In a year marked by rapidly evolving cyber threats, Check Point is thrilled to receive the edge Security Leadership Award for AI Security Innovator of the Year! The edge Security Leadership Award shines a spotlight on industry visionaries who are…
Category: Check Point Blog
Check Point Named Strategic Leader in AV-Comparatives EPR Report
Check Point Harmony Endpoint has been recognized as a Strategic Leader in AV-Comparatives’ 2023 Endpoint Prevention and Response (EPR) report. This accolade underscores Harmony Endpoint’s exceptional capabilities in proactively defending against advanced cyber threats. The AV-Comparatives EPR report is a…
Protecting Against DDoS Tsunami Attacks
Quantum DDoS Protector helps defend against sophisticated Tsunami DDoS Attacks without downtime or service disruption. Check Point has a long-standing history of protecting numerous customers worldwide from large-scale web DDoS (Distributed Denial of Service) attacks, effectively handling large amounts of…
Taking Steps Toward Achieving FedRAMP
The federal, state, local government and education sectors continue to be the most targeted by cyberattacks in the United States. According to Check Point Research, education and research organizations experience 1,248 per week, on average — the most of any…
Getting to Know Netzer Shohet
Netzer Shohet is a Product Manager based in Givatayim, Israel. He joined Check Point as a developer on the IPS infrastructure team in 2005 and currently works on cloud development for our platform that enabled the launch of CloudGuard WAF,…
Earth Day 2024: Securing Our Earth
The critical role that cyber security plays in protecting our planet Cyber security solutions are the silent safeguard of our society, ensuring the smooth operation of economies, businesses, and critical infrastructure that keep the world running. While we often associate…
Miercom NGFW Security Benchmark 2024: Why It Matters for Cloud Network Security
As businesses increasingly transition to the cloud, cloud security is a top priority. Customers tell us that the greater their confidence in their cloud security, the faster they will migrate, and the more workloads they will move to the cloud.…
AI for Risk Discovery: 10 Ways to Make it Work For You
Beyond the buzz of chatbots or personalized recommendations, AI’s profound ability to anticipate and neutralize risks is gaining momentum among organizations. As the vast volumes of data surge and regulations tighten their grip, traditional risk assessment tools falter under the…
Securing the Financial Sector with Check Point Infinity Global Services
The digital transformation has significantly enhanced efficiency within the financial sector, but not without elevating the cyber risk landscape. Recent findings by the International Monetary Fund (IMF) reveal a stark reality: cyberattacks have more than doubled since the pandemic, spotlighting…
Microsoft and Google Top the List in Q1 2024 Phishing Attacks: Check Point Research Highlights a Surge in Cyber Threats
Airbnb’s Entry into Top 10 imitated Brands Signals Expanding Cybercriminal Horizons In the ever-evolving landscape of cyber threats, phishing attacks continue to pose a significant risk to individuals and organizations worldwide. Check Point Research (CPR), the Threat Intelligence arm of…
Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF
Navigating the Intersection of Cyber Security and Software Repositories through Standardized Safety Measures As the impact of the open-source software (OSS) community continues to expand, comprehending the interplay between OSS practices and cyber security standards has become paramount. Recentlythe Open…
Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of 2023, though a 5% increase in Q1 YoY Sustained Industry Attacks focus: The Hardware…
Check Point Supercharges Brisbane Catholic Education’s Security Stack to Improve Threat Detection and Streamline Manageability
March 2024’s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos
Attackers Find Your Session Cookies Irresistible
Protecting the weakest link: how human errors can put a company in risk
According to “The Global Risks Report 2022” 95% of cybersecurity issues originate from human errors. Check Point Software highlights essential measures that companies must implement to ensure their protection. In today’s digital age, cybersecurity has become a priority for businesses,…
Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line
DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of…
Not So Private After All: How Dating Apps Can Reveal Your Exact Location
Check Point Research (CPR) recently analyzed several popular dating applications with over 10 million downloads combined in order to understand how safe they are for users. As dating apps traditionally utilize geolocation data, offering the opportunity to connect with people…
Empowering Your Team: 5 Ways Internally Marketing Security Policies can Benefit Your Organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Top GenAI Threats – and why Zero Trust AI Access is the Future
