Category: Check Point Blog

Getting to Know: Kacey Darling

In her 12+ years in cybersecurity, Kacey Darling has held a variety of roles across sales and marketing across Check Point, including Channel Development Manager, Account Manager and Field Marketing Manager for the North Central region of the United States.…

Cyber Stakes: The MGM Ransomware Roulette

  What we have learned and the steps to protect your enterprise Highlights MGM Resorts was hit by a major ransomware attack that took systems offline in locations across Las Vegas Prolific ransomware group ALPHV claimed responsibility in a post…

Getting to Know: Grant Asplund

For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his…

Phishing via Google Looker Studio

A burgeoning attack involving Google Looker Studio is making the rounds. In the last few weeks, we’ve seen over a hundred of these attacks. Google Looker Studio is a tool that converts information—slideshows, spreadsheets, etc—into visualized data, such as charts…

Addressing the Rising Threat of Web DDoS Tsunami Attacks in 2023

The first half of 2023 has seen a massive surge in Distributed Denial of Service (DDoS) attacks, unveiling a new level of sophistication, frequency, and size that organizations must confront. This rising threat is particularly exemplified by the popularity in…

How companies can get a grip on ‘business email compromise’

***This blog was originally published on the World Economic Forum*** More use of SaaS applications means employee business accounts are being targeted for “business email compromise” (BEC). BEC has evolved from basic email phishing scams to more sophisticated iterations, including…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Shares Analysis of Qakbot Malware Group

On August 29, 2023, the FBI announced it dismantled the Qakbot (also referred to as Qbot) multinational cyber hacking and ransomware operation, impacting 700,000 computers around the world – including financial institutions, government contractors and medical device manufacturers. The Qakbot…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

Check Point Software: XDR Leader in Frost Radar™ 2023 Report

We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…

How to close the IT Talent Gap with a SASE Solution

According to cybersecurityventures.com unfilled cyber security positions will hit 3.5 million in 2023, with more than 750,000 of those positions based in the U.S. The lack of talent in this area can lead to inadequate threat detection, weaker security, and…

Preventing DNS Tunneling with AI Deep Learning

DNS Tunneling is probably considered a relic of the early Internet days, back when the first firewalls were deployed and malware analysis was a little bit simpler than it is today. Though attackers have evolved, using steganography and encryption to…

Verify You Are Human (So We Can Steal Your Credentials)

Web server management faces numerous security challenges. Distributed Denial of Service (DDoS) attacks are one such threat. These attacks involve multiple bots bombarding the server with a high volume of requests in a short period of time, resulting in a…

Check Point Wins Gold Stevie International Business Award

Check Point is thrilled to accept the International Business Awards’ Gold Stevie award for our Quantum Titan security platform! At Check Point, we are transforming how organizations secure their networks across on-premise, cloud and IoT environments. Powered by ThreatCloud AI,…

Avoiding False Positive: The Silent SAST Killer

Author: Dotan Nahum False positives are the most frustrating aspect of performing security testing. It’s like playing a game of whack-a-mole: every time you run a test, you have to wonder whether false positives will pop up in your results…

US Hospitals Under Increasing Threat of Ransomware

  According to Check Point Research (CPR): on average, 1 in 29 healthcare organizations in the United States were impacted by ransomware over the past four weeks. Healthcare is currently the #1 most impacted industry by ransomware. In fact, in…

Meet Cloud Girls 2023 Trailblazer Trisha Paine

***This content was originally published on Cloud Girls. Trisha Paine, Head of Global Marketing of Cloud Security at Check Point Software, was recognized by Cloud Girls, in collaboration with the Alliance of Channel Women, as a Rising Star in the eighth annual Cloud…

All CISOs should know this about cloud network security

Cloud network security may not sound very different from traditional network security – and it’s not, at least in some respects. Cloud networks use the same fundamental paradigms and protocols as on-prem networks, so there is some overlap between cloud…

Review of Recent NPM-Based Vulnerabilities

NPM made headlines after a staggering rate of vulnerabilities was discovered in over 50 popular packages, putting countless projects and organizations at risk. Unfortunately, many organizations underplay or ignore NPM vulnerabilities. Are you one of the many developers relying on…

