This article has been indexed from Check Point Software Check Point Research (CPR) warns of potential ransomware attacks, as it sees samples of Emotet fast-spreading via Trickbot. Since Emotet’s takedown by law enforcement, CPR estimates 140,000 victims of Trickbot, across…
Tag: Check Point Software
Check Point named a Major Player in Modern Endpoint Software Security for Small and Midsize Businesses in the latest IDC MarketScape Report
This article has been indexed from Check Point Software We are proud to announce that Check Point is recognized as a Major Player in the IDC MarketScape: Worldwide Modern Endpoint Security 2021 Vendor Assessment for Small and Midsize Businesses (Doc…
Check Point Software named a Major Player in Modern Endpoint Security for Enterprise in the latest IDC MarketScape Report
This article has been indexed from Check Point Software By Dana Katz, Head of Product Marketing, Threat Prevention and Shlomi Gvili, Senior Product Manager, Harmony Endpoint We are proud to announce that Check Point is recognized as a Major Player…
SMS Messages Socially Engineered to Steal Billions of Rial from Iran’s Citizens
This article has been indexed from Check Point Software In the midst of major cyber attacks targeting the general population of Iran, Check Point Research (CPR) sees ongoing malicious campaigns using socially engineered SMS messages to infect tens of thousands of devices…
Come Meet Check Point Software at AWS re:Invent 2021
This article has been indexed from Check Point Software By Russell Tal, Alliance Marketing Manager AWS re:Invent is just around the corner and Check Point is proud to be a Platinum Sponsor of the ninth annual event! Considered one of…
Check Point CloudGuard Network Security streamlines operational efficiency with as-a-Service solution on AWS
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published November 29, 2021 Check Point is honored and excited to take cloud security innovation to the next level through its integration with AWS…
Check Point Research discover vulnerabilities in smartphones chips embedded in 37% of smartphones around the world
This article has been indexed from Check Point Software Highlights Check Point Research discovered vulnerabilities in MediaTek’s chips, embedded in 37% of all smartphones globally CPR discovered several vulnerabilities in the audio processor that are accessible from the Android user…
Check Point Research discover vulnerabilities in smartphones chips embedded in 37% of smartphones around the world
This article has been indexed from Check Point Software Highlights Check Point Research discovered vulnerabilities in MediaTek’s chips, embedded in 37% of all smartphones globally CPR discovered several vulnerabilities in the audio processor that are accessible from the Android user…
What is ThreatCloud and how does it work
This article has been indexed from Check Point Software ThreatCloud, the brain behind Check Point Software’s threat prevention power, combines big data threat intelligence with advanced AI technologies to provide accurate prevention to all Check Point Software customers. So how…
Cyber Security in the Public Sector: Global Trend Toward Increasingly Lucrative Public Sector Targets
This article has been indexed from Check Point Software There’s nothing quite like a global pandemic with legally enforceable lockdowns to expose the public sector’s dependence on outdated digital infrastructure. While the devastating SolarWinds “sunburst” attack made headlines in 2020…
Cyber Security in the Public Sector: Global Trend Toward Increasingly Lucrative Public Sector Targets
This article has been indexed from Check Point Software There’s nothing quite like a global pandemic with legally enforceable lockdowns to expose the public sector’s dependence on outdated digital infrastructure. While the devastating SolarWinds “sunburst” attack made headlines in 2020…
Azure Security must enable change to effectively support remote employees: Part 3
This article has been indexed from Check Point Software By Russell Tal, Alliance Marketing Manager The first two blogposts in this series discussed how the cyber risks have changed in today’s cloud security landscape as organizations have increased their cloud…
Number of Malicious Shopping Websites Jumps 178% ahead of November e-Shopping Holidays, Breaking Records
This article has been indexed from Check Point Software Highlights: Check Point Research (CPR) spots over 5300 different malicious websites per week, marking the highest since the beginning of 2021 Numbers show a 178% increase compared to 2021 so far…
