Tag: Check Point Blog

Getting to Know Emma Pember

Emma Pember is a Lead Professional Services Consultant in the ANZ Infinity Global Services team, based in Perth, Australia. She works with customers in the APAC region, specializing in Maestro and VSX deployments. Emma has been with Check Point PS…

Phishing Through Venmo

Introduction Venmo is one of the most popular payment apps in the world. Owned by PayPal, Venmo is an easy way for friends to send money back and forth. It’s also used by many businesses, and the app’s social network…

Check Point Research Alerts: Financially Motivated Magnet Goblin Group Exploits 1-Day Vulnerabilities to target Publicly Facing Servers

Key Highlights: – Rapid Exploitation of 1-Day Vulnerabilities: Threat actor group Magnet Goblin’s hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, particularly targeting public-facing servers and edge devices. In some cases, the deployment of the exploits is within…

The Future of Cybersecurity in the Age of Generative AI: Insights and Projections from a recent ESG research

Main Highlights: Security professionals express cautious optimism about the potential of generative AI to bolster cybersecurity defenses, acknowledging its ability to enhance operational efficiency and threat response. Organizations are proactively developing governance structures for generative AI, recognizing the importance of…

Digital Deception at the Ballot Box: The Shadow Machinery of Election Manipulation: How Deepfake Technology Threatens the 2024 U.S. Elections

Main Takeaways: Widespread Availability: The ease of access to deepfake technology raises alarms for election security. Unmasking the Invisible Architects: The potential for election fraud through the adept use of artificial intelligence and deepfake technologies, orchestrated by a clandestine network…

2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report

Key Takeaways: ·        Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. ·        Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…

Getting to Know Muhammad Yahya Patel

Muhammad (Mo) Yahya Patel is a lead security engineer and a member of Check Point’s Office of the CTO. Before joining Check Point, Mo worked as a security consultant, designing and implementing security solutions for private and public sector organisations…

Spoofing Temu for Credential Harvesting

Introduction Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distributors. Launched in 2022 and owned by Pindouduo, it has attracted a large audience, with 40% of its downloads…

Generative AI is the Pride of Cybercrime Services

Cybercriminals Officially Utilize Generative AI for Spam Campaigns, Social Media Impersonation and Verification Services Highlights: – Generative AI as a Cybercrime Tool: Cybercriminals are increasingly using generative AI for sophisticated cybercrimes, including social media impersonation, spam campaigns, and KYC verification services.…

Pay Now or Pay Later

Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for implementing robust cybersecurity measures in the domains of Operational Technology (OT) and Industrial Control Systems (ICS). Considering the growing convergence of IT and OT, the…

Is Open Source More Risk than Reward?

Open source has become an indispensable aspect of modern software development. From the Linux operating system to the ubiquitous Apache web server, open source projects have sparked innovation, fostered collaboration, and disrupted traditional business models. However, as the open source…

Getting to Know: Royce Ho

Royce Ho is a Regional Threat Prevention Security Consultant for the Southeast Asia & Korea (SEAK) region at Check Point Software Technologies. Prior to Check Point, he worked at CSIntelligence, Deloitte, F5 Networks and StarHub. Royce received a Bachelor’s of…