Check Point’s researchers find Dridex has been updated and spread via multiple spam campaigns to deliver targeted ransomware, increasing the risk from the long-established trojan Our latest Global Threat Index for March 2020 shows the well-known banking trojan Dridex, which…
Tag: Check Point Software
Keep your mobile phone free of Coronavirus, both inside & outside
Over the past month, many articles have been published recommending that we keep our mobile phones clean to reduce the risk of Coronavirus infection. While there’s still some debate over whether it’s necessary to clean your phone case and screen…
CloudGuard IaaS Performance: up to 377% improvement with R80.40
By Hezi Bahry, Product Manager, CloudGuard IaaS, published April 8, 2020 I have come to realize, over many years of purchasing various products, that the product price is one of the most misleading parameters in the decision-making process. Buying a…
A Quantum Leap for Network Security
By Michael A. Greenberg, Product Marketing Manager, Security Platforms What a time to be alive. The coronavirus outbreak has accelerated the digital transformation of enterprises requiring them to expand support for remote internet connectivity across the globe. Businesses need to…
A Perfect Storm: the Security Challenges of Coronavirus Threats and Mass Remote Working
The Coronavirus pandemic has brought perhaps the fastest, starkest change to working patterns around the world in living memory. Whilst workers in healthcare, policing, retail, delivery, cleaning and a host of other essential frontline services grapple with vastly increased demand…
The Cure for Securing Cloud Workloads in Healthcare
By Trisha Paine, Head of Cloud Marketing Programs, published April 3rd, 2020 The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud. While one appreciates all of the benefits…
Cloud Migration Strategies
Title: Cloud Migration Strategies By Jonathan Maresky, Product Marketing Manager, CloudGuard IaaS, published April 2, 2020 When determining your cloud computing strategy, it’s important to understand that no two commercial situations are alike. Organizations may have varying areas of expertise,…
Coronavirus update: In the cyber world, the graph has yet to flatten
The struggle against the coronavirus pandemic continues to make an impact globally. According to Dr. Anthony Fauci, – longtime director for the National Institute of Allergy and Infectious Diseases and the emerging face of American leadership in the fight against…
Cloud Security Intelligence Boost for SIEM
By Gui Alvarenga, Product Marketing Manager Deploying Cloud computing infrastructure is an excellent way for enterprises to stay agile, especially in today’s demanding, fast paced, digitally transforming world – if you’re in business and not meeting those demands, well, then…
COVID-19 Impact: Cyber Criminals Target Zoom Domains
While the world is struggling with the Coronavirus outbreak, many countries have implemented precautionary measures. Schools are being closed, communities are asked to shelter-in-place, and many organizations have enabled their employees to work remotely. As a result, video communication platforms…
Cloud Security Intelligence Boost for SIEM
By Gui Alvarenga, Product Marketing Manager Deploying Cloud computing infrastructure is an excellent way for enterprises to stay agile, especially in today’s demanding, fast paced, digitally transforming world – if you’re in business and not meeting those demands, well, then…
COVID-19 Impact: Cyber Criminals Target Zoom Domains
While the world is struggling with the Coronavirus outbreak, many countries have implemented precautionary measures. Schools are being closed, communities are asked to shelter-in-place, and many organizations have enabled their employees to work remotely. As a result, video communication platforms…
Public Cloud – 4 Subtle Differences with Significant Security Concerns
By Grant Asplund, Cloud Evangelist Do you know what percentage of enterprises surveyed are either very concerned or extremely concerned about security in the cloud? Considering Gartner is predicting Infrastructure as a Service (IaaS) CAGR will approach 30% through 2022,…
Who’s Zooming Who? Guidelines on How to Use Zoom Safely
By Omri Herscovici, Vulnerability Research Team Lead In recent weeks, the COVID-19 crisis has meant that millions of people are staying at home instead of going to work or meeting up with people. Estimates vary but up to 50% of…
Three Must-Haves for Stopping Zero Days at the Speed of Business (Part 2)
By Mor Ahuvia, Threat Prevention Product Marketing Manager Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect more zero days, but can stop them before they ever reach their…
How Your Attack Surface is Reduced, Moving to Serverless
Serverless is a new approach to application architecture and deployment. Security becomes both easier and harder, and it is nuanced. In this post, we will go over: what got better, what got more challenging, and what changes What Got Better…
How Your Attack Surface is Reduced, Moving to Serverless
Serverless is a new approach to application architecture and deployment. Security becomes both easier and harder, and it is nuanced. In this post, we will go over: what got better, what got more challenging, and what changes What Got Better…
How Your Attack Surface is Reduced, Moving to Serverless
Serverless is a new approach to application architecture and deployment. Security becomes both easier and harder, and it is nuanced. In this post, we will go over: what got better, what got more challenging, and what changes What Got Better…
COVID-19 Impact: As Retailers Close their Doors, Hackers Open for Business
While we struggle to contain the outbreak of the coronavirus worldwide, its impact is spreading rapidly across the globe. Countries are shutting their borders and imposing isolation on cities and states, businesses are scaling back their operations, the entertainment world…
AWS Lambda Stateless & Ephemeral?
