Saturday, July 13, 2019

X by Orange Guarantees Cloud Security for Clients with Check Point CloudGuard

Moti Sagey may be the Mind of Proper Marketing & Intelligence at Check Point Software.  Moti accounts for strategically transforming intelligence and knowledge right into a compelling and resonating story, enabling Check Indicate provide its customers with disruptive technologies which are a measure in front of threats and competitors.

José María San José may be the CTO and CIO for X by Orange-a subsidiary of Orange The country. We swept up with him to listen to how X by Orange is facilitating use of digital services for clients across The country and also the role that Check Point CloudGuard IaaS plays in the new cloud security services.

The Orange Group is really a world leader in corporate telecommunications services, and among the largest operators of mobile and internet services in Europe and Africa. X by Orange may be the branded trademark of Orange Business to business Technology, a subsidiary of Orange The country. Created promote the development of medium and small companies, it uses the cloud to change and digitize communications.

What were your needs for cloud security?


I was developing two new items for SMB clients, X-Privacy and X-Security. We wanted a cloud security solution yet another easy meal to handle and may instantly safeguard clients’ corporate data from known and unknown cyber threats without requiring around-the- clock hands-on management. We needed excellent support in the vendor across The country.



Which Check Point solutions would you use?


We depend on Check Point CloudGuard for AWS within our X-Security service. It analyzes and filters all internet traffic across all sites and makes certain that all communications are encrypted, authenticated, and guarded through cloud firewalls. Real-time sandboxing and cloud-based threat intelligence prevent threats from reaching clients and affecting their operations.

We use Check Point ZoneAlarm for the X-Protection service, which protects clients’ devices. X-Protection provides anti-virus and anti-ransomware abilities as well as an advanced mobile protection module for android and ios cellular devices.

Why have you choose Check Point?


Check Point passed a very competitive buying process. We examined the marketplace to narrow lower the competitors after which assessed several vendors against strict criteria, including the amount of features as well as their degree of security sophistication. Check Point delivered everything we wanted-robust security defenses along with easy implementation and management-to construct into our services.

Our customers are now positive about their protection plus they don’t need to bother about the safety features, connectivity or threat activity. The answer provides real-time prevention and also the services will always be current with emerging threats. Dealing with Check Point continues to be answer to our success using the services. Check Point continues to be dedicated to the work in the start, and every one of us in the market understand how essential that is.

Thursday, July 11, 2019

New 16000 and 26000 Security Gateways

In 2018, over 2 billion people and 46% of companies were influenced by cyber-attacks.

In 2019, we have seen this trend expanding with Gen V attacks growing in sophistication, utilizing multiple attack surfaces and vectors. To create matters much more challenging is coping with the 30 % rise in traffic loads on the systems along with the truth that over 90 % of internet visitors are encrypted with HTTPS. Regrettably, current security solutions are unaware of all this traffic and not able to correctly inspect SSL encrypted traffic.

Check Point introduces two new security gateways: 16000 and 26000 Security Gateways. Enterprises all over the world are now able to safeguard themselves with as many as 1 Tera-bps of Threat Prevention performance.

These new appliances bring together three primary advantages to achieve hyperscale network security:

  1. Greatest Security Effectiveness -integrated with R80.30 and ThreatCloud setting a brand new standard of prevention against advanced fifth generation cyber attacks.
  2. Condition-of-the-Art SSL Inspection - Threat prevention that gives lightning fast SSL-encrypted traffic inspection without compromising up time or scalability
  3. 1 Tera bps of Gen V Performance - Hyperscale ready, high end threat prevention hardware for that fastest Gen V security gateway in the market


Operated by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways provide the industry’s best network threat prevention including Check Point’s ThreatCloud and award-winning SandBlast™ Zero-Day Protection.  These modular gateways deliver as much as 24 Gbps of Threat Prevention security throughput, support connectivity standards as much as 100 Gbe, and have expansion options for approximately 64 network interfaces.



The Check Point 16000 and 26000 really are a new generation of high end Security Gateways for that enterprise market segment. Using the new appliances, enterprise customers can enable advanced threat prevention and inspect for threats within TLS encrypted traffic.

Achieving 1 Terabit-per-second: Go into the Maestro Hyperscale Orchestrator


Check Point Maestro Hyperscale Orchestrator, the industry’s first hyperscale network security solution, enables just one Check Point gateway to grow towards the capacity and gratifaction of 52 gateways within a few minutes. This nearly unlimited scalability enables cloud-level resilience and reliability together with Terabit/second firewall throughput, allowing organizations to aid 5G network high data rates and ultra-low latency while securing probably the most demanding network computing workloads.

This mixture from the R80.30 software, 16000/26000 Security Gateways, and also the Maestro Orchestrator enables Check Point enterprises everywhere to attain hyperscale network security with tera-bit amounts of threat prevention performance.

Tuesday, July 9, 2019

May 2019’s Most Wanted Malware: Patch Now to Avoid the BlueKeep Blues

In May, the most important event within the threat landscape wasn't a brand new kind of adware and spyware:  it had been a significant vulnerability in older versions of Home windows os's that - if exploited by crooks - can lead to the kind of mega-scale ransomware attacks we had in 2017 with WannaCry and NotPetya.

The vulnerability may be the ‘BlueKeep’ Microsoft RDP flaw (CVE-2019-0708) in Home windows 7 and Home windows Server 2008 machines, which affects nearly a million machines available to the general public internet, and much more within organizations’ systems.  The main reason this vulnerability is crucial since it requires no user interaction to become exploited.  RDP has already been a recognised, popular attack vector that has been accustomed to install ransomware for example Samsam and Dharma.

Our researchers are presently seeing many checking attempts for that flaw, via a number of different countries globally, which may be the initial reconnaissance phase of the attack. A single computer with this particular flaw may be used to generate a malicious payload that infects a whole network. Then all infected computers with Access to the internet can infect other vulnerable devices worldwide - enabling the attack to spread tremendously, in an unstoppable pace.

So it’s crucial that organizations safeguard themselves - yet others - by patching the flaw now, before it’s far too late.  Additionally towards the relevant Microsoft patches, Check Point is supplying both network and endpoint protections for this attack.



Other significant adware and spyware news in May was the developers from the GandCrab Ransomware-as-a-Service affiliate marketing program announcing other family members . from the month that they are ceasing operation, and asking their affiliates to prevent disbursing the ransomware within 20 days. The operation continues to be active since The month of january 2018, as well as in just two several weeks had infected 50 plus,000 victims. Total earnings because of its developers and affiliates are claimed to stay in the vast amounts of dollars.  A normal within the Top Ten Popular Index, Gandcrab was frequently updated with new abilities to evade recognition tools.

May 2019’s Best Three ‘Most Wanted’ Adware and spyware:


The 3 most prominent Cryptominers - Cryptoloot, XMRig and JSEcoin still top the adware and spyware index, each having a global impact of fourPercent.


  1. Cryptoloot - Crypto-Miner, while using victim’s CPU or GPU power and existing sources for crypto mining - adding transactions towards the blockchain and releasing new currency. It had been a rival to Coinhive, attempting to pull the rug under it by asking less percent of revenue from websites.
  2. XMRig - Open-source CPU mining software employed for the mining procedure for the Monero cryptocurrency, and first observed in-the-wild on May 2017.
  3. JSEcoin - JavaScript miner that may be baked into websites. With JSEcoin, you are able to run the miner directly inside your browser in return for an advertisement-free experience, in-game currency along with other incentives.
  4.  Emotet - Advanced, self-propagate and modular Trojan viruses. Emotet once accustomed to employ like a banking Trojan viruses, and lately can be used like a distributer with other adware and spyware or malicious campaigns. It uses multiple means of maintaining persistence and  Evasion strategies to avoid recognition. Additionally, it may be spread through phishing junk e-mail emails that contains malicious attachments or links.
  5. Ramnit- Banking Trojan viruses that steals banking credentials, FTP passwords, session cookies and private data.
  6.  Lokibot- Lokibot is definitely an Info Stealer distributed largely by phishing emails, and it is accustomed to steal various data for example email credentials, in addition to passwords to CryptoCoin wallets and FTP servers.
  7. Dorkbot- IRC-based Earthworm made to allow remote code execution by its operator, along with the download of more adware and spyware towards the infected system.
  8. Trickbot- Trickbot is really a dominant banking Trojan viruses constantly being updated with new abilities, features and distribution vectors. This permits Trickbot to become a flexible and customizable adware and spyware that may be distributed included in multi purposed campaigns.
  9. Nivdort -Multipurpose bot, also referred to as Bayrob, which is used to gather passwords, modify system settings and download additional adware and spyware. It is almost always spread via junk e-mail emails using the recipient address encoded within the binary, thus making each file unique.
  10. Agentesla- AgentTesla is definitely an advanced RAT functioning like a keylogger along with a password stealer.AgentTesla is capable of doing monitoring and collecting the victim’s keyboard input, system clipboard, taking screenshots, and exfiltrating credentials owned by of a number of software placed on a victim’s machine (including Google Chrome, Mozilla Firefox and Microsoft Outlook email client).

