Kim Forsthuber is a Channel Specialist for at Check Point Software Technologies. As a Channel Specialist, Kim works closely with Check Point’s partners to develop and execute strategic marketing and sales plans for the Harmony portfolio. Prior to Check Point,…
Tag: Check Point Blog
After Ransomware Disruption, Hospital Turns to Check Point Infinity Global Services to Recover and Build Cyber Resilience
When a renowned hospital was crippled by a ransomware attack, the immediate focus shifted from patient care to a cyber-strategy discussion. The nightmare that ensued revealed vulnerabilities, stressed resources, and created a chaotic environment, compromising both patient data and trust.…
Phishing via Dropbox
A burgeoning attack involving Dropbox is making the rounds. In the first two weeks of September, we saw 5,550 of these attacks. Hackers are using Dropbox to create fake login pages that eventually lead to a credential harvesting page. It’s…
Check Point Research Uncovers Critical Vulnerabilities in Friend.tech WEB3 Platform
Highlights: Check Point Research (CPR) found substantial security vulnerabilities that if exploited could provide attackers with control over the platform’s database, access to the user’s chat room conversations, influence user’s ranks and points, file sharing, and full access to Friend.Tech’s…
Celebrating Over 20,000 Hours of Cyber Hacking Training via the Check Point MIND and NotSoSecure Partnership
Our 2023 Mid-Year Cybersecurity Report found that cyberattacks surged 8% in the first half of 2023, with more attacks than ever before. Cyber criminals show no signs of slowing down. Unfortunately, researchers at ISC2 predict that by 2025, there will…
The City of Kamloops Protects City Data and Networks with Check Point Software
Check Point Harmony Email & Collaboration successfully blocked over 14,000 phishing emails on Kamloops’ servers that evaded the previous email protection Business email compromise is a type of spear phishing attack in which cyber criminals use business tools to trick…
Check Point CloudGuard is now Microsoft Azure Consumption Commitment Eligible
Check Point CloudGuard, Check Point’s solution for Azure Virtual WAN security, is now eligible for Microsoft Azure consumption commitment (MACC). Azure customers with qualifying Azure agreements can now purchase CloudGuard and use it towards fulfilling their commitments while adding an…
Check Point Wins Globee Leadership Award for Company of the Year in Security Products/Services
Check Point is thrilled to be recognized by the Globee Awards as 2023 Company of the Year in Security Products/Services. The Globee Awards commemorate exceptional accomplishments, visionary strategies, and the teams behind the year’s most commendable initiatives. With cyberattacks becoming…
What is Alert Deafness?
Ping! One of the CI pipelines is failing. Ding! Critical production error incoming… The exponential increase in data processed by organizations means a rise in errors, failures, and vulnerabilities is expected. But with pings and dings popping up over 500…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Research exposes new versions of the BBTok banking malware, which targets clients of over 40 Mexican and Brazilian banks
Highlights: Check Point Research (CPR) recently discovered an active campaign deploying a new variant of the BBTok banking malware in Latin America Originally exposed in 2020, the newly discovered variant of the malware replicates the interfaces of over 40 Mexican…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Check Point Named a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
As enterprises distribute data center workloads across multiple clouds, expand support for SaaS applications, and remote workers, the challenge of implementing a zero trust security architecture becomes more complex. Download the full report. How does Forrester define a Zero Trust…
Will the Real Slim Shady Please Stand Up? Check Point Research Exposes Cybercriminal Behind Malicious Software Impacting EMEA and APAC
Highlights: Advertised as legitimate tools, Remcos and GuLoader are malware in disguise, heavily utilized in cyberattacks Check Point Research (CPR) has uncovered evidence that the distributor is deeply entwined within the cybercrime scene, leveraging their platform to facilitate cybercrime, while…
Getting to Know: Kacey Darling
In her 12+ years in cybersecurity, Kacey Darling has held a variety of roles across sales and marketing across Check Point, including Channel Development Manager, Account Manager and Field Marketing Manager for the North Central region of the United States.…
Cyber Stakes: The MGM Ransomware Roulette
What we have learned and the steps to protect your enterprise Highlights MGM Resorts was hit by a major ransomware attack that took systems offline in locations across Las Vegas Prolific ransomware group ALPHV claimed responsibility in a post…
Check Point Infinity Global Services Saved Financial Services Organization up to 80% on Insurance Costs
In an inspiring success story, a leading financial institution achieved remarkable results by embracing Check Point Infinity Global Services (IGS) Managed Detection and Response (MDR) with Incident Response (MDR+IR) service. This strategic move not only strengthened their cybersecurity, but also…
Check Point Research reports a large-scale phishing attack targeting over 40 Colombian based companies
Highlights: A new phishing campaign has been discovered by Check Point researchers in the last two months. This campaign targeted over 40 prominent companies in various industries within Colombia. The attackers behind the phishing campaign aimed to install the “Remcos”…
MemDive AI Engine Prevents Malicious Payloads from Evading Security Measures
By Asaf Avisar, Arie Olshtein and Shiri Yaakobson Highlights: In recent months, MemDive allowed our Threat Emulation engine to prevent various attempts of a shellcode-based packer, aiming to execute STOP ransomware and the RedLine Stealer. Check Point customers using Quantum…
