Tag: Check Point Blog

How hunting for vulnerable drivers unraveled a widespread attack

Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…

Cyber Criminals Using URL Tricks to Deceive Users

Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…

Check Point’s SASE Tops Scores for Threat Prevention

Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and…

Protecting Hospitals from IoT Threats with Check Point

In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security…

Service Levels for MSSPs: Elevating Security-Specific Services

Introduction: The Critical Role of Service Levels in Managed Security Today’s managed service providers (MSPs) play a crucial role in safeguarding businesses against cyber threats. As the complexity and frequency of these threats increase exponentially, it’s becoming critical for MSPs…