When ‘Good Enough’ Security Just Isn’t Enough
This article has been indexed from Check Point Software By Hezi Chen, Head of Competitive Intelligence You assume your security architecture is secure, that’s not always the case Organizations that provide security understand their products must be secure. Unfortunately, this…
October 2021’s Most Wanted Malware: Trickbot Takes Top Spot for Fifth Time
This article has been indexed from Check Point Software Check Point Research reveals that Trickbot is the most prevalent malware and a new vulnerability in Apache is one of the most exploited vulnerabilities worldwide. Education and Research top the target…
Check Point recognized as Leader in the 2021 Gartner® Network Firewall Magic Quadrant™
This article has been indexed from Check Point Software Being a leader is not a one-time effort. Instead, we believe, being a Leader in one of the most dynamic and unpredictable markets on earth means continuously innovating to meet evolving…
Azure security must enable change to effectively support remote employees: Part 2
This article has been indexed from Check Point Software By Russell Tal, Alliance Marketing Manager In the first part of this three-part blogpost series, we discussed how the pandemic has drastically accelerated adoption of cloud technologies like Microsoft Azure, and…
Azure security must enable change to effectively support remote employees: Part 1
This article has been indexed from Check Point Software By Russell Tal, Alliance Marketing Manager In March 2020, the world changed forever, and the COVID-19 pandemic has driven radical changes in business operations. Organizations were forced to transition their workforce…
Scammers used Google Ads to Steal ~ $500k Worth of Cryptocurrency
This article has been indexed from Check Point Software Check Point Research (CPR) warns of scammers using Google Ads to steal crypto wallets, after seeing hundreds of thousands of dollars’ worth of cryptocurrency taken from victims this past weekend. Scammers…
Check Point CloudGuard is a launch partner of Azure Gateway Load Balancer
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published November 2, 2021 This blog post explains Azure Gateway Load Balancer (recently announced by Microsoft in Public Preview), and how it simplifies and…
Join Check Point Software Technologies at Microsoft Ignite
This article has been indexed from Check Point Software By, Russell Tal, Alliance Marketing Manager Microsoft Ignite is one of the biggest online technology conferences of 2021! Check Point Software is proud to be an award-winning Microsoft Partner, and we…
Top 5 Cloud Native Security Challenges
This article has been indexed from Check Point Software As companies migrate and expand their applications and services to multi-cloud environments, security teams face growing challenges, ranging from corporate policies and budget constraints, to compliance fines and new threats of…
Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities in 2022
This article has been indexed from Check Point Software Check Point Software 2022 Cyber-security Predictions also anticipates an increase in supply chain attacks in the new year Check Point® Software Technologies released its cyber-security predictions for 2022 detailing the key…
Top Tips for IoT Device Security: Designing Secure IoT Devices
This article has been indexed from Check Point Software The post Top Tips for IoT Device Security: Designing Secure IoT Devices appeared first on Check Point Software. Read the original article: Top Tips for IoT Device Security: Designing Secure IoT…
Using Discord infrastructure for malicious intent
This article has been indexed from Check Point Software Research by: Idan Shechter & Omer Ventura Check Point Research (CPR) spotted a multi-functional malware with the capability to take screenshots, download and execute additional files, and perform keylogging – all by…
Check Point Software makes cybersecurity training accessible to all through partnership with Cybrary – a global leader in cybersecurity professional development
This article has been indexed from Check Point Software Check Point has partnered with Cybrary, a global leader in cybersecurity professional development, to provide cybersecurity professionals the training to enable them to develop their careers within an ever evolving business…
Check Point Software and Splunk Showcase Automated Threat Response at .conf21 Splunk
