Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Check Point Research

Below you will find reports with the source of “Check Point Research”

image from Cyber Security Report 2022

Cyber Security Report 2022

The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. (more available)
Added: September 29, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is based on a comprehensive survey of 775 cybersecurity professionals conducted in January 2022, to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: August 26, 2022
image from 2022 Cyber Attack Trends: Mid-Year Report

2022 Cyber Attack Trends: Mid-Year Report

In this report we take a closer look at how cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. (more available)
Added: August 26, 2022
image from 2020 Cyber Security Report

2020 Cyber Security Report

Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. (more available)
Added: May 21, 2020
image from Naikon APT: Cyber Espionage Reloaded

Naikon APT: Cyber Espionage Reloaded

In the following report, Naikon describes the tactics, techniques, procedures and infrastructure that have been used by the Naikon APT group over the 5 years since the last report, and offer some insight into how they were able to remain under the radar. (more available)
Added: May 18, 2020
image from 2019 Security Report: Welcome To The Future of Cyber Security

2019 Security Report: Welcome To The Future of Cyber Security

From the Report, “This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. (more available)
Added: March 6, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. (more available)
Added: February 7, 2019
image from Cyber Attack Trends Analysis

Cyber Attack Trends Analysis

From the report, “With data drawn from our ThreatCloud World Cyber Threat Map and our experience within the cyber research community, we will give a comprehensive overview of the trends observed in the categories of Cryptominers, Ransomware, Malware techniques, Data Breaches, Mobile and Nation State cyber attacks. (more available)
Added: January 24, 2019
image from 2016 Security Report

2016 Security Report

This document details how and why a company should be proactively scanning internal networks, segmenting network elements, and requiring multi-factor authentication also helps ensure security. (more available)
Added: October 26, 2018
image from Cyber Attack Trends: 2018 Mid Year Report

Cyber Attack Trends: 2018 Mid Year Report

In this 2018 Mid-Year Report, they take a look at how so far this year, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication and a new level of agility. (more available)
Added: October 19, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.
Added: October 18, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. (more available)
Added: October 17, 2018
image from NTLM Credentials Theft Via PDF Files

NTLM Credentials Theft Via PDF Files

This article takes a look at a vulnerability that allows theft via PDF files.
Added: October 16, 2018
image from MMap Vulnerabilities - Linux Kernel

MMap Vulnerabilities - Linux Kernel

This article reviews the Linux Kernel, mainly searching for vulnerabilities in different drivers. In this particular article, they took a look into drivers trying to roll their own usage of the mmap() function. (more available)
Added: October 15, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.
Added: October 14, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net. (more available)
Added: October 13, 2018
image from A Crypto Mining Operation Unmasked

A Crypto Mining Operation Unmasked

This article provides an insightful report on a CryptoMining Operation.
Added: October 12, 2018
© Cyentia Institute 2023
Library updated: February 1, 2023 20:09 UTC (build 051771c)