Tag: Check Point Software

Secure Your Migration to AWS, Part I: The Challenges

This article has been indexed from Check Point Software By Mark Brindley, Head of Cloud Alliance The cloud provides the infrastructure backbone for most enterprises, as well as the delivery of mission-critical applications. In the last decade, the cloud has…

The complete guide to SSH keys in GitLab

This article has been indexed from Check Point Software By Dotan Nahum April 20, 2022 No one wants to send their precious information over unencrypted channels. This is why most websites and web services use HTTPS to encrypt data by…

The Age of Zero-day Java Vulnerabilities

This article has been indexed from Check Point Software Spring4Shell, Log4j and a few good tips for staying secure By Idan Sofer May 5th, 2022 Well it is now safe to say that the season of Java vulnerability exploits is…

Cracks forming in the ransomware ecosystem

This article has been indexed from Check Point Software According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat to businesses worldwide. Gone are the days when ransomware actors would target a single machine and…

GitLab vs GitHub: Which is right for you?

This article has been indexed from Check Point Software By Dotan Nahum It is safe to say that most code in the world resides on either GitLab or GitHub. Which makes perfect sense in a cloud-based, OSS-dependent world. Without them,…

Spring4Shell Zero-Day Vulnerability

This article has been indexed from Check Point Software Vulnerability Discovered in Java Spring Framework. Check Point Customers using CloudGuard AppSec preemptive protection are fully protected from Spring4Shell Attacks About the Spring4Shell The Spring Framework is a programming and configuration…

LAPSUS$ & OKTA: The Cyber Attacks Continue

This article has been indexed from Check Point Software Lapsus$, a Portuguese hacking group from Brazil, has recently been linked to cyber attacks on some high-profile targets. The cyber gang is best known for publishing sensitive information stolen from major…

LAPSUSS & Okta: The Cyber Attacks Continue

This article has been indexed from Check Point Software Lapsus$, a Portuguese hacking group from Brazil, has recently been linked to cyber attacks on some high-profile targets. The cyber gang is best known for publishing sensitive information stolen from major…

OKTA breached by Lapsus$ Ransomware Gang

This article has been indexed from Check Point Software Identity firm OKTA breached by Lapsus$ Ransomware Gang. Millions of users potentially compromised globally What do we know by now? According to official statement from Okta, the authentication services company is…

Top 9 Git Secret Scanning Tools for DevSecOps

This article has been indexed from Check Point Software By Dotan Nahum Part of the Spectral API Security Series Collaboration is key. Not only in software development. But when it comes to collaboration on Git repositories, the word “key” takes on…

Top 9 Git Secret Scanning Tools for DevSecOps

This article has been indexed from Check Point Software By Dotan Nahum Part of the Spectral API Security Series Collaboration is key. Not only in software development. But when it comes to collaboration on Git repositories, the word “key” takes on…

Cloud vs. “Traditional” IT Compliance

This article has been indexed from Check Point Software Author: Kristin Manogue, Global Programs When technology is advancing day by day, companies tend to seek out opportunities that could lead to competitive advantages. Cloud has been one of the key…

Check Point Research Reveals Leaks of Conti Ransomware Group

This article has been indexed from Check Point Software Conti’s Inside Operations Revealed: Employees think they are Working for a Legal High-Tech Company After analyzing leaked documents, Check Point Research (CPR) gives new details on the inside-operations of Conti, the…

8 Top Git Security Issues & What To Do About Them

This article has been indexed from Check Point Software By Eyal Katz Git is the most popular software version control (SVC) standard used by developers today. That doesn’t make it the most secure. Whether you’re using GitLab, GitHub, or a locally…

Lapsus$ Ransomware Gang – A Malware in Disguise

This article has been indexed from Check Point Software 07/03/2022 Lapsus$ Ransomware gang uses stolen source code to disguise malware files as trustworthy. Check Point customers remain protected Background A ransomware gang named Lapsus$, which took responsibility for last week’s…

Telegram becomes a digital forefront in the Conflict

This article has been indexed from Check Point Software Cyber-attacks, fraud and news feeds: Cyber criminals and Hacktivists Leverage Telegram for conflict-related Activities Highlights: Amid East European conflict, users volume grew hundred folds daily on Telegram related groups, peaking at…

