This article has been indexed from Check Point Software By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention CRN recently released its annual Mobile 100 list highlighting – among others – key products in the “Mobile Security and Management Tools” category.…
Tag: Check Point Software
Check Point Software announces new Microsoft integrations at RSA® Conference 2021 to make enterprises more resilient
This article has been indexed from Check Point Software RSA® Conference has been around for thirty years and is considered the largest security conference in the world. This year, Covid-19 turned RSA Conference into a virtual event marking the first…
Cloudified Data Centers are the New Normal – RSA Conference 2021®
This article has been indexed from Check Point Software It is no secret, our networks and data centers have changed as we know it, moving from on premise servers to the future of Hyperscale cloud computing where scalability on demand, cost-efficiency and simple operations…
April 2021’s Most Wanted Malware: Dridex Remains in Top Position Amidst Global Surge in Ransomware Attacks
This article has been indexed from Check Point Software Check Point Research reports that the Dridex trojan, which is often used in the initial stages of ransomware attacks, is the most prevalent malware for the second month running Our latest…
The New Ransomware Threat: Triple Extortion
This article has been indexed from Check Point Software Global surge in ransomware attacks hits 102% increase this year compared to the beginning of 2020, and shows no sign of slowing down Number of organizations impacted by ransomware globally has…
Check Point Software Showcases Cloud Security at AWS Summit
AWS Summit is almost here! In the past, AWS Summits have been regional day-long conferences for developers and IT pros to gain knowledge and experience with the AWS cloud. This year, the AWS Summit is online, with the Americas session…
Protect Enterprises and Critical Infrastructure from the Increase in Ransomware Attacks
By, Russ Schafer and Mitch Muro The recent attack on a U.S. pipeline impacting almost half the fuel on the East Coast, is confirmation that the acceleration in sophisticated ransomware attacks is continuing. The numbers don’t lie. We are in…
Companies’ 5 Million Personal identifiable information records detected on an AWS service due to misconception of users
Highlights Check Point Research (CPR) identified a trend of user’s misconception of service on AWS system manager, resulting in personal records detection 5 million personally identifiable information (PII) records and credit card transactions revealed by CPR Check Point Research worked…
“Into The Mind of An IoT Hacker | Protect Your IoT Networks & Devices” – RSA Conference 2021®
By now, we’ve probably all heard the stories around cyber criminals and their successful cyber attacks on companies by infiltrating their connected IoT devices. But how do cyber criminals achieve this kind of attack? Well to start, it’s important to…
Android users’ privacy at risk as Check Point Research identifies vulnerability on Qualcomm’s mobile station modems
Check Point Research (CPR) found a security vulnerability in Qualcomm’s mobile station modem (MSM), the chip responsible for cellular communication in nearly 40% of the world’s phones. If exploited, the vulnerability would have allowed an attacker to use Android OS…
Check Your Privilege – the Risks of Privilege Escalation In the Cloud
Facebook founder and CEO Mark Zuckerberg’s famous motto, ‘move fast and break things’ is believed to be one of the drivers behind the company’s innovations and growth. However, moving faster than you’d planned isn’t always a good thing, as organizations…
Enhance Application Security with Nutanix Flow and Check Point CloudGuard
Read the original article: Enhance Application Security with Nutanix Flow and Check Point CloudGuard By Daniel Mirkin, CloudGuard Project Manager, and Abhishek Tiwari, Senior Director, Product Management, Nutanix Flow, published May 4, 2021 Nutanix provides a “web-scale, hyperconverged infrastructure solution…
Application Control in the World of Cloud and Shadow IT
Read the original article: Application Control in the World of Cloud and Shadow IT Cloud solutions are proliferating rapidly. Sometimes it seems like the pace is too fast, and is coming at the expense of security considerations. Sensitive information stored…
Check Point Software is a finalist for two Microsoft Security 20/20 awards
Read the original article: Check Point Software is a finalist for two Microsoft Security 20/20 awards Last year, the first annual Microsoft Security 20/20 awards were given only three weeks before the whole world shut down for COVID-19. In many…
Double Trouble – the Threat of Double Extortion Ransomware and How Your Organization Can Protect Itself
Read the original article: Double Trouble – the Threat of Double Extortion Ransomware and How Your Organization Can Protect Itself By the time you have finished reading this sentence, an organization somewhere in the world will have fallen victim to…
