Many organizations today rely on Remote Desktop Protocol (RDP) to help keep their hybrid and remote teams productive and connected. RDP enables access to applications and office computers from anywhere, ensuring that employees can carry on with their work, whether…
Category: Check Point Blog
Check Point Partners with Georgia to Strengthen Cyber Security Across the Peach State
Check Point has been selected as the official cyber security partner for the State of Georgia through the Department of Administrative Services (DOAS) state-wide contract. This partnership marks a major step in our commitment to helping state, higher education, local…
Navigating the Evolving Threat Landscape Ahead of Black Friday
As Thanksgiving and Black Friday approach, so do the risks of fraudulent shopping scams. Cyber criminals take advantage of shoppers eager to benefit from the exceptional sales available on Black Friday. In preparation for this shopping season, Check Point Research…
Quantum Firewall Software R82: AI-Powered Security for Zero-Day Threats
Security needs to constantly evolve, as organizations must protect against the latest threats while meeting changing business needs. Check Point’s newest security software for Quantum Firewalls and Cloud Guard Network is designed for the future: to deliver protection against unknown…
Small Devices, Big Bills
Why IoT Incidents hit harder than IT breaches The price of connectivity As the world embraces IoT technologies, the associated risks and vulnerabilities become increasingly prominent. Traditional IT incidents and IoT incidents differ not only in their nature but in…
Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework
Introduction The cyber security landscape is evolving at breakneck speed, rendering traditional defense mechanisms inadequate. Advanced cyber threats now move laterally within networks with alarming ease, exploiting vulnerabilities that traditional perimeter defenses cannot fully address. The rise of remote work…
5G network AI models: Threats and Mitigations
Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive…
Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware
Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a…
Empowering Employees in the Age of AI: Strengthening Cyber Security through Training and Awareness
In today’s rapidly evolving digital landscape, cyber security has emerged as a paramount concern for organizations across all sectors. As cyber threats become more sophisticated, the role of employees in safeguarding organizational assets has never been more critical. Employees serve…
Hamas-linked Threat Group Expands Espionage and Destructive Operations
Check Point Research has been monitoring the ongoing activities of the WIRTE threat actor, which is previously linked to the Hamas-associated group Gaza Cybergang, despite the ongoing conflict in the region. The conflict has not disrupted the group’s activities, and…
Honoring One Year of Check Point’s U.S. Military, Veterans, and Allies ERG: Our Ongoing Dedication to Supporting Veterans
As we mark the one-year anniversary of Check Point’s U.S. Active Military, Veterans, and Allies Employee Resource Group (ERG), we reflect on the profound impact this initiative has had on our workplace community. Designed to cultivate an inclusive and supportive…
October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cyber criminals across the globe. Check Point’s Global…
Incident Response Readiness Journey
Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…
Tackling Cyberbullying with Cyber security to defend the Digital Playground
Cyber security, laws and education being used to combat the rise of cyberbullying. Cyberbullying is a severe, often relentless form of digital harassment that can manifest in many ways, impacting individuals’ emotional well-being and security. On this International Day Against…
Uncovering a Large-Scale Campaign Using the Latest Version of The Rhadamanthys Stealer: Rhadamanthys.07
Executive Summary: Check Point Research has identified a large-scale phishing operation utilizing a new version of Rhadamanthys Stealer. Dubbed CopyRh(ight)adamantys, the operation targets individuals and organizations under the false premise of copyright infringement violations. Attackers create dedicated Gmail accounts and…
Check Point Software Strengthens Cyber Security Training for Enterprises with OffSec’s Advanced Learning Platform
As cyber threats continue to grow in scale and sophistication, continuous cyber security training is crucial for enterprises looking to build resilient defenses. Recent data from Check Point Research (CPR) reveals a 30% increase in cyberattacks in Q2 2024 alone—the…
Check Point Further Enhances Cyber Security Training for IGS Customers with OffSec’s Learn Enterprise
In an era of rapidly evolving cyber threats, the need for continuous cyber security training is more critical than ever. Check Point Research (CPR) even highlights a 30% increase in cyber attacks in Q2 2024 – the highest surge in…
The Evolution of Transparent Tribe’s New Malware
Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…
AI’s Impact in 2024 Elections and What Voters Can Do to Protect Themselves from Disinformation
2024 is perhaps the biggest election year the world has ever seen, with more than 60 countries holding national elections that will impact nearly half the world’s population, per Statista. 2024 is also the year the world became more comfortable…
