In today’s constantly evolving threat landscape, it is more important than ever to have a strong security posture in place. Threat actors are becoming more sophisticated and are increasing their rate of attacks – according to Check Point Research, cyber…
Category: Check Point Blog
Unveiling Void Manticore: Structured Collaboration Between Espionage and Destruction in MOIS
Check Point Research (CPR) has been actively monitoring the activities of Void Manticore, an Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS). This threat actor has garnered attention for its involvement in destructive wiping attacks, often…
Connect the Security Dots by CloudGuard Effective Risk Management
Countless of services we use in our daily life are backed by Cloud computing, thanks to its agility and global presence from many cloud service providers nowadays. Although we tend not to realize about their cloud dependency until such services…
5 data security concepts you need to know
Everyone is talking about data security and its importance, but what does that practically look like? Let’s take a look… Our newly released Cloud Security Report showed a startling trend in the data. Data breaches have now surpassed misconfigurations…
PDF-Based Email Threats On the Rise: Fight Back with AI-Powered Prevention
Executive Summary: PDFs have become the dominant vector for malicious attachments, accounting for nearly 3/4th of all malicious files in the last month This marks a staggering rise from 2023, when it accounted for 20% Healthcare is hit the hardest,…
Empowering Women Through Mentoring: Meet Cordelia Allway
Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…
Foxit PDF Reader “Flawed Design” : Hidden Dangers Lurking in Common Tools
Heightened vulnerability: Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit PDF Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands, exploiting human psychology to…
Check Point Infinity ThreatCloud AI Featured on Fast Company’s 2024 World Changing Ideas List
Check Point is proud to be included in Fast Company’s 2024 World Changing Ideas list for Infinity ThreatCloud AI! As the brains behind the Infinity Platform, ThreatCloud AI was chosen due to its game-changing technology that leverages 50+ AI engines…
CRN Recognizes three Check Point Channel Stars in its 2024 Women of the Channel list
CRN has recognized Check Point’s Head of Americas Channel Sales, Nisha Holt, for her outstanding achievements as one of the Women of the Channel Power 100. Furthermore, Rebecca James and Lauren Ventura have also earned a spot on the esteemed…
How to Maintain Your Cyber Security Hygiene for a Vulnerability-free Environment
We practice daily routines like brushing our teeth and washing our hands to maintain our physical health. Similarly, the digital landscape has become a breeding ground for sophisticated cyber threats, each requiring specific ‘sanitization’ strategies. Your Organization Must Scrub…
April 2024’s Most Wanted Malware: Surge in Androxgh0st Attacks and the Decline of LockBit3
Researchers recently identified a spike in Androxgh0st attacks, a Trojan that targets Windows, Mac and Linux platforms, which saw it jump straight into second place in the top malware list. Meanwhile, LockBit3 narrowly remains the top ransomware group, despite a…
Five business use cases for evaluating Azure Virtual WAN security solutions
Are you using Microsoft Azure Virtual WAN, or considering using it? If so, what is the best way to secure your Virtual WAN deployments? This is not a trivial question, because not all firewalls are equal or even similar in…
Stop Chasing Breaches: Build a Resilient Security Architecture
You assume your security architecture is secure, it’s not always the case Cyber security vendors play a critical role in protecting the digital landscape. However, security products, too, are not immune from targeted exploits by bad actors. Cyberattacks can happen…
Check Point Protects Enterprises by Accelerating Security for Networks and AI Cloud Infrastructure, in Collaboration with NVIDIA
As cyber threats expand rapidly, enterprises can trust Check Point to deliver accelerated network and cloud security solutions, in collaboration with NVIDIA. By combining Check Point’s experience in advanced threat prevention with NVIDIA’s cutting-edge accelerated computing platforms, enterprises can get…
AAPI Heritage Month Spotlight: Jenny Nguyen
In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on some of our AAPI employees. We sat down with Jenny Nguyen, a campaign operations manager in our Redwood City office, to discuss her favorite…
Drop My VPN – Are You Nuts?
If the title of this post caught your attention, maybe you’ve thought about moving on from your VPN because of performance issues or security concerns but are still researching alternatives. On the other hand, perhaps you actually do think it’s…
Spoofing Shein for Credential Harvesting
Introduction Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads. The e-commerce platform is Googled more frequently than major brands like Nike…
Unpacking the New DHS Guidelines for Securing Critical Infrastructure from AI-related Threats
Under President Biden’s Executive Order regarding the safe development and use of Artificial Intelligence, the Department of Homeland Security published new guidelines about how to secure critical infrastructure from AI-related threats. The guidelines are focused on three key categories. The…
Extending SASE Protection Into the Browser
If you want to protect your remote workers one of the best places to start is the web browser. It’s the primary portal to our workday for accessing everything from files to SaaS applications or just browsing the web. That’s…
Infinity Global Services’ Cyber Park Introduces “Nemesis” – A Cyber Security Adventure Awaits!
Welcome to a world where every click can lead to an adventure, and every challenge conquered is a step closer to becoming a cyber guardian. Infinity Global Services’ or ‘IGS’ Cyber Park is thrilled to unveil our latest escapade into…