Check Point Research’s latest Brand Phishing Report reveals it is all change at the top for most imitated brands with new entries from financial services and retail Our latest Brand Phishing Report for Q1 2023 highlights the brands which were…
Tag: Check Point Software
The Power of Zero Trust in DevOps Supply Chains
Building a DevOps supply chain requires thought and effort, and sometimes luck. Cyber security threats continue to increase as malicious actors become increasingly sophisticated, exposing businesses of all sizes. Today, it can be said with certainty that the only thing…
An Overview of the Quantum Revolution in Computing
At Check Point Software Technologies, we are passionate about delivering the best security to our customers around the world. To accomplish this, we must stay ahead of cyber criminals by continuously innovating and considering new approaches for cybersecurity. One of…
Not all CNAPP Vendors are like us: Check Point Recognized as a Representative Vendor for CloudGuard in 2023 Gartner Market Guide for CNAPP
Background “Attackers are targeting the misconfiguration of cloud infrastructure (network, compute, storage, identities and permissions), APIs and the software supply chain itself.” Cloud security providers are taking note and merging more CWPP, CSPM, and CIEM solutions into a CNAPP offering…
Not all CNAPP Vendors Stack Up: Check Point CloudGuard Recognized as Representative Vendor in Gartner CNAPP Market Guide
Background Hackers are intensifying their efforts as the attack surface grows—targeting misconfigurations on the cloud infrastructure (network, compute, storage, identities, and permissions), APIs, and the software supply chain itself. According to Gartner research reports, this is driving an estimated market…
Safe Travels? Check Point Research puts a spotlight on a growing underground market selling flight points, hotel rewards and stolen credential of airline accounts
Highlights: Check Point Research (CPR) reveals a growing industry selling credentials to stolen hotel and airline accounts. End goal is to get access to accounts with reward points and sell it. CPR provides examples including dedicated brute forcing tool used…
What do the inkblots tell you? Check Point Researchers Unveil “Rorschach,” previously unseen, fastest ever Ransomware
Highlights: Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) detected a previously unnamed ransomware strain, now dubbed “Rorschach,” deployed against a US-based company. Highly customizable with technically unique features previously unseen in ransomware, Rorschach is one of…
Quantum Titan’s AI Deep Learning Engines Detect and Block Zero-Day Phishing Attacks in Real Time
By Shiri Yaakobson and Ori Noga Since its launch in December 2022, Check Point’s patented inline ‘Zero Phishing’ technology has prevented dozens of zero-day phishing campaigns. In this blog post we aim to share three highlighted cases our engines prevented…
Top Vulnerabilities in 2023 and How to Block Them
By Mor Ahuvia, Product Marketing Manager Before cyber attackers can wage successful malware or ransomware campaigns, they have to gain access to their target environments. In 2022, half of the Check Point Incident Response Team’s cases resulted from attackers gaining…
3CXDesktop App Trojanizes in A Supply Chain Attack: Check Point Customers Remain Protected
30/3/2023 03:35 EST What is 3CXDesktop App? 3CXDesktopApp is a desktop client of 3CX voice over IP (VoIP) system. The application allows users to communicate within and outside the organization through their desktop or laptops. The app can record calls…
3CXDesktop App Trojanizes in A Supply Chain Attack: Check Point customers remain protected
What is 3CXDesktop App? 3CXDesktopApp is a desktop client of 3CX voice over IP (VoIP) system. The application allows users to communicate within and outside the organization through their desktop or laptops. The app can record calls and facilitate video…
An Overview of the Quantum Revolution in Computing
Author: Julia Rabinovich Network Security Products March 2023 At Check Point Software Technologies, we are passionate about delivering the best security to our customers around the world. To accomplish this, we must stay ahead of cyber criminals by continuously innovating…
Congratulations to Our 2023 CPX 360 Award Winners in EMEA
By Kristin Owens, Director, Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation initiatives.…
Reliable SD-WAN Connectivity with Enterprise-Grade Security—The Best of Both Worlds
The Gartner SD-WAN forecast predicts that by 2025, 65% of enterprises will have implemented SD-WAN—up from 30% in 2020[1]. SD-WANs enable organizations to connect branch locations to the main data center, to each other, and to the cloud more easily…
Beware of Phishing Scams 3.0- The email you receive might not be from who you think it is
Highlights: Avanan a Check Point Company sees a spike in emails impersonating legitimate firms and services in the past 2 months of February and March 2023 PayPal and Google are the most impersonated services in these attacks Users are advised…
Detecting Malicious Packages on PyPI: Malicious package on PyPI use phishing techniques to hide its malicious intent
