Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Check Point Research

Below you will find reports with the source of “Check Point Research”

image from The State of CyberSecurity 2025

The State of CyberSecurity 2025

This report highlights the real-world impact of these changes, offering 2025 insights and recommendations from and for CISCOs. With over a decade of analysis, Check Point Research insights come from unparalleled data sources that no other company combines. By incorporating incident response, dark web, and open-source findings, we achieve visibility in over 170 countries to reveal global and regional trends.

(more available)
Added: February 12, 2025
image from 2024 Cyber Security Report

2024 Cyber Security Report

This report looks back at the major cyber security events of 2023, offering insights and analysis to help understand and prepare for the challenges ahead. Our goal is to provide valuable information to organizations, policy makers, and cyber security professionals, helping them to build stronger defenses in an increasingly digital world. Check Point Research reports that threat actors in hacking forums have started making use of AI tools like ChatGPT, in order to create malware and attack tools such as info-stealers and encryptors.

(more available)
Added: August 21, 2024
image from 2023 Cyber Security Report

2023 Cyber Security Report

In our Security Report, we discuss a few more trends observed by cp throughout the year. The Russia-Ukraine war demonstrated how the traditional, kinetic, war can be augmented by a cybernetic war. It has also influenced the broader threat landscape in the rapid changes of hacktivism and how independent threat actors choose to work for state-affiliated missions.

(more available)
Added: July 22, 2023
image from Cyber Security Report 2022

Cyber Security Report 2022

The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. Education and Research were revealed as the most targeted sector. The report gives a detailed overview of the cyber threat landscape and recommendations on how to prevent the next cyber pandemic.

(more available)
Added: September 29, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is based on a comprehensive survey of 775 cybersecurity professionals conducted in January 2022, to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: August 26, 2022
image from 2022 Cyber Attack Trends: Mid-Year Report

2022 Cyber Attack Trends: Mid-Year Report

In this report we take a closer look at how cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. Furthermore, we uncover what the fallout of this will be for governments and enterprises all over the world, even those that are not directly involved in the conflict.

(more available)
Added: August 26, 2022
image from 2020 Cyber Security Report

2020 Cyber Security Report

Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, the authors offer a review of 2019’s major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep organizations safe from cyber attacks.

(more available)
Added: May 21, 2020
image from Naikon APT: Cyber Espionage Reloaded

Naikon APT: Cyber Espionage Reloaded

In the following report, Naikon describes the tactics, techniques, procedures and infrastructure that have been used by the Naikon APT group over the 5 years since the last report, and offer some insight into how they were able to remain under the radar.

(more available)
Added: May 18, 2020
image from 2019 Security Report: Welcome To The Future of Cyber Security

2019 Security Report: Welcome To The Future of Cyber Security

From the Report, “This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. We provide an assessment of threat events by organization size and industry, and examine threat incident patterns identified through guidance from security specialists. We also further explore inbound activity to our honeypot network to identify trends and patterns that reveal rising new threats, such as Android Debug Bridge (ADB) activity, the persistence of old threats such as EternalBlue, and the vulnerability posed by non-novel credentials as revealed to publicly exposed systems. The report concludes with five steps you can take to bolster your organization’s security posture in 2019 and beyond, based on our findings.”

(more available)
Added: March 6, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. We assessed the major incidents that impacted organizations over the past year along with our commentary and insights regarding them. These trends fell into the categories of Cryptominers, Ransomware, Malware Methodology, Data Breaches, Mobile and Nation State Cyber Attacks. In this installment we zone in on an underlying trend that lies behind all of the above categories, the democratization of cyber crime.” Read on to find out more.

(more available)
Added: February 7, 2019
image from Cyber Attack Trends Analysis

Cyber Attack Trends Analysis

From the report, “With data drawn from our ThreatCloud World Cyber Threat Map and our experience within the cyber research community, we will give a comprehensive overview of the trends observed in the categories of Cryptominers, Ransomware, Malware techniques, Data Breaches, Mobile and Nation State cyber attacks. We will then conclude with a review of the predictions made in our 2018 Security Report and assess to what extent these proved accurate. Along the way we will also provide cutting edge analysis from our in-house experts to arrive at a better understanding of today’s threat landscape.”

(more available)
Added: January 24, 2019
image from 2016 Security Report

2016 Security Report

This document details how and why a company should be proactively scanning internal networks, segmenting network elements, and requiring multi-factor authentication also helps ensure security.

(more available)
Added: October 26, 2018
image from Cyber Attack Trends: 2018 Mid Year Report

Cyber Attack Trends: 2018 Mid Year Report

In this 2018 Mid-Year Report, they take a look at how so far this year, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication and a new level of agility. Indeed, as seen in this analysis of the GrandCrab ransomware, malware is now rapidly adapting in real-time to the technology solutions offered by security vendors.

(more available)
Added: October 19, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.

Added: October 18, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

(more available)
Added: October 17, 2018
image from NTLM Credentials Theft Via PDF Files

NTLM Credentials Theft Via PDF Files

This article takes a look at a vulnerability that allows theft via PDF files.

Added: October 16, 2018
image from MMap Vulnerabilities - Linux Kernel

MMap Vulnerabilities - Linux Kernel

This article reviews the Linux Kernel, mainly searching for vulnerabilities in different drivers. In this particular article, they took a look into drivers trying to roll their own usage of the mmap() function.

(more available)
Added: October 15, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.

(more available)
Added: October 14, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
image from A Crypto Mining Operation Unmasked

A Crypto Mining Operation Unmasked

This article provides an insightful report on a CryptoMining Operation.

Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)