Tag: Check Point Blog

5G network AI models: Threats and Mitigations

Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive…

Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware

Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a…

Incident Response Readiness Journey

Introduction Imagine for a second that you live in a neighborhood where increasingly houses get broken into by brazen criminals to steal and break valuable items, kidnap people for ransom, and, in some cases, burn houses to the ground! If…

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Cloud Risk Management: The DevOps Guide

For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify,…

Get it Done Faster with AI Copilot for Harmony SASE

Managing network security can be a daunting task, even for the most seasoned IT professionals. Harmony SASE users now have a new tool at their disposal to streamline these challenges: the Infinity AI Copilot for Harmony SASE, currently in preview.…

Strengthening Cloud Defenses: Key Strategies

In today’s digital landscape, cloud security has emerged as a critical concern for organizations worldwide. As cloud technologies continue to be adopted at an accelerated pace, businesses face new layers of complexity. In fact, 73% of professionals acknowledge that cloud…

How to secure your SaaS data?

SaaS Supply Chain Risks: Biggest Threat to Your Data SaaS supply chain attacks pose the greatest risk to your data. Attackers exploit vulnerabilities in SaaS applications, which serve as entry points into your enterprise. This might be something as basic…

Hispanic Heritage Month Spotlight: Priscilla Ramis

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Priscilla Ramis, HR Partner, to learn about her…

Hispanic Heritage Month: Roberto Galindo

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Roberto Galindo, Security Engineer, SLED, to learn about…

5,000 Fake Microsoft Emails that Your Employees Could Fall For

EXECUTIVE SUMMARY: In the technology sector, Microsoft stands out as the one of the most frequently impersonated brands. Scammers commonly pose as Microsoft employees or affiliated vendors, deceiving email recipients. According to the latest research findings from Harmony Email &…

How to Safeguard Your Systems from Linux CUPS Vulnerabilities

On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…

LINUX CUPS VULNERABILITIES

On September 23rd, a security researcher named Simone Margaritelli (evilSocket on X) disclosed 4 vulnerabilities in OpenPrinting Common Unix Printing System (CUPS), a modular printing system for Unix-like operating systems that enables users to manage printers and print jobs. Due…

Hispanic Heritage Month Spotlight: Ana Perez Quiles

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We sat down with Ana Perez Quiles, Public Relations Manager, to learn…

The Cryptocurrency Drainer Hiding on Google Play

Executive Summary Check Point Research uncovered a new malicious crypto drainer app on Google Play designed to steal cryptocurrency. The first time a drainer has targeted mobile device users exclusively, this app used modern evasion techniques to avoid detection and…

AI: The New Frontier in Safeguarding Critical Infrastructure

In an era where digital threats loom large, artificial intelligence (AI) emerges as a powerful ally in protecting our vital systems. According to Check Point Research, from January to August 2024, the utilities sector, including critical infrastructure, ranked fifth in…

Hispanic Heritage Month Spotlight: Bill Diaz

In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We’re kicking off by spotlighting Bill Diaz, Vice President of Vertical Solutions…

5 Steps to Building a Robust Cyber Resilience Framework

The reality of cyber security is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the focus from preventing attacks to ensuring readiness, mitigating impact, and driving a swift…

Check Point’s Quantum Leap: Integrating NIST PQC Standards

In our previous blog, “Living in a Post Quantum World,” we discussed the role cryptographic algorithms play in withstanding threats that may arise from the advanced computational abilities of quantum computers.  As quantum technology evolves, it poses a significant threat…

The Jedi of Code: May CloudGuard Be with You

Imagine a wise Jedi knight, ever-vigilant, honest, and focused on what truly matters: protecting your Crown Jewels in the Cloud. This Jedi, like a wise Master, guides you with a focus on the impact on your organization. With Check Point…