By, Ori Abramovsky Highlights: Check Point CloudGuard Spectralops detected a malicious phishing account on PyPI, the leading Python package index. Users installing the account packages were exposed to a malicious actor, probably a PII stealer. Once detected, we alerted PyPI…
How Agentless Workloads Improves Security Velocity
By Benny Zemmour – Group Manager Cloud Security Why Modern Development Demands Agentless Workload Protection In the age of fast-paced software development cycles and complex applications, security must be automated. As such, agentless security solutions have become a de facto…
CNAPP in a Snap — How Agentless Workload Posture Improves Security Velocity
By Benny Zemmour – Group Manager Cloud Security Why Modern Development Demands an Agentless Workload Protection Solution What can you do when your security tools are holding you back? Are the solutions that keep you safe also inhibiting innovation? When…
Checkmate: Check Point Research exposes security vulnerabilities on Chess.com
Highlights: Check Point Research (CPR) found security vulnerabilities on the chess.com platform that could allow users to manipulate the game’s results. According to the findings, our researchers were able to: Extract successful chess moves to solve online puzzle challenges and…
GigaOm Recognizes CloudGuard AppSec as a Leader in Innovation and Feature Play in its 2023 Radar Report for Application and API Security
CloudGuard AppSec, Check Point’s next gen WAAP solution, is distinguished for its patented Preemptive AI that blocks sophisticated zero-day attacks and it’s robust and comprehensive feature set. In today’s hyper-connected world, enterprise applications are readily available and connected to the…
Check Point Research conducts Initial Security Analysis of ChatGPT4, Highlighting Potential Scenarios For Accelerated Cybercrime
Highlights: Check Point Research (CPR) releases an initial analysis of ChatGPT4, surfacing five scenarios that can allow threat actors to streamline malicious efforts and preparations faster and with more precision. In some instances, even non-technical actors can create harmful tools.…
Can your SASE solution block these top malware?
Malware is a go-to tactic and essential tool for attackers. According to Check Point Research’s 2023 Cyber Security Report, 32% of cyber attacks globally are based on multipurpose malware with email as the attack vector in 86% of those attacks.…
Beware of Fake Calls! It’s not really your bank calling. Check Point Research draws attention to a new Android Malware
Highlights: CPR alerts on an Android Trojan named “FakeCalls”, a voice phishing malware Malware can masquerade incoming calls as coming form known legitimate financial organizations, aiming to gain the victim’s trust and extract personal and financial data “FakeCalls” malware targets…
Check Point Software Technologies Earns Top Spots in 19 G2 Leadership Grids
By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point We at Check Point are proud to share that our products have been ranked as leading solutions in 19 categories of security software on G2. From firewalls to…
Is your security team concerned with unmanaged devices?
Secure all your organization’s devices in a few clicks. By Antoine Korulski and Adi Goldshtein Harel CISOs face major challenges in 2023 when defending against threats coming from unmanaged devices, used by third-party service providers, or employee personal devices (BYOD)…
February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government
Researchers report that Remcos Trojan was used by threat actors to target Ukrainian government entities through phishing attacks as part of wider cyberespionage operations. Meanwhile, Formbook and Emotet returned to the top three most prevalent malware families, and Education/Research remained…
International Women’s Day: Achieving Gender Parity in the C-Suite and Advancing Equity in the Cybersecurity Industry
Industry analysts often highlight how gender parity is making headway in the business world, but is this true? In the alleged glass-ceiling world of the C-Suite where the comparison between male and female C-level leaders is still highly skewed in…
Getting to Know Francisco Criado, Check Point’s New VP, Global Partner Ecosystem Organization
As Vice President of the Global Partner Ecosystem Organization, Francisco Criado leads all strategy and program deployment with Check Point’s partners around the world. He brings nearly two decades of experience in the industry, including leadership roles at Avnet, Tech…
“Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities
Highlights: CPR continues tracking Sharp Panda, a long-running Chinese cyber-espionage operation, targeting Southeast Asian government entities In late 2022, a campaign with an initial infection vector similar to previous Sharp Panda operations targeted a high-profile government entity in the Asian…
Prevention-focused SASE Solution is Here: Check Point leads the way, per new Miercom Report
Which is better—detecting a threat and not knowing how long it’s been in your network, or preventing it from getting in? It’s not a trick question. Threats of all kinds have become increasingly sophisticated and aggressive. As global unrest in…
Winning Combinations: Check Point Customers and Their Advanced Security Solutions
By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation…
How To Reduce Security Risks Posed by Cloud Identities?