How to Secure Engineer Access to Cloud Workloads with Zero Trust
Read the original article: How to Secure Engineer Access to Cloud Workloads with Zero Trust DevOps Access Challenges in the Era of Cloud and Remote Now that remote work and developer infrastructure-in-the-cloud have become the new normal, securing engineer access…
Moving Targets – the Growing Threat to Enterprise Mobiles
Read the original article: Moving Targets – the Growing Threat to Enterprise Mobiles Wherever legitimate business goes, criminals invariably follow to try and exploit those new opportunities. And that was certainly true in 2020. The COVID-enforced shift to remote working…
Turning Telegram toxic: ‘ToxicEye’ RAT is the latest to use Telegram for command & control
Read the original article: Turning Telegram toxic: ‘ToxicEye’ RAT is the latest to use Telegram for command & control Remote access trojan exploits Telegram communications to steal data from victims and update itself to perform additional malicious activities Research by:…
Verizon Mobile Security Index 2021 with Threat Insights from Check Point Software
Read the original article: Verizon Mobile Security Index 2021 with Threat Insights from Check Point Software By Dana Katz, Head of Product Marketing, Threat Prevention Verizon recently released its fourth annual Mobile Security Index (MSI) to provide IT leaders with…
MITRE Engenuity ATT&CK® Evaluations Highlight Check Point Software Leadership in Endpoint Security with 100% Detection across All Tested Unique ATT&CK Techniques
Read the original article: MITRE Engenuity ATT&CK® Evaluations Highlight Check Point Software Leadership in Endpoint Security with 100% Detection across All Tested Unique ATT&CK Techniques By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention and Yoni Nave, Product Manager, Check Point…
Organizations Embrace Consolidation Strategies to Combat Surge in Sophisticated Attacks
Read the original article: Organizations Embrace Consolidation Strategies to Combat Surge in Sophisticated Attacks By Brian Gleeson, Head of Infinity Product Marketing Today’s global market conditions and trends in information security push organizations to employ consolidation strategies. “Too many security…
Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2021
Read the original article: Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2021 Check Point Research issues Q1 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up…
AWS Marketplace offerings explained: CloudGuard adds AWS GWLB
Read the original article: AWS Marketplace offerings explained: CloudGuard adds AWS GWLB By Jonathan Maresky, CloudGuard Product Manager, published April 14, 2021 Too much choice is often confusing. Think about all the different types of cereal, perfume, or even political…
Cloudified Data Centers are the New Normal
Read the original article: Cloudified Data Centers are the New Normal By Michael A. Greenberg, Product Marketing Manager, Security Platforms Ready to begin your data center transformation? Join the Webinar It is no secret, our networks and data centers have…
March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign
Read the original article: March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign Check Point Research reports that IcedID has entered the global malware index for the first time, taking second place, after exploiting the…
Check Point’s Mobile Security Report 2021: Almost Every Organization Experienced a Mobile-related Attack in 2020
Read the original article: Check Point’s Mobile Security Report 2021: Almost Every Organization Experienced a Mobile-related Attack in 2020 By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In 2020, 97% of organizations faced mobile threats that used various attack vectors.…
“The WAF Is Dead” (and we know who did it)
Read the original article: “The WAF Is Dead” (and we know who did it) TJ Gonen, Head of Cloud Security Products, Check Point The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of…
Deliver Security and Trust to IoT, with this IoT Security Guide by IDC
Read the original article: Deliver Security and Trust to IoT, with this IoT Security Guide by IDC Highlights As organizations seek to deliver security and trust to the IoT, they must focus on the following architectural components: Connectivity, including service…
Autoreply attack! New Android malware found in Google Play Store spreads via malicious auto-replies to WhatsApp messages
Read the original article: Autoreply attack! New Android malware found in Google Play Store spreads via malicious auto-replies to WhatsApp messages Research by: Aviran Hazum, Bodgan Melnykov & Israel Wenik Highlights Disguised as a Netflix content enabler app named “FlixOnline,”…
Supply chain attacks: what we know about the SolarWinds ‘Sunburst’ exploit, and why it still matters
Read the original article: Supply chain attacks: what we know about the SolarWinds ‘Sunburst’ exploit, and why it still matters The word ‘unprecedented’ has been used a lot over the past year, and with good reason given the huge impact…
Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance.
