Check Point Infinity XDR/XPR has once again been recognized as a Growth and Innovation leader in the Frost Radar™ Extended Detection and Response (XDR) Report, 2024. This year, climbing even higher among the top-ranking solutions, Check Point solidifies its position…
Tag: Check Point Blog
Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation Leader in 2024
Check Point Infinity XDR/XPR has once again been recognized as a Growth and Innovation leader in the Frost Radar™ Extended Detection and Response (XDR) Report, 2024. This year, climbing even higher among the top-ranking solutions, Check Point solidifies its position…
Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation Leader in 2024
Check Point Infinity XDR/XPR has once again been recognized as a Growth and Innovation leader in the Frost Radar™ Extended Detection and Response (XDR) Report, 2024. This year, climbing even higher among the top-ranking solutions, Check Point solidifies its position…
Check Point XDR/XPR Reaches New Heights: Climbing Even Higher as a Frost Radar™ XDR Growth and Innovation Leader in 2024
Check Point Infinity XDR/XPR has once again been recognized as a Growth and Innovation leader in the Frost Radar™ Extended Detection and Response (XDR) Report, 2024. This year, climbing even higher among the top-ranking solutions, solidifying the position as an…
Empowering MSSPs with CloudGuard CSPM: Secure Multi-Cloud Environments with Confidence
As organizations embrace cloud infrastructure at a rapid pace, they face a growing number of challenges: maintaining visibility, ensuring compliance, and mitigating cloud misconfigurations. Managed Security Service Providers (MSSPs) are uniquely positioned to help businesses navigate these hurdles—but they need…
Ecosystem Security: The State of Puebla’s Success Story
In Mexico, the State of Puebla, one of 32 states, is the first in the nation to have launched a comprehensive digital governance initiative with the aim of increasing the accessibility of state-sponsored services. At the outset, the state wanted…
From Trust to Technology: The Cyber Security Pillar of Modern Banking
From leveraging zero-trust frameworks to educating customers, banks must adopt advanced security strategies to counter the evolving cyber threat landscape The International Day of Banks 2024 which falls on December 4th highlights the indispensable role of trust in banking. However,…
Cyber Risk – How to effectively manage fourth-party risks
Originally published in the November 2024 edition of Intelligent Risk magazine Cyber risks have gained numerous business executives’ attention as these risks are effectively operational risks due to their potentially devastating operational and financial impacts, and reputational damage to organizations.…
5G network AI models: Threats and Mitigations
Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive…
Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware
Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a…
Empowering Employees in the Age of AI: Strengthening Cyber Security through Training and Awareness
In today’s rapidly evolving digital landscape, cyber security has emerged as a paramount concern for organizations across all sectors. As cyber threats become more sophisticated, the role of employees in safeguarding organizational assets has never been more critical. Employees serve…
Hamas-linked Threat Group Expands Espionage and Destructive Operations
Check Point Research has been monitoring the ongoing activities of the WIRTE threat actor, which is previously linked to the Hamas-associated group Gaza Cybergang, despite the ongoing conflict in the region. The conflict has not disrupted the group’s activities, and…
Honoring One Year of Check Point’s U.S. Military, Veterans, and Allies ERG: Our Ongoing Dedication to Supporting Veterans
As we mark the one-year anniversary of Check Point’s U.S. Active Military, Veterans, and Allies Employee Resource Group (ERG), we reflect on the profound impact this initiative has had on our workplace community. Designed to cultivate an inclusive and supportive…
October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cyber criminals across the globe. Check Point’s Global…
Incident Response Readiness Journey
Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…
Tackling Cyberbullying with Cyber security to defend the Digital Playground
Cyber security, laws and education being used to combat the rise of cyberbullying. Cyberbullying is a severe, often relentless form of digital harassment that can manifest in many ways, impacting individuals’ emotional well-being and security. On this International Day Against…
Uncovering a Large-Scale Campaign Using the Latest Version of The Rhadamanthys Stealer: Rhadamanthys.07
Executive Summary: Check Point Research has identified a large-scale phishing operation utilizing a new version of Rhadamanthys Stealer. Dubbed CopyRh(ight)adamantys, the operation targets individuals and organizations under the false premise of copyright infringement violations. Attackers create dedicated Gmail accounts and…
Check Point Software Strengthens Cyber Security Training for Enterprises with OffSec’s Advanced Learning Platform
As cyber threats continue to grow in scale and sophistication, continuous cyber security training is crucial for enterprises looking to build resilient defenses. Recent data from Check Point Research (CPR) reveals a 30% increase in cyberattacks in Q2 2024 alone—the…
Check Point Further Enhances Cyber Security Training for IGS Customers with OffSec’s Learn Enterprise
In an era of rapidly evolving cyber threats, the need for continuous cyber security training is more critical than ever. Check Point Research (CPR) even highlights a 30% increase in cyber attacks in Q2 2024 – the highest surge in…
The Evolution of Transparent Tribe’s New Malware
Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…