By Andrei Dankevich – Product Marketing Manager Cloud Security The history of cloud computing goes all the way back to the1950s when the world was introduced to shared and distributed architectures with technologies like mainframe computing, for example, the IBM…
Winning Combinations: Check Point 2023 CPX Americas Customer Awards
By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation…
The Russian-Ukrainian War, One Year Later
Highlights: One year after the Russian Ukrainian War, Check Point Research (CPR) highlights that September 2022 was a turning point in the cyberattacks related to the conflict. Comparing March – September 2022 vs. October 2022 – February 2023: CPR identifies…
Cloud Security Buyers Club
By Jon Harlow We’re living through an information security revolution, where staying ahead of the bad guys is significant to your company reputation and ultimately it’s bottom line. We’ll continue to see dramatic growth in cyber security publicity, not only…
Unlocking the Potential: Check Point’s Infinity Spark Offers Unmatched Benefits for Managed Service Providers (MSPs)
Delivering a complete enterprise-grade security suite for their SMB customers and a user-friendly multi-tenant MSP dashboard with flexible, easy-to-understand pricing models A report published by Devolutions in October 2022 found that 46% of small and medium-sized businesses (SMBs) plan on…
Check Point CloudGuard Spectral detects malicious crypto-mining packages on NPM – The leading registry for JavaScript Open-Source packages
Highlights: CloudGuard Spectral detected 16 malicious packages on NPM, the world’s leading JavaScript package index Installing these packages enabled Cryptojacking: hijacking a machine to mine cryptocurrencies without the user’s consent Check Point Researchers disclosed these findings to NPM which…
Check Point Research uncovers a malicious campaign targeting Armenian based targets
Highlights: Amid rising tensions between Azerbaijan and Armenia, Check Point Research identified a malicious campaign against entities in Armenia Malware used in the campaign aims to remotely control compromised machines and carry out surveillance operations CPR analysis shows clear indication…
New Course Alert: Gateway Performance Optimization Course by Author, Timothy C. Hall
Check Point Mind is pleased to announce the availability of a special new advanced-level training course – Gateway Performance Optimization. Developed and instructed exclusively by Timothy C. Hall, CheckMates Champion and author of the infamous book Max Power 2020: Check…
Unlocking the Potential: Check Point’s Infinity Spark Offers Unmatched Benefits for Managed Service Providers (MSPs)
Delivering a complete enterprise-grade security suite for their SMB customers and a user-friendly multi-tenant MSP dashboard with flexible, easy-to-understand pricing models A report published by Devolutions in October 2022 found that 46% of small and medium-sized businesses (SMBs) plan on…
Check Point CloudGuard Spectral detects malicious crypto-mining packages on NPM – The leading registry for JavaScript Open-Source packages
Highlights: CloudGuard Spectral detected 16 malicious packages on NPM, the world’s leading JavaScript package index Installing these packages enabled Cryptojacking: hijacking a machine to mine cryptocurrencies without the user’s consent Check Point Researchers disclosed these findings to NPM which…
Love Bites: Valentine’s Day shoppers advised to be aware of targeted online scams
Highlights: Since January 2023, Check Point Research (CPR) sees a 54% increase in new Valentine’s Day related domains, compared to previous months One out of every 10 new domains containing the term “love” or “Valentine” found to be potentially risky,…
January 2023’s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes
Check Point Research reports that infostealer Vidar made its return to the top ten list in January, reaching seventh place, while major campaign dubbed Earth Bogle delivered njRAT malware to targets across the Middle East and North Africa Our…
Announcing Check Point Software’s Americas Partner Winners at CPX 360 New York
At Check Point Software, we are a 100% channel driven company. Together with our partners, we deliver industry-leading cybersecurity solutions to hundreds of thousands of organizations of all sizes, around the world. Each year at our global conference, CPX 360,…
Check Point 2023 Security Report: Cyberattacks reach an all-time high in response to geo-political conflict, and the rise of ‘disruption and destruction’ malware