August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI
Check Point Research reported on a new ChromeLoader campaign named “Shampoo” which targets Chrome browser users with malware-loaded fake ads. Meanwhile, the communications sector jumped up the list to the second most impacted industry over healthcare Our latest Global…
Getting to Know: Grant Asplund
For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his…
Phishing via Google Looker Studio
A burgeoning attack involving Google Looker Studio is making the rounds. In the last few weeks, we’ve seen over a hundred of these attacks. Google Looker Studio is a tool that converts information—slideshows, spreadsheets, etc—into visualized data, such as charts…
Addressing the Rising Threat of Web DDoS Tsunami Attacks in 2023
The first half of 2023 has seen a massive surge in Distributed Denial of Service (DDoS) attacks, unveiling a new level of sophistication, frequency, and size that organizations must confront. This rising threat is particularly exemplified by the popularity in…
Allowing cybercriminals to drive your car: 5 Tips for Keeping Your Electric Vehicle Secure
Cyberattacks to electric cars have increased by 380%, with a methodology focused on disrupting the proper functioning of their charging stations and the functions of the vehicle itself, as well as stealing data stored in them. Remote vehicle hijacking, potential…
How companies can get a grip on ‘business email compromise’
***This blog was originally published on the World Economic Forum*** More use of SaaS applications means employee business accounts are being targeted for “business email compromise” (BEC). BEC has evolved from basic email phishing scams to more sophisticated iterations, including…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Shares Analysis of Qakbot Malware Group
On August 29, 2023, the FBI announced it dismantled the Qakbot (also referred to as Qbot) multinational cyber hacking and ransomware operation, impacting 700,000 computers around the world – including financial institutions, government contractors and medical device manufacturers. The Qakbot…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
Check Point Software: XDR Leader in Frost Radar™ 2023 Report
We are proud to announce that Check Point Software has been named an innovation and growth leader in the 2023 Frost Radar™ Extended Detection and Response Report! “XDR is an essential tool that distinguishes itself by providing organizations with cross-layered…
How to close the IT Talent Gap with a SASE Solution
According to cybersecurityventures.com unfilled cyber security positions will hit 3.5 million in 2023, with more than 750,000 of those positions based in the U.S. The lack of talent in this area can lead to inadequate threat detection, weaker security, and…
Preventing DNS Tunneling with AI Deep Learning
DNS Tunneling is probably considered a relic of the early Internet days, back when the first firewalls were deployed and malware analysis was a little bit simpler than it is today. Though attackers have evolved, using steganography and encryption to…
Surge in Cybercrime: Check Point 2023 Mid-Year Security Report Reveals 48 Ransomware Groups Have Breached Over 2,200 Victims
The world of cybersecurity is constantly in flux, and understanding this ever-changing landscape is essential for businesses aiming to stay one step ahead of potential threats. The release of our 2023 Mid-Year Security Report shows some alarming trends, and novel…
3 Ways to Prevent Cyber Attacks and Improve Healthcare Outcomes
By Cindi Carter, CISO in the Office of the CTO at Check Point Software Technologies Earlier this month, a ransomware attack shut down emergency rooms across the United States, forcing ambulances to route to other hospitals. Prospect Medical Group, which…
Summer Break Isn’t a Vacation for Cybercriminals: Education and Research Organizations are Top Targets According to Check Point Research
Highlights: In comparison to other industries, the Education/Research sector experiences the highest rate of cyberattacks, with a vast disparity This year, the Education/Research sector has witnessed an average of 2256 weekly cyber-attacks per organization The APAC region recorded the highest…
Verify You Are Human (So We Can Steal Your Credentials)
Web server management faces numerous security challenges. Distributed Denial of Service (DDoS) attacks are one such threat. These attacks involve multiple bots bombarding the server with a high volume of requests in a short period of time, resulting in a…
Check Point Wins Gold Stevie International Business Award
Check Point is thrilled to accept the International Business Awards’ Gold Stevie award for our Quantum Titan security platform! At Check Point, we are transforming how organizations secure their networks across on-premise, cloud and IoT environments. Powered by ThreatCloud AI,…
Check Point Partners with the White House on National Cyber Workforce and Education Strategy
On July 31, 2023, the White House announced a new National Cyber Workforce and Education Strategy (NCWES) to keep all Americans secure and boost the next generation of innovation in the United States. The NCWES aims to expand the national…
Avoiding False Positive: The Silent SAST Killer
Author: Dotan Nahum False positives are the most frustrating aspect of performing security testing. It’s like playing a game of whack-a-mole: every time you run a test, you have to wonder whether false positives will pop up in your results…
July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot
Check Point Research reported that RAT Remcos rose four places due to trojanized installers, Anubis Mobile Malware Ousted SpinOk and Education/Research Still Hardest Hit Our latest Global Threat Index for July 2023 saw researchers report that Remcos moved to third…
US Hospitals Under Increasing Threat of Ransomware