Read the original article: Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance. By, John Guo, Cloud Alliance Architect, Check Point Software Technologies Firewalls can be the main bottleneck when it…
Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance.
Read the original article: Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance. By, John Guo, Cloud Alliance Architect, Check Point Software Technologies Firewalls can be the main bottleneck when it…
Unfair exchange: ransomware attacks surge globally amid Microsoft Exchange Server vulnerabilities
Read the original article: Unfair exchange: ransomware attacks surge globally amid Microsoft Exchange Server vulnerabilities Over the past year, hospitals and the healthcare industry have been under tremendous pressure during the COVID-19 pandemic, not only dealing with surges in patient…
Hackers Gained Access to 150,000 IP Cameras Inside Hospitals, Police Departments, Prisons, Schools, and Companies like Tesla & Equinox
Read the original article: Hackers Gained Access to 150,000 IP Cameras Inside Hospitals, Police Departments, Prisons, Schools, and Companies like Tesla & Equinox Highlights In March 2021, a group of hackers breached a large group of IoT security cameras via…
The Advantages of a Unified Approach to Cloud Data Security
Read the original article: The Advantages of a Unified Approach to Cloud Data Security By, Amit Sharon, Head of Customer Community Cloud computing is disrupting security models, leaving organizations struggling to figure out the most effective and efficient ways to…
Check Point CloudGuard Network Security now integrates with Oracle Cloud Infrastructure’s new Flexible Network Load Balancer
Read the original article: Check Point CloudGuard Network Security now integrates with Oracle Cloud Infrastructure’s new Flexible Network Load Balancer Jeff Engel Cloud Alliance Engineering Check Point is thrilled to announce support for Oracle Cloud Infrastructure’s new Flexible Network Load…
A passport to freedom? Fake COVID-19 test results and vaccination certificates offered on Darknet and hacking forums
Read the original article: A passport to freedom? Fake COVID-19 test results and vaccination certificates offered on Darknet and hacking forums Check Point Research highlights new trend of forged negative COVID-19 test results and fake vaccine certificates offered on the…
360° Phishing Protection for remote users with Check Point Harmony
Read the original article: 360° Phishing Protection for remote users with Check Point Harmony Securing the new ‘work from anywhere’ hybrid environment is an extremely complex task. It is also a top priority for many organizations, as 81% have adopted…
Application Security: Why Prevention Beats Remediation
Read the original article: Application Security: Why Prevention Beats Remediation Author: Hillel Solow, Cloud Security Architect and Evangelist, Check Point Software Technologies Prevention of risk is top of mind for many in both our personal and professional lives. This holds…
Breaking bad: desperate job seekers turn to the Darknet and hacking forums for opportunities
Read the original article: Breaking bad: desperate job seekers turn to the Darknet and hacking forums for opportunities Check Point Research highlights the potential rise in the number of people engaged in illegal work typically offered in the Darknet and…
Thinking of Joining Clubhouse? The Membership Fee Could Be Your Data Privacy
Read the original article: Thinking of Joining Clubhouse? The Membership Fee Could Be Your Data Privacy Clubhouse’s exclusivity has created a huge buzz – but does the app and platform’s security match the hype around it? Jonathan Fischbein, Chief Information…
Exploits on Organizations Worldwide Tripled after Microsoft’s Revelation of Four Zero-days
Read the original article: Exploits on Organizations Worldwide Tripled after Microsoft’s Revelation of Four Zero-days Following the revelation of four zero-day vulnerabilities currently affecting Microsoft Exchange Server, Check Point Research (CPR) discloses its latest observations on exploitation attempts against organizations…
Exploits on Organizations Worldwide Tripled every Two Hours after Microsoft’s Revelation of Four Zero-days
