpoint.webp 2015-09-10 14:08:58 Analysis of the Sality Gambling Campaign (lien direct) Check Point has a wide and global install base, from which we receive anonymized logs of millions of security incidents per day. At the end of July, one of our anomaly detection algorithms found the following domains in logs from approximately 15% of our sensors in Vietnam: blindzone.ivyro.net argentinaenimagenes.com imou.wz.cz burakcay.com   All four of […]
Checkpoint.webp 2015-09-09 18:02:34 The Sandbox Evolved: An Advanced Solution to Defeat the Unknown (lien direct) The modern threat landscape is one of constant evolution. Everything is changing before our eyes – the types of security threats we face, and especially the methods cybercriminals use to infiltrate networks and confiscate data. These new, ever-changing threats have become very complex, bringing new risks and uncertainties. Typically, signature-based protection like antivirus (AV) and […]
Checkpoint.webp 2015-09-08 13:47:39 WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users (lien direct) Introduction WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The web application mirrors all messages sent and received, and fully synchronize your phone and your desktop computer so that users can see all messages on both devices. WhatsApp Web is available for most WhatsApp supported platforms, including Android, iPhone (iOS), Windows Phone […]
Checkpoint.webp 2015-09-02 13:30:15 Introducing Check Point SandBlast Zero-Day Protection (lien direct) Cyber threats are continuing to evolve, and hackers are finding new ways to hide malware inside emailed documents, on websites as “drive by” exploits or in downloadable content. Many attacks begin by exploiting known vulnerabilities and modifying malware to have unrecognizable signatures to evade traditional security measures. By creating these new, unknown variants, hackers aim […]
Checkpoint.webp 2015-08-31 13:02:11 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices (lien direct) Introduction Ransomware has been a well-known method of attack in the PC world for quite some time. Many PC-based ransomware variants have been thoroughly covered and their malicious payloads described by security researchers. In the past few years, however, a new breed of ransomware has appeared. This time, the target platforms are no longer workstations, […]
Checkpoint.webp 2015-08-27 14:40:07 Leadership, Validation, Innovation and Continuous Improvement (lien direct) From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day in today's world, the business of threats has become an industry operating at a dizzying velocity. Combatting today's industrial production of threats requires a unified, multi-layer threat prevention solution with an integrated sandbox.  A multilayer solution makes it more difficult […]
Checkpoint.webp 2015-08-25 13:20:31 Certifi-gate Found in the Wild on Google Play (lien direct) New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, Check Point publicly disclosed Certifi-gate, a new vulnerability on Android. Using anonymous data collected from the Certifi-gate scanner, an app that tells users if their devices are vulnerable, Check Point uncovered some startling new information: An instance of Certifi-gate was […]
Checkpoint.webp 2015-08-18 13:30:47 JavaScript Hooking as a Malicious Website Research Tool (lien direct) One of the top Internet threats today is drive-by download attacks which originate from exploits kits, hacked websites, spam campaigns and more. As browsers are the main tool for navigating the web, the main attack vectors are browser vulnerabilities, plugin and extension vulnerabilities, as well as some OS vulnerabilities.   We have been playing with […]
Checkpoint.webp 2015-08-17 13:55:10 What You Can (and Can\'t) Do Against Ransomware (lien direct) It happens very quickly: one moment your files are there, and the next they’re not. All you did was download some “useful” software, or run an email attachment that you got from a colleague. The next thing you know, all your files have had their extensions changed to something nonsensical, and their contents have been […]
Checkpoint.webp 2015-08-12 17:51:48 SSH Decryption Opens Door to Very Old Security Vectors (lien direct) Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH uses the client-server model with public host key fingerprints in order to prevent MiTM (Man in The Middle) attacks.   Cybercriminal usage It's very common for hackers to use SSH in order […]
Checkpoint.webp 2015-08-11 18:46:37 (Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part II – Supremacy (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […] Guideline
Checkpoint.webp 2015-08-10 15:02:44 An Update on the Stagefright Vulnerability (lien direct) What is Stagefright? Stagefright is a vulnerability in the Android media library that allows attackers to send a multimedia text messages that enable them to steal information off of a device. How can an attacker use Stagefright? Using a victim's phone number, an attacker only has to send the malware-infected multimedia file to a device […]
Checkpoint.webp 2015-08-06 16:46:02 Certifi-gate: Hundreds of Millions of Android Devices Could Be Pwned (lien direct) (This post was edited to include additional remediation advice on August 10, 2015.) Check Point today released details about Certifi-gate, a previously unknown vulnerability in the architecture of popular mobile Remote Support Tools (RSTs) used by virtually every Android device manufacturer and network service provider. The Check Point mobile threat research team disclosed its findings […]
Checkpoint.webp 2015-08-06 13:30:28 Introducing Check Point Mobile Threat Prevention (lien direct) [Click here to learn more about today’s Certifi-gate Threat Advisory.] Introducing Check Point Mobile Threat Prevention We're more mobile than we've ever been, so it's no surprise that smartphones and tablets aren't our second screens, they're our first. These devices move massive amounts of data around the clock and around the world, and while some […]
Checkpoint.webp 2015-08-05 14:24:41 Threat Alert: BIND DNS Server TKEY Vulnerability (lien direct) Recent Bind9 Vulnerability could be used to shut down large parts of the Internet   The Check Point Incident Response Team (CPIRT) has received numerous reports of automated scans across the internet attempting to exploit the recently released BINDS DNS TKEY Vulnerability (CVE-2015-5477). This vulnerability allows a denial of service attack (DoS) against BIND DNS […]
Checkpoint.webp 2015-08-04 13:30:05 Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part I (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […] Guideline
Checkpoint.webp 2015-07-30 15:00:55 Check Point to Uncover Certifi-gate, A New Android Threat, at Black Hat USA 2015 (lien direct) Check Point to Uncover A New Threat to Millions of Android Devices Seizing control of and stealing information from Android devices is nothing new for sophisticated hackers. But what if the vulnerabilities they depend on were being made available by those you trust most to protect your privacy and sensitive data? Join Check Point researchers […]
Last update at: 2024-05-07 23:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter