SingAREN is Singapore’s national research and community network. One of its main duties is to connect Singapore’s research and educational organizations to research centers across Asia, Australia, Europe, the Middle East and the United States. Researchers rely on SingAREN’s networks…
Tag: Check Point Blog
Congratulating Check Point’s CPX APAC Partner Award Winners
2023 was the year of mega ransomware attacks and AI-fueled cyber threats. The APAC region was hit hardest by cyber attacks, with organizations experiencing an average of 1,930 attacks per week. Our partners were there to support and guide customers…
Check Point Attains ‘Champion’ Status in the Canalys Global Cybersecurity Leadership Matrix for three consecutive years
Check Point has earned the prestigious “Champion” status in the 2023 Canalys Global Cybersecurity Leadership Matrix. This recognition reflects not only exceptional channel management and market performance, but also continued growth in the cybersecurity industry. Check Point has received the…
Pay Now or Pay Later
Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for implementing robust cybersecurity measures in the domains of Operational Technology (OT) and Industrial Control Systems (ICS). Considering the growing convergence of IT and OT, the…
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat
90% of children over 8 years old are already using Internet. Only 40% of parents are aware that their children have faced cyber threats. Education is the cornerstone of our culture, as it allows us to progress as a society…
Conditional QR Code Routing Attacks
Over the summer, we saw a somewhat unexpected rise in QR-code based phishing attacks. These attacks were all fairly similar. The main goal was to induce the end-user to scan the QR Code, where they would be redirected to a…
A Step-by-Step Guide to Spotting and Preventing Frame Injections
Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cybercriminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for phishing…
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam
By: Oded Vanunu, Dikla Barda, Roman Zaikin Main Highlights: 1. Sophisticated Scam Targeting Token Holders: Over 100 popular projects’ token holders targeted with fake NFT airdrops appearing from reputable sources. 2. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims…
Shifting Paradigms: Cloud Security in the Post-Pandemic Era
‘The new normal.’ It began as a buzzword after COVID-19 hit the world in 2020. The new normal referred to a culture that adapted to the pandemic and changed our day-to-day lives. One significant outcome of the lockdown was digital…
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations
A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each experienced over 60,000…
Is Open Source More Risk than Reward?
Open source has become an indispensable aspect of modern software development. From the Linux operating system to the ubiquitous Apache web server, open source projects have sparked innovation, fostered collaboration, and disrupted traditional business models. However, as the open source…
ThreatCloud AI Wins 2024 BIG Innovation Award
The Business Intelligence Group awarded ThreatCloud AI with a 2024 BIG Innovation award. ThreatCloud AI powers Check Point’s entire security portfolio – from edge to cloud to network and beyond. It makes two billion security decisions daily – ensuring that…
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security
As we enter 2024, your organization may have unused MACC or Azure commit-to-consume (CtC) credits as your annual renewal date draws near. These credits are “use them or lose them”—but the good news is that you can now transform those…
Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023
The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten Our latest Brand Phishing Report for Q4 2023 highlights the brands that were…
December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates
Researchers discovered a revival of the Qbot malware, which was detected in phishing attempts directed at the hospitality industry. Meanwhile, downloader FakeUpdates jumped into first place Our latest Global Threat Index for December 2023 saw researchers identify the resurrection of…
Alkem Laboratories Future-Proofs Security Infrastructure with Check Point Software Technologies
Alkem Laboratories is a leading pharmaceutical company with over 23 manufacturing facilities in India and the United States of America. For over 50 years, Alkem has focused their 500 scientists working across five R&D centers on innovations aligned with the…
IoT – The key to connected care excellence
Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security…
Mastering the Art of Cyber Resilience in Operational Technology
I recently joined industry colleagues and the World Economic Forum in publishing, “Unlocking Cyber Resilience in Industrial Environments: Five Principles.” It’s a comprehensive guide designed to enhance cybersecurity in operational technology (OT) environments. Our white paper underscores the significance of…
Microsoft Defender for Endpoint is Integrated with Check Point Horizon XDR/XPR
Microsoft Defender for Endpoint integrates with Check Point’s extended detection and response (XDR) solution – Horizon XDR/XPR. One-click integration connects the endpoint solution and telemetry is added to the XDR/XPR artificial intelligence (AI) driven data correlation engine. XDR/XPR combines data…
Top Reasons to Attend CPX 2024
What is CPX 2024? CPX 2024 is an annual cyber security conference hosted by Check Point for security professionals worldwide. Registration is now open and we invite you to join us to learn the latest trends, challenges, and opportunities shaping…