Read the original article: Exploits on Organizations Worldwide Tripled every Two Hours after Microsoft’s Revelation of Four Zero-days Following the revelation of four zero-day vulnerabilities currently affecting Microsoft Exchange Server, Check Point Research (CPR) discloses its latest observations on exploitation…
Exploits on Organizations Worldwide Doubling every Two Hours after Microsoft’s Revelation of Four Zero-days
Read the original article: Exploits on Organizations Worldwide Doubling every Two Hours after Microsoft’s Revelation of Four Zero-days Following the revelation of four zero-day vulnerabilities currently affecting Microsoft Exchange Server, Check Point Research (CPR) discloses its latest observations on exploitation…
All You Need to Know: The Four Zero Days in Microsoft Exchange Servers
Read the original article: All You Need to Know: The Four Zero Days in Microsoft Exchange Servers By, Adi Ikan, Head of Network Research and Protection Lotem Finkelsteen, Threat Intelligence Group Manager Yaniv Balmas, Head of Cyber Research Sagi…
February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown
Read the original article: February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown Check Point Research reports that following the international police operation that took control of Emotet in January, Trickbot has become the new top global threat…
Check Point CloudGuard NDR integrates with AWS VPC Traffic Mirroring
Read the original article: Check Point CloudGuard NDR integrates with AWS VPC Traffic Mirroring By Jonathan Maresky, CloudGuard Product Manager, published March 10, 2021 Cybersecurity is a cat-and-mouse game between threat actors and defenders. It is also a constant arms…
Dangerous Malware Dropper Found in 9 Utility Apps on Google’s Play Store
Read the original article: Dangerous Malware Dropper Found in 9 Utility Apps on Google’s Play Store Highlights Check Point Research discovered a new dropper being spread via 9 malicious Android apps on the official Google Play store The malware family…
What Should You Know About Cloud Security Solutions?
Read the original article: What Should You Know About Cloud Security Solutions? By, Gui Alvarenga Cloud security is a complex topic from a technical perspective, but the basics are easy to grasp. If you’re like most business decision makers, security…
New World – New Opportunities – New Offices
Read the original article: New World – New Opportunities – New Offices The coronavirus pandemic has demanded unprecedented lifestyle changes from our community. It was, and still is, a new challenge for all of us to face. As the day-to-day…
Attacks Targeting Microsoft Exchange: Check Point customers remain protected
Read the original article: Attacks Targeting Microsoft Exchange: Check Point customers remain protected On March 2nd , 2021, Volexity reported the in-the-wild exploitation of the following Microsoft Exchange Server vulnerabilities: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065. Further investigation uncovered that an attacker was exploiting a zero-day…
COVID-19 website warning: rise in vaccine-related domain registrations means increased risk of scams
Read the original article: COVID-19 website warning: rise in vaccine-related domain registrations means increased risk of scams The roll-out of COVID-19 vaccinations is accelerating, with around 250 million doses already administered globally and millions more receiving their injections daily. But…
Check Point Harmony Endpoint recognized as a Top Product in Corporate Endpoint Protection by AV-TEST
Read the original article: Check Point Harmony Endpoint recognized as a Top Product in Corporate Endpoint Protection by AV-TEST By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention Check Point Software is pleased to announce that its Harmony Endpoint security solution…
Harmony Endpoint recognized as a Top Product in Corporate Endpoint Protection by AV-TEST
Read the original article: Harmony Endpoint recognized as a Top Product in Corporate Endpoint Protection by AV-TEST By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention Check Point Software is pleased to announce its endpoint security solution Harmony Endpoint successfully passed…
FinServ Compliance: Top 5 Considerations to Securing Your Cloud Infrastructure
Read the original article: FinServ Compliance: Top 5 Considerations to Securing Your Cloud Infrastructure Author: Kristin Manogue, Product Marketing Manager, Cloud Security Posture Management Cloud service providers have expanded their offerings into industry-specific domains. AWS Financial Services and Azure for…
