Royce Ho is a Regional Threat Prevention Security Consultant for the Southeast Asia & Korea (SEAK) region at Check Point Software Technologies. Prior to Check Point, he worked at CSIntelligence, Deloitte, F5 Networks and StarHub. Royce received a Bachelor’s of…
Tag: Check Point Blog
Santa’s presents can be your worst spy this Christmas: five must-haves to keep this Season’s treats safe from cyber criminals
IoT devices offer many benefits, but they also have a very weak security system, making them a highly vulnerable technology. In light of this potential risk, Check Point Software suggests five key steps to strengthen protection and ensure the safe…
Birmingham Public Schools Teams with Check Point to Build Cyber Resilience
Schools across the United States are facing an unprecedented surge in cyberattacks. In fact, Check Point Research found that the education/research sector experienced the highest number of attacks, with an average of 2160 attacks per organization per week during the…
Unveiling the New Threats: Rhadamanthys v0.5.0 A Research Overview by Check Point Research (CPR)
Key Insights: · The Evolving Threat: The Rhadamanthys stealer, a multi-layered malware, is now available in its latest iteration, version 0.5.0, enhancing its capabilities and introducing new spying functions. · Customizable and Dangerous: Its plugin system allows it to be…
November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus
Researchers reported on a new AsyncRAT campaign where malicious HTML files were being used to spread the stealthy malware. Meanwhile, downloader FakeUpdates jumped straight into second place after a short break from the top ten list Our latest Global Threat…
Meet the new CloudGuard: Risk Management in Action
A critical CVE or Common Vulnerability and Exposure is identified every day. Security teams need to plan the measures (mitigation strategies) taken to reduce the harmful effects of a CVE, to ensure that the applications they are managing remain secure…
Empower Cyber Security Defenses with Horizon IOC
Cyber security threats move fast, so having a robust and centralized solution for managing Indicators of Compromise (IOCs) is crucial. Check Point introduces Horizon IOC, an innovative platform designed to streamline IOC management across the enterprise. Centralized IOC Management for…
Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000%
By Oded Vanunu, Dikla Barda, Roman Zaikin Unmasking Deceptive Tactics: A recent investigation by Check Point Research exposes a troubling trend in the cryptocurrency landscape. Deceptive actors are manipulating pool liquidity, sending token prices soaring by a shocking 22,000%. $80,000…
How the Denver Broncos Intercepts Cyber Threats with Check Point
The Denver Broncos, a professional football club in the National Football League, depend on Check Point’s cyber security portfolio to protect Empower Field at Mile High, the team and staff. With a combination of Check Point CloudGuard, Quantum and Harmony,…
Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced
Highlights · Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks. ·…
Check Point Secures Broncos Country
The Denver Broncos, a professional football club in the National Football League, depend on Check Point’s cyber security portfolio to protect Empower Field at Mile High, the team and staff. With a combination of Check Point CloudGuard, Quantum and Harmony,…
Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel
Highlights: · Expanded Cyber Frontline: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with a…
Check Point Research Report: Shift in Cyber Warfare Tactics – Iranian Hacktivist Proxies Extend Activities Beyond Israel
Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with…
AWS Security Hub and 4 Ways to Enhance Security
Securing software engineering and operational processes has become increasingly challenging over the past decade. The majority of workloads have been migrated to the cloud, and a larger number of engineers are now working remotely. If your organization employs a cloud-native…
Information is power, but misinformation is just as powerful
The disinformation and manipulation techniques employed by cybercriminals are becoming increasingly sophisticated due to the implementation of Artificial Intelligence in their systems The post-truth era has reached new heights with the advent of artificial intelligence (AI). With the increasing popularity…
Unlocking the Power of MITRE ATT&CK: A Comprehensive Blog Series on Implementation Strategies for Incident Response Teams
Welcome to this journey of blog posts which will be a series on implementations of MITRE ATT&CK for Incident Response Teams. Each post aims to build on top of the previous one. As for any roadmap, application of the several…
What You Need to Know about the Pennsylvania Water Authority’s Breach
Pennsylvania Water Authority hit by supply chain attack, demonstrating it’s possible to be a victim without being the main target of a cyberattack Iran affiliated hackers are claiming responsibility What Happened? Over the weekend, threat actors took control of a…
Reasons Your WAN is Failing You, and What You Can Do About It
According to Gartner® by 2026, 70% of enterprises will have implemented SD-WAN[1] with adoption growing at a CAGR of 26%[2]. The move to cloud-based services and cloud-based infrastructure is leading organizations to rethink their networking infrastructure. Biggest WAN Limitations Here…
Reasons your WAN is Failing You, and What You Can You Do about It
According to Gartner® by 2026, 70% of enterprises will have implemented SD-WAN[1] with adoption growing at a CAGR of 26%[2]. The move to cloud-based services and cloud-based infrastructure is leading organizations to rethink their networking infrastructure. Biggest WAN Limitations Here…
CRN Names Check Point’s Christina Ruth to its 2023 Channel Women on the Rise List
Check Point is proud to announce that CRN®, a brand of The Channel Company, has named Christina Ruth, Channel Account Manager, to its 2023 Channel Women on the Rise list. This list honors up-and-coming, dedicated, driven women who are making…