According to Check Point Research (CPR): on average, 1 in 29 healthcare organizations in the United States were impacted by ransomware over the past four weeks. Healthcare is currently the #1 most impacted industry by ransomware. In fact, in…
Don’t Miss Check Point’s Black Hat Demos & Sessions
Black Hat USA is just around the corner, the Check Point team has a full agenda planned for you to make the most of your visit. In addition to the conference sessions, we will host breakout and theater sessions, demos,…
Meet Cloud Girls 2023 Trailblazer Trisha Paine
***This content was originally published on Cloud Girls. Trisha Paine, Head of Global Marketing of Cloud Security at Check Point Software, was recognized by Cloud Girls, in collaboration with the Alliance of Channel Women, as a Rising Star in the eighth annual Cloud…
All CISOs should know this about cloud network security
Cloud network security may not sound very different from traditional network security – and it’s not, at least in some respects. Cloud networks use the same fundamental paradigms and protocols as on-prem networks, so there is some overlap between cloud…
Review of Recent NPM-Based Vulnerabilities
NPM made headlines after a staggering rate of vulnerabilities was discovered in over 50 popular packages, putting countless projects and organizations at risk. Unfortunately, many organizations underplay or ignore NPM vulnerabilities. Are you one of the many developers relying on…
Your First Line of Defense Against Ransomware: SASE
Statista says that 71% of global businesses felt the impact of ransomware trends. A total of 62.9% of the ransomware victims paid the ransom. They use myriad techniques and tools to infiltrate networks, applications and computers as they lay the…
4 Essential Elements for a Comprehensive Cloud Security Stack
Digital transformation is pushing business entities to deploy products faster than ever, but at what cost? IT teams feel colossal pressure to balance speed with security. While they are adopting the cloud as a way to remain agile and scalable,…
How Generative AI Affects Mobile Security
Me: “Can you be misused for cyber-attacks?” Chat GPT: “As an AI language model, I don’t have agency or intentions of my own. However, like any technology, I can potentially be misused by individuals with malicious intent. Ultimately, the responsibility…
Is Your Peloton Attracting Security Threats?
A Deep Dive Into the Vulnerabilities Found In America’s Largest Internet-Connected Exercise-as-a-Service Company. Highlights: Check Point security experts unveil vulnerabilities found in internet-connected workout equipment such as Peloton. Exploiting these vulnerabilities could potentially grant threat actors access to user databases,…
Docker Images: Why are Many Cyber Attacks Originating Here?
What happens when you need to set up a container environment quickly? You may use a popular platform called Docker Hub to find an application that can be rapidly deployed. Then, let’s say you find an image that looks…
CDN Service Exposes Users to Malicious Packages for Phishing Attacks Invisible to Security Tools
Malicious package previously removed are still accessible through jsdelivr and results in phishing attack Highlights: CloudGuard Spectral detected a malicious package on NPM that applied a phishing attack to gain its user’s credentials To do so, the package relied on…
Facebook Flooded with Ads and Pages for Fake ChatGPT, Google Bard and other AI services, Tricking Users into downloading Malware
Highlights Cyber criminals are using Facebook to impersonate popular generative AI brands, including ChatGPT, Google Bard, Midjourney and Jasper Facebook users are being tricked into downloading content from the fake brand pages and ads These downloads contain malicious malware, which…
Facebook Flooded with Ads and Pages for Fake ChatGPT, Google Bard and other AI services, Tricking Users into Downloading Malware
Highlights Cyber criminals are using Facebook to impersonate popular generative AI brands, including ChatGPT, Google Bard, Midjourney and Jasper Facebook users are being tricked into downloading content from the fake brand pages and ads These downloads contain malicious malware, which…
United States Announces New IoT Cybersecurity Label
This week, the Biden-Harris Administration announced the US Cyber Trust Mark, a new label to help consumers easily understand which smart devices are less vulnerable to cyberattacks. In the US, Statista estimates there will be 5.4 billion Internet of Things…
Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023
Our latest Brand Phishing Report for Q2 2023 highlights the brands that were most frequently imitated by cybercriminals in their attempts to steal individuals’ personal information or payment credentials during April, May and June 2023. Last quarter global technology company…
Why Organizations Must Reinforce Their Endpoint Security with a Modern Web Security Solution
Cybercriminals tend to adapt their tactics to the never-ending changes in the business landscape, and the rise of remote and hybrid work arrangements has certainly provided them with a wealth of opportunities. The growing use of personal devices for business…
Check Point Software is recognized for its impressive security products in CRN’s 2023 Tech Innovator Award
We are proud to announce that Check Point Software has been named as a finalist for the highly prestigious 2023 CRN Tech Innovator Awards! We are thrilled to receive this recognition, and even more excited that we have been chosen…
Brand Spoofing Prevention – Check Point Software Technologies’ AI-Powered Pre-emptive Zero Phishing Prevents Local and Global Brand Impersonation Attacks
Highlights: · Check Point Software Technologies’ Zero-Phishing AI Engine now scaled and improved to identify and block access to which impersonate local and global brands across multiple languages and countries. · New domains are inspected immediately upon registration for pre-emptive…