CloudGuard secures your hybrid-cloud and enables 169% Return on Investment
Read the original article: CloudGuard secures your hybrid-cloud and enables 169% Return on Investment By Jonathan Maresky, CloudGuard Product Manager, published February 26, 2021 “Confidence in Check Point security leads to more rapid movement to the cloud” According to the…
Helping You Immunize Your Organization Against the Cyber Pandemic: Check Point Research’s 2021 Security Report
Read the original article: Helping You Immunize Your Organization Against the Cyber Pandemic: Check Point Research’s 2021 Security Report Download the full 2021 Cyber Security Report “Prediction is very difficult, especially if it’s about the future,” as Niels Bohr, Nobel laureate…
Don’t Get Caught in the Hackers’ Web: The New Frontier in Web Security
Read the original article: Don’t Get Caught in the Hackers’ Web: The New Frontier in Web Security By Brian Gleeson, Head of Infinity Product Marketing There is one constant for the globe’s newly remote workforce: employees require fast and secure…
Check Point Harmony: Highest level of Security for remote users
Read the original article: Check Point Harmony: Highest level of Security for remote users Dana Katz, Head of Product Marketing, Threat Prevention The world, as we know it, has changed, and so have businesses worldwide. Users are working anywhere and…
Disrupting Cyber Strategies for 2021, and Beyond
Read the original article: Disrupting Cyber Strategies for 2021, and Beyond Early in 2020, few could have predicted the devastation with the spread of a biological virus. Coronavirus, SARS-CoV-2, and COVID-19 are terms we will never forget. As a counter…
Jian – The Chinese Double-edged Cyber Sword
Read the original article: Jian – The Chinese Double-edged Cyber Sword Highlights: A Chinese-affiliated attack group (APT31) cloned and actively used an American-affiliated attack group’s (Equation Group) cyber offensive tool code named “EpMe”. Both attack tools exploit a then unknown…
Uplevel your SOC with one tool and the insights behind it- Part 2
Read the original article: Uplevel your SOC with one tool and the insights behind it- Part 2 Many SOC teams are often forced to piece together information from multiple monitoring solutions and navigate through a daily overload of alerts with…
Why You Can’t See The App For The Microservices
Read the original article: Why You Can’t See The App For The Microservices By, Yaffa Finkelstein, Product Marketing Manager Last week, with school cancelled yet again, I watched my preschooler painstakingly build a complex bridge for his toy cars. He…
Emerging Mobile Threats and How to Prevent Them
Read the original article: Emerging Mobile Threats and How to Prevent Them By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In the new normal, your remote workforce is increasingly accessing corporate data from mobile devices. That means the exposure to…
Why You Can’t See The App For The Microservices
Read the original article: Why You Can’t See The App For The Microservices Last week, with school cancelled yet again, I watched my preschooler painstakingly build a complex bridge for his toy cars. He was immersed in the construction; precariously…
Emerging Mobile Threats and How to Prevent Them
Read the original article: Emerging Mobile Threats and How to Prevent Them By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In the new normal, your remote workforce is increasingly accessing corporate data from mobile devices. That means the exposure to…
Uplevel your SOC with one tool and the insights behind it- Part 2
Read the original article: Uplevel your SOC with one tool and the insights behind it- Part 2 Many SOC teams are often forced to piece together information from multiple monitoring solutions and navigate through a daily overload of alerts with…
January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown
Read the original article: January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown Check Point Research reports the Emotet trojan continued to reign as top malware in January, even though international law enforcement took control…
Roses are red, violets are blue, cybercriminals are ready to come after you!
