Category: Check Point Blog

Incident Response Readiness Journey

Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Cloud Risk Management: The DevOps Guide

For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify,…

Get it Done Faster with AI Copilot for Harmony SASE

Managing network security can be a daunting task, even for the most seasoned IT professionals. Harmony SASE users now have a new tool at their disposal to streamline these challenges: the Infinity AI Copilot for Harmony SASE, currently in preview.…

Strengthening Cloud Defenses: Key Strategies

In today’s digital landscape, cloud security has emerged as a critical concern for organizations worldwide. As cloud technologies continue to be adopted at an accelerated pace, businesses face new layers of complexity. In fact, 73% of professionals acknowledge that cloud…

How to secure your SaaS data?

SaaS Supply Chain Risks: Biggest Threat to Your Data SaaS supply chain attacks pose the greatest risk to your data. Attackers exploit vulnerabilities in SaaS applications, which serve as entry points into your enterprise. This might be something as basic…