Category: Check Point Blog

How SASE Addresses Enterprise Network Challenges

Unified Security and Network Performance The proliferation of remote work, cloud services, and mobile devices has expanded the traditional network perimeter, introducing complexities in ensuring secure and efficient access to resources and the need to defend against web-based threats. All…

MITRE ATT&CK® Evaluations Highlights Check Point Detection

In the 2024 MITRE ATT&CK® Evaluations, Check Point demonstrated what world-class detection looks like. The results speak for themselves: detection of all 57 applicable tested attack steps, with an impressive 56 detections at technique level. This isn’t just about catching…

Cyber Risk – How to effectively manage fourth-party risks

Originally published in the November 2024 edition of Intelligent Risk magazine Cyber risks have gained numerous business executives’ attention as these risks are effectively operational risks due to their potentially devastating operational and financial impacts, and reputational damage to organizations.…

The Exploitation of Gaming Engines: A New Dimension in Cybercrime

Executive Summary Check Point Research discovered a new technique using Godot Engine, a popular open-source game engine, to execute malicious code that executes nefarious commands and delivers malware and largely remains undetected. This innovative method enables cybercriminals to compromise devices…

The Black Friday Cybercrime Economy

The holidays are here, and as people all over the world prepare to celebrate with their families, cyber criminals are putting in overtime. With Black Friday and Cyber Monday approaching, threat actors are poised to take advantage of consumers hoping…

Getting to Know Kelvin Tse

Kelvin, can you tell us about your role at Check Point? As a Channel Account Manager, my key responsibilities include collaborating closely with our partners and ensuring that our business strategies are aligned. I focus on understanding our partners’ core…

Unlocking Productivity with RDP Enhancements

Many organizations today rely on Remote Desktop Protocol (RDP) to help keep their hybrid and remote teams productive and connected. RDP enables access to applications and office computers from anywhere, ensuring that employees can carry on with their work, whether…

Small Devices, Big Bills

Why IoT Incidents hit harder than IT breaches The price of connectivity As the world embraces IoT technologies, the associated risks and vulnerabilities become increasingly prominent. Traditional IT incidents and IoT incidents differ not only in their nature but in…

Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework

Introduction The cyber security landscape is evolving at breakneck speed, rendering traditional defense mechanisms inadequate. Advanced cyber threats now move laterally within networks with alarming ease, exploiting vulnerabilities that traditional perimeter defenses cannot fully address. The rise of remote work…

5G network AI models: Threats and Mitigations

Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive…

Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware

Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a…

Incident Response Readiness Journey

Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…