Read the original article: Roses are red, violets are blue, cybercriminals are ready to come after you! Highlights: Over 400 malicious Valentine’s Day themed phishing individual email campaigns spotted weekly in January A 29% YOY increase in Valentine’s Day themed…
6 questions you should ask yourself when choosing an email security solution
Read the original article: 6 questions you should ask yourself when choosing an email security solution With massive data breaches emerging from every corner, the cyber threat landscape is at an all times severity. From financially-driven threats such as ransomware…
Uplevel your SOC with one tool and the insights behind it- Part 1
Read the original article: Uplevel your SOC with one tool and the insights behind it- Part 1 The goal for every SOC team, regardless of size, is to gather information, determine if there are security vulnerabilities (or worse, an active…
Of Kittens and Princes: the latest updates on two Iranian espionage operations
Read the original article: Of Kittens and Princes: the latest updates on two Iranian espionage operations Cyber-warfare and espionage have long been common weapons in the arsenal of governments, armies, and intelligence agencies around the world. The Islamic Republic of…
Check Point Cloud Security Wins High Praise as Leader in G2 Reviews
Read the original article: Check Point Cloud Security Wins High Praise as Leader in G2 Reviews By, Amit Sharon, Head of Customer Community and Market Research Check Point CloudGuard is helping thousands of customers crush the challenges of managing cloud…
SOC Operations: 4 Top Challenges
Read the original article: SOC Operations: 4 Top Challenges The cyber threat landscape is ever-evolving, and as threats grow more sophisticated – so too must the strategies to prevent them. A Security Operations Center (SOC) is a centralized function within…
The Growing Challenge of Office 365 & G Suite Protection
Read the original article: The Growing Challenge of Office 365 & G Suite Protection It’s no secret that all of us as remote workers rely heavily on our cloud email and productivity apps to complete important tasks, share sensitive information…
CISO’s Secrets: get behind the scenes of cybersecurity’s trending topics. True stories, real-life scenarios, and a solutions-focused approach
Read the original article: CISO’s Secrets: get behind the scenes of cybersecurity’s trending topics. True stories, real-life scenarios, and a solutions-focused approach Join Check Point Software Technologies and host James Azar (Cyber Hub Summit) in uncovering the world of CISO…
No Matter the Network Growth, you can always have Scalable Security Management on Demand
Read the original article: No Matter the Network Growth, you can always have Scalable Security Management on Demand By Michael A. Greenberg, Product Marketing Manager, Security Platforms Today, we are seeing an exponential growth in network traffic. In fact, based…
CISO’s Secret: get behind the scenes of cybersecurity’s trending topics. True stories, real-life scenarios, and a solutions-focused approach
Read the original article: CISO’s Secret: get behind the scenes of cybersecurity’s trending topics. True stories, real-life scenarios, and a solutions-focused approach Join Check Point Software Technologies and host James Azar (Cyber Hub Summit) in uncovering the world of CISO…
Why Managed Service Providers (MSPs) should think small for success: Check Point’s new Quantum Spark™ security gateways for SMBs bring major new Security-as-a-Service opportunities
Read the original article: Why Managed Service Providers (MSPs) should think small for success: Check Point’s new Quantum Spark™ security gateways for SMBs bring major new Security-as-a-Service opportunities Today’s cyber-landscape is tough for small to midsize businesses (SMBs). Criminals and…
Check Point Software named “Champion” in the EMEA & APAC Canalys’ Cybersecurity Leadership Matrix 2020
Read the original article: Check Point Software named “Champion” in the EMEA & APAC Canalys’ Cybersecurity Leadership Matrix 2020 By, Frank Rauch, Head of Worldwide Channels Since its inception 27 years ago, Check Point has remained committed to the channel…
Secure Third Party Access Best Practices – It’s Time for Zero Trust
Read the original article: Secure Third Party Access Best Practices – It’s Time for Zero Trust By Jacob Lee, Global Leader for SASE In our hyper-connected world it’s imperative to collaborate with B2B business partners securely and seamlessly to be…
IoT Firmware Security: Zero-Day Exploitation & Prevention
Read the original article: IoT Firmware Security: Zero-Day Exploitation & Prevention Here’s how hackers can compromise your network via routers that aren’t protect with IoT device security Intro Security for the “Internet of Things” (or IoT) is still relatively new…
Rethinking Endpoint Security
Read the original article: Rethinking Endpoint Security Part 2: The top 5 must-have endpoint protections By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention Malicious actors worldwide are taking advantage of the sudden transition to the work from home reality, exploiting…
Collaborative global effort disrupts Emotet, World’s most dangerous malware
Read the original article: Collaborative global effort disrupts Emotet, World’s most dangerous malware In an extraordinary broad, well-coordinated and timed collaboration, law enforcement agencies of eight countries and the Europol have teamed together to takedown the globally distributed infrastructure Emotet…
Preventing multi-stage attacks with Check Point SandBlast Threat Emulation
Read the original article: Preventing multi-stage attacks with Check Point SandBlast Threat Emulation Now more than ever, organizations and federal agencies are under assault by a new generation of cyberattacks, which are targeted, stealthy and persistent. The attack techniques are…
Are your Endpoints Affected by the SolarWinds Sunburst Attack?
