Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer
THREATCLOUD CENTRAL
THREATCLOUD INTEL

Don't Become the Next Code Spaces: Learn best practices for using cloud services securely

CHECK POINT MALWARE RESEARCH GROUP, 07/15/2014

Code Spaces, an organization that offered source code repositories and project management services hosted in Amazon’s Web Services for developers, was forced to cease operations in June after failing to meet the demands of cyber-extortionists. In this article, the Check Point Malware Research Group provides best practices for using cloud services securely that should be followed by all organizations in order to prevent themselves from becoming the next Code Spaces.

READ MORE »
READ ALL ARTICLES »

 

Numbers of Malware Programs Detected
TODAYLAST 7 DAYSLAST 30 DAYS
1,15224,24390,280
MALWARE DETECTED WITH THREAT EMULATION

THREAT EMULATION PODCAST

Listen as Check Point experts discuss Threat Emulation.

LISTEN »
COMMUNITY
Last Update: Dec. 2, 2013
Checkpoint R77 VSX NAT ISSUE
I built a virtual system, we have a external inteface (default route) and some internal interfaces. ...

GO TO THE FORUMS »
GET THE LATEST IPS PROTECTIONS
  • 07/28/2014  CPAI-2014-1622
    Infinity Exploit Kit Remote Code Execution
  • 07/22/2014  CPAI-2014-1596
    Microsoft Internet Explorer Memory Corruption (MS14-035; CVE-2014-1775)
  • 07/21/2014  CPAI-2014-1728
    PDF Containing Encrypted Data
GO TO IPS PROTECTIONS »
DOWNLOAD THE 2014 SECURITY REPORT
The Check Point 2014 Security Report highlights major security events in 2013 and current malware trends. The data included in this report is based on collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations of various industries. Most importantly, the report provides security recommendations on how to protect against these threats.

GET THE REPORT »

THREATWIKI TOP 3

Check out the week's most visited Malware resources pages.

SEE ALL »