This article has been indexed from Check Point Software 19–20 October | AMER 20–21 October | EMEA & APAC Comprehensive security has never been more important than today with the significant increase in remote workers. Sophisticated cyber attacks have increased…
Key Takeaways from the 2021 Gartner® Market Guide for Mobile Threat Defense
This article has been indexed from Check Point Software By Dana Katz, Head of Product Marketing, Threat Prevention The highly-anticipated 2021 Market Guide for Mobile Threat Defense was recently published by Gartner®. This report outlines the latest Mobile Threat Defense…
Social Now Among Top Three Sectors to be Imitated in Phishing Attempts in Q3 2021
This article has been indexed from Check Point Software Check Point Research issues Q3 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data Our latest Brand Phishing Report for…
Check Point Software Again Earns Leadership Spot in G2 NGFW Reviews
This article has been indexed from Check Point Software The post Check Point Software Again Earns Leadership Spot in G2 NGFW Reviews appeared first on Check Point Software. Read the original article: Check Point Software Again Earns Leadership Spot in…
Top 10 Considerations When Evaluating a Cloud Network Security Solution
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published October 14, 2021 Cloud security has become business-critical as organizations expand and deepen their cloud presence. According to the Check Point 2020…
Check Point Software Prevents Theft of Crypto Wallets on OpenSea, the World’s Largest NFT Marketplace
This article has been indexed from Check Point Software After seeing reports of stolen crypto wallets triggered by free airdropped NFTs, Check Point Research (CPR) investigated OpenSea, the world’s largest NFT marketplace. The investigation led to the discovery of critical…
September 2021’s Most Wanted Malware: Trickbot Once Again Tops the List
This article has been indexed from Check Point Software Check Point Research reports that Trickbot is the most prevalent malware while remote access trojan, njRAT, has entered the index for the first time. Our latest Global Threat Index for September…
As battle against cybercrime continues during Cybersecurity Awareness Month, Check Point Research reports 40% increase in cyberattacks
This article has been indexed from Check Point Software Highlights Globally in 2021, 1 out of every 61 organizations is being impacted by ransomware each week Since January 2020 till present, September 2021 has the highest number of attacks –…
What Can We Learn From the Top Cloud Security Breaches?
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published September 30, 2021 (This blog post was first published in TheNewStack.) According to Canalys’ recently published review of cybersecurity, there were more data breaches…
Securing AWS Lambda functions powered by Gravitron2 with Check Point CloudGuard Workload Protection
This article has been indexed from Check Point Software Amazon Web Services just launched support for AWS Lambda Functions powered by AWS Graviton2 processors built using 64-bit Arm Neoverse cores to deliver the best price performance for your cloud serverless…
Driving Automated Threat Prevention & Security Policy Orchestration
This article has been indexed from Check Point Software Join Check Point and Ansible virtually at AnsibleFest 2021, Sept 29-30th The dramatic increase in cyberattacks like ransomware, zero day, and supply chain are fundamentally changing how we should be approaching…
Cloud enabled Network Security as a Service with Check Point Harmony Connect and Harmony Email and Office
This article has been indexed from Check Point Software As more applications move to the cloud, business users increasingly rely on these applications to do their jobs. From virtual meetings to file-sharing to collaboration through tools, including voice and video…
Amid vaccine mandates, fake vaccine certificates become a full blown industry
This article has been indexed from Check Point Software Black market for fake vaccine certificates booms Check Point Research (CPR) continues to monitor the black market in which fake COVID-19 vaccine certificates are being sold to anyone willing to pay.…
August 2021’s Most Wanted Malware: Formbook Climbs into First Place
This article has been indexed from Check Point Software Check Point Research reports that the infostealer, Formbook, is the most prevalent malware while the banking trojan, Qbot, has dropped from the list all together. Our latest Global Threat Index for…
