research.checkpoint.com
Open in
urlscan Pro
141.193.213.20
Public Scan
URL:
https://research.checkpoint.com/about-us/
Submission: On January 05 via api from US — Scanned from DE
Submission: On January 05 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* CheckPoint.com * * * * * * * Publications * Threat Research * CPRadio * Attack Reports * Tools * CPR Zero- Vulnerability Repository * Evasion techniques Encyclopedia * Anti-Debug Tricks * SandBlast File Analysis * How-To Guides * URL Categorization * Instant Security Assessment * Live Threat Map * About Us * Contact Us * Subscribe * MENU ABOUT US Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. From the moment a breach is initiated, ThreatCloud begins sharing data across the entire network, providing researchers with the intelligence they need to deeply analyze and report on attacks. Check Point Research publications and intelligence sharing fuel the discovery of new cyber threats and the development of the international threat intelligence community to keep you secure. -------------------------------------------------------------------------------- LEADING THE THREAT INTELLIGENCE COMMUNITY The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs. Their data sources includes open sources, the ThreatCloud network and dark web intelligence. Internally, the team has developed their own machine learning modules, anomaly detection, reverse engineering and campaign hunting techniques that all assist in staying ahead of hackers and the latest cyber threats. You can follow all our latest research on Twitter. If you would like to collaborate or hear more about our research we would love to hear from you. Please feel free to contact us through Twitter or our Contact Page. -------------------------------------------------------------------------------- NOTABLE RESEARCH PUBLICATIONS BY CHECK POINT RESEARCH 2019 – 2020 * Hacking Fortnite Accounts * Reverse RDP attacks: Code Execution on RDP Clients * Operation Tripoli * EA Games Vulnerability * Microsoft Management Console (MMC) Vulnerabilities * We Decide What You See: Remote Code Execution on a Major IPTV Platform * UPSynergy: Chinese-American Spy vs. Spy Story * Say Cheese: Ransomware-ing a DSLR Camera * Agent Smith: A new Species of Mobile Malware * The Eye on the Nile * Mappint the connections inside Russia’s APT Ecosystem * Zoom-Zoom: We Are Watching You * The 2020 Cyber Security Report * Tik or Tok? Is TikTok secure enough? * Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure * Vicious Panda: The COVID Campaign 2018 * Domestic Kitten: An Iranian Surveillance Operation * Interactive Map of APT-C-23 * Ryuk Ransomware: A Targeted Campaign Breakdown * Faxploit: Hacking Fax Machines to Enter an IT Network * Man-In-The-Disk Android Vulnerabilities * FakesApp: Vulnerabilities in WhatsApp * Ramnit’s Network of Proxy Servers * Malvertising Campaign of Secrets and Lies * GlanceLove: Under the Cover of the World Cup * Cyber Trends Mid-Year Report * Remote Code Execution on LG Phones * SiliVaccine: Inside North Korea’s Anti-Virus * CryptoMining Operation Unmasked * NTLM Credentials Theft via PDF Files * A New Phishing Kit on the Dark Net * Uncovering Drupalgeddon 2 * RottenSys: Not a Secure Wifi Service At All * The GandCrab Ransomware Mindset * Jenkins Miner * AdultSwine: Malware Displaying Porn on Kids Mobile Apps 2017 * Huawei Home Routers in Botnet Recruitment * Christmas is Coming, The Criminals Await * IoT Botnet – Full Investigation * Bad Rabbit – Full Investigation * IoT Botnet Storm Is Coming * Brazilian Bankingware * EternalBlue – Everything There Is To Know * ExpensiveWall * Beware Of The Bashware * Malware Hiding In Your Resume * Get Rich or Die Trying * JavaScript Lost in Dictionary * OSX/DOK * WannaCry Registered Killswitch * Lost in Translation * Fireball – Led to eventual apprehension of attack perpetrators 2016 * EZCast Vulnerability * HummingBad * Sidestepper * VikingHorde * QuadRooter * DressCode * ImageGate * Gooligan * Check Point Research was also the first to reveal the infrastructure and operations behind the Cerber ransomware and the Nuclear Exploit Kit. CHECK POINT BLOG * Achilles: Small chip, big peril. * How scammers are hiding their phishing trips in public clouds * Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix Vanity URL issue * Nexus Zeta – From Suspicious Alerts to Conviction * As organizations get back to business, cyber criminals look for new angles to exploit Publications * GLOBAL CYBER ATTACK REPORTS * RESEARCH PUBLICATIONS * IPS ADVISORIES * CHECK POINT BLOG * DEMOS Tools * SANDBLAST FILE ANALYSIS * URL CATEGORIZATION * INSTANT SECURITY ASSESSMENT * LIVE THREAT MAP About Us Contact Us Subscribe © 1994-2022 Check Point Software Technologies LTD. All rights reserved. Property of CheckPoint.com | Privacy Policy × We'd like to show you notifications for the latest news and updates. AllowCancel