Category: Check Point Blog

Cyber Risk – How to effectively manage fourth-party risks

Originally published in the November 2024 edition of Intelligent Risk magazine Cyber risks have gained numerous business executives’ attention as these risks are effectively operational risks due to their potentially devastating operational and financial impacts, and reputational damage to organizations.…

The Exploitation of Gaming Engines: A New Dimension in Cybercrime

Executive Summary Check Point Research discovered a new technique using Godot Engine, a popular open-source game engine, to execute malicious code that executes nefarious commands and delivers malware and largely remains undetected. This innovative method enables cybercriminals to compromise devices…

The Black Friday Cybercrime Economy

The holidays are here, and as people all over the world prepare to celebrate with their families, cyber criminals are putting in overtime. With Black Friday and Cyber Monday approaching, threat actors are poised to take advantage of consumers hoping…

Getting to Know Kelvin Tse

Kelvin, can you tell us about your role at Check Point? As a Channel Account Manager, my key responsibilities include collaborating closely with our partners and ensuring that our business strategies are aligned. I focus on understanding our partners’ core…

Unlocking Productivity with RDP Enhancements

Many organizations today rely on Remote Desktop Protocol (RDP) to help keep their hybrid and remote teams productive and connected. RDP enables access to applications and office computers from anywhere, ensuring that employees can carry on with their work, whether…

Small Devices, Big Bills

Why IoT Incidents hit harder than IT breaches The price of connectivity As the world embraces IoT technologies, the associated risks and vulnerabilities become increasingly prominent. Traditional IT incidents and IoT incidents differ not only in their nature but in…

Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework

Introduction The cyber security landscape is evolving at breakneck speed, rendering traditional defense mechanisms inadequate. Advanced cyber threats now move laterally within networks with alarming ease, exploiting vulnerabilities that traditional perimeter defenses cannot fully address. The rise of remote work…

5G network AI models: Threats and Mitigations

Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive…

Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware

Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a…

Incident Response Readiness Journey

Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Cloud Risk Management: The DevOps Guide

For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify,…

Get it Done Faster with AI Copilot for Harmony SASE

Managing network security can be a daunting task, even for the most seasoned IT professionals. Harmony SASE users now have a new tool at their disposal to streamline these challenges: the Infinity AI Copilot for Harmony SASE, currently in preview.…

Strengthening Cloud Defenses: Key Strategies

In today’s digital landscape, cloud security has emerged as a critical concern for organizations worldwide. As cloud technologies continue to be adopted at an accelerated pace, businesses face new layers of complexity. In fact, 73% of professionals acknowledge that cloud…

How to secure your SaaS data?

SaaS Supply Chain Risks: Biggest Threat to Your Data SaaS supply chain attacks pose the greatest risk to your data. Attackers exploit vulnerabilities in SaaS applications, which serve as entry points into your enterprise. This might be something as basic…

Hispanic Heritage Month Spotlight: Priscilla Ramis

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Priscilla Ramis, HR Partner, to learn about her…

Hispanic Heritage Month: Roberto Galindo

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Roberto Galindo, Security Engineer, SLED, to learn about…