E-REDES Secures Mission-Critical Substation Environments with Next-Generation Security from Check Point Software
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software Digitalization is introducing new capabilities into energy distribution and power grids. Intelligent technologies offer far greater visibility…
Check Point Cloud Security Wins High Praise as Leader in G2 Reviews
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software Check Point customers express their enthusiasm for industry-leading Check Point CloudGuard products on a leading software review…
Check Point Harmony: A secure solution for remote users
This article has been indexed from Check Point Software By, Jessica Reece, Manager of Regional Telco Sales The business world has comprehensively shifted over the last year into remote work, a way of life that may be permanent for many…
Check Point CloudGuard Network Security is a Launch Partner for Amazon VPC Enhanced Routing
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published August 31, 2021 In my previous blog post I wrote about the three pillars of CloudGuard: “Security · Automated · Everywhere”, and explained…
How to Maintain PCI-DSS Compliance for E-commerce Applications
This article has been indexed from Check Point Software By, Gui Alvarenga, Product Marketing Manager While retailers and online stores continue to be targets for hackers due to the large financial gains, it is surprising that many are struggling to…
Preventing Multi-Stage Attacks – Case in Point
This article has been indexed from Check Point Software By: Danielle Guetta, Product Marketing Manager & Amir Helinger, Product Manager On our blog post from January of this year we shared how multi-stage attacks work and how our Threat Emulation…
Cloud Security Posture Management: Getting It Right
This article has been indexed from Check Point Software By, Kristin Manogue, Product Marketing Manager, Cloud Security Posture Management Companies have never been under such close scrutiny as to how they collect, process, and retain data and other online assets.…
Your AppSec Needs Intrusion Prevention, And Here’s Why
This article has been indexed from Check Point Software By, Yaffa Finkelstein, Product Marketing, Check Point CloudGuard You’re an AppSec aficionado and you have an automated WAF up and running. Presumably, you’re relying on an AI powered solution to reduce…
Check Point Research: Education sector sees 29% increase in attacks against organizations globally
This article has been indexed from Check Point Software Check Point Research (CPR) observes a steady increase in the average number of cyberattacks per organization weekly, with the education/research sector showing a higher number of attacks than other sectors In…
Your AppSec Needs Intrusion Prevention, And Here’s Why
This article has been indexed from Check Point Software By, Yaffa Finkelstein, Product Marketing, Check Point CloudGuard You’re an AppSec aficionado and you have an automated WAF up and running. Presumably, you’re relying on an AI powered solution to reduce…
Indra Group Attack on Iran Highlights the Threats to Global Critical Infrastructure
This article has been indexed from Check Point Software Check Point Research (CPR) warns governments everywhere of the importance of protecting critical infrastructure, as it learns that the July 9 cyber attack on Iran’s train system was carried out by…
July 2021’s Most Wanted Malware: Snake Keylogger Enters Top 10 for First Time
This article has been indexed from Check Point Software Check Point Research reports that Trickbot is the most prevalent malware for the third month running, while Snake Keylogger enters the index for the first time taking second place Our latest…
TopRx Protects Business Continuity Through by Strengthening Its Security Posture with Check Point Software
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software When a pharmaceutical distributor needed to expand cybersecurity defenses to remote employees, it looked for a near-zero-touch…
Black market for fake vaccine certificates reaches new peaks, while Delta variant keeps spreading globally
This article has been indexed from Check Point Software Check Point Research continues to monitor the dark marketplace in which COVID 19 Vaccine certifications are sold to anyone willing to pay. Prices have reduced, now ranging between $100-120. Darknet advertisements…
Who Says VoIP Configuration Has To Be Tough?