By, Hillel Solow, Serverless Security R&D With AWS Lambda, the stateless and ephemeral nature of serverless functions shifts the way attackers approach these systems. Some of the key ramifications of this shift are: The move to repetitive stateless attacks, where…
A Life of Cybercrime: The Inside Story of How a Nigerian Hacker Earned over $100,000
When you spot a phishing attempt or an email with a suspicious document attached in your inbox, have you ever wondered who actually sent it to you, and how they got your details? Or even how much money they really…
Improvements of CloudGuard IaaS in the latest release of R80.40 Unified Security
By Hezi Bahry, Product Manager, CloudGuard IaaS, published March 16, 2020 At Check Point we continually improve our products with new features and functionality. Some of these improvements are as a result of customer requests. Some are needed to ensure…
Highlights of CloudGuard IaaS R80.40 Latest Release
By Hezi Bahry, Product Manager, CloudGuard IaaS, published March 16, 2020 At Check Point we continually improve our products with new features and functionality. Some of these improvements are as a result of customer requests. Some are needed to ensure…
Common Zero-Day Network Protection Approaches and Drawbacks (Part 1)
By Mor Ahuvia, Threat Prevention Product Marketing Manager Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect more zero days, but also stave them off–without having to compromise on…
Implementing Effective Security Measures for Your Remote Workforce
In our previous blog we went over the best practices an organization can take to enable their employees to work safely from home during the coronavirus (COVID-19) outbreak without impacting the organization’s security and productivity. As we learned we need…
SandBlast Mobile expands its ecosystem by adding Jamf as a supported mobile management solution
… to extend mobile security to the iOS mobile workforce By Yael Macias, Product Marketing Manager, Threat Prevention and Ran Schwartz, Product Manager, Threat Prevention With over 35,000 customers, Jamf is the industry standard for all things Apple in the…
February 2020’s Most Wanted Malware: Increase in Exploits Spreading the Mirai Botnet to IoT Devices
Check Point Research also reports that Emotet has been spreading via new SMS phishing Campaign Our latest Global Threat Index for February 2020 shows a large increase in exploitation of a vulnerability to spread the Mirai botnet, which is notorious…
Top Tips for Secure Remote Working
Practical tips to enable employees to work safely from home during the Coronavirus outbreak Are we facing an unprecedented pandemic, or will our fears be unfounded? It’s impossible to say right now, but global concerns over the current spread of…
Serverless Architecture = What Cloud Should Be
By Hillel Solow, Serverless Security R&D Serverless enables you to shift even more infrastructure management responsibilities to your cloud provider. Serverless architectures provide you automation and the benefit of experiencing unlimited scale potential. Very little stands between developers and deployed…
Update: Coronavirus-themed domains 50% more likely to be malicious than other domains
As we recently reported, Check Point Research determined that hackers around the globe have found the Coronavirus serving them well as an enabler for their activities. The outbreak and spread of the coronavirus is still undergoing, and hackers are still…
Embracing the Benefits and Challenges of Digital Transformation
By Gui Alvareng, Product Marketing Manager, published March 4th, 2020 Digital transformation and technology trends have shaped how we live, communicate, and do business. Organizations are becoming more agile, embracing technologies like artificial intelligence (AI), machine learning (ML), mobile and…
Check Point SandBlast Agent Achieves AA Product Rating in NSS Labs 2020 Advanced Endpoint Protection Test
By Adeline Chan, Threat Prevention Product Marketing We are thrilled to announce that Check Point achieved an AA rating in the 2020 NSS Labs Advanced Endpoint Protection (AEP) test. Check Point’s endpoint solution, SandBlast Agent, achieved a 99.12% total block…
Check Point SandBlast Agent Achieves AA Product Rating in NSS Labs 2020 Advanced Endpoint Protection Test
By Adeline Chan, Threat Prevention Product Marketing We are thrilled to announce that Check Point achieved an AA rating in the 2020 NSS Labs Advanced Endpoint Protection (AEP) test. Check Point’s endpoint solution, SandBlast Agent, achieved a 99.12% total block…
Check Point expands the 1500 series gateways for SMB with 2 new models
By Michael A. Greenberg, Product Marketing Manager, Security Platforms Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats. Now, small and midsize…
Is the Google Play Store Safe? Not Yet.
