Tag: Check Point Software

Not all CNAPP Vendors are like us: Check Point Recognized as a Representative Vendor for CloudGuard in 2023 Gartner Market Guide for CNAPP

Background “Attackers are targeting the misconfiguration of cloud infrastructure (network, compute, storage, identities and permissions), APIs and the software supply chain itself.” Cloud security providers are taking note and merging more CWPP, CSPM, and CIEM solutions into a CNAPP offering…

Not all CNAPP Vendors Stack Up: Check Point CloudGuard Recognized as Representative Vendor in Gartner CNAPP Market Guide

Background Hackers are intensifying their efforts as the attack surface grows—targeting misconfigurations on the cloud infrastructure (network, compute, storage, identities, and permissions), APIs, and the software supply chain itself. According to Gartner research reports, this is driving an estimated market…

GigaOm Recognizes CloudGuard AppSec as a Leader in Innovation and Feature Play in its 2023 Radar Report for Application and API Security

CloudGuard AppSec, Check Point’s next gen WAAP solution, is distinguished for its patented Preemptive AI that blocks sophisticated zero-day attacks and it’s robust and comprehensive feature set. In today’s hyper-connected world, enterprise applications are readily available and connected to the…

“Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities

Highlights: CPR continues tracking Sharp Panda, a long-running Chinese cyber-espionage operation, targeting Southeast Asian government entities In late 2022, a campaign with an initial infection vector similar to previous Sharp Panda operations targeted a high-profile government entity in the Asian…

Cloud Security Buyers Club

By Jon Harlow We’re living through an information security revolution, where staying ahead of the bad guys is significant to your company reputation and ultimately it’s bottom line. We’ll continue to see dramatic growth in cyber security publicity, not only…

Check Point CloudGuard Spectral detects malicious crypto-mining packages on NPM – The leading registry for JavaScript Open-Source packages

Highlights: CloudGuard Spectral detected 16 malicious packages on NPM, the world’s leading JavaScript package index Installing these packages enabled Cryptojacking: hijacking a machine to mine cryptocurrencies without the user’s consent   Check Point Researchers disclosed these findings to NPM which…

Check Point CloudGuard Spectral detects malicious crypto-mining packages on NPM – The leading registry for JavaScript Open-Source packages

Highlights: CloudGuard Spectral detected 16 malicious packages on NPM, the world’s leading JavaScript package index Installing these packages enabled Cryptojacking: hijacking a machine to mine cryptocurrencies without the user’s consent   Check Point Researchers disclosed these findings to NPM which…

The Rise of the Code Package Threat

Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, aiming to distribute malware The malicious code packages, Python-drgn and Bloxflip, distributed by Threat actors leveraging package repositories as a reliable and scalable malware distribution…

The Rise of the Code Package Threat

Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, aiming to distribute malware The malicious code packages, Python-drgn and Bloxflip, distributed by Threat actors leveraging package repositories as a reliable and scalable malware distribution…

Brand Phishing report – Q4 2022

Summary Following a significant phishing campaign in the previous quarter, Yahoo became the top brand impersonated in phishing attacks in Q4 2022, climbing 23 spots in the ranking from the previous quarter. DHL dropped from the lead in Q3 2022…

12 Ways to make ZTNA deployments effortless

Launching into a zero trust network access (ZTNA) implementation? Don’t be nervous. We’ve already anticipated—and handled—the most challenging parts of ZTNA deployment for you. In just minutes, you can protect any asset, such as cloud or premises-based data centers, applications,…