The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Check Point Delivers Advanced Cloud Security to Google Cloud Platform
“As we currently utilize a variety of Google services, it was a natural fit for us to build our new cloud environment around Google Cloud Platform,” said Günther Oberhofer, Head of Networks and Communications, Conrad Electronic SE. “Enabling strong security was also a key part of that strategy. Check Point vSEC lets us securely leverage the cloud to its fullest capabilities, extending our on-premise data center while protecting critical assets from external and internal threats, all while achieving speed, agility and cost-savings offered by Google Cloud Platform.”
Hummingbad Overtaken as Leading Mobile Malware in January’s Global Threat Impact Index
Hummingbad was replaced at the top of the ‘most wanted mobile malware’ by Triada, a modular backdoor for Android which grants super-user privileges to downloaded malware, as helps it to get embedded into system processes. In total, mobile malware accounted for 9% of all recognized attacks while the Index ranked Kelihos, a botnet used in bitcoin theft, as the most prevalent malware family overall, with 5% of organizations globally is impacted by it.
Check Point’s Global Threat Index Shows Ransomware Attacks Spike in November
Check Point found both the number of active malware families and number of attacks remained close to an all-time high as the number of attacks on business networks continued to be relentless. Continuing a trend first detected in October, Locky ransomware continued to increase in prevalence with a further 10% increase in the number of attacks using this family – a pattern that was mirrored by the fifth most common malware, Cryptowall.
Check Point’s Global Threat Index Shows Malware Attacks are on the Rise
Check Point’s Threat Intelligence Research Team found that both the number of active malware families and number of attacks increased by 5% during the period, pushing the number of attacks on business networks to near peak levels, as seen earlier this year. Locky ransomware attacks continued to rise, moving it up from third to second place, while the Zeus banking trojan moved up two spots, returning it to the top three. The reason for Locky’s continued growth is the constant variation and expansion of its distribution mechanism, which is primarily through spams emails. Its creators are continually changing the type of files used for downloading the ransomware, including doc, xls and wsf files, as well as making significant structural changes to the spam emails. The actual ransomware itself is nothing exceptional, but cyber criminals are investing a lot of time into maximizing the number of machines that become infected by it. For the seventh consecutive month, HummingBad, an android malware that establishes a persistent rootkit to carry out an array of malicious purposes, remained the most common malware used to attack mobile devices.
Check Point Wins Third-Straight ‘Recommended’ Rating in 2016 from NSS Labs
“The main reason businesses invest and build security systems is to prevent hackers and malware from getting into their networks and systems. True protection can only be achieved with technology that offers the best block rate in the industry,” said Gabi Reish, vice president of product management and marketing, Check Point. “Receiving the highest block rating from NSS Labs is a testament to our on-going commitment to deliver the most effective security products to keep our customers one step ahead of threats and hackers.”
New Check Point Research Reveals Enterprises Battling 9x More Unknown Malware; Employees Download New Malware Every Four Seconds
In the recent SANS 2016 Threat Landscape Study, conducted in partnership with security education and research group SANS Institute, researchers surveyed more than 300 IT and security professionals across the globe to uncover the threats organizations encounter in the real world; when and how they become incidents; which types of threats had the biggest impact; and the greatest challenges enterprises face in protecting themselves.
Check Point Research Shows Drop in Traditional Malware, Rise in Mobile Malware
In July, Conficker was the most prominent family accounting for 13 percent of recognized attacks; second placed JBossjmx accounted for 12 percent; and third placed Sality was responsible for 8 percent. The top ten families were responsible for 60 percent of all recognized attacks.
Check Point Researchers Unravel Complex Money Trail of ‘Cerber,’ One of the World’s Largest Active Ransomware Campaigns
In a 60-page report, Check Point’s Threat Intelligence and Research Team, along with research partner IntSights Cyber Intelligence, identify new details and analysis on Cerber’s technical and business operation, revealing:
Check Point Introduces First Real-Time Zero-Day Protection for Web Browsers
“As cyberattacks are growing in their complexity and frequency, enterprises are increasingly at risk of falling victim to a wide range of browser-based attacks,” said Nathan Shuchami, head of advanced threat prevention, Check Point. “Existing technologies ask users to wait for content to be evaluated, or require multiple, intrusive software installations on every system. SandBlast Agent for Browsers brings the highest level of protection to users in a simple browser plug-in that blocks unknown and zero-day malware delivered via web downloads, while quickly delivering safe content within seconds.”
Check Point Software Technologies Reports 2016 Second Quarter Financial Results
“We had a good second quarter with results toward the high-end of our expectations. Our newly launched security appliance lines optimized for threat prevention were embraced by customers and resulted in a marked increase in unit sales,” said Gil Shwed, founder and chief executive officer, Check Point. “In addition, our advanced threat prevention and zero-day malware protection software experienced high-growth and contributed to the acceleration in our software blades subscriptions revenues.”