• Reverse Microsoft RDP Attack: the Path not Taken

    Omri Herscovici, Vulnerability Research Team Leader at Check Point Software Technologies Security researchers at Check Point identified a vulnerability in the core Window’s function protecting against an attack type known as Path-Traversal. The technical name of that core function is “PathCchCanonicalize”, and it stands as the official API that Windows recommends to developers for defence…


  • Is your Hospital Prepared for the Next Cyber Attack?

    By: Dana Katz, Head of Product Marketing, Threat Prevention at Check Point Software Technologies Today, hospitals are connected like never before with cloud, mobile, and IoT technologies that improve their efficiency and quality of service. However, these changes have punched holes in the “good old” security perimeter and have created more entry points for hackers…


  • 2020 APAC Threat Predictions: Secure mobile devices better, improve threat intel against new techniques from APT groups

    Keep your mobile phone free of Coronavirus, both inside & outside

    By: Check Point Research Technologies Over the past month, many articles have been published recommending that we keep our mobile phones clean to reduce the risk of Coronavirus infection.  While there’s still some debate over whether it’s necessary to clean your phone case and screen to get rid of possible germs, it’s a good idea…


  • Kaspersky extends cooperation with INTERPOL in the joint fight against cybercrime

    February 2020’s Most Wanted Malware: Increase in Exploits Spreading the Mirai Botnet to IoT Devices

    SINGAPORE – MARCH 12TH, 2020 – Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, has published its latest Global Threat Index for February 2020.  February saw a large increase in exploits targeting a vulnerability to spread the Mirai botnet, which is notorious for infecting…


  • Android

    Is the Google Play Store Safe? Not Yet.

    By Ran Schwartz, Product Manager, Threat Prevention Over recent years, there has been a lot of activity on Google’s part to improve the security of its Google Play app store. Why? Because millions of users have inadvertently downloaded thousands of malicious applications from the store which have compromised their data including SMS, credentials, photos, calendars…


  • Industry experts share thoughts on MAS’s new rules

    The Monetary Authority of Singapore (MAS) has released a new set of requirements to raise the cybersecurity standards in the financial industry. These legally binding requirements also aim to strengthen the cyber resilience of financial organisations against the attacks. Sharing their thoughts on the latest move by the MAS are Olli Jarva, Managing Consultant at…


  • Fortnite on mobile

    Fortnite’s vulnerability exposed

    Researchers at Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, has shared details of vulnerabilities that could have affected any player of the hugely popular online battle game, Fortnite. Fortnite has nearly 80 million players worldwide. The game is popular on all gaming platforms, including Android, iOS, PC via Microsoft Windows and…