Check Point Blog

Check Point Software Blog

Latest articles

Rethinking Endpoint Security

Part 1: Five guiding principles for choosing the optimal endpoint security solution By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention With the sudden and massive shift to remote work, organizations and their endpoints have never been more vulnerable. Malicious actors are taking advantage of this situation, exploiting an unprecedented...

Linux users should patch now to block new “FreakOut” malware which exploits new vulnerabilities

Recently, Check Point Research (CPR) encountered several attacks that are exploiting multiple vulnerabilities, including some recently discovered flaws. These ongoing attacks involve a new malware variant, called ‘FreakOut.’ The goal behind these attacks is to create an IRC botnet (a collection of machines infected with malware that can be controlled...

Use Infinity SOC to find out if you are affected by the Solarwinds Sunburst Hack

The world is now facing what appears to be a new wave of multi-vector cyber-attacks, the latest being the Solarwinds Sunburst, with clear characteristics of an upcoming cyber pandemic. Over 18,000 companies and government offices downloaded what seemed to be a regular software update on their computers but was actually a Trojan horse. To help… The...

Check Point Software Partners with Orange Cyber Defense to offer WIFI hacking course to cyber experts

Check Point has teamed up with SensePost (ethical hacking team within Orange Cyberdefense) to deliver one of their leading offensive courses, giving participants the opportunity to understand how to think like a hacker. The WIFI hacking course is offered to anyone who wants to understand how to attack and defend Wi-Fi networks. It’s an offensive… The...

Brand Phishing Report – Q4 2020

Summary According to Check Point Research´s (CPR) analysis, Microsoft still lead the top ten-brand phishing in the last quarter of 2020, with many websites trying to impersonate Microsoft login screens and steal user credentials. Shipping and retail, mainly led by email phishing on DHL and Amazon, are up to the top 3 brand industries for… The post...

Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement – Under the Radar

By Maya Levine, Technical Marketing Engineer, and Lior Sonntag, Security Analyst A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge of many techniques. In this latest installation of the Cloud Threat Hunting: Attack and Investigation Series, we present the most involved...

Going Rogue – a Mastermind Behind Android Malware Returns with a New RAT

Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the world around us.  There are over 3.5 billion smartphone users worldwide, and it is estimated that over 85% of those devices – around 3 billion – run the Android OS. So it’s no surprise that… The post Going Rogue – a Mastermind Behind Android Malware...

December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat

Our latest Global Threat Index for December 2020 has revealed that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top… The post December...

Attacks targeting healthcare organizations spike globally as COVID-19 cases rise again

At the end of October 2020, we reported that hospitals and healthcare organizations had been targeted by a rising wave of ransomware attacks, with the majority of attacks using the infamous Ryuk ransomware. This followed a Joint Cybersecurity Advisory issued by the CISA, FBI and HHS, which warned of an increased and imminent cybercrime threat to… The...

Our New Year’s Resolution for You: Protect Your IoT Networks and Devices!

By, Mitch Muro, Product Marketing Manager Can 2020 just be over yet?! I mean, come on. Not only have we been struck with one of the most sophisticated and severe attacks seen to date (which of course is the Generation V SolarWinds Sunburst Attack), but cyber criminals are even taking advantage of the increase in… The post Our New Year’s Resolution...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!