Your First Line of Defense Against Ransomware: SASE

Statista says that 71% of global businesses felt the impact of ransomware trends. A total of 62.9% of the ransomware victims paid the ransom. They use myriad techniques and tools to infiltrate networks, applications and computers as they lay the…

How Generative AI Affects Mobile Security

Me: “Can you be misused for cyber-attacks?” Chat GPT: “As an AI language model, I don’t have agency or intentions of my own. However, like any technology, I can potentially be misused by individuals with malicious intent. Ultimately, the responsibility…

Is Your Peloton Attracting Security Threats?

A Deep Dive Into the Vulnerabilities Found In America’s Largest Internet-Connected Exercise-as-a-Service Company. Highlights: Check Point security experts unveil vulnerabilities found in internet-connected workout equipment such as Peloton. Exploiting these vulnerabilities could potentially grant threat actors access to user databases,…

United States Announces New IoT Cybersecurity Label

This week, the Biden-Harris Administration announced the US Cyber Trust Mark, a new label to help consumers easily understand which smart devices are less vulnerable to cyberattacks. In the US, Statista estimates there will be 5.4 billion Internet of Things…

Brand Spoofing Prevention – Check Point Software Technologies’ AI-Powered Pre-emptive Zero Phishing Prevents Local and Global Brand Impersonation Attacks

Highlights: · Check Point Software Technologies’ Zero-Phishing AI Engine now scaled and improved to identify and block access to which impersonate local and global brands across multiple languages and countries. · New domains are inspected immediately upon registration for pre-emptive…

Check Point Software Prevents Potential ChatGPT and Bard data breaches

Preventing leakage of sensitive and confidential data when using Generative AI apps Security Risk Assessment Like all new technologies, ChatGPT, Google Bard, Microsoft Bing Chat, and other Generative AI services come with classic trade-offs, including innovation and productivity gains vs.…

Think Your Secrets are Safe in their Vault? Think Again

“If you want to keep a secret, you must also hide it from yourself.” You might be surprised to learn that this wise quote comes from George Orwell’s famous 1984, not a ‘how to code’ textbook. Although if developers want…

Top Considerations for Securing AWS Lambda, part 3

Serverless computing or function-based computing, is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

Phishing Tools for Purchase: A Closer Look at Facebook Scamming Groups

By Gal Yogev Highlights:  Facebook groups are hosting scammers who offer tools for creating phishing pages, facilitating brand impersonation and victim deception. Check Point researchers have identified numerous Facebook pages playing host to these hacker groups, aiding the exchange and…

Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes

It’s become painfully obvious that cybersecurity is critical to enabling clinicians to provide quality care to their patients. This week, a hospital in Illinois is closing its doors after a devastating ransomware attack. Recent cyberattacks against CommonSpirit Health compromised the…

MOVEit Vulnerability Weaponized in Ransomware Attack

What is MOVEit? MOVEit is a managed file transfer (MFT) software solution developed by Progress Software Corporation (formerly Ipswitch). It is designed to securely transfer files within or between organizations. MOVEit offers a centralized platform for managing file transfers, providing…

Unified Security from Code to Cloud at AWS re:Inforce

In the last year, Check Point and AWS have strengthened their partnership by leaps and bounds. The Check Point release of CloudGuard CNAPP on AWS Marketplace and the upcoming CloudGuard Network Security-as-a-Service offering are just the beginning. In the last…

Latest Chinese state-sponsored attacks on critical US infrastructure spies a continuation of trend, Reports Check Point Research

Last Wednesday, Microsoft issued a warning claiming Chinese state-sponsored hackers have compromised “critical” cyber infrastructure in a variety of industries, including government and communications organizations. “The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to…

Mitigating Risks in Cloud Native Applications

As organizations move their operations to the cloud, they face a difficult challenge in ensuring secure configurations and consistent security posture across multiple cloud services and platforms. In addition, they must do all of this in a way that does…