Sunday, July 7, 2019

Introducing Malware DNA: Gaining Deep Insights into Malware Ancestry

Just one drop of bloodstream contains vast amounts of strands of DNA, transporting genetic instructions for that development, functioning, growth, and reproduction of known microorganisms. DNA holds the inspiration of existence.

Similarly, the lines of adware and spyware code from the foundations of cyber threats. Sophisticated cyberattacks threaten enterprises constantly putting sensitive data, privacy, and business operations in danger.

Check Point SandBlast Network detects and blocks formerly unknown and undiscovered adware and spyware, also referred to as a zero-day. To be able to stop these cyberattacks right where they are, Check Point offers Threat Emulation, an  innovative zero-day sandboxing technology, leveraged by Check Point’s SandBlast Network solution. It delivers the perfect catch rate for threats and it is virtually safe from all evasive attack techniques.

To protect against zero-day attacks, a danger Emulation report is produced for each file which goes through its sandbox. The report includes more information about any malicious attempt recorded by running the file within the sandbox. The Threat Emulation report can also be enriched with threat intelligence directly given from Check Point ThreatCloud, the world’s largest threat intelligence source of all IT surfaces - cloud, network, endpoints, and cellular devices.

How's this attached to the DNA of cyber threats?


Interestingly, adware and spyware is definitely an transformative process as evidenced through the boost in new adware and spyware recently.  However, hardly a big surprise since many adware and spyware is made from existing odds and ends of code. For any hacker, why reinvent the wheel when you are able just take advantage of previous hacks? Much like software developers, online hackers like to reuse code in order to save time freeing these to enhance their adware and spyware techniques, for example staying away from recognition and growing and attack’s efficiency.



Adware and spyware DNA, a part of Check Point’s Sandblast Network solution, is the opportunity to classify a brand new threat right into a adware and spyware family provides an unparalleled degree of knowledge of the threats your business faces. By hearing aid technology origin from the threat, cybersecurity experts can rapidly devise strategies against any suspicious file or attack campaign, like the:

  • Specific kind of threat
  • Repercussions and damages this threat poses


And apply guidelines that report to formerly resolved occurrences.

Exactly how should we make sure the classification of recent or rare families?

With this we've integrated a patent-pending technology that ensures the classification of adware and spyware to families also in line with the outcomes of the sandbox report. As the solutions available for sale are signatures based engines, our AI technology allow an immediate classification, according to a large number of indicators, considering the smallest changes.

With Adware and spyware DNA, all enterprises can strengthen their security posture and optimize their prevention and recognition techniques, all while dramatically lowering the response time for you to remediate threats with actionable intelligence.

Friday, July 5, 2019

CPR Zero: Check Point Research’s Vulnerability Repository

In the past three years, Check Point Studies have invested significant sources into vulnerability research. For each vulnerability we uncover, we first inform the seller and immediately develop new protections that are built-into the Check Point type of products.

Throughout our vulnerability research, we encounter numerous bugs, more interesting than the others. Most of the vulnerabilities we uncover will also be shared openly within our blog or conference presentations, for example Hacked in Translation, Exactly what the FAX?!, and many recent WinRAR 19 years old code execution. However, even though some vulnerabilities are printed, most are not.

The standard practice for openly disclosing vulnerabilities is to own relevant vendor 3 months to repair the problem before informing the general public, thus allowing users to accept necessary steps to prevent attacks. We discover that user awareness plays a significant role in the choice to update and patch the atmosphere.



