Introduction Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distributors. Launched in 2022 and owned by Pindouduo, it has attracted a large audience, with 40% of its downloads…
Tag: Check Point Blog
Raspberry Robin: Evolving Cyber Threat with Advanced Exploits and Stealth Tactics
Key Highlights: · Rapid Exploit Development: Raspberry Robin leverages new 1-day Local Privilege Escalation (LPE) exploits developed ahead of public knowledge, hinting at either an in-house development capability or access to a sophisticated exploit market. · Innovative Delivery and…
Fake Voicemail as Credential Harvesting Lure
Introduction Hackers will try just about anything to get you to click on a malicious link. The key is to make the overall email seem as believable as possible. The more legitimate it seems, the better. The more believable it…
Generative AI is the Pride of Cybercrime Services
Cybercriminals Officially Utilize Generative AI for Spam Campaigns, Social Media Impersonation and Verification Services Highlights: – Generative AI as a Cybercrime Tool: Cybercriminals are increasingly using generative AI for sophisticated cybercrimes, including social media impersonation, spam campaigns, and KYC verification services.…
Navigating the Cyber security Maze for Small and Medium Business: How Quantum Spark 1900 & 2000 are Reshaping Security for SMBs and MSPs
Innovative Next-Generation Firewalls Deliver Enhanced AI Threat Prevention up to 5 Gbps with a 99.8% block rate against zero-day malware, phishing, and ransomware In an era where cyber threats are becoming increasingly complex, small and medium-sized businesses (SMBs) are finding…
Check Point Software Unveils the Infinity Platform: Pioneering the Future of AI-Powered, Cloud-Delivered Cyber Security
At Check Point Software Technologies, we are always at the forefront of innovative cyber security solutions. Today, we are excited to announce a significant evolution in cyber security technology – the launch of our redefined Check Point Infinity Platform. This…
Singapore’s National Research and Education Network (SingAREN) Protects Vital Research with Check Point Software
SingAREN is Singapore’s national research and community network. One of its main duties is to connect Singapore’s research and educational organizations to research centers across Asia, Australia, Europe, the Middle East and the United States. Researchers rely on SingAREN’s networks…
Congratulating Check Point’s CPX APAC Partner Award Winners
2023 was the year of mega ransomware attacks and AI-fueled cyber threats. The APAC region was hit hardest by cyber attacks, with organizations experiencing an average of 1,930 attacks per week. Our partners were there to support and guide customers…
Check Point Attains ‘Champion’ Status in the Canalys Global Cybersecurity Leadership Matrix for three consecutive years
Check Point has earned the prestigious “Champion” status in the 2023 Canalys Global Cybersecurity Leadership Matrix. This recognition reflects not only exceptional channel management and market performance, but also continued growth in the cybersecurity industry. Check Point has received the…
Pay Now or Pay Later
Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for implementing robust cybersecurity measures in the domains of Operational Technology (OT) and Industrial Control Systems (ICS). Considering the growing convergence of IT and OT, the…
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat
90% of children over 8 years old are already using Internet. Only 40% of parents are aware that their children have faced cyber threats. Education is the cornerstone of our culture, as it allows us to progress as a society…
Conditional QR Code Routing Attacks
Over the summer, we saw a somewhat unexpected rise in QR-code based phishing attacks. These attacks were all fairly similar. The main goal was to induce the end-user to scan the QR Code, where they would be redirected to a…
A Step-by-Step Guide to Spotting and Preventing Frame Injections
Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cybercriminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for phishing…
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam
By: Oded Vanunu, Dikla Barda, Roman Zaikin Main Highlights: 1. Sophisticated Scam Targeting Token Holders: Over 100 popular projects’ token holders targeted with fake NFT airdrops appearing from reputable sources. 2. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims…
Shifting Paradigms: Cloud Security in the Post-Pandemic Era
‘The new normal.’ It began as a buzzword after COVID-19 hit the world in 2020. The new normal referred to a culture that adapted to the pandemic and changed our day-to-day lives. One significant outcome of the lockdown was digital…
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations
A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each experienced over 60,000…
Is Open Source More Risk than Reward?
Open source has become an indispensable aspect of modern software development. From the Linux operating system to the ubiquitous Apache web server, open source projects have sparked innovation, fostered collaboration, and disrupted traditional business models. However, as the open source…
ThreatCloud AI Wins 2024 BIG Innovation Award
The Business Intelligence Group awarded ThreatCloud AI with a 2024 BIG Innovation award. ThreatCloud AI powers Check Point’s entire security portfolio – from edge to cloud to network and beyond. It makes two billion security decisions daily – ensuring that…
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security
As we enter 2024, your organization may have unused MACC or Azure commit-to-consume (CtC) credits as your annual renewal date draws near. These credits are “use them or lose them”—but the good news is that you can now transform those…
Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023
The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten Our latest Brand Phishing Report for Q4 2023 highlights the brands that were…