This article has been indexed from Check Point Software Voice over IP (VoIP) environments can be difficult to control when firewalls are introduced. Not only can call behavior be unpredictable resulting in a poor user experience when the configuration is…
Check Point Harmony Mobile named a Market Leader in Omdia’s 2021 Market Radar
This article has been indexed from Check Point Software By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention, Shlomi Gvili, Senior Product Manager, Check Point Harmony Mobile Harmony Mobile, Check Point Software’s mobile threat defense solution, has been recently recognized as…
Amazon Kindle Vulnerabilities could have led Threat Actors to Device Control and Information Theft
This article has been indexed from Check Point Software Check Point Research (CPR) found security flaws in Amazon Kindle, the world’s most popular e-reader. By tricking victims into opening a malicious e-book, a threat actor could have leveraged the flaws…
Protecting SMBs Against Kaseya Supply Chain, Zero Day, and Ransomware Attacks
This article has been indexed from Check Point Software By, Mitchell Muro, Product Marketing Manager The Highlights Massive Kaseya supply chain attack carried out by REvil in early July weekend impacted numerous customers with millions of USD in ransom demands…
Protecting SMBs Against Kaseya Supply Chain, Zero Day, and Ransomware Attacks
This article has been indexed from Check Point Software The Highlights Massive Kaseya supply chain attack carried out by REvil in early July weekend impacted numerous customers with millions of USD in ransom demands Check Point Research (CPR) has seen…
Check Point Software breaks down modern-day cloud attacks at Black Hat USA 2021
This article has been indexed from Check Point Software By Trisha Paine, Head of Cloud Security Product Marketing Now in its 24th year, Black Hat USA returns July 31st-August 5th as a hybrid event, featuring real-time virtual trainings, and a…
Check Point Software Wins Microsoft US Award for Energy, Emphasizing Commitment to Customers
This article has been indexed from Check Point Software By Russell Tal and Paul Ardoin, Alliance Marketing A few years ago, Gas South was small, local company providing natural gas to a few hundred thousand customers in four southern states…
Check Point CloudGuard Improves Google Cloud Security with Exciting New Capabilities for Managed Instance Groups
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published July 27, 2021 The three pillars of CloudGuard are “Security · Automated · Everywhere”. We explain this in the CloudGuard pages in the…
Check Point CloudGuard Improves Google Cloud Security with Exciting New Capabilities for Managed Instance Groups
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published July 27, 2021 The three pillars of Check Point CloudGuard are “Security · Automated · Everywhere”. We explain this in the CloudGuard pages…
Check Point Software Rewards Channel Excellence for Securing Migration to the Cloud
This article has been indexed from Check Point Software What an eventful and truly inspiring year it has been. Excelling through these most challenging times clearly demonstrates the power of partnership; dedicated Check Point Software partners adeptly securing customer journeys…
Tips for Securing Your Industrial Control Systems with a Safer Operational Technology (OT) Environment
This article has been indexed from Check Point Software In June 2020, Honda was forced to shut down two automotive plants due to a ransomware attack. The company was quick to reassure the public that there had been no leakage…
Check Point R81.10 AI & ML Driven Threat Prevention and Security Management
This article has been indexed from Check Point Software By Michael A. Greenberg, Senior Product Marketing Manager, Quantum Check Point’s latest version of the Quantum Cyber Security platform is officially GA. Welcome to the Check Point Quantum Cyber Security platform…
Incedo Inc. Transforms Security Defenses and Becomes a Highly Resilient Organization with Check Point
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Research, Check Point Incedo serves clients in financial services, telecommunications, life sciences, healthcare, and product engineering. Until recently, multiple distributed…
Check Point Software named a “Champion” in Global Security Leadership Matrix 2021
This article has been indexed from Check Point Software By, Frank Rauch, Head of Worldwide Channels Since its inception 27 years ago, Check Point Software has remained committed to the channel partner ecosystem. As a 100% channel driven organization, partnerships…
Brand Phishing Report Q2 2021: Microsoft Continues Reign
This article has been indexed from Check Point Software Check Point Research issues Q2 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data Our latest Brand Phishing Report for…
Check Point Software showcases new offerings, integrations, and tools at Microsoft Inspire 2021
This article has been indexed from Check Point Software By Russell Tal, Alliance Marketing Manager The decades-long partnership between Microsoft and Check Point Software Technologies is not only a strong building block for our companies, it’s also a great tool…
