On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…
Category: Check Point Blog
Hispanic Heritage Month Spotlight: Ana Perez Quiles
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Ana Perez Quiles, Public Relations Manager, to learn…
Check Point Software Technologies: A Visionary Approach to Workspace Security
In today’s rapidly evolving digital landscape, businesses face unprecedented cybersecurity challenges. The rise of remote work, cloud adoption, and sophisticated cyber threats demand a robust, flexible, and user-friendly endpoint protection solution. Check Point Harmony Endpoint provides exactly this kind of…
The Cryptocurrency Drainer Hiding on Google Play
Executive Summary Check Point Research uncovered a new malicious crypto drainer app on Google Play designed to steal cryptocurrency. The first time a drainer has targeted mobile device users exclusively, this app used modern evasion techniques to avoid detection and…
AI: The New Frontier in Safeguarding Critical Infrastructure
In an era where digital threats loom large, artificial intelligence (AI) emerges as a powerful ally in protecting our vital systems. According to Check Point Research, from January to August 2024, the utilities sector, including critical infrastructure, ranked fifth in…
Cyber Security Leader vs Cyber Security Tag-along: How to Tell the Difference
Throughout history, many fascinating stories have been told about great leaders; Julius Caesar successfully turned Rome into a prosperous empire, and Napoleon Bonaparte famously commanded the French forces on the seas. In 100 BC and 1800, respectively, it was easier…
New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know
Check Point Harmony Email Researchers have recently identified a concerning phishing campaign that spoofs Google Apps Script macros – a tool used to automate tasks in Google applications. Google Apps Script macros are popular due to their abilities to automate…
Check Point SASE: Triple Threat Protection for the New Perimeter
Securing the modern enterprise network is more complex than ever. Company data is migrating to the cloud, Software as a Service (SaaS) applications are the norm, and the workforce is increasingly working remotely. Securing these dynamic environments requires a new…
Cyber predators target vulnerable victims: Hackers blackmail hospitals, trade patient data and find partners through darknet ads
In a world of crime, expect no mercy. Cybercrime goes hard after its goal, which is most often financial gain. Hackers choose their victims accordingly, where they are most likely to succeed and where the most valuable data is located.…
Hispanic Heritage Month Spotlight: Bill Diaz
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We’re kicking off by spotlighting Bill Diaz, Vice President of Vertical Solutions…
5 Steps to Building a Robust Cyber Resilience Framework
The reality of cyber security is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the focus from preventing attacks to ensuring readiness, mitigating impact, and driving a swift…
Check Point’s Quantum Leap: Integrating NIST PQC Standards
In our previous blog, “Living in a Post Quantum World,” we discussed the role cryptographic algorithms play in withstanding threats that may arise from the advanced computational abilities of quantum computers. As quantum technology evolves, it poses a significant threat…
The Unraveling of an Iranian Cyber Attack Against the Iraqi Government
Check Point Research discovered an elaborate cyber-attack against Iraqi governmental networks The installer used to deploy the malware bore the logo of the Iraqi General Secretariat of the Council of Ministers, while the domains of compromised servers were related to…
August 2024’s Most Wanted Malware: RansomHub Reigns Supreme While Meow Ransomware Surges
Check Point’s latest threat index reveals RansomHub’s continued dominance and Meow ransomware’s rise with novel tactics and significant impact. Check Point’s Global Threat Index for August 2024 revealed ransomware remains a dominant force, with RansomHub sustaining its position as the…
Check Point Software Celebrates Partner Success at the Asia Pacific Partner Conference 2024
Check Point Software has recognized the top partners across the Asia Pacific region, during this year’s Check Point Asia Pacific Partner Conference 2024. Held in Phuket, Thailand from 2nd – 5th September 2024, this yearly conference saw attendance of 240…
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
In recent weeks, a new hacktivist campaign has emerged to demand the release of Telegram CEO Pavel Durov, after his arrest by French authorities. In this report, Check Point Research explores the most prominent and dominant hacking groups involved in…
Check Point Celebrates International Women in Cyber Day 2024
September 1st is International Women in Cyber Day. The technology industry has come a long way over the last thirty years and at Check Point, the story is the same. We have several senior leadership and engineering roles filled by…
7 Smart Steps to Run Serverless Containers on Kubernetes
The post 7 Smart Steps to Run Serverless Containers on Kubernetes appeared first on Check Point Blog. This article has been indexed from Check Point Blog Read the original article: 7 Smart Steps to Run Serverless Containers on Kubernetes
The Jedi of Code: May CloudGuard Be with You
Imagine a wise Jedi knight, ever-vigilant, honest, and focused on what truly matters: protecting your Crown Jewels in the Cloud. This Jedi, like a wise Master, guides you with a focus on the impact on your organization. With Check Point…
Enhancing Phishing and Malware Detection with ssdeep Fuzzy Hashing
The science and art of detecting zero-day phishing and malware campaigns depends on leveraging our knowledge of previous threats. Establishing digital fingerprints, called “fuzzy hashes,” is one way that security teams can identify similarities between novel files and confirmed threats.…