Check Point
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103749/fire-400x200.jpg)
Cryptomining malware digs into nearly 40% of organizations worldwide
Check Point published its latest Global Threat Index for May 2018, revealing that the Coinhive cryptominer impacted 22% of organizations globally – up from 16% in April, an …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103838/telegram-400x200.jpg)
Cybercriminals are turning to Telegram due to its security capabilities
Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
Dig this: The future of crypto-mining botnets
The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Researchers discover next generation phishing kit
Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. A posting on the Dark Net that advertises …
![power](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101825/power-400x200.jpg)
Cryptomining malware continues to drain enterprise CPU power
Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global …
![smartphone isolation](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101952/smartphone-isolation-400x200.jpg)
The future of smartphone security: Hardware isolation
Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they …
![finance biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104705/finance-biohazard-400x200.jpg)
Rise in cryptomining malware impacts organizations worldwide
Cybercriminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and malvertising adware continue to impact organizations …
![Android explode](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103322/android-explode-400x200.jpg)
Google removes 60+ fake game apps displaying porn ads from Google Play
Google has removed some 60+ game apps from Google Play, as they were found to contain code that either delivered inappropriate and pornographic ads, attempted to trick users …
![meltdown](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102251/meltdown-400x200.jpg)
Meltdown and Spectre: To patch or to concentrate on attack detection?
Patching to protect machines against Meltdown and Spectre attacks is going slow, and the provided patches, in some instances, lead to more problems than just slowdowns. In …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft plugs 56 vulns, including Office flaw exploited in attacks
As part of the January 2018 Patch Tuesday, Microsoft has released fixes for 56 CVE-listed vulnerabilities, including the Meltdown and Spectre flaws, and an Office bug actively …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
Return of Necurs botnet brings new ransomware threat
The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check …
![LG HomeHack](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102809/lg-homehack-400x200.jpg)
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device
Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege