The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Tag: Check Point Blog
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Stay Safe This Prime Day: Check Point Identifies Rise in Phishing Attacks and Scam Emails
Highlights In the last 30 days, Check Point Research (CPR) has identified over 1,000 newly registered Amazon-related domains, with a staggering 88% of them deemed malicious or suspicious 1 of every 54 new Amazon-related domains includes the phrase “Amazon Prime,”…
Customers Praise Check Point CloudGuard WAF for Exceptional Web Application and API Security
An organization’s attack surface expands with its increasing business application programming interfaces (APIs), which require stronger protection than what traditional cybersecurity solutions offer. Web Application Firewalls (WAFs) defend web applications and APIs against common attacks like structure query language (SQL)…
5,000 Fake Microsoft Emails that Your Employees Could Fall For
EXECUTIVE SUMMARY: In the technology sector, Microsoft stands out as the one of the most frequently impersonated brands. Scammers commonly pose as Microsoft employees or affiliated vendors, deceiving email recipients. According to the latest research findings from Harmony Email &…
How to Safeguard Your Systems from Linux CUPS Vulnerabilities
On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…
Check Point Harmony Endpoint: Strategic Leader in Real-World Endpoint Protection
In the ever-evolving landscape of cybersecurity, theoretical protection is not enough. Businesses need solutions that stand up to real-world threats, day in and day out. That’s why we’re proud to announce that Check Point Harmony Endpoint has been named a…
LINUX CUPS VULNERABILITIES
On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…
Hispanic Heritage Month Spotlight: Ana Perez Quiles
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Ana Perez Quiles, Public Relations Manager, to learn…
Check Point Software Technologies: A Visionary Approach to Workspace Security
In today’s rapidly evolving digital landscape, businesses face unprecedented cybersecurity challenges. The rise of remote work, cloud adoption, and sophisticated cyber threats demand a robust, flexible, and user-friendly endpoint protection solution. Check Point Harmony Endpoint provides exactly this kind of…
The Cryptocurrency Drainer Hiding on Google Play
Executive Summary Check Point Research uncovered a new malicious crypto drainer app on Google Play designed to steal cryptocurrency. The first time a drainer has targeted mobile device users exclusively, this app used modern evasion techniques to avoid detection and…
AI: The New Frontier in Safeguarding Critical Infrastructure
In an era where digital threats loom large, artificial intelligence (AI) emerges as a powerful ally in protecting our vital systems. According to Check Point Research, from January to August 2024, the utilities sector, including critical infrastructure, ranked fifth in…
Cyber Security Leader vs Cyber Security Tag-along: How to Tell the Difference
Throughout history, many fascinating stories have been told about great leaders; Julius Caesar successfully turned Rome into a prosperous empire, and Napoleon Bonaparte famously commanded the French forces on the seas. In 100 BC and 1800, respectively, it was easier…
New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know
Check Point Harmony Email Researchers have recently identified a concerning phishing campaign that spoofs Google Apps Script macros – a tool used to automate tasks in Google applications. Google Apps Script macros are popular due to their abilities to automate…