Large Language Models (LLMs) are revolutionizing the way we interact with technology. As a result, SaaS vendors are vying for a competitive edge by integrating AI features, offering enterprises tools such as AI-based sales insights or coding co-pilots. Traditionally, zero-trust…
Empowering Your Team: 5 ways internally marketing security policies can benefit your organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Beyond Imagining – How AI is actively used in election campaigns around the world
Key Findings AI is already extensively utilized in election campaigns worldwide. Deepfakes and voice cloning have been employed in elections in three main venues: By candidates for self-promotion. By candidates to attack and defame political opponents. By foreign nation-state actors…
Check Point Software: Pioneering Vision in Endpoint Protection
We’re excited to share that Check Point has been recognized as a Visionary in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe, this recognition not only reinforces our deep understanding of the market, but also acknowledges…
World Backup Day 2024: Navigating the Future of Cyber security with Cloud Solutions
March 31st marks the celebration of World Backup Day, a timely reminder of the importance of securing critical data in today’s digital landscape. In a world where “data is the new oil’ as businesses rely heavily on information and data…
PyPI Inundated by Malicious Typosquatting Campaign
Highlights: PiPI is one of the largest Indexes, with more than 800,000 users Check Point CloudGuard identified a typosquatting campaign on PyPI, comprising over 500 malicious packages. Installation of these packages exposed users to potential theft of their personally identifiable…
Getting to Know Emma Pember
Emma Pember is a Lead Professional Services Consultant in the ANZ Infinity Global Services team, based in Perth, Australia. She works with customers in the APAC region, specializing in Maestro and VSX deployments. Emma has been with Check Point PS…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Beware the Tax Scam Tsunami: Unmasking QR Code schemes, Bogus Refunds and AI imposters
It’s tax season, that wonderful time of year when a refund check might be showing up in your mailbox—or going out to be sent to the government. Around the world, many countries are gearing up for tax time. This becomes…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…
US and UK Governments Take Stand Against APT31, State-Affiliated Hacking Group
On Monday, the Biden administration announced a criminal indictment and sanctions against a group of Chinese hackers for their role in allegedly conducting hacks against companies in the US, as well as government officials. The US government charged seven hackers,…
Top Zero Trust Platforms Evaluated by Miercom: Check Point Ranks #1
Implementing a Zero Trust security posture is an expected best practice, but platforms can differ considerably in security effectiveness, ease-of-use, and breadth of capabilities. Miercom, a leading independent network and security testing firm, evaluated the top five security platforms to…
Making Sport of Sports: The Growing Cyber Threat to Global Sports Events in 2024
As the global sports calendar turns its pages to the eagerly awaited Olympic Games in Paris and the EURO 2024 Cup in Germany, an ominous shadow threatens to tarnish these spectacles. The trend of cyber attacks on sports events has…
Check Point Wins First Place in Head-to-Head Firewall Testing Miercom 2024 NGFW Firewall Security Benchmark
Enterprise network firewalls are critical to a cyber defense posture. The decision of choosing a firewall is based on multiple factors, including vendor reputation, operational flexibility, policy and firewall management capabilities, and price/value. Equally important are performance test results that…
Embrace the Future of Remote Access: Transitioning from Legacy VPNs to SASE
Cisco will cease providing patches and maintenance updates for AnyConnect clients on March 31, 2024. Any customers still using these clients will be exposed to risk should new vulnerabilities be discovered. You could also end up with limited functionality if…
The Hidden Risks Within Ethereum’s CREATE2 Function: A Guide to Navigating Blockchain Security
By Oded Vanunu, Dikla Barda, Roman Zaikin The digital age has ushered in a wave of technological innovations, with blockchain technology standing at the forefront of this digital revolution. Ethereum, a key player in this space, has been pivotal in…
Phishing Through Venmo
Introduction Venmo is one of the most popular payment apps in the world. Owned by PayPal, Venmo is an easy way for friends to send money back and forth. It’s also used by many businesses, and the app’s social network…
Shield Your Documents: Introducing DocLink Defender for Real-Time Malware Blockade
Highlights: 1. Innovative Real-Time Protection: DocLink Defender leverages the latest in analytical technology to intercept and neutralize malicious documents instantly. By safeguarding systems from the get-go, it provides an impenetrable shield against potential malware infections. 2. Proven Defense Against Advanced…
February 2024’s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign
Researchers uncovered a new campaign with FakeUpdates, also known as SocGolish, targeting and compromising WordPress websites with hacked admin accounts. Meanwhile, Play entered the top three of most wanted ransomware groups and education remained the most attacked sector worldwide Our…
Check Point Research Alerts: Financially Motivated Magnet Goblin Group Exploits 1-Day Vulnerabilities to target Publicly Facing Servers
Key Highlights: – Rapid Exploitation of 1-Day Vulnerabilities: Threat actor group Magnet Goblin’s hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, particularly targeting public-facing servers and edge devices. In some cases, the deployment of the exploits is within…
Women and cyber security: a must to boost the future
Women represented only 25% of the cyber security workforce in 2023. 20% of Check Point Software´s Vice Presidents globally are women, beyond the industry standard of 16%. On International Women’s Day, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading…
The Future of Cybersecurity in the Age of Generative AI: Insights and Projections from a recent ESG research
Main Highlights: Security professionals express cautious optimism about the potential of generative AI to bolster cybersecurity defenses, acknowledging its ability to enhance operational efficiency and threat response. Organizations are proactively developing governance structures for generative AI, recognizing the importance of…
Top 6 SaaS Breach Vectors and How to Prevent Them
On average, IT teams are only aware of 20% of the SaaS applications used in their organizations1. If standard controls could be easily applied to SaaS apps, then this number would be little cause for concern. However, the frequency of…
Congratulating Check Point’s CPX Americas Partner Award Winners
2023 was the year of mega ransomware attacks and AI-fueled cyber threats with 1 in 10 organizations worldwide plagued by attempted ransomware attacks. Our partners were there to support and guide customers amidst the growing threat landscape and new cyber…
New IDC survey confirms how far CISOs have evolved
Savvy security leaders must enable the business and protect their organizations In November 2023, IDC conducted an extensive global survey with 847 security leaders across 17 countries to better identify their roles, responsibilities, and the realities they face on the…
Navigating the Evolution of Cybersecurity: The Leap from NIST 1 to NIST 2
In the rapidly evolving world of cybersecurity, staying ahead of threats requires constant vigilance and adaptation. As a leader in strategic consulting and provider of comprehensive NIST cyber risk assessments, we’re excited to announce the upcoming release of our modified…
PCI Compliance Levels: A Developer’s Guide to PCI Compliance
Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers…
A Shadowed Menace : The Escalation of Web API Cyber Attacks in 2024
Highlights: Significant Increase in Attacks: In the first month of 2024, attempts to attack Web APIs impacted 1 in 4.6 organizations worldwide every week, marking a 20% increase compared to January 2023, highlighting the growing risk associated with API vulnerabilities. Industry-Wide…
VirusTotal Threat Intelligence Now Seamlessly Integrated in Infinity XDR/XPR
Check Point Technologies announces VirusTotal threat intelligence is now an integral part of Infinity XDR/XPR prevention-first security operations platform. Security teams and SOC analysts depend on high quality threat intelligence from multiple sources to investigate indicators of compromise (IOCs) and…
CloudGuard Streamlines Azure Virtual WAN security with Direct Ingress
As Azure Virtual WAN continues to gain popularity among enterprise customers with distributed and complex IT environments, the need for a comprehensive, consolidated, and collaborative security solution to protect these deployments becomes even more crucial. Check Point CloudGuard provides customers…
Securing the Road Ahead: Addressing Persistent Cloud Misconfigurations in the Automotive Industry
Explore a pair of security exposures from the automotive industry and how the proper security tools could have prevented these ‘same old issues’ from happening. Earlier this month, BMW was yet another victim of dangerous misconfigurations in their cloud storage,…
Digital Deception at the Ballot Box: The Shadow Machinery of Election Manipulation: How Deepfake Technology Threatens the 2024 U.S. Elections
Main Takeaways: Widespread Availability: The ease of access to deepfake technology raises alarms for election security. Unmasking the Invisible Architects: The potential for election fraud through the adept use of artificial intelligence and deepfake technologies, orchestrated by a clandestine network…
SASE Survey Reveals User Experience Is Top of Mind
The results are in: end user experience is everything when it comes to SASE. That was the primary feedback from 650 security professionals we surveyed regarding SASE adoption. A full 71% put end user experience as their top concern. This…
2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report
Key Takeaways: · Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. · Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…
Hybrid Mesh and the Check Point Infinity Platform
Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…
CPX Vienna 2024: Celebrating the Pinnacle of Partnership Excellence
As the digital landscape evolves, so does the essence of collaboration and innovation within our partner ecosystem. The CPX Vienna 2024 stands as a testament to this journey, culminating in the prestigious Check Point Partner Awards. These awards spotlight the…
Getting to Know Muhammad Yahya Patel
Muhammad (Mo) Yahya Patel is a lead security engineer and a member of Check Point’s Office of the CTO. Before joining Check Point, Mo worked as a security consultant, designing and implementing security solutions for private and public sector organisations…
Check Point Research Unveils Critical #MonikerLink Vulnerability in Microsoft Outlook with a 9.8 CVSS Severity Score
Key Findings: – Hyperlink Handling in Outlook: The research demonstrates that “file://” hyperlinks can be manipulated in a certain way which results in a bypass of the Outlook’s security measures such as Protected View. – The Vulnerability’s Impact: The #MonikerLink…
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
As we navigate the digital dimensions of love and affection this Valentine’s Day 2024, the landscape is both vast and fraught with pitfalls. In an eye-opening revelation, January saw the creation of 18,171 new domains containing ‘Valentine’ or ‘love’, indicating…
Get to Know Check Point Harmony SASE
Check Point’s new Secure Access Service Edge (SASE) offering is now called Harmony SASE. The world has changed in the last few years, and the old way of securing a standard on-premises network, with its notions of inside and outside…
Are People Problems Blocking Your Secure Cloud Migration?
Jonathan Maresky, Cloud Security Product Marketing Manager What gets in the way of successful and secure cloud migrations? Ask most CIOs, cloud architects or IT engineers that question, and their minds will probably first go to technological hurdles – like…
January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats
Researchers uncovered a large cyber threat distributor known as VexTrio, which serves as a major traffic broker for cybercriminals to distribute malicious content. Meanwhile, LockBit3 topped the list of active ransomware groups and Education was the most impacted industry worldwide …
Empowering Women in Cybersecurity: Bridging the Gender Gap
On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue…
MalDocs in Word and Excel: A Persistent Cybersecurity Challenge
Highlights · Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802. · Widespread Use by Cybercriminals:…
Spoofing Temu for Credential Harvesting
Introduction Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distributors. Launched in 2022 and owned by Pindouduo, it has attracted a large audience, with 40% of its downloads…
Raspberry Robin: Evolving Cyber Threat with Advanced Exploits and Stealth Tactics
Key Highlights: · Rapid Exploit Development: Raspberry Robin leverages new 1-day Local Privilege Escalation (LPE) exploits developed ahead of public knowledge, hinting at either an in-house development capability or access to a sophisticated exploit market. · Innovative Delivery and…
Fake Voicemail as Credential Harvesting Lure
Introduction Hackers will try just about anything to get you to click on a malicious link. The key is to make the overall email seem as believable as possible. The more legitimate it seems, the better. The more believable it…
Generative AI is the Pride of Cybercrime Services
Cybercriminals Officially Utilize Generative AI for Spam Campaigns, Social Media Impersonation and Verification Services Highlights: – Generative AI as a Cybercrime Tool: Cybercriminals are increasingly using generative AI for sophisticated cybercrimes, including social media impersonation, spam campaigns, and KYC verification services.…
Navigating the Cyber security Maze for Small and Medium Business: How Quantum Spark 1900 & 2000 are Reshaping Security for SMBs and MSPs
Innovative Next-Generation Firewalls Deliver Enhanced AI Threat Prevention up to 5 Gbps with a 99.8% block rate against zero-day malware, phishing, and ransomware In an era where cyber threats are becoming increasingly complex, small and medium-sized businesses (SMBs) are finding…
Check Point Software Unveils the Infinity Platform: Pioneering the Future of AI-Powered, Cloud-Delivered Cyber Security
At Check Point Software Technologies, we are always at the forefront of innovative cyber security solutions. Today, we are excited to announce a significant evolution in cyber security technology – the launch of our redefined Check Point Infinity Platform. This…
Singapore’s National Research and Education Network (SingAREN) Protects Vital Research with Check Point Software
SingAREN is Singapore’s national research and community network. One of its main duties is to connect Singapore’s research and educational organizations to research centers across Asia, Australia, Europe, the Middle East and the United States. Researchers rely on SingAREN’s networks…