Greek Ministry of Education Protects 65,000 Distance Learners with Check Point ZoneAlarm
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software Technologies The COVID pandemic forced the Greek Ministry of Education to create a new, remote infrastructure for…
Three Simple Methods to Secure Your Enterprise IoT Devices
This article has been indexed from Check Point Software IoT, the internet of things, is everywhere, including inside your enterprise environment. And that’s a very good thing. IoT has been a blessing for enterprises: It can make employees more productive…
Survey Reveals 4 Ways Remote Work has Impacted IT Security And Here’s What You Can Do About It
This article has been indexed from Check Point Software From reluctant to embracing, a majority of organizations have seen an explosion in remote work since the pandemic began. Some organizations, like Check Point Software Technologies, are permanently transitioning to a…
“Kaseya Attack”: Over 1000 organizations globally attacked on Fourth of July weekend, biggest supply chain attack since Sunburst
This article has been indexed from Check Point Software Highlights Massive supply chain attack carried out by REvil over the 4th of July weekend impacts numerous Kaseya customers with millions of USD in ransom demands Check Point Research (CPR) observes…
“Kaseya Attack”: Over 1000 organizations globally attacked on Fourth of July weekend, biggest supply chain attack since sunburst
This article has been indexed from Check Point Software Highlights Massive supply chain attack carried out by REvil over the 4th of July weekend impacts numerous Kaseya customers with millions of USD in ransom demands Check Point Research (CPR) observes…
Biggest supply chain attack since Sunburst strikes over US Independence Day weekend, affecting over 1000 organizations globally
This article has been indexed from Check Point Software Highlights Massive supply chain attack carried out by REvil over the 4th of July weekend impacts numerous Kaseya customers with millions of USD in ransom demands Check Point Research (CPR) observes…
Russian speaking group strikes on US Independence weekend, hitting several organizations with ransomware demands, in the biggest supply chain attack since Sunburst
This article has been indexed from Check Point Software Highlights Massive supply chain attack during 4th of July weekend spanning numerous Kaseya customers with millions of USD in ransom demands Check Point Research (CPR) observes 15 new REvil attacks per…
Cyber Espionage on Afghanistan, Kyrgyzstan and Uzbekistan by Chinese-speaking Hacker Group
This article has been indexed from Check Point Software Check Point Research (CPR) detects an ongoing cyber espionage operation targeting the Afghan government. Attributed to a Chinese-speaking hacker group, the threat actors impersonated the Office of the President of Afghanistan…
Cyberattacks and threats continue to break records, warns Check Point Research
This article has been indexed from Check Point Software 70% year-on-year increase in cyberattacks on US organizations in May 2021, and 16% increase since beginning of year 97% year-on-year increase in cyberattacks on EMEA organizations in May 2021, and 21%…
CoxHealth Ramps Up Security with Check Point Maestro Hyperscale Orchestrator
This article has been indexed from Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point In 2020, the COVID pandemic made healthcare the most targeted industry sector, with cyberattacks spiking by 45%. In…
The Evolution of Application Security (AppSec)
This article has been indexed from Check Point Software Yaffa Finkelstein, Product Marketing Manager, Check Point CloudGuard Earlier this year we released Check Point CloudGuard AppSec – the fully automated, Artificial intelligence (AI) powered Web Application and Application Programing Interface…
Security Flaws in Atlassian’s Platform Led to Account Takeover in One Click
This article has been indexed from Check Point Software Check Point Research (CPR) finds security flaws in Atlassian, a platform used by 180,000 customers worldwide to engineer software and manage projects. With just one click, an attacker could have used…
Global Surge in Ransomware Attacks: To pay or not to pay is not the only question
This article has been indexed from Check Point Software Guide for enterprises on how to prevent and deal with ransomware attacks Check Point Research (CPR) recently revealed that the average weekly number of ransomware attacks has increased 93% over the…
Check Point CloudGuard Integrates with AWS CloudFormation Public Registry at launch
This article has been indexed from Check Point Software By Jonathan Maresky, Cloud Product Marketing Manager, published June 21, 2021 The three pillars of CloudGuard are “Security · Automated · Everywhere”. You can see this in the CloudGuard pages…
How to Tighten IoT Security for Healthcare Organization
This article has been indexed from Check Point Software Healthcare has always been on the cutting edge, with hospitals and healthcare providers typically quick to embrace any innovation that will translate into better, more efficient, more affordable care. From microscopic…
Check Point Software is Cloud Security!
