Tag: Check Point Blog

Five Reasons to Choose Secure SD-WAN from Check Point

In today’s fast-paced digital landscape, businesses are increasingly in need of reliable, secure, and high-performance connectivity. Check Point’s secure SD-WAN solutions offer a comprehensive approach by combining top-notch security with optimized internet and network connectivity, ensuring safe and uninterrupted operations.…

Migrating from Hub and Spoke Network to Azure Virtual WAN

Azure Virtual WAN is a robust network service that combines networking, security, and routing functionalities into a single operational interface. This innovative approach simplifies the complexity of managing multiple connectivity types such as VNet, VPN, remote user, and ExpressRoute connectivity.…

How hunting for vulnerable drivers unraveled a widespread attack

Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…

Cyber Criminals Using URL Tricks to Deceive Users

Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…

Check Point’s SASE Tops Scores for Threat Prevention

Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and…

Protecting Hospitals from IoT Threats with Check Point

In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security…