Tag: Check Point Blog

Getting to Know: Kim Forsthuber

Kim Forsthuber is a Channel Specialist for at Check Point Software Technologies. As a Channel Specialist, Kim works closely with Check Point’s partners to develop and execute strategic marketing and sales plans for the Harmony portfolio. Prior to Check Point,…

Phishing via Dropbox

A burgeoning attack involving Dropbox is making the rounds. In the first two weeks of September, we saw 5,550 of these attacks. Hackers are using Dropbox to create fake login pages that eventually lead to a credential harvesting page. It’s…

What is Alert Deafness?

Ping! One of the CI pipelines is failing. Ding! Critical production error incoming… The exponential increase in data processed by organizations means a rise in errors, failures, and vulnerabilities is expected. But with pings and dings popping up over 500…

Will the Real Slim Shady Please Stand Up? Check Point Research Exposes Cybercriminal Behind Malicious Software Impacting EMEA and APAC

Highlights: Advertised as legitimate tools, Remcos and GuLoader are malware in disguise, heavily utilized in cyberattacks Check Point Research (CPR) has uncovered evidence that the distributor is deeply entwined within the cybercrime scene, leveraging their platform to facilitate cybercrime, while…

Getting to Know: Kacey Darling

In her 12+ years in cybersecurity, Kacey Darling has held a variety of roles across sales and marketing across Check Point, including Channel Development Manager, Account Manager and Field Marketing Manager for the North Central region of the United States.…

Getting to Know: Grant Asplund

For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his…

Phishing via Google Looker Studio

A burgeoning attack involving Google Looker Studio is making the rounds. In the last few weeks, we’ve seen over a hundred of these attacks. Google Looker Studio is a tool that converts information—slideshows, spreadsheets, etc—into visualized data, such as charts…

Summer Break Isn’t a Vacation for Cybercriminals: Education and Research Organizations are Top Targets According to Check Point Research

Highlights: In comparison to other industries, the Education/Research sector experiences the highest rate of cyberattacks, with a vast disparity This year, the Education/Research sector has witnessed an average of 2256 weekly cyber-attacks per organization The APAC region recorded the highest…

Review of Recent NPM-Based Vulnerabilities

NPM made headlines after a staggering rate of vulnerabilities was discovered in over 50 popular packages, putting countless projects and organizations at risk. Unfortunately, many organizations underplay or ignore NPM vulnerabilities. Are you one of the many developers relying on…

Is Your Peloton Attracting Security Threats?

A Deep Dive Into the Vulnerabilities Found In America’s Largest Internet-Connected Exercise-as-a-Service Company. Highlights: Check Point security experts unveil vulnerabilities found in internet-connected workout equipment such as Peloton. Exploiting these vulnerabilities could potentially grant threat actors access to user databases,…

Brand Spoofing Prevention – Check Point Software Technologies’ AI-Powered Pre-emptive Zero Phishing Prevents Local and Global Brand Impersonation Attacks

Highlights: · Check Point Software Technologies’ Zero-Phishing AI Engine now scaled and improved to identify and block access to which impersonate local and global brands across multiple languages and countries. · New domains are inspected immediately upon registration for pre-emptive…