How the Eastern Europe Conflict Has Polarized Cyberspace

This article has been indexed from Check Point Software Abstract The war between Russia and Ukraine is advancing. People everywhere are deciding who they will support. The same dynamic happens in the cyberspace. Hacktivists, cybercriminals, white hat researchers or even…

How the Ukrainian Conflict Has Polarized Cyberspace

This article has been indexed from Check Point Software Abstract The war between Russia and Ukraine is advancing. People everywhere are deciding who they will support. The same dynamic happens in the cyberspace. Hacktivists, cybercriminals, white hat researchers or even…

How The Eastern Europe Conflict Polarized Cyberspace

This article has been indexed from Check Point Software Abstract The war between Russia and Ukraine is advancing. People everywhere are deciding who they will support. The same dynamic happens in the cyberspace. Hacktivists, cybercriminals, white hat researchers or even…

Staying Safe in Times of Cyber Uncertainty

This article has been indexed from Check Point Software Given the recent geo-political uncertainty, Cyber security professionals need to prepare for a continued uptick in threat activity. Instances have already been reported. For example, Check Point research teams encountered an…

Stay Protected in Times of Cyber Uncertainty

This article has been indexed from Check Point Software Given the recent geo-political uncertainty, security professionals need to be prepared for Cyber-criminals to seize the global crisis to launch dangerous cyber exploits. These may include Gen V cyber-attacks as well…

SASE vs. SSE – What’s the difference?

This article has been indexed from Check Point Software By Mor Ahuvia, Product Marketing Manager SASE vs. SSE – What’s the difference While the security access service edge, or SASE, describes an architecture framework that consolidates networking and security delivered…

The 2022 Workforce Security Report

This article has been indexed from Check Point Software By: Danielle Guetta, Product Marketing Manager With 57% of 1200 security professionals reporting that more than half of their workforce works remotely at least two days a week, the question of…

Check Point Harmony Connect SASE just got Sassier

This article has been indexed from Check Point Software Kicking off 2022 with new features, Check Point Harmony Connect SASE now offers VPN-as-a-service, new global PoPs and device posture validation for remote access As announced at CPX 360 Americas, we…

How Hackers Run Token Scams to “Rug Pull” Money

This article has been indexed from Check Point Software In a new publication, Check Point Research (CPR) shows how scammers misconfigure smart contracts to create fraudulent tokens. The report details the method scammers are currently using to “rug pull” money…

2022: A New Strategy for the New Year

This article has been indexed from Check Point Software Driving Impact and Changing the Game in Cyber Security By Peter Alexander, CMO Check Point Check Point is transforming in 2022! A series of new strategic directions will reshape cyber security…

How SASE protects from Log4j

This article has been indexed from Check Point Software By Mor Ahuvia, Product Marketing Manager and Bob Bent, Partner Solutions Engineer LOG4J lessons – How SASE protects from 0-day exploits Log4J shows why the quality of threat prevention is so…

Log4j vulnerability Protection for Endpoints

This article has been indexed from Check Point Software By Noa Goldstein, Product Marketing Manager, Shlomi Gvili, Senior Product Manager and Gal Carmeli, Harmony Endpoint R&D Group Manager. Learn how Harmony Endpoint prevents log4j related attacks and accelerate detection and…

Is ZTNA Your First Stop to SASE?

This article has been indexed from Check Point Software By, Mor Ahuvia, Product Marketing Manager While some teams prioritize secure browsing for remote employees, others need to ensure zero trust network access to their most sensitive resources before anything else.…

A deep dive into a real-life Log4j exploitation

This article has been indexed from Check Point Software The widely used Apache Log4j vulnerability is still making waves worldwide. After witnessing over 1,272,000 attempts to allocate the vulnerability, and attempted exploits on over 44% of corporate networks globally, Check…

The numbers behind a cyber pandemic – detailed dive

This article has been indexed from Check Point Software Precisely one year after the SolarWinds Hack, the groundbreaking supply chain attack the world experienced, and while organizations are still struggling to protect the software supply chain from third-party risk, the Apache…

Protect Yourself Against The Apache Log4j Vulnerability

This article has been indexed from Check Point Software What happened? On December 9th, an acute remote code execution (RCE) vulnerability was reported  in the Apache logging package Log4j 2 versions 2.14.1 and below (CVE-2021-44228). Apache Log4j is the most…