Introduction Venmo is one of the most popular payment apps in the world. Owned by PayPal, Venmo is an easy way for friends to send money back and forth. It’s also used by many businesses, and the app’s social network…
Category: Check Point Blog
Shield Your Documents: Introducing DocLink Defender for Real-Time Malware Blockade
Highlights: 1. Innovative Real-Time Protection: DocLink Defender leverages the latest in analytical technology to intercept and neutralize malicious documents instantly. By safeguarding systems from the get-go, it provides an impenetrable shield against potential malware infections. 2. Proven Defense Against Advanced…
February 2024’s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign
Researchers uncovered a new campaign with FakeUpdates, also known as SocGolish, targeting and compromising WordPress websites with hacked admin accounts. Meanwhile, Play entered the top three of most wanted ransomware groups and education remained the most attacked sector worldwide Our…
Check Point Research Alerts: Financially Motivated Magnet Goblin Group Exploits 1-Day Vulnerabilities to target Publicly Facing Servers
Key Highlights: – Rapid Exploitation of 1-Day Vulnerabilities: Threat actor group Magnet Goblin’s hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, particularly targeting public-facing servers and edge devices. In some cases, the deployment of the exploits is within…
Women and cyber security: a must to boost the future
Women represented only 25% of the cyber security workforce in 2023. 20% of Check Point Software´s Vice Presidents globally are women, beyond the industry standard of 16%. On International Women’s Day, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading…
The Future of Cybersecurity in the Age of Generative AI: Insights and Projections from a recent ESG research
Main Highlights: Security professionals express cautious optimism about the potential of generative AI to bolster cybersecurity defenses, acknowledging its ability to enhance operational efficiency and threat response. Organizations are proactively developing governance structures for generative AI, recognizing the importance of…
Top 6 SaaS Breach Vectors and How to Prevent Them
On average, IT teams are only aware of 20% of the SaaS applications used in their organizations1. If standard controls could be easily applied to SaaS apps, then this number would be little cause for concern. However, the frequency of…
Congratulating Check Point’s CPX Americas Partner Award Winners
2023 was the year of mega ransomware attacks and AI-fueled cyber threats with 1 in 10 organizations worldwide plagued by attempted ransomware attacks. Our partners were there to support and guide customers amidst the growing threat landscape and new cyber…
New IDC survey confirms how far CISOs have evolved
Savvy security leaders must enable the business and protect their organizations In November 2023, IDC conducted an extensive global survey with 847 security leaders across 17 countries to better identify their roles, responsibilities, and the realities they face on the…
Navigating the Evolution of Cybersecurity: The Leap from NIST 1 to NIST 2
In the rapidly evolving world of cybersecurity, staying ahead of threats requires constant vigilance and adaptation. As a leader in strategic consulting and provider of comprehensive NIST cyber risk assessments, we’re excited to announce the upcoming release of our modified…
PCI Compliance Levels: A Developer’s Guide to PCI Compliance
Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers…
A Shadowed Menace : The Escalation of Web API Cyber Attacks in 2024
Highlights: Significant Increase in Attacks: In the first month of 2024, attempts to attack Web APIs impacted 1 in 4.6 organizations worldwide every week, marking a 20% increase compared to January 2023, highlighting the growing risk associated with API vulnerabilities. Industry-Wide…
VirusTotal Threat Intelligence Now Seamlessly Integrated in Infinity XDR/XPR
Check Point Technologies announces VirusTotal threat intelligence is now an integral part of Infinity XDR/XPR prevention-first security operations platform. Security teams and SOC analysts depend on high quality threat intelligence from multiple sources to investigate indicators of compromise (IOCs) and…
CloudGuard Streamlines Azure Virtual WAN security with Direct Ingress
As Azure Virtual WAN continues to gain popularity among enterprise customers with distributed and complex IT environments, the need for a comprehensive, consolidated, and collaborative security solution to protect these deployments becomes even more crucial. Check Point CloudGuard provides customers…
Securing the Road Ahead: Addressing Persistent Cloud Misconfigurations in the Automotive Industry
Explore a pair of security exposures from the automotive industry and how the proper security tools could have prevented these ‘same old issues’ from happening. Earlier this month, BMW was yet another victim of dangerous misconfigurations in their cloud storage,…
Digital Deception at the Ballot Box: The Shadow Machinery of Election Manipulation: How Deepfake Technology Threatens the 2024 U.S. Elections
Main Takeaways: Widespread Availability: The ease of access to deepfake technology raises alarms for election security. Unmasking the Invisible Architects: The potential for election fraud through the adept use of artificial intelligence and deepfake technologies, orchestrated by a clandestine network…
SASE Survey Reveals User Experience Is Top of Mind
The results are in: end user experience is everything when it comes to SASE. That was the primary feedback from 650 security professionals we surveyed regarding SASE adoption. A full 71% put end user experience as their top concern. This…
2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report
Key Takeaways: · Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. · Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…
Hybrid Mesh and the Check Point Infinity Platform
Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…
CPX Vienna 2024: Celebrating the Pinnacle of Partnership Excellence
As the digital landscape evolves, so does the essence of collaboration and innovation within our partner ecosystem. The CPX Vienna 2024 stands as a testament to this journey, culminating in the prestigious Check Point Partner Awards. These awards spotlight the…