Under the dazzling lights of Las Vegas, Check Point unveiled its forward-thinking strategy for safeguarding our interconnected world at CPX 2025, its flagship annual cyber security conference. The event drew thousands of participants from the United States, Canada, and Latin…
Tag: Check Point Blog
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…
What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection
Executive Summary: In one of the largest thefts in digital asset history, hackers gained access to an offline Ethereum wallet and stole $1.5 billion worth of digital assets, primarily consisting of Ethereum tokens. The recent incident with Bybit marks a…
Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…
The Future of Sustainability | Bacteria, Meet the Internet of Things
In an era of pressing ecological crises, innovative technologies are emerging to address challenges that traditional methods have struggled to solve. One of the new frontiers in this quest is microbial IoT, a revolutionary fusion of microbiology and IoT. With…
Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners
At Check Point Software, our partners are at the core of our mission to deliver cutting-edge cyber security solutions worldwide. As cyber threats continue to evolve in complexity and frequency, our partners play a vital role in safeguarding businesses and…
Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform
Check Point today unveiled its strategic vision for securing the hyper-connected world at CPX 2025 Bangkok, its premier annual cyber security event. With nearly 1,650 employees, customers and partners from across APAC in attendance, Check Point showcased how AI-driven security…
Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluru
Check Point has announced its plans to establish its first Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India, with a goal to drive innovation in cyber security solutions and strengthen global product development and talent growth. This strategic expansion,…
Strengthening Authentication in the AI Era: How Harmony SASE Aligns with CISA’s Secure by Design Pledge
For the modern threat environment, strong authentication is a must. Malicious actors are leveraging traditional credential harvesting tactics more than ever, as well as using AI to enhance them. Organizations must reinforce their defenses and deploy multi-factor authentication (MFA) to…
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and…
Protecting Hospitals from IoT Threats with Check Point
In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security…
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
Check Point Software’s latest threat index highlights that FakeUpdates continues to pose a significant threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. A recent investigation by security researchers revealed that an affiliate of RansomHub utilized…
A Safer Digital Future: Stopping AI-Fueled Cyber Scams for a more Secure Tomorrow
With Safer Internet Day this week, it’s hard not to feel a little extra concern about our kids’ online safety. Today, our children and young adults are living and breathing a digital world that’s evolving faster than ever—one where scammers…
Service Levels for MSSPs: Elevating Security-Specific Services
Introduction: The Critical Role of Service Levels in Managed Security Today’s managed service providers (MSPs) play a crucial role in safeguarding businesses against cyber threats. As the complexity and frequency of these threats increase exponentially, it’s becoming critical for MSPs…
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new Valentine’s/love-related websites, marking a 5% increase compared to the previous month. Of these, 1 in 72 newly registered websites were identified as malicious or risky. Specifically focusing on Valentine’s-related websites,…
Breaking (Fire)Walls & Glass Ceilings: Women Leading Digital Revolution and Cyber Security’s Next Frontier
Cyber security is at the heart of today’s digital revolution, yet it remains one of the most male-dominated sectors in science and technology. Data from Zippia shows that while women hold 48% of roles in the broader workforce, they represent…
How Electric AI Strengthened Its Cloud Security with AI-Powered Solutions
Electric AI, a New York-based IT platform provider serving nearly 1,000 customers and over 55,000 end-users, faced the critical challenge of securing not only their own infrastructure but also protecting sensitive data across multiple industries. As a managed security provider…
Check Point Helps Gentera Secure the Financial Future of Millions
Gentera is built on the vision of eradicating financial exclusion and serves over 3.2 million clients across its subsidiaries in Mexico, Guatemala, and Peru. To help empower those with fewer financial resources, Gentera provides counseling and services around credit, insurance,…