Tag: Check Point Blog

Is Your Peloton Attracting Security Threats?

A Deep Dive Into the Vulnerabilities Found In America’s Largest Internet-Connected Exercise-as-a-Service Company. Highlights: Check Point security experts unveil vulnerabilities found in internet-connected workout equipment such as Peloton. Exploiting these vulnerabilities could potentially grant threat actors access to user databases,…

United States Announces New IoT Cybersecurity Label

This week, the Biden-Harris Administration announced the US Cyber Trust Mark, a new label to help consumers easily understand which smart devices are less vulnerable to cyberattacks. In the US, Statista estimates there will be 5.4 billion Internet of Things…

Top Considerations for Securing AWS Lambda, part 3

Serverless computing or function-based computing, is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

MOVEit Vulnerability Weaponized in Ransomware Attack

What is MOVEit? MOVEit is a managed file transfer (MFT) software solution developed by Progress Software Corporation (formerly Ipswitch). It is designed to securely transfer files within or between organizations. MOVEit offers a centralized platform for managing file transfers, providing…

Unified Security from Code to Cloud at AWS re:Inforce

In the last year, Check Point and AWS have strengthened their partnership by leaps and bounds. The Check Point release of CloudGuard CNAPP on AWS Marketplace and the upcoming CloudGuard Network Security-as-a-Service offering are just the beginning. In the last…

Latest Chinese state-sponsored attacks on critical US infrastructure spies a continuation of trend, Reports Check Point Research

Last Wednesday, Microsoft issued a warning claiming Chinese state-sponsored hackers have compromised “critical” cyber infrastructure in a variety of industries, including government and communications organizations. “The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to…

Mitigating Risks in Cloud Native Applications

As organizations move their operations to the cloud, they face a difficult challenge in ensuring secure configurations and consistent security posture across multiple cloud services and platforms. In addition, they must do all of this in a way that does…

Identify and Protect against Endpoint vulnerabilities

57% of ransomware attacks leverage unpatched vulnerabilities. Are you protected? By Noa Goldstein, Product Marketing Manager and Bar Yassure, Harmony Endpoint Product Manager   Endpoint vulnerabilities represent a “hole in the fence” of an operating system or application, through which…

Protecting your password: Create an unbreakable one

Brute-force attacks to obtain passwords have moved from CPUs to GPUs, improving their effectiveness by checking more than a million keys per second. Passwords now need new requirements to be truly secure: a minimum number of 12 characters, the use…

Top Considerations for Securing AWS Lambda, part 2

Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

Securing our Sustainable Future

This Earth Day 2023, people from around the world will come together to “Invest in Our Planet” to accelerate the transition to an equitable and prosperous green economy for all. From planting trees to cleaning up beaches to lobbying elected…

Top Considerations for Securing AWS Lambda, part 1

Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

Cloud Risk Mitigation: Putting it in Context

For many cloud security teams, prioritizing alerts on a day-to-day basis can be overwhelming and impossible to manage. For every cloud application, server, and workload added, the number of alerts piles up. Security teams have no time to go into…