By Ran Schwartz, Product Manager, Threat Prevention Over recent years, there has been a lot of activity on Google’s part to improve the security of its Google Play app store. Why? Because millions of users have inadvertently downloaded thousands of…
All Things Mobile Security @RSA 2020
By Yael Macias, Product Marketing Manager, Threat Prevention RSA is fast approaching, and we have many exciting things going on during the event in San Francisco next week! One of the topics you will be able to learn about in…
Plenty More Phish in the Sea….
Yaffa Finkelstein, Product Marketing Manager, CloudGuard SaaS, published February 12, 2020 Hands up if you’ve ever received one of these emails? “Dear Sirs, A person with the same family name as you, died last week in deepest Peru. You are…
Beware of the other virus – the spread of Coronavirus-themed Malware
While the world attempts to take control over the spread of the Coronavirus, and tries to contain, eliminate and prevent it from spreading, hackers around the globe have found the Coronavirus serving them well as an enabler for their activities.…
Meeting the Security Needs of 31 Nations: R80 Receives 2 Common Criteria Certifications
Check Point recently received international recognition for meeting the essential security requirements for government sectors across the globe. Check Point’s R80 Unified Security Management and Gateway Appliances achieved Common Criteria Certifications for EAL4+ and Protection Profile Compliance for providing leading…
January 2020’s Most Wanted Malware: Coronavirus-themed spam spreads malicious Emotet malware
Check Point’s researchers also report an increase in exploits of the ‘MVPower DVR Remote Code Execution’ vulnerability, impacting 45% of organizations globally While the threat of Coronavirus grabs the attention of the world, our latest Global Threat Index for January…
Valentine’s & Chocolate Don’t Always Equal Love
With Valentine’s Day approaching, lovers around the world are working on finding the best way to celebrate with their loved ones. Meanwhile – cyber criminals around the world also seem to be caught up in the spirit of this unique…
What Are Serverless Functions: Three Revolutions Wrapped in One
After spending most of my day talking about serverless functions security, how it is different, what to worry about, and what to feel good about, I often find it difficult to communicate around the challenges of serverless. This is because…
Learn How Check Point Secured the Branch Office VMware SD-WAN™ for a Global Chemical Company
Businesses are accelerating their digital transformation to cloud SaaS applications like Office 365 by adopting SD-WAN. SD-WAN enables enterprises to connect directly to the Internet and remove the cloud application latency caused by routing traffic through the data center using…
Cut Your Security Operations Time By 60% with the New R80 Security Management-as-a-Service
With the increase in advanced cyber attacks, and the need to support workloads across the cloud, datacenter, mobile, endpoint and IoT, enterprises are facing many security management challenges. Organizations prefer a unified approach, but are often using several security solutions…
Check Point Research Brand Phishing report – Q4
Facebook tops the list, Technology industry is prime target Summary According to Check Point Research analysis, Facebook leads the top 10 phishing brands in Q4 2019 and Technology is the most common industry for which attackers try to imitate brands.…
The Dark Side of Smart Lighting: Check Point Research Shows How Business and Home Networks Can Be Hacked from a Lightbulb
Everyone is familiar with the concept of IoT, the Internet of Things, but how many of you have heard of smart lightbulbs? By using a mobile app, or your digital home assistant, you can control the light in your house…
Cloud Visibility Challenges
By Gui Alvarenga, Product Marketing Manager, published January 31 2020 Today’s enterprises have typically reached high levels of cloud maturity, including distributed application architectures that are based on advanced cloud technologies such as containers and FaaS (Function as a Service,…
Check Point Research partners with Microsoft Azure to create a safer, better secured cloud infrastructure
Cloud security is often a mystery. Clients blindly trust the cloud providers and their security. If we look at the popular cloud vulnerabilities we can see that most of them focus on the security of the client’s applications (aka misconfigurations…
Check Point Research finds vulnerabilities in Zoom Video Communications, Inc.