Therefore, we made the decision to produce the CPR-Zero Repository which includes every bug we uncover and disclose, even if they're not featured inside a particular publication. Their email list contains more information regarding each bug, together with a crash dump, a brief explanation and often a POC. This initial bug release includes over 100 critical vulnerabilities many of their facts are not released while they happen to be patched.

The repository is going to be ongoing and constantly updated upon any new breakthroughs. The operation is not automatic, however, so we reserve the authority to not disclose a few of the bugs which may be greater risk.

We're proud that Check Point boasts probably the most gifted and capable experts within the field, so we make an effort to stand above malicious actors by developing new information tools, minimization techniques and identify attack vectors before they are doing. The vulnerability repository is our latest effort and aims to become a valuable part of notifying users of recent risks in addition to encouraging vendors to accept necessary steps to carry on to supply a risk-free consumer experience when browsing the web.

Wednesday, July 3, 2019

Secure Your Cloud with Check Point CloudGuard: Inforce 2019 in Boston

It’s the very first time that AWS has located the wedding, that is razor-centered on cloud security. Cloud security is really a growing section of attention, observed through the growing quantity of security, identity and compliance services launched by AWS and 3rd-party ecosystem partners. We're excited to participate this latest event, and encourage you to definitely visit booth #431 to listen to what we must offer. Here's what we are as much as, and how much to listen to:

Amplifying our partnership with AWS!


Check Point is definitely an Amazon . com Partner Network (APN) Advanced Technology Work with Networking and Security competencies. Our CloudGuard group of products is deeply integrated with plenty of AWS services including Amazon . com GuardDuty, Amazon . com CloudWatch, AWS Security Hub, AWS Transit Gateway, AWS CloudTrail and VPC Flow Logs. And Appearance Point is another platinum sponsor of AWS re:Inforce.



The Check Point team - Who’s in the booth?


We’ll attend the big event in pressure, having a star-studded presence including Ran Nahmias, Global Mind of Cloud Security, Zohar Alon, Mind of Cloud Products, Roy Feintuch, Cloud Chief Technologist, in addition to CloudGuard Product Managers and Cloud Security Architects. Our cloud security experts is going to be on-hands and able to deep-dive which help answer the questions you have.

Driving thought leadership in cloud security


Zohar Alon will introduce CloudGuard Log.ic and supply his insights into improving AWS peace of mind in a speaking slot entitled “How to Leverage Traffic Analysis to Travel through Cloudy Skies”.

  • The very first slot is on Tuesday, Jun 25 from three:00-3:30pm
  • The repeat performance is on Wednesday, Jun 26, from 8:45-9:15am


Both is going to be at Level , Vivi Demo Theater Hall A   B1.

And you will see lightning presentations every hour in the Check Point booth #431.

Cloud Security Product Spotlight


We’ll be demoing CloudGuard IaaS, CloudGuard Dome9 and our latest exciting product, CloudGuard Log.ic!

CloudGuard IaaS for AWS delivers advanced, multi-layered network to safeguard AWS and hybrid cloud environments and protects assets within the cloud. Security measures include Firewall, IPS, Application Control, IPsec Virtual private network, Anti-virus, Anti-Bot, Loss Of Data Prevention, Threat Extraction and Threat Emulation.

CloudGuard Dome9’s SaaS platform enables you to definitely easily manage security and compliance inside your AWS atmosphere. You are able to assess security posture, identify misconfigurations, positively safeguard against attacks, and comply with guidelines.

CloudGuard Log.ic is really a security analytics solution that gives threat protection and security intelligence for that public cloud with forensic analysis abilities, that was launched a week ago. Watch this web seminar on June 24 to understand how CloudGuard Log.ic provides native threat protection and security analysis for that public cloud.

But if you wish to learn more about why Check Point may be the leader in Cloud Security, book a period now and steer clear of the hurry!

Monday, July 1, 2019

Security Flaws in Electronic Arts’s Origin Platform

Today’s kids and youngsters-at-heart are perhaps more hooked on video games than in the past, and probably the most popular are sports themed. However for cyber crooks the only real sport they're hooked on is exploiting vulnerabilities to ensure that personal data reaches the finish-of-level baddie.

