Highlights: · Expanded Cyber Frontline: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with a…
Tag: Check Point Blog
Check Point Research Report: Shift in Cyber Warfare Tactics – Iranian Hacktivist Proxies Extend Activities Beyond Israel
Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with…
AWS Security Hub and 4 Ways to Enhance Security
Securing software engineering and operational processes has become increasingly challenging over the past decade. The majority of workloads have been migrated to the cloud, and a larger number of engineers are now working remotely. If your organization employs a cloud-native…
Information is power, but misinformation is just as powerful
The disinformation and manipulation techniques employed by cybercriminals are becoming increasingly sophisticated due to the implementation of Artificial Intelligence in their systems The post-truth era has reached new heights with the advent of artificial intelligence (AI). With the increasing popularity…
Unlocking the Power of MITRE ATT&CK: A Comprehensive Blog Series on Implementation Strategies for Incident Response Teams
Welcome to this journey of blog posts which will be a series on implementations of MITRE ATT&CK for Incident Response Teams. Each post aims to build on top of the previous one. As for any roadmap, application of the several…
What You Need to Know about the Pennsylvania Water Authority’s Breach
Pennsylvania Water Authority hit by supply chain attack, demonstrating it’s possible to be a victim without being the main target of a cyberattack Iran affiliated hackers are claiming responsibility What Happened? Over the weekend, threat actors took control of a…
Reasons Your WAN is Failing You, and What You Can Do About It
According to Gartner® by 2026, 70% of enterprises will have implemented SD-WAN[1] with adoption growing at a CAGR of 26%[2]. The move to cloud-based services and cloud-based infrastructure is leading organizations to rethink their networking infrastructure. Biggest WAN Limitations Here…
Reasons your WAN is Failing You, and What You Can You Do about It
According to Gartner® by 2026, 70% of enterprises will have implemented SD-WAN[1] with adoption growing at a CAGR of 26%[2]. The move to cloud-based services and cloud-based infrastructure is leading organizations to rethink their networking infrastructure. Biggest WAN Limitations Here…
CRN Names Check Point’s Christina Ruth to its 2023 Channel Women on the Rise List
Check Point is proud to announce that CRN®, a brand of The Channel Company, has named Christina Ruth, Channel Account Manager, to its 2023 Channel Women on the Rise list. This list honors up-and-coming, dedicated, driven women who are making…
Check Point CloudGuard: A Leader and Fast Mover in GigaOm’s Radar Report for CSPM
The process of transitioning to the cloud is complex and non-linear, with companies moving through various phases. The diversity of technologies used in cloud applications and the evolving dynamics of security teams within organizations add to the complexity. To effectively…
Unlocking a World of Cybersecurity Insights with the CISO’s Secrets Podcast
As the world of cybersecurity continues to evolve and present new challenges, staying informed and connected to industry leaders is crucial. To that end, the Infinity Global Services team is proud to announce Season 5 of the CISO’s Secrets podcast!…
Check Point enhances AWS security—see it in action at AWS re:Invent!
For over a decade, cloud experts and customers have gathered at AWS’s flagship conference, AWS re:Invent. It’s a week of knowledge and inspiration, and this year it’s November 27 to December 1 at The Venetian in Las Vegas. We invite…
Comparative Study Results on Linux and Windows Ransomware Attacks, Exploring Notable Trends and Surge in Attacks on Linux Systems
Highlights: Evolving Landscape: Check Point Research (CPR) unveils a comprehensive study exploring the surge in ransomware attacks on Linux systems, drawing comparisons to their Windows counterparts. Simplification Trend: CPR’s analysis reveals a notable trend towards simplification among Linux-targeting ransomware…
The Human Factor of Cyber Security
In my 2 decade career in cybersecurity, I have observed firsthand that while technology plays a significant role protecting organizations, the human element is equally crucial. It is often said that the most sophisticated security protocols can be undermined by…
New ThreatCloud AI engine designed to prevent IPFS attacks
In the ever-evolving landscape of cyber threats, the rise of decentralized technologies, particularly the Interplanetary File System (IPFS), has ushered in both challenges and opportunities for attackers. In this blog post, we embark on a journey into the realm of…
Decrypting Danger: Check Point Research deep-dive into cyber espionage tactics by Russian-origin attackers targeting Ukrainian entities
Highlights: Gamaredon, a distinct APT player in Russian espionage, stands out for its large-scale campaigns primarily targeting Ukrainian entities. The USB worm, LitterDrifter, reveals a global impact with potential infections in countries like the USA, Vietnam, Chile, Poland, Germany, and…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
November Shopping Schemes: Check Point Research Unveiling Cybercriminal Tactics as Luxury Brands Become Pawns in Email Scams
Highlights: Delivery service and shipping sectors are the focus of cybercriminals during this shopping period. October 2023 saw a 13% increase in the number of malicious files related to orders and delivery/shipping compared to October 2022. Check Point Research Exposes…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…