Savvy security leaders must enable the business and protect their organizations In November 2023, IDC conducted an extensive global survey with 847 security leaders across 17 countries to better identify their roles, responsibilities, and the realities they face on the…
Tag: Check Point Blog
Navigating the Evolution of Cybersecurity: The Leap from NIST 1 to NIST 2
In the rapidly evolving world of cybersecurity, staying ahead of threats requires constant vigilance and adaptation. As a leader in strategic consulting and provider of comprehensive NIST cyber risk assessments, we’re excited to announce the upcoming release of our modified…
PCI Compliance Levels: A Developer’s Guide to PCI Compliance
Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers…
A Shadowed Menace : The Escalation of Web API Cyber Attacks in 2024
Highlights: Significant Increase in Attacks: In the first month of 2024, attempts to attack Web APIs impacted 1 in 4.6 organizations worldwide every week, marking a 20% increase compared to January 2023, highlighting the growing risk associated with API vulnerabilities. Industry-Wide…
VirusTotal Threat Intelligence Now Seamlessly Integrated in Infinity XDR/XPR
Check Point Technologies announces VirusTotal threat intelligence is now an integral part of Infinity XDR/XPR prevention-first security operations platform. Security teams and SOC analysts depend on high quality threat intelligence from multiple sources to investigate indicators of compromise (IOCs) and…
CloudGuard Streamlines Azure Virtual WAN security with Direct Ingress
As Azure Virtual WAN continues to gain popularity among enterprise customers with distributed and complex IT environments, the need for a comprehensive, consolidated, and collaborative security solution to protect these deployments becomes even more crucial. Check Point CloudGuard provides customers…
Securing the Road Ahead: Addressing Persistent Cloud Misconfigurations in the Automotive Industry
Explore a pair of security exposures from the automotive industry and how the proper security tools could have prevented these ‘same old issues’ from happening. Earlier this month, BMW was yet another victim of dangerous misconfigurations in their cloud storage,…
Digital Deception at the Ballot Box: The Shadow Machinery of Election Manipulation: How Deepfake Technology Threatens the 2024 U.S. Elections
Main Takeaways: Widespread Availability: The ease of access to deepfake technology raises alarms for election security. Unmasking the Invisible Architects: The potential for election fraud through the adept use of artificial intelligence and deepfake technologies, orchestrated by a clandestine network…
SASE Survey Reveals User Experience Is Top of Mind
The results are in: end user experience is everything when it comes to SASE. That was the primary feedback from 650 security professionals we surveyed regarding SASE adoption. A full 71% put end user experience as their top concern. This…
2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report
Key Takeaways: · Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. · Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…
Hybrid Mesh and the Check Point Infinity Platform
Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…
CPX Vienna 2024: Celebrating the Pinnacle of Partnership Excellence
As the digital landscape evolves, so does the essence of collaboration and innovation within our partner ecosystem. The CPX Vienna 2024 stands as a testament to this journey, culminating in the prestigious Check Point Partner Awards. These awards spotlight the…
Getting to Know Muhammad Yahya Patel
Muhammad (Mo) Yahya Patel is a lead security engineer and a member of Check Point’s Office of the CTO. Before joining Check Point, Mo worked as a security consultant, designing and implementing security solutions for private and public sector organisations…
Check Point Research Unveils Critical #MonikerLink Vulnerability in Microsoft Outlook with a 9.8 CVSS Severity Score
Key Findings: – Hyperlink Handling in Outlook: The research demonstrates that “file://” hyperlinks can be manipulated in a certain way which results in a bypass of the Outlook’s security measures such as Protected View. – The Vulnerability’s Impact: The #MonikerLink…
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
As we navigate the digital dimensions of love and affection this Valentine’s Day 2024, the landscape is both vast and fraught with pitfalls. In an eye-opening revelation, January saw the creation of 18,171 new domains containing ‘Valentine’ or ‘love’, indicating…
Get to Know Check Point Harmony SASE
Check Point’s new Secure Access Service Edge (SASE) offering is now called Harmony SASE. The world has changed in the last few years, and the old way of securing a standard on-premises network, with its notions of inside and outside…
Are People Problems Blocking Your Secure Cloud Migration?
Jonathan Maresky, Cloud Security Product Marketing Manager What gets in the way of successful and secure cloud migrations? Ask most CIOs, cloud architects or IT engineers that question, and their minds will probably first go to technological hurdles – like…
Empowering Women in Cybersecurity: Bridging the Gender Gap
On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue…
January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats
Researchers uncovered a large cyber threat distributor known as VexTrio, which serves as a major traffic broker for cybercriminals to distribute malicious content. Meanwhile, LockBit3 topped the list of active ransomware groups and Education was the most impacted industry worldwide …
MalDocs in Word and Excel: A Persistent Cybersecurity Challenge
Highlights · Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802. · Widespread Use by Cybercriminals:…