Within the last couple of days, Check Point Studies have combined forces with CyberInt to recognize a series of vulnerabilities that, once exploited, might have brought towards the takeover of countless player accounts inside the world’s second largest gaming company, EA Games. The possibility damage might have involved an assailant accessing a user’s charge card information and the opportunity to fraudulently purchase in game currency with respect to the consumer.

CyberInt and appearance Point immediately notified EA Games of those security gaps and together leveraged their expertise to aid EA in fixing these to safeguard their gaming customers.

Origin: The EA Games Platform


With more than 300 million users and revenues close to $5 billion, EA Games may be the world’s second largest gaming company market capital and boasts household gaming titles for example FIFA, Maden National football league, National basketball association Live, UFC, The Sim cards, Battlefield, Command and Conquer and Medal of Recognition in the portfolio. Each one of these games and much more rest on its self-developed Origin gaming platform that enables users to buy and play EA’s games across PC and mobile.



Origin also includes social features for example profile management, networking with buddies with chat and direct game joining together with community integration with networking sites for example Facebook, Xbox Live, Ps Network, and Nintendo Network.

Origin and also the Vulnerabilities Found


In the same way to check on Point Research’s previous breakthroughs into another hugely popular video game, Fortnite, the vulnerabilities present in EA’s platform similarly didn't require user to give any login details whatsoever. Rather, it required benefit of EA Games’ utilization of authentication tokens with the oAuth Single Sign-On (SSO) and TRUST mechanism that's included in EA Game’s user login process.

Within this situation, EA Games is really a cloud-based company that utilizes Microsoft Azure for hosting several domains for example ea.com and origin.com to be able to provide global use of various services for his or her players, including creating new game accounts, connecting towards the Origin social networking and getting more games in EA’s online shop.

The way the Attack Works


Each service provided by EA is registered on the unique subdomain address, for instance, eaplayinvite.ea.com, and it has a DNS pointer (A or CNAME record) to some specific cloud supplier host, e.g. ‘ea-invite-reg.azurewebsites.net’, which runs the preferred service without anyone's knowledge, within this situation an internet application server.

Because of misconfigurations within the Azure cloud platform, however, EA had altered the ‘ea-invite-reg-azurewebsites.net’ CNAME record so the subdomain, ‘eaplayinvite.com’ no more pointed into it. This resulted in ‘eaplayinvite.ea.com’ now result in a dead link. It had been thus very easy for the team to buy the ‘ea-invite-reg.azurewebsites.net’ CNAME record rather and also have eaplayinvite.com indicate our very own cloud account. Once we now controlled this sub-domain, any user being able to access this url could now unknowingly be routed through our team’s cloud computing account.

Stage Two Attack


The next phase ended up being to know how EA games had configured the oAuth protocol and offers its users having a Single Sign-on (SSO) mechanism. This SSO mechanism basically exchanges the user’s login credentials (password) having a unique SSO Token that's then accustomed to authenticate the consumer across EA’s network without one getting to re-enter their login details.

The Harm Caused


Using the access token now at the disposal of the attacker, he is able to now log to the user’s Origin account and examine data stored there, including the opportunity to buy more games and accessories in the user’s expense. Pointless to state that in addition to this massive invasion of privacy, the financial risks and possibility of fraud is vast.

Key Takeaways


It is crucial that organizations with customer facing online portals, and the like like, execute proper validation checks around the login pages they ask their users to gain access to. They have to also perform thorough and regular hygiene checks on their own entire IT infrastructure to make sure they haven't yet left outdated or unused domains online. When attackers are continually looking for the weakest link inside your company’s presence online, these frequently unknown and unprotected pages can certainly function as a backdoor for your enterprise’s primary network.

It's also wise for users to allow two-factor authentication. In so doing, so when logging to their account from the new device, the consumer is needed to go in a burglar code that's then sent via email towards the account owner.

For consumers, it's highly advised to simply make use of the official website when installing or purchasing games. It's also essential that parents make their kids conscious of the specter of online fraud and warn them that cyber crooks is going to do anything to get into personal and financial details which can be held included in a gamer’s internet account.