Congratulating Check Point’s CPX APAC Partner Award Winners
2023 was the year of mega ransomware attacks and AI-fueled cyber threats. The APAC region was hit hardest by cyber attacks, with organizations experiencing an average of 1,930 attacks per week. Our partners were there to support and guide customers…
Check Point Attains ‘Champion’ Status in the Canalys Global Cybersecurity Leadership Matrix for three consecutive years
Check Point has earned the prestigious “Champion” status in the 2023 Canalys Global Cybersecurity Leadership Matrix. This recognition reflects not only exceptional channel management and market performance, but also continued growth in the cybersecurity industry. Check Point has received the…
Pay Now or Pay Later
Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for implementing robust cybersecurity measures in the domains of Operational Technology (OT) and Industrial Control Systems (ICS). Considering the growing convergence of IT and OT, the…
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat
90% of children over 8 years old are already using Internet. Only 40% of parents are aware that their children have faced cyber threats. Education is the cornerstone of our culture, as it allows us to progress as a society…
Conditional QR Code Routing Attacks
Over the summer, we saw a somewhat unexpected rise in QR-code based phishing attacks. These attacks were all fairly similar. The main goal was to induce the end-user to scan the QR Code, where they would be redirected to a…
A Step-by-Step Guide to Spotting and Preventing Frame Injections
Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cybercriminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for phishing…
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam
By: Oded Vanunu, Dikla Barda, Roman Zaikin Main Highlights: 1. Sophisticated Scam Targeting Token Holders: Over 100 popular projects’ token holders targeted with fake NFT airdrops appearing from reputable sources. 2. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims…
Shifting Paradigms: Cloud Security in the Post-Pandemic Era
‘The new normal.’ It began as a buzzword after COVID-19 hit the world in 2020. The new normal referred to a culture that adapted to the pandemic and changed our day-to-day lives. One significant outcome of the lockdown was digital…
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations
A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each experienced over 60,000…
Is Open Source More Risk than Reward?
Open source has become an indispensable aspect of modern software development. From the Linux operating system to the ubiquitous Apache web server, open source projects have sparked innovation, fostered collaboration, and disrupted traditional business models. However, as the open source…
ThreatCloud AI Wins 2024 BIG Innovation Award
The Business Intelligence Group awarded ThreatCloud AI with a 2024 BIG Innovation award. ThreatCloud AI powers Check Point’s entire security portfolio – from edge to cloud to network and beyond. It makes two billion security decisions daily – ensuring that…
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security
As we enter 2024, your organization may have unused MACC or Azure commit-to-consume (CtC) credits as your annual renewal date draws near. These credits are “use them or lose them”—but the good news is that you can now transform those…
Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023
The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten Our latest Brand Phishing Report for Q4 2023 highlights the brands that were…
December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates
Researchers discovered a revival of the Qbot malware, which was detected in phishing attempts directed at the hospitality industry. Meanwhile, downloader FakeUpdates jumped into first place Our latest Global Threat Index for December 2023 saw researchers identify the resurrection of…
Alkem Laboratories Future-Proofs Security Infrastructure with Check Point Software Technologies
Alkem Laboratories is a leading pharmaceutical company with over 23 manufacturing facilities in India and the United States of America. For over 50 years, Alkem has focused their 500 scientists working across five R&D centers on innovations aligned with the…
IoT – The key to connected care excellence
Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security…
Mastering the Art of Cyber Resilience in Operational Technology
I recently joined industry colleagues and the World Economic Forum in publishing, “Unlocking Cyber Resilience in Industrial Environments: Five Principles.” It’s a comprehensive guide designed to enhance cybersecurity in operational technology (OT) environments. Our white paper underscores the significance of…
Microsoft Defender for Endpoint is Integrated with Check Point Horizon XDR/XPR
Microsoft Defender for Endpoint integrates with Check Point’s extended detection and response (XDR) solution – Horizon XDR/XPR. One-click integration connects the endpoint solution and telemetry is added to the XDR/XPR artificial intelligence (AI) driven data correlation engine. XDR/XPR combines data…