This article has been indexed from Check Point Software By Yaffa Finkelstein, Product Marketing Manager, Cloud Security You might have seen the recent press around Check Point’s commitment to growing our cloud security business over the next few months. In…
Ransomware attacks continue to Surge, hitting a 93% increase year over year
This article has been indexed from Check Point Software Number of organizations impacted by ransomware has risen to 1210 in June 2021 Check Point Research sees a 41% increase in attacks since the beginning of 2021 and a 93% increase…
Check Point Software Announces Integration of CloudGuard Network Security with Equinix Network Edge
This article has been indexed from Check Point Software By Jeff Engel, Cloud Alliance Architect, published June 11, 2021 Digital transformation has garnered massive momentum for cloud computing, and has reshaped enterprise IT as we know it. The ease and…
Check Point Software´s May 2021 Most Wanted Malware: Dridex Drops from List While Trickbot Rises to Top
This article has been indexed from Check Point Software Check Point Research (CPR) reports that the Dridex trojan, which is often used in the initial stages of ransomware attacks, has now dropped from the index after being one of the…
From VPN to ZTNA – The Evolution of Secure Remote Work
This article has been indexed from Check Point Software Is your VPN getting in the way of productivity? If so, you’re not alone. When it comes to remote network access, you have difficult choices to make. But essentially, they all…
Four Security Vulnerabilities were Found in Microsoft Office
This article has been indexed from Check Point Software Check Point Research (CPR) urges Windows users to update their software, after discovering four security vulnerabilities that affect products in Microsoft Office suite, including Excel and Office online. Rooted from legacy…
The Ultimate Guide to 2020 MITRE ATT&CK® Evaluations
This article has been indexed from Check Point Software By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention The newly published 2020 MITRE Engenuity ATT&CK Evaluations provided a detailed assessment of various vendors’ ability to automatically detect and respond to real-life…
Chinese APT group targets Southeast Asian government with previously unknown backdoor
This article has been indexed from Check Point Software Check Point Research (CPR) warns of a new cyber espionage weapon being used by a Chinese threat group, after it identified and blocked an ongoing surveillance operation targeting a Southeast Asian…
Check Point Software Offers HealthCare Information Security and Privacy Practitioner Course by ISC(2)
This article has been indexed from Check Point Software By, Brooke Cassidy, Learning & Training Dedicated health care industry related education program for partners and IT professionals to be rolled out globally in partnership with (ISC)2. Check Point Software expands…
Gartner’s Approach to Reduce your Data Center Costs
This article has been indexed from Check Point Software By Michael A. Greenberg, Product Marketing Manager, Security Platforms Stay ahead of the curve and download the report now The new era of the Hybrid Data Center is upon us. While…
Minority report: Fake human rights documents and websites used in cyberattacks targeting Uyghurs, a Turkic ethnic minority in China
This article has been indexed from Check Point Software Highlights Check Point Research (CPR), in collaboration with Kaspersky’s Global Research & Analysis Team (GReAT), have been tracking an ongoing attack targeting a small minority group of Uyghur individuals in Xinjiang…
Check Point Research: Asia Pacific experiencing a 168% year on year increase in cyberattacks in May 2021
This article has been indexed from Check Point Software Check Point Research (CPR) has revealed a staggering 168% year on year increase in the number of cyberattacks in Asia Pacific (APAC) when compared to May 2020. Between April and May…
Transform Your Data Center and Network Security to Support Distributed Cloud Apps and Remote Workers at the Edge
This article has been indexed from Check Point Software By Russ Schafer, Head of Product Marketing, Security Platforms With the emergence of distributed SaaS applications and the need to better support remote workers, the modern data center is rapidly evolving…
Cybersecurity Readiness for the Post-Pandemic Enterprise
This article has been indexed from Check Point Software Enabling a safe, secure, and convenient digital workplace – Register for the Upcoming Webinar Here In our recent release of Check Point Software’s 2021 Cyber Security Report, we show how hackers…
Misconfiguration of third party cloud services exposed data of over 100 million users
This article has been indexed from Check Point Software Research by: Aviad Danin, R&D Team Leader, Check Point Software Technologies Aviran Hazum, Analysis and Response Team Leader, Check Point Software Technologies Bogdan Melnykov, Reverse Engineer, Check Point Software Technologies Dana…