Ransomware’s Evolving Threat: The Rise of RansomHub, Decline of Lockbit, and the New Era of Data Extortion
1.Introduction The ransomware landscape is witnessing significant changes, with new actors like RansomHub rising to prominence, while previously dominant groups such as Lockbit experience a sharp decline. Ransomware remains the most pervasive cyber threat, with financially motivated criminal groups deploying…
Halloween Frights of the Digital Age: Cyber Threats Haunting Us in 2024
Halloween is a time for haunted houses, spooky costumes, and trick-or-treating, but in today’s digital landscape, there are scarier things lurking just beneath the surface. The rise in global cyber threats paints a chilling picture—cyber attacks have surged by an…
7,500 Phishing Emails Use Interesting Obfuscation Method to Target Student Loan Holders
According to the Education Data Initiative, nearly 43 million Americans are saddled with the burden of student loan debt, with an average individual debt burden of $37,000. In 2022, President Biden announced a three-part plan to cancel thousands of dollars…
2025 Cyber Security Predictions – The Rise of AI-Driven Attacks, Quantum Threats, and Social Media Exploitation
As we move into 2025, the cyber security landscape will become more complex, with new challenges emerging as rapidly as the technologies that drive them. From artificial intelligence (AI)-enhanced malware to looming quantum computing threats, the forecast from Check Point…
Cloud Risk Management: The DevOps Guide
For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify,…
Get it Done Faster with AI Copilot for Harmony SASE
Managing network security can be a daunting task, even for the most seasoned IT professionals. Harmony SASE users now have a new tool at their disposal to streamline these challenges: the Infinity AI Copilot for Harmony SASE, currently in preview.…
Strengthening Cloud Defenses: Key Strategies
In today’s digital landscape, cloud security has emerged as a critical concern for organizations worldwide. As cloud technologies continue to be adopted at an accelerated pace, businesses face new layers of complexity. In fact, 73% of professionals acknowledge that cloud…
A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide
A Record Spike in Attacks: In Q3 2024, an average of 1,876 cyber attacks per organization was recorded, marking a 75% increase compared to the same period in 2023 and a 15% rise from the previous quarter. Industry-wise Breakdown: The…
Check Point Research Unveils Q3 2024 Brand Phishing Trends: Microsoft Remains Most Imitated Brand as Alibaba and Adobe Enter Top 10
Microsoft is identified as the primary target in phishing attacks, with significant shifts observed in the Top 10 rankings. In the realm of cyber security, phishing attacks are among the most prevalent threats, often serving as the initial step for…
How to secure your SaaS data?
SaaS Supply Chain Risks: Biggest Threat to Your Data SaaS supply chain attacks pose the greatest risk to your data. Attackers exploit vulnerabilities in SaaS applications, which serve as entry points into your enterprise. This might be something as basic…
October Cyber Awareness | IoT security – beyond connectivity into risk
As we step into Cyber Awareness Month this October, organizations must take a closer look at how new technologies like IoT, AI and advanced wireless standards are transforming the threat landscape. Many emerging solutions remain under the radar. The integration…
September 2024’s Most Wanted Malware: Notable AI-Driven Techniques and Persistent RansomHub Threats
Check Point’s latest threat index emphasizes the shift towards AI-driven malware tactics in the current cyber landscape Check Point’s Global Threat Index for September 2024 revealed its Global Threat Index for September 2024. The report highlights an interesting trend in…
Hispanic Heritage Month Spotlight: Priscilla Ramis
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Priscilla Ramis, HR Partner, to learn about her…
Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova’s National Elections
Executive Summary: Ahead of Moldova’s elections on October 20, 2024, Check Point Research detected an ongoing disinformation campaign aiming to influence the results of Moldova’s elections and nationwide referendum on EU (European Union) membership. Using emails as its primary attack…
5 Ways to “Secure Our World” for Cyber Security Awareness Month
October is Cyber Security Awareness Month – a time dedicated to promoting awareness about the importance of cyber security. In an era where our lives are increasingly intertwined with the digital world, the significance of cyber security cannot be overstated.…
Securing the Future of Home Networks: Heights Telecom and Check Point’s Revolutionary Partnership
As homes become more connected, the role of home gateways – the devices that connect home networks to the internet – has become more critical than ever. These routers, once considered simple conduits for internet access, are now the gatekeepers…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Hispanic Heritage Month: Roberto Galindo
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Roberto Galindo, Security Engineer, SLED, to learn about…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Check Point Software Recognized as a Leader in The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024