The 2023 Security Report is reflecting on a chaotic year in cybersecurity. The report looks back on a tumultuous 2022, which saw cyberattacks reach an all-time high in response to the Russo-Ukrainian war. Education and Research remains the most targeted…
Available Now: Check Point Quantum SD-WAN delivers the Best Security with Optimized Connectivity
Check Point is proud to announce Quantum SD-WAN, a new software blade available in Quantum Gateways that unifies the best network security with optimized internet and network connectivity. Download the eBook Trying to balance fast connections with effective security? Thanks…
Announcing Check Point Software’s Americas Partner Winners at CPX 360 New York
At Check Point Software, we are a 100% channel driven company. Together with our partners, we deliver industry-leading cybersecurity solutions to hundreds of thousands of organizations of all sizes, around the world. Each year at our global conference, CPX 360,…
Check Point 2023 Security Report: Cyberattacks reach an all-time high in response to geo-political conflict, and the rise of ‘disruption and destruction’ malware
The 2023 Security Report is reflecting on a chaotic year in cybersecurity. The report looks back on a tumultuous 2022, which saw cyberattacks reach an all-time high in response to the Russo-Ukrainian war. Education and Research remains the most targeted…
Cybercriminals Bypass ChatGPT Restrictions to Generate Malicious Content
There have been many discussions and research on how cybercriminals are leveraging the OpenAI platform, specifically ChatGPT, to generate malicious content such as phishing emails and malware. In Check Point Research’s (CPR) previous blog, we described how ChatGPT successfully conducted a…
In A Cloud Speed World, Is It Time To Leave It To The Machines?
By Yuval Shchory, Head Of Product Management, Cloud Security The cloud has completely revolutionized how businesses work. Where once both web presence and internal applications were essentially static, with changes only made after much deliberation and via pre-planned upgrades, the…
Massive Ransomware attack Targets VMware ESXi Servers
VMware servers around the world suffer an extensive targeted ransomware attack, largest non-windows ransomware cyberattack on record. Here’s what you need to know and do What happened? French Computer Emergency Response Team and Italy’s national cybersecurity authority (ACN) officially warned…
Dingo Token ranking is #774, with a live market cap of $10,941,525 USD is a SCAM!
By, Dikla Barda, Roman Zaikin and Oded Vanunu The Dingo Token, currently ranked #774 with a market capitalization of $10,941,525 USD, has been flagged as a potential scam by Check Point Research (CPR). The project’s owner reportedly used the “setTaxFeePercent”…
Check Point Software Join Forces with Samsung to Elevate Mobile Security
The move to mass remote working saw the mobile attack surface expand dramatically, resulting in 97% of organizations facing mobile threats from several attack vectors. With 60% of workers forecasted to be mobile by 2024, mobile security needs to be…
Check Point Software takes 1st Place in Independent Test of Top Network Firewalls
Miercom Next Generation Firewall Benchmark 2023 Download the Report After all the data sheets, trade show presentations, and product websites, how do you validate that your network firewall is the most effective at blocking malware, phishing and other attacks, versus…
The Rise of the Code Package Threat
Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, aiming to distribute malware The malicious code packages, Python-drgn and Bloxflip, distributed by Threat actors leveraging package repositories as a reliable and scalable malware distribution…
Learn More About Check Point’s Prevention-First CNAPP
By Geert De Ron – Cloud Security Architect, published February 3, 2023 Cloud-Native Application Protection Platforms (CNAPP) have become essential tools for organizations to secure their cloud environments. In this article we will cover why cloud security operations are looking…
11 Questions to Ask When Choosing an Application Security Vendor
By: Diana Polansky, Cloud Security Product Marketing Manager, and Sergio Silva, Product Incubation Manager When we started to plan our goals for the new year, we took the time to think about your goals as well – and we don’t…
Dingo Token ranking is #774, with a live market cap of $10,941,525 USD is a SCAM!
