Category: Check Point Blog

Brand Impersonation Scam Hijacks Travel Agency Accounts

Recently, within the span of a week, a new and extensive phishing campaign compromised more than 7,300 businesses and 40,000 individuals around the world. The most heavily impacted regions are the United States (75%) and the European Union (10%). The…

Ensuring HIPAA Compliance with Secure Remote Access

When it comes to remote access, healthcare organizations must contend with the same challenges as their counterparts in many other industries: remote workers and third-party contractors need fast, reliable connections to enterprise resources. The security team also needs to defend…

Building Cyber Resilience with Trofi Security and Check Point

As the digital threat landscape grows increasingly complex, organizations are under mounting pressure to secure their environments against a variety of risks, from ransomware and phishing to sophisticated zero-day exploits. Businesses need security solutions that not only prevent breaches but…

DeepDLL– A New Approach to Detect Malicious DLLs

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

New Opportunities for Communication Service Providers

The internet is the ‘new’ corporate network, and Communication Service Providers (CSPs) are well-positioned to enable their clients’ ongoing digital transformations. The emergence of 5G and the standardization of work from anywhere are only reinforcing this shift. CSPs have the…

Getting to Know Katya Pikkarainen

Katya, can you tell us a bit about yourself? I have a Bachelor of Science in Business Management from the University of Minnesota, and I’m currently an Account Manager living in Minnesota, where I was born and raised. What led…

How SASE Addresses Enterprise Network Challenges

Unified Security and Network Performance The proliferation of remote work, cloud services, and mobile devices has expanded the traditional network perimeter, introducing complexities in ensuring secure and efficient access to resources and the need to defend against web-based threats. All…

MITRE ATT&CK® Evaluations Highlights Check Point Detection

In the 2024 MITRE ATT&CK® Evaluations, Check Point demonstrated what world-class detection looks like. The results speak for themselves: detection of all 57 applicable tested attack steps, with an impressive 56 detections at technique level. This isn’t just about catching…

Cyber Risk – How to effectively manage fourth-party risks

Originally published in the November 2024 edition of Intelligent Risk magazine Cyber risks have gained numerous business executives’ attention as these risks are effectively operational risks due to their potentially devastating operational and financial impacts, and reputational damage to organizations.…

The Exploitation of Gaming Engines: A New Dimension in Cybercrime

Executive Summary Check Point Research discovered a new technique using Godot Engine, a popular open-source game engine, to execute malicious code that executes nefarious commands and delivers malware and largely remains undetected. This innovative method enables cybercriminals to compromise devices…