The digital realm faces unprecedented threats as cybercrime continues its relentless rise. According to Check Point Research, the second quarter of 2024 witnessed a staggering 30% increase in worldwide cyber-attacks, highlighting the critical need for safeguarding digital assets. Today, we…
Stay Safe This Prime Day: Check Point Identifies Rise in Phishing Attacks and Scam Emails
Highlights In the last 30 days, Check Point Research (CPR) has identified over 1,000 newly registered Amazon-related domains, with a staggering 88% of them deemed malicious or suspicious 1 of every 54 new Amazon-related domains includes the phrase “Amazon Prime,”…
Customers Praise Check Point CloudGuard WAF for Exceptional Web Application and API Security
An organization’s attack surface expands with its increasing business application programming interfaces (APIs), which require stronger protection than what traditional cybersecurity solutions offer. Web Application Firewalls (WAFs) defend web applications and APIs against common attacks like structure query language (SQL)…
5,000 Fake Microsoft Emails that Your Employees Could Fall For
EXECUTIVE SUMMARY: In the technology sector, Microsoft stands out as the one of the most frequently impersonated brands. Scammers commonly pose as Microsoft employees or affiliated vendors, deceiving email recipients. According to the latest research findings from Harmony Email &…
How to Safeguard Your Systems from Linux CUPS Vulnerabilities
On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…
Check Point Harmony Endpoint: Strategic Leader in Real-World Endpoint Protection
In the ever-evolving landscape of cybersecurity, theoretical protection is not enough. Businesses need solutions that stand up to real-world threats, day in and day out. That’s why we’re proud to announce that Check Point Harmony Endpoint has been named a…
LINUX CUPS VULNERABILITIES
On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…
Hispanic Heritage Month Spotlight: Ana Perez Quiles
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Ana Perez Quiles, Public Relations Manager, to learn…
Check Point Software Technologies: A Visionary Approach to Workspace Security
In today’s rapidly evolving digital landscape, businesses face unprecedented cybersecurity challenges. The rise of remote work, cloud adoption, and sophisticated cyber threats demand a robust, flexible, and user-friendly endpoint protection solution. Check Point Harmony Endpoint provides exactly this kind of…
The Cryptocurrency Drainer Hiding on Google Play
Executive Summary Check Point Research uncovered a new malicious crypto drainer app on Google Play designed to steal cryptocurrency. The first time a drainer has targeted mobile device users exclusively, this app used modern evasion techniques to avoid detection and…
AI: The New Frontier in Safeguarding Critical Infrastructure
In an era where digital threats loom large, artificial intelligence (AI) emerges as a powerful ally in protecting our vital systems. According to Check Point Research, from January to August 2024, the utilities sector, including critical infrastructure, ranked fifth in…
Cyber Security Leader vs Cyber Security Tag-along: How to Tell the Difference
Throughout history, many fascinating stories have been told about great leaders; Julius Caesar successfully turned Rome into a prosperous empire, and Napoleon Bonaparte famously commanded the French forces on the seas. In 100 BC and 1800, respectively, it was easier…
New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know
Check Point Harmony Email Researchers have recently identified a concerning phishing campaign that spoofs Google Apps Script macros – a tool used to automate tasks in Google applications. Google Apps Script macros are popular due to their abilities to automate…
Check Point SASE: Triple Threat Protection for the New Perimeter
Securing the modern enterprise network is more complex than ever. Company data is migrating to the cloud, Software as a Service (SaaS) applications are the norm, and the workforce is increasingly working remotely. Securing these dynamic environments requires a new…
Cyber predators target vulnerable victims: Hackers blackmail hospitals, trade patient data and find partners through darknet ads
In a world of crime, expect no mercy. Cybercrime goes hard after its goal, which is most often financial gain. Hackers choose their victims accordingly, where they are most likely to succeed and where the most valuable data is located.…
Hispanic Heritage Month Spotlight: Bill Diaz
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We’re kicking off by spotlighting Bill Diaz, Vice President of Vertical Solutions…
5 Steps to Building a Robust Cyber Resilience Framework
The reality of cyber security is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the focus from preventing attacks to ensuring readiness, mitigating impact, and driving a swift…
Check Point’s Quantum Leap: Integrating NIST PQC Standards
In our previous blog, “Living in a Post Quantum World,” we discussed the role cryptographic algorithms play in withstanding threats that may arise from the advanced computational abilities of quantum computers. As quantum technology evolves, it poses a significant threat…
The Unraveling of an Iranian Cyber Attack Against the Iraqi Government
Check Point Research discovered an elaborate cyber-attack against Iraqi governmental networks The installer used to deploy the malware bore the logo of the Iraqi General Secretariat of the Council of Ministers, while the domains of compromised servers were related to…