Highlights: Check Point Research (CPR) warns about online phishing scams related to summer vacations 1 in every 33 new summer vacation related domain registered in the previous month of May was malicious or suspicious CPR provides examples of vacation-related scams…
Tag: Check Point Blog
How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks
A sophisticated new malware/trojan attack is designed to steal login credentials and credit card information from payment systems, banks and crypto exchanges. This attack tricks legitimate business applications into running compromised but innocent-looking dynamic link library (DLL) files — making…
The Evolution of QR Code Phishing: ASCII-Based QR Codes
Introduction Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code attacks. It started with standard MFA authentication requests. It then evolved…
CloudGuard Network Security integrates with AWS Cloud WAN Service Insertion at launch to improve the operational efficiency of cloud security teams
In the ever-evolving landscape of cloud security, staying ahead of threats is the top priority for IT security teams. However, for many organizations experiencing a shortage in security engineers and an overload of security tasks, it is often as important…
May 2024’s Most Wanted Malware: Phorpiex Botnet Unleashes Phishing Frenzy While LockBit3 Dominates Once Again
Researchers uncovered a campaign with Phorpiex botnet being used to spread ransomware through millions of phishing emails. Meanwhile, the Lockbit3 Ransomware group has rebounded after a short hiatus accounting for one-third of published ransomware attacks Our latest Global Threat Index…
Emergency Response: A Harmony SASE Rapid Deployment Story
One of the main advantages of Check Point Harmony SASE is our focus on providing fast deployment that allows our customers to establish a secure cloud network and onboard users in less than an hour. Of course, fast deployment is…
Important Security Update – Stay Protected Against VPN Information Disclosure (CVE-2024-24919)
Updated: May 28, 2024 at 1PM PT Yesterday (May 27, 2024) we delivered a solution that addresses attempts we saw on a small number of customers’ VPN remote access networks as referenced below. Today, we found the root cause for…
Getting to Know Natalia Vezhevatova
Natalia Vezhevatova is a territory account manager at Check Point with a background in IT account management, sales, and renewals. Read on to learn more about Natalia’s career journey and story. Tell us a bit about your background and role…
The 4 Biggest Challenges for the Hybrid Enterprise and What CISOs Need to Solve Them
Organizations are no longer relegated to centralized datacenters, but most aren’t fully remote or in the cloud: their data and operations increasingly follow a hybrid model. This shift is driven by distributed teams, including branch offices, work from home, and…
Extend & Strengthen DDoS Security Across the Entire Network with Infinity Playblocks
New DDoS attack techniques and trends, including AI, application-level attacks, and cloud vulnerabilities, render traditional DDoS security inadequate against modern attacks. At the same, DDoS attacks have increased by 94% in the last year, after rising by 48% the prior…
Important Security Reminder – Install the Fix to Stay Protected
Over the past week, we’ve been monitoring attempts to gain unauthorized access to VPNs, which we attributed to CVE-2024-24919. We quickly generated a fix which ich ensures these attempts are prevented once installed, and we are urging customers to install…
Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities
For years, Check Point has been a top strategic partner for Amazon Web Services with multiple competencies including Security Software and Networking Software. As a global leader in security, Check Point allows customers to do more on AWS—the solutions are…
2024 Cloud Security Report – Available Now
The 2024 Cloud Security Report from Cybersecurity Insiders and Check Point is now available for download. The new report draws on the experience and perspective of over 800 cloud and cybersecurity professionals to provide a deep look at the current…
Important Security Update – Stay Protected Against VPN Information Disclosure (CVE-2024-24919)
Updated: May 28, 2024 at 1PM PT Yesterday (May 27, 2024) we delivered a solution that addresses attempts we saw on a small number of customers’ VPN remote access networks as referenced below. Today, we found the root cause for…
AI Market Research: The Pivotal Role of Generative AI in Cyber Security
What researchers are learning about GenAI and cyber security AI is the hottest topic in the universe. Pair AI with cyber security and the possibilities (and challenges) are staggering. For many security professionals, it’s a foregone conclusion that incorporating intelligence…
Important Security Update – Stay Protected Against VPN Information Disclosure (CVE-2024-24919)
Updated: May 28, 2024 at 1PM PT Yesterday (May 27, 2024) we delivered a solution that addresses attempts we saw on a small number of customers’ VPN remote access networks as referenced below. Today, we found the root cause for…
From Phish to Phish Phishing: How Email Scams Got Smart
One Phish, Two Phish, Spy Phish, AI Phish: How Email Scams Got Smart If only things were this easy. There’s never been a time where phishing was good, but there was certainly a time where phishing seemed quaint. Back in…
Empowering Women Through Mentoring: Meet Rebecca Frizzarin
Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…
Important Security Update – Enhance your VPN Security Posture!
Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and attack vector into enterprises. Attackers are motivated to gain access to organizations over remote-access setups so they…
Unveiling CNAPP+P: The Extra Mile in Cyber Defense
Introduction In the fast-evolving landscape of cyber security, where threats loom large and innovation is constant, staying ahead of the curve is imperative. At CPX 2024, a pivotal event in the realm of cyber security hosted by Check Point, a…