57% of ransomware attacks leverage unpatched vulnerabilities. Are you protected? By Noa Goldstein, Product Marketing Manager and Bar Yassure, Harmony Endpoint Product Manager Endpoint vulnerabilities represent a “hole in the fence” of an operating system or application, through which…
Category: Check Point Blog
April 2023’s Most Wanted Malware: Qbot Launches Substantial Malspam Campaign and Mirai Makes its Return
Check Point Research uncovered a substantial malspam campaign for Trojan Qbot, which came in second in last month’s threat index. Meanwhile Internet-of-Things (IoT) malware Mirai made it back on the list for the first time in a year, and Healthcare…
Protecting your password: Create an unbreakable one
Brute-force attacks to obtain passwords have moved from CPUs to GPUs, improving their effectiveness by checking more than a million keys per second. Passwords now need new requirements to be truly secure: a minimum number of 12 characters, the use…
FluHorse – Check Point Research Exposes Newly Discovered Malware Disguised as Legitimate and Popular Android Apps Targeting East Asia
Highlights Check Point Research (CPR) uncovered a fresh strain of malware that is cleverly disguised as popular Android applications from East Asia. The malware campaign is highly sophisticated and is directed at a variety of sectors in Eastern Asia. It…
Check Point Software Applauds U.S. Senators for Investigating Use of AI to Create Malicious Phishing Emails with the IRS
This week, United States Senators Maggie Hassan (D-NH), Chuck Grassley (R-IA), Ron Wyden (D-OR), and James Lankford (R-OK), raised their concerns over the potential use of artificial intelligence (AI) to create malicious phishing emails designed to trick Americans into sharing…
Fake Websites Impersonating Association To ChatGPT Poses High Risk, Warns Check Point Research
Highlights Check Point Research (CPR) sees a surge in malware distributed through websites appearing to be related to ChatGPT Since the beginning of 2023, 1 out of 25 new ChatGPT-related domain was either malicious or potentially malicious CPR provides examples…
KuppingerCole names Check Point A Market Leader in SASE Leadership Compass
We’re proud to be named a Leader in KuppingerCole’s Leadership Compass for SASE Integrated Suites with Harmony Connect SASE receiving strong positive ratings in security and usability, among other areas. “Organizations looking for rigorous security in a SASE solution should…
Understanding and Minimizing the Security Risks of the Quantum Revolution in Computing
Recently we covered the state of quantum computing and its potential societal benefits. Now we will cover the potential impact of quantum computing on cybersecurity and how we at Check Point Software are innovating to ensure our customers receive the…
Global Cyberattacks Continue to Rise with Africa and APAC Suffering Most
Highlights: Global weekly attacks rose by 7% in Q1 2023 versus same quarter last year, , with each organization facing an average of 1248 attacks per week. Education/Research sector faced the highest number of attacks, rising to an average of…
When Cyberattacks Have Nothing to Do with You – The Escalation of DDoS Cyberattacks due to Hacktivism
Hacktivist attacks have been escalating across the world in recent years with reputed hacktivist groups growing in both size and influence. Last year, a Malaysia-linked hacktivist group attacked targets in India, seemingly in reprisal for a representative of the ruling…
Top Considerations for Securing AWS Lambda, part 2
Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…
Join Check Point at RSA Conference in San Francisco
The RSA Conference is just around the corner, and the Check Point team has a full agenda planned for you to make the most of your visit. In addition to the conference sessions, we will host breakout and theater sessions,…
Check Point Software Technologies and BBT.live Join Forces to Bring Enhanced Cybersecurity to Remote Networks with Secure SD-WAN Solution
At Check Point, we understand that cybersecurity is more important than ever in today’s digital world. As businesses and individuals become more reliant on digital technology, they become more vulnerable to cyber threats such as hacking, phishing, and malware. To…
Check Point Research uncovers rare techniques used by Iranian-affiliated threat actor, targeting Israeli entities
Highlights: Check Point Research reveals new findings related to Phosphorus APT group, an Iranian APT group operating in the Middle East and North America. CPR dubbed this activity cluster Educated Manticore Educated Manticore has substantially enhanced its toolkit by incorporating…
Securing our Sustainable Future
This Earth Day 2023, people from around the world will come together to “Invest in Our Planet” to accelerate the transition to an equitable and prosperous green economy for all. From planting trees to cleaning up beaches to lobbying elected…
Top Considerations for Securing AWS Lambda, part 1
Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…
Cloud Risk Mitigation: Putting it in Context
For many cloud security teams, prioritizing alerts on a day-to-day basis can be overwhelming and impossible to manage. For every cloud application, server, and workload added, the number of alerts piles up. Security teams have no time to go into…
The 3Cs of Best Security: Comprehensive, Consolidated, and Collaborative
Cybercriminals are constantly finding new ways to exploit governments, major corporations and small to medium sized businesses. Motivated by political, financial, or social gain, criminal groups are taking advantage of both the rising geopolitical tensions and the volatile economic climate.…