Key Takeaways Check Point Research (CPR) recently uncovered Styx Stealer, a new malware capable of stealing browser data, instant messenger sessions from Telegram and Discord, and cryptocurrency. The developer of Styx Stealer was found to be linked to one of…
Category: Check Point Blog
Simplify Your Data Center Security with Check Point’s Managed Firewall-as-a-Service (MFaaS)
As the digital environment rapidly changes, colocation data centers need to be managed and secured more than ever. The increasing complexity of cyber threats and the need for seamless scalability demand advanced solutions that can keep pace with organizational growth.…
Server-Side Template Injection: A Critical Vulnerability Threatening Web Applications
Summary : High Prevalence and Impact: Over the past three months, an average of 1 out of every 16 organizations faced SSTI attacks weekly, with the Retail/Wholesale and Finance/Banking sectors being the most affected. Severe Risks: SSTI vulnerabilities can lead…
Check Point Research Warns Every Day is a School Day for Cyber Criminals with the Education Sector as the Top Target in 2024
Highlights The Education sector has been the most targeted industry this year to date, with an average of 3,086 attacks per organization per week, marking a 37% increase compared to 2023 The APAC region has witnessed the greatest number of…
Hacktivism’s Role in Political Conflict: The Renewed Campaign of #OpVenezuela
Venezuela is currently facing significant political unrest following the July 28th, 2024, presidential election. Nicolás Maduro was declared the winner, securing a third term in office. However, the opposition claims that substantial evidence indicates the election was fraudulent, with claims…
Check Point Research Warns Every Day is a School Day for Cybercriminals with the Education Sector as the Top Target in 2024
Highlights The Education sector has been the most targeted industry this year to date, with an average of 3,086 attacks per organization per week, marking a 37% increase compared to 2023 The APAC region has witnessed the greatest number of…
Check Point and Cybrary: Empowering Customers with Cutting-Edge Cyber Security Training
In a world where cyber threats are constantly evolving, staying ahead of the curve is crucial for any organization. As a matter of fact, Check Point research shows a 30% Increase in Q2 of 2024 in global cyber attacks, which…
Digital Pioneers: Why Today’s Youth is the Best Generation to Support Cyber Security of the Future
Not only are participation and development integral themes in this year’s International Youth Day, but they are essential components in addressing the challenges posed by evolving cyber threats and emerging technologies On this year’s International Youth Day, celebrated on Monday…
How MSSPs Can Navigate the Regulatory Landscape: Ensuring Compliance
As regulatory bodies continuously update standards to address emerging security threats, Managed Security Service Providers (MSSPs) face significant challenges in keeping up with changing regulations. Consequently, they must not only practice vigilance and agility but also adopt a proactive approach…
Infinity Global Services and Cysurance Launch a Comprehensive Insurability Assessment Program
Check Point recently teamed up with Cysurance, a leader in next-generation risk mitigation, to launch a joint Insurability Assessment program. This innovative program is designed to help businesses proactively identify and mitigate potential cyber security risks, ensuring they meet stringent…
Unlock the Power of GenAI with Check Point Software Technologies
The GenAI Revolution is Already Here Generative AI applications like ChatGPT and Gemini are here to stay. But as they make users’ lives much simpler, they also make your organization’s life much harder. While some organizations have outright banned GenAI…
Securing Data in the AI Era: Introducing Check Point Harmony Endpoint DLP
In today’s digital landscape, data is the lifeblood of organizations. With the rapid adoption of Generative AI tools to boost productivity, data is being shared at unprecedented rates. While this revolution in AI promises immense benefits, it also introduces new…
New Generative AI-Powered Solutions to Secure the Workspace
Attending Black Hat? Join us at booth #2936 to get a glimpse of all our newest capabilities to secure your workspace and beyond. The risk of falling victim to ransomware attacks and leaking data to shadow software as a service (SaaS)…
Securing Data in the AI Era: Introducing Check Point Harmony DLP
In today’s digital landscape, data is the lifeblood of organizations. With the rapid adoption of Generative AI tools to boost productivity, data is being shared at unprecedented rates. While this revolution in AI promises immense benefits, it also introduces new…
Getting to Know Check Point Olympian: Ron Darmon
Get to know Ron Darmon, a former Olympic triathlete and now a data scientist on our XDR security content team. Discover how his Olympic experience has shaped his mindset and prepared him for a career in data science. Ron, how…
Getting to Know Tim Otis
Tim Otis, Head of Incident Response (IR) and Managed Detection and Response (MDR), brings 28 years of cyber security expertise to Check Point, where he has dedicated the past 17 years. His extensive experience spans roles in help desk, systems…
Over 20,000 Ubiquiti Cameras and Routers are Vulnerable to Amplification Attacks and Privacy Risks
Check Point Research (CPR) assessed the popular Ubiquiti G4 Instant Camera, a compact, wide-angle, WiFi-connected camera with two-way audio, along with the accompanying Cloud Key+ device that supports the application. Key Highlights CPR conducted an attack surface assessment, discovering two…
Are You Getting the Most Value from Your Existing CNAPP Solution?
As many organizations feel overwhelmed by increasing cloud complexity, Cloud Native Application Protection Platforms (CNAPPs) have emerged as a resource to ensure comprehensive and streamlined security. However, a robust CNAPP solution like Check Point CloudGuard offers so many features and…
Protecting Your Cloud Application Against Unknown Risks
Cloud native security measures are primarily focused on safeguarding against identifiable threats, employing innovative technologies like big data and AI to monitor and preempt potential attacks. Despite these efforts, however, no system can ever be completely impervious to threats. Even…
Check Point Research Reveals Q2 2024 Brand Phishing Trends: Microsoft Tops List While New Entries Signal Shifting Threat Landscape
Check Point Research ranks Microsoft as primary target in phishing attacks and notes the introduction of Adidas, WhatsApp and Instagram into the Top 10 Phishing attacks remain one of the most pervasive cyber threats and are often the entry point…