The Dingo Token, currently ranked #774 with a market capitalization of $10,941,525 USD, has been flagged as a potential scam by Check Point Research (CPR). The project’s owner reportedly used the “setTaxFeePercent” function to manipulate the buying and selling fees…
Check Point Software Join Forces with Samsung to Elevate Mobile Security
The move to mass remote working saw the mobile attack surface expand dramatically, resulting in 97% of organizations facing mobile threats from several attack vectors. With 60% of workers forecasted to be mobile by 2024, mobile security needs to be…
Check Point Software takes 1st Place in Independent Test of Top Network Firewalls
Miercom Next Generation Firewall Benchmark 2023 Download the Report After all the data sheets, trade show presentations, and product websites, how do you validate that your network firewall is the most effective at blocking malware, phishing and other attacks, versus…
The Rise of the Code Package Threat
Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, aiming to distribute malware The malicious code packages, Python-drgn and Bloxflip, distributed by Threat actors leveraging package repositories as a reliable and scalable malware distribution…
Check Point Software takes 1st Place in Independent Test of Top Network Firewalls Miercom NGFW Benchmark 2023
Download the Report After all the data sheets, trade show presentations, and product websites, how do you validate that your network firewall is the most effective at blocking malware, phishing and other attacks, versus other brands? One of the best…
11 Questions to Ask When Choosing an Application Security Vendor
By: Diana Polansky, Cloud Security Product Marketing Manager, and Sergio Silva, Product Incubation Manager When we started to plan our goals for the new year, we took the time to think about your goals as well – and we don’t…
Registry Vulnerability Scanning: Early Prevention for Max Efficiency
Andrew Samusenko, Director, Cloud Workload Protection Platform (CWPP) The earlier you catch security vulnerabilities, the less likely they are to cause damage to your organization and incur costs for repairing them later. Most companies have security policies that are designed…
Brand Phishing report – Q4 2022
Summary Following a significant phishing campaign in the previous quarter, Yahoo became the top brand impersonated in phishing attacks in Q4 2022, climbing 23 spots in the ranking from the previous quarter. DHL dropped from the lead in Q3 2022…
12 Ways to make ZTNA deployments effortless
Launching into a zero trust network access (ZTNA) implementation? Don’t be nervous. We’ve already anticipated—and handled—the most challenging parts of ZTNA deployment for you. In just minutes, you can protect any asset, such as cloud or premises-based data centers, applications,…
Russia Affiliated NoName057(16) Hacktivist Group Puts 2023 Czech Presidential Election on the Spot
NoName057(16) is a Russian-affiliated hacktivist group that has been active since March 2022. They have been known to target Ukrainian and pro-Ukrainian organizations, businesses, and governments, with the targets shifting according to geopolitical developments. In recent months, the group has…
It’s up to us to determine if generative AI helps or harms our world
Reprinted with permission from the World Economic Forum AI is a disruptor technology, with the potential to improve our lives drastically, but also carries potential for abuse and global harm The world saw a 38% increase in cyberattacks in 2022…
Check Point Research flags a 48% growth in cloud-based networks attacks in 2022, compared to 2021
Highlights: Check Point Research (CPR) examines Cloud-based networks and finds a significant growth of 48% in the number of attacks per organization, experienced in 2022 compared to 2021 Attempted attacks on cloud-based networks, specifically to Vulnerability Exploits, sees a higher…
Russian Hackers Attempt to Bypass OpenAI’s Restrictions for Malicious Use of ChatGPT
Check Point Research (CPR) is seeing attempts by Russian cybercriminals to bypass OpenAI’s restrictions, in order to use ChatGPT for malicious purposes. In underground hacking forums, hackers are discussing how to circumvent IP addresses, payment cards and phone numbers controls…
Are you National Institute of Standards and Technology (NIST) 800-53 compliant?
By Amardip Deshpande – CloudGuard, Research Team, published January 13, 2023 Although we’re in the cloud age and almost all companies have their workloads in the cloud and are aware of how cyber-attacks and cyber-crimes are increasing day by day,…
December 2022’s Most Wanted Malware: Glupteba Entering Top Ten and Qbot in First Place
Check Point Research reports that Glupteba has returned to the top ten list for the first time since July 2022. Qbot overtook Emotet as the most prevalent malware in December, while android malware Hiddad made a comeback Our latest Global…
Check Point Research Reports a 38% Increase in 2022 Global Cyberattacks
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented by global volume, industry and geography. Global cyberattacks increased by 38% in 2022, compared to 2021. These cyberattack numbers were driven by smaller, more agile…
The Technology Letter: CHECK POINT CEO SHWED: YOU DON’T PICK YOUR BATTLES, THEY PICK YOU
By Tiernan Ray Reprinted with permission from The Technology Letter The shares of Tel Aviv-based computer security pioneer Check Point Software Technologies are that rare bird, a software stock that actually increased in price last year. Amidst a thirty-two percent…