Tag: Check Point Software

NSA, CISA& FBI Alert on Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors – Check Point Customers Remain Fully Protected

Background Recently, the joint cybersecurity advisory (CSA) provided the top Common Vulnerabilities and Exposures (CVEs) used since 2020 by People’s Republic of China (PRC) state-sponsored cyber actors as assessed by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency…

NSA, CISA& FBI Alert on Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors – Check Point Customers Remain Fully Protected

Background Recently, the joint cybersecurity advisory (CSA) provided the top Common Vulnerabilities and Exposures (CVEs) used since 2020 by People’s Republic of China (PRC) state-sponsored cyber actors as assessed by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency…

Three Key Takeaways from Microsoft Ignite

By, Russell Tal This year, Microsoft’s Ignite conference is different. With both in-person and virtual options, Microsoft promises a new kind of Ignite, with an emphasis on “Do more with less in the Microsoft Cloud.” Check Point’s cloud security platform…

NSA, CISA& FBI Alert on Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors – Check Point Customers Remain Fully Protected

Background Recently, the joint cybersecurity advisory (CSA) provided the top Common Vulnerabilities and Exposures (CVEs) used since 2020 by People’s Republic of China (PRC) state-sponsored cyber actors as assessed by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency…

Protecting your assets in the cloud

By Jon Harlow, published Oct, 2022 Securing your business domain needs to be as natural as locking the door and switching on the alarm when you leave. That used to be the basis of security, right? Nobody gets through a…

Three Key Takeaways from Microsoft Ignite

By, Russell Tal This year, Microsoft’s Ignite conference is different. With both in-person and virtual options, Microsoft promises a new kind of Ignite, with an emphasis on “Do more with less in the Microsoft Cloud.” Check Point’s cloud security platform…

Protecting your assets in the cloud

By Jon Harlow, published Oct, 2022 Securing your business domain needs to be as natural as locking the door and switching on the alarm when you leave. That used to be the basis of security, right? Nobody gets through a…

What’s the Story Around Cyber Attackers and IP Cameras?

By Miri Ofir, R&D Director, Quantum IoT Protect, Check Point  Internet-connected security cameras are everywhere these days – public spaces, organizations, and even private homes. The market is estimated at around $50B for 2021 and rapidly growing. Every day, hundreds…

New Hacktivism Model Trends Worldwide

Check Point Research outlines a new model of hacktivism now trending worldwide. Five characteristics mark today’s form of hacktivism, according to researchers: political ideology, leadership hierarchy, formal recruiting, advanced tools and public relations. CPR gives the hacktivist group Killnet as…

What’s the Story Around Cyber Attackers and IP Cameras?

By Miri Ofir, R&D Director, Quantum IoT Protect, Check Point  Internet-connected security cameras are everywhere these days – public spaces, organizations, and even private homes. The market is estimated at around $50B for 2021 and rapidly growing. Every day, hundreds…

New Hacktivism Model Trends Worldwide

Check Point Research outlines a new model of hacktivism now trending worldwide. Five characteristics mark today’s form of hacktivism, according to researchers: political ideology, leadership hierarchy, formal recruiting, advanced tools and public relations. CPR gives the hacktivist group Killnet as…

GCP, therefore IAM

Google Cloud Platform (GCP) Permissions Handling By: Eyal Levy- CloudGuard, Research Team Introduction Managing access authorization for your cloud assets is a challenging task. Certainly, when dealing with multiple public/private resources, environments, services, providers, and users. The GCP IAM service,…

From zero to hero in blockchain security – A CP workshop at DEF CON 30

DEF CON is one of the world’s largest and most notable cyber conventions, held annually in Las Vegas, Nevada. DEF CON first took place in June 1993 and today, attendees include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture,…

Github “Supply Chain” Attack

Just this morning, a significant software “supply chain” attack was discovered in Github, and while the attack was prevented from spreading further, the ramifications of “supply chain” attacks are clear and intimidating. This recent attack was executed in Github –…

Check Point announces its Azure Virtual WAN security solution

By Hezi Bahry, Cloud Network Security Product Manager, published August 1, 2022 Azure Virtual WAN, a Microsoft Network-as-a-Service, is already generating significant interest because of its operational improvements and advanced feature sets. Organizations using Azure Virtual WAN’s capabilities need to…

Getting the most from Microsoft Inspire 2022

By Paul Ardoin, Manager, Cloud Security Partner Marketing If you’re a channel partner or seller of Microsoft and Check Point offerings, it’s time to celebrate our joint successes over the last twelve months! Microsoft Inspire, a virtual event      held July…

Is your SWG smarter than an SNI Jedi Master?

In our previous blog, we discussed how not all secure web gateways can prevent SNI fraud, risking connections to malicious servers or sites. In this post, we take a deeper look at what SNI fraud is and how it can…

8 Million Dollars Stolen in a Uniswap Phishing Attack

Uniswap is a leading decentralized crypto exchange that runs on the Ethereum blockchain, which uses a decentralized network protocol. The protocol facilitates automated transactions between cryptocurrency tokens on the Ethereum blockchain using smart contracts. Yesterday, the Binance CEO @cz_binance triggered…

Can your Secure Web Gateway (SWG) prevent SNI fraud?

Can your Secure Web Gateway (SWG) prevent SNI fraud? We checked and some of the top gateways can’t. Preventing attempts to bypass SNI-based HTTPS filtering can make the difference between a breach and staying safe. Is Your SWG’s URL-Filter up…

RSS Testing

Testing post. The post RSS Testing appeared first on Check Point Software. This article has been indexed from Check Point Software Read the original article: RSS Testing

4 Tips for an Airtight Kubernetes Security Policy

This article has been indexed from Check Point Software By Dotan Nahum Kubernetes powers significant automation capabilities for developers in deploying, managing, scaling, and ensuring the availability of containerized apps. Data from 2021 shows that adoption continues to rise with over 5.6…

Check Point protects against malicious Chrome extensions

This article has been indexed from Check Point Software Recently, Check Point’s Infinity XDR, which will be officially available later this year, detected an evasive malicious Chrome extension which modifies the Chrome LNK files (the shortcuts to the Chrome browser…

The IaC Showdown: Terraform vs. Ansible

This article has been indexed from Check Point Software By Dotan Nahum Infrastructure as code (IaC) has become the de-facto method for dealing with infrastructure at scale. This codification of infrastructure configurations lets software development teams create version-controlled, reusable configurations.…

5 Essential Ways to Improve SDLC Security

This article has been indexed from Check Point Software By Dotan Nahum Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting pressure on DevOps teams to detect and…