Read the original article: Are your Endpoints Affected by the SolarWinds Sunburst Attack? By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention The SolarWinds Sunburst attack outburst has already affected 18,000 companies and government offices worldwide. To help quickly determine whether…
TikTok fixes privacy issue discovered by Check Point Research
Read the original article: TikTok fixes privacy issue discovered by Check Point Research In recent months, Check Point Research teams discovered a vulnerability within the TikTok mobile application’s friend finder feature: a vulnerability that if exploited would have enabled an…
Maintaining Security in a Multi-Cloud Environment
Read the original article: Maintaining Security in a Multi-Cloud Environment By, Kristin Manogue, Product Marketing Manager, Cloud Security Posture Management First off, we should ask: What does multi-cloud mean and how does it differ from the typical cloud approach? In…
The 5G Era: Secure your Everything
Read the original article: The 5G Era: Secure your Everything Supporting ten times more devices per km2 than 4G, higher capacity, faster connections, higher throughput and lower latency, the 5G cellular network is gearing up to become a legitimate replacement…
Infrastructure-as-Code Concepts
Read the original article: Infrastructure-as-Code Concepts By, Yaffa Finkelstein, Product Marketing Manager Cloud Application Security So what is Infrastructure-as-Code (IaC) anyway? IaC is a process that automates the provisioning and management of cloud resources. IaC software takes some input scripts…
Cyber Criminals Leave Stolen Phishing Credentials in Plain Sight
Read the original article: Cyber Criminals Leave Stolen Phishing Credentials in Plain Sight Introduction Cyber-crime is a complex landscape, but when it comes to actually launching cyber-attacks, there are three main techniques that criminals have relied on for decades to…
Rethinking Endpoint Security
Read the original article: Rethinking Endpoint Security Part 1: Five guiding principles for choosing the optimal endpoint security solution By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention With the sudden and massive shift to remote work, organizations and their endpoints…
Linux users should patch now to block new “FreakOut” malware which exploits new vulnerabilities
Read the original article: Linux users should patch now to block new “FreakOut” malware which exploits new vulnerabilities Recently, Check Point Research (CPR) encountered several attacks that are exploiting multiple vulnerabilities on Linux devices, including some recently discovered flaws. These…
Use Infinity SOC to find out if you are affected by the Solarwinds Sunburst Hack
Read the original article: Use Infinity SOC to find out if you are affected by the Solarwinds Sunburst Hack The world is now facing what appears to be a new wave of multi-vector cyber-attacks, the latest being the Solarwinds Sunburst,…
Check Point Software Partners with Orange Cyber Defense to offer WIFI hacking course to cyber experts
Read the original article: Check Point Software Partners with Orange Cyber Defense to offer WIFI hacking course to cyber experts Check Point has teamed up with SensePost (ethical hacking team within Orange Cyberdefense) to deliver one of their leading offensive…
Brand Phishing Report – Q4 2020
Read the original article: Brand Phishing Report – Q4 2020 Summary According to Check Point Research´s (CPR) analysis, Microsoft still lead the top ten-brand phishing in the last quarter of 2020, with many websites trying to impersonate Microsoft login screens…
Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement – Under the Radar
Read the original article: Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement – Under the Radar By Maya Levine and Lior Sonntag A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected.…
Going Rogue – a Mastermind Behind Android Malware Returns with a New RAT
Read the original article: Going Rogue – a Mastermind Behind Android Malware Returns with a New RAT Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the world around us. …
December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat
Read the original article: December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat Our latest Global Threat Index for December 2020 has revealed that the Emotet trojan has returned to first place in the top malware list, impacting…
Attacks targeting healthcare organizations spike globally as COVID-19 cases rise again
Read the original article: Attacks targeting healthcare organizations spike globally as COVID-19 cases rise again At the end of October 2020, we reported that hospitals and healthcare organizations had been targeted by a rising wave of ransomware attacks, with the…