Check Point Blog - RSS Feed

Check Point Software Blog

Latest articles

Check Point CloudGuard further enhances Azure security with Azure PaaS protections

By Jonathan Maresky, Cloud Product Marketing Manager, published January 18, 2022 Check Point CloudGuard provides the best Azure security, enhancing and complementing Azure services with industry-leading network security, Cloud Security Posture Management, intelligence and threat hunting, workload protection and AppSec (application security and API protection)....

DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021

Check Point Research issues Q4 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data Our latest Brand Phishing Report for Q4 2021 highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment...

New Requirements in the Wake of Omicron have led to Increased Dark Market Activity Around Fake Covid Certificates

As nations around the world brace for the fallout from the new Omicron variant of COVID-19, Check Point Research warns of a global surge in the supply of fake vaccination and PCR/Antigen test certificates The surge in fake PCR and antigen test certificates represents another ‘wave’ of fraudulent activity as criminals seek to exploit the… The post New...

George Takei and Usain Bolt to Join Check Point CPX 360

We are thrilled to announce two major celebrities will join us at CPX 360 2022, the most important cyber security event of the year. First, we have George Takei, the beloved Mr. Sulu of Star Trek, who will join us for a lively and broadranging conversation. Mr. Takei is known around the world for his… The post George Takei and Usain Bolt to Join Check...

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

Check Point Research reveals that Emotet has risen from seventh to second place in the most prevalent malwares index while Trickbot remains on top. Apache Log4j is the most exploited vulnerability. Our latest Global Threat Index for December 2021 reveals Trickbot is still the most prevalent malware, albeit at a slightly lower rate affecting 4%… The...

Humans might let you down, but CloudGuard won’t! (Just don’t expect a Birthday card)

Leave It to The Machine – A case study of the AWSSupportServiceRolePolicy incident analysis By: Check Point CloudGuard research team (Omer Shliva, Omer Shmuelly and Guy Coldham) Introduction Gartner predicts that by 2025, 99% of cloud security issues will be a result of human error when configuring assets and security in the cloud. Regardless of… The...

Check Point Research: Cyber Attacks Increased 50% Year over Year

Highlights In Q4 of 2021 there was an all-time peak in weekly cyber-attacks per organization, counting over 900 attacks per organization In 2021, there was a 50% increase in overall attacks per week on corporate networks compared to 2020 Education and Research was the most attacked sector Less than a month after the world witnessed… The post Check...

Transferring Quantum Maestro Knowledge and Delivering Real-World Experience

Check Point Quantum Maestro is a premier Hyperscale Network Security solution that provides the scalability, agility, and elasticity of cloud-level security on-premise for businesses of all sizes. The solution maximizes the capabilities of existing Check Point network security gateway appliances using its central component, the Check Point Maestro Hyperscale...

How to Keep Workloads Secure in the Dynamic Threat Landscape

By Yaffa Finkelstein – Product Marketing, Cloud Security If the Log4j attacks taught the internet anything, it’s that layered security is critical because you never know where the next exploit could emerge from. Who would have thought that the innocuous and ubiquitous open source logging