research.checkpoint.com Open in urlscan Pro
141.193.213.20  Public Scan

URL: https://research.checkpoint.com/about-us/
Submission: On January 05 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * CheckPoint.com
 * 
 * 
 * 
 * 
 * 
 * 

 * Publications
   * Threat Research
   * CPRadio
   * Attack Reports
 * Tools
   * CPR Zero- Vulnerability Repository
   * Evasion techniques Encyclopedia
   * Anti-Debug Tricks
   * SandBlast File Analysis
   * How-To Guides
   * URL Categorization
   * Instant Security Assessment
   * Live Threat Map
 * About Us
 * Contact Us
 * Subscribe
 * 

MENU



ABOUT US

Check Point Research provides leading cyber threat intelligence to Check Point
Software customers and the greater intelligence community. The research team
collects and analyzes global cyber attack data stored on ThreatCloud to keep
hackers at bay, while ensuring all Check Point products are updated with the
latest protections. From the moment a breach is initiated, ThreatCloud begins
sharing data across the entire network, providing researchers with the
intelligence they need to deeply analyze and report on attacks. Check Point
Research publications and intelligence sharing fuel the discovery of new cyber
threats and the development of the international threat intelligence community
to keep you secure.

--------------------------------------------------------------------------------


LEADING THE THREAT INTELLIGENCE COMMUNITY

The research team consists of over 100 analysts and researchers cooperating with
other security vendors, law enforcement and various CERTs. Their data sources
includes open sources, the ThreatCloud network and dark web intelligence.
Internally, the team has developed their own machine learning modules, anomaly
detection, reverse engineering and campaign hunting techniques that all assist
in staying ahead of hackers and the latest cyber threats. You can follow all our
latest research on Twitter.

If you would like to collaborate or hear more about our research we would love
to hear from you. Please feel free to contact us through Twitter or our Contact
Page.

--------------------------------------------------------------------------------

NOTABLE RESEARCH PUBLICATIONS BY CHECK POINT RESEARCH

2019 – 2020

 * Hacking Fortnite Accounts  
 * Reverse RDP attacks: Code Execution on RDP Clients
 * Operation Tripoli
 * EA Games Vulnerability 
 * Microsoft Management Console (MMC) Vulnerabilities 
 * We Decide What You See: Remote Code Execution on a Major IPTV Platform
 * UPSynergy: Chinese-American Spy vs. Spy Story
 * Say Cheese: Ransomware-ing a DSLR Camera
 * Agent Smith: A new Species of Mobile Malware
 * The Eye on the Nile
 * Mappint the connections inside Russia’s APT Ecosystem
 * Zoom-Zoom: We Are Watching You 
 * The 2020 Cyber Security Report
 * Tik or Tok? Is TikTok secure enough?
 * Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud
   Infrastructure
 * Vicious Panda: The COVID Campaign

 

2018

 * Domestic Kitten: An Iranian Surveillance Operation
 * Interactive Map of APT-C-23
 * Ryuk Ransomware: A Targeted Campaign Breakdown
 * Faxploit: Hacking Fax Machines to Enter an IT Network
 * Man-In-The-Disk Android Vulnerabilities
 * FakesApp: Vulnerabilities in WhatsApp
 * Ramnit’s Network of Proxy Servers
 * Malvertising Campaign of Secrets and Lies
 * GlanceLove: Under the Cover of the World Cup
 * Cyber Trends Mid-Year Report
 * Remote Code Execution on LG Phones
 * SiliVaccine: Inside North Korea’s Anti-Virus
 * CryptoMining Operation Unmasked
 * NTLM Credentials Theft via PDF Files
 * A New Phishing Kit on the Dark Net
 * Uncovering Drupalgeddon 2
 * RottenSys: Not a Secure Wifi Service At All
 * The GandCrab Ransomware Mindset
 * Jenkins Miner
 * AdultSwine: Malware Displaying Porn on Kids Mobile Apps

2017

 * Huawei Home Routers in Botnet Recruitment
 * Christmas is Coming, The Criminals Await
 * IoT Botnet – Full Investigation
 * Bad Rabbit – Full Investigation
 * IoT Botnet Storm Is Coming
 * Brazilian Bankingware
 * EternalBlue – Everything There Is To Know
 * ExpensiveWall
 * Beware Of The Bashware
 * Malware Hiding In Your Resume
 * Get Rich or Die Trying
 * JavaScript Lost in Dictionary
 * OSX/DOK
 * WannaCry Registered Killswitch
 * Lost in Translation
 * Fireball – Led to eventual apprehension of attack perpetrators

2016

 * EZCast Vulnerability
 * HummingBad
 * Sidestepper
 * VikingHorde
 * QuadRooter
 * DressCode
 * ImageGate
 * Gooligan
 * Check Point Research was also the first to reveal the infrastructure and
   operations behind the Cerber ransomware and the Nuclear Exploit Kit.



CHECK POINT BLOG

 * Achilles: Small chip, big peril.
 * How scammers are hiding their phishing trips in public clouds
 * Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix
   Vanity URL issue
 * Nexus Zeta – From Suspicious Alerts to Conviction
 * As organizations get back to business, cyber criminals look for new angles to
   exploit

Publications
 * GLOBAL CYBER ATTACK REPORTS
 * RESEARCH PUBLICATIONS
 * IPS ADVISORIES
 * CHECK POINT BLOG
 * DEMOS

Tools
 * SANDBLAST FILE ANALYSIS
 * URL CATEGORIZATION
 * INSTANT SECURITY ASSESSMENT
 * LIVE THREAT MAP

About Us
Contact Us
Subscribe

© 1994-2022 Check Point Software Technologies LTD. All rights reserved.
Property of CheckPoint.com | Privacy Policy

×

We'd like to show you notifications for the latest news and updates.


AllowCancel