Since-introduced mitigations resolve issue Zoom is a leader in modern enterprise video communications, it provides an easy cloud platform for video and audio conferencing, collaboration, chat, and webinars across mobile devices, desktops, telephones, and room systems. And it is used…
The Challenge of Compliance in the Cloud
By Trisha Paine, Head of Cloud Marketing Programs, published January 22 2020 Compliance programs are designed to address perceived threats or risks to an industry or community. Typically, an industry authority (e.g., government or industry consortium) sets regulatory standards in…
The Challenge of Compliance in the Cloud
By Trisha Paine, Head of Cloud Marketing Programs, published January 22 2020 Compliance programs are designed to address perceived threats or risks to an industry or community. Typically, an industry authority (e.g., government or industry consortium) sets regulatory standards in…
Preventing Zero Day Attacks using MITRE ATT&CK Framework
By Kobi Eisenkraft and Asaf Fried, Threat Prevention R&D This is the third installment of a three-part series about how Check Point employs the MITRE ATT&CK framework to prevent cyberattacks. Read Part 1 and Part 2. The challenge Check Point…
Achieving Continuous Compliance at the Speed of Cloud
By Grant Asplund, Cloud Evangelist, published January 17, 2020 Imagine you’re in a small boat. You’re out in the middle of a pond and you have to keep your boat in precisely the same place, in the middle of the…
Cloud Native Security: What it Means
Published January 17, 2020 What are Cloud Native Applications? Cloud-native applications are built purposefully for deployment and operation in a cloud environment. They consist of small, independent microservices, such as serverless functions and containers, and utilize services that cloud providers…
Unlocking the data hidden in logs using MITRE ATT&CK Framework
By Oren Koren, Idan Sharabi and Dan Zada, Threat Prevention R&D This is the second installment of a three-part series about how Check Point employs the MITRE ATT&CK framework to prevent cyberattacks. Read Part 1. The analyst holy grail Analyzing…
Use the Correct Tool for the Job: Mobile Management Solutions are Not Security!
By Yael Macias, Product Marketing Manager, Threat Prevention In the past decade, the world went mobile. And businesses had to catch up and adapt to this trend, by allowing their employees to access corporate assets and seamlessly work from their…
Helping you navigating the ever-changing security landscape: Check Point Research’s 2020 Cyber Security Annual Report
“The distinction between the past, present and future is only a stubbornly persistent illusion,” as Albert Einstein wrote. That’s certainly been true of the cyber-security landscape over recent years. Some of the contours and details may have changed, but the…
Taking Security to the Next Level with MITRE ATT&CK
By Moshe Hayun and Kobi Eisenkraft, Threat Prevention R&D This is the first installment of a three-part series about how Check Point employs the MITRE ATT&CK framework to prevent cyberattacks. What is MITRE ATT&CK? MITRE ATT&CK™ is a globally-accessible knowledge…
Fast Track Your Network Security at CPX 2020
By Michael A. Greenberg, Product Marketing Manager, Security Platforms A lot of exciting news coming out of Check Point’s premier cyber security summit and expo: CPX 360 starting in Bangkok, Thailand on January 15th.. This year’s 2020 event revealed some…
Why are we still talking about email security?
Yaffa Finkelstein, Product Marketing Manager, CloudGuard SaaS, published January 13, 2020 Do you know when the first email was sent? It was 1971 when Roy Tomlinson sent the first email across a network. Almost 40 years ago, he used the…
December 2019’s Most Wanted Malware: Greta Thunberg-themed Spam Used to Spread Emotet Malware
Check Point’s researchers also report sharp increase in exploits against the ‘Command Injection Over HTTP’ vulnerability, impacting 33% of organizations globally Our latest Global Threat Index for December 2019 shows that Emotet was the leading malware family for the third…
Allianz and Check Point Launch Joint Initiative to Improve Cyber Resilience of Businesses
There have been unprecedented levels of cyber threats this year. These threats become large-scale, multi-vector attacks that can inflict major damage on enterprises worldwide. Statistics show that 80% of attacks on SMBs result in confirmed breaches; costing companies $100K on…
Your Apps Have Gone Serverless. Has Your Security?
Whether walking around re:Invent earlier this month or sitting in the sessions, one thing was clear; serverless is here to stay. It is no wonder why, there are many benefits to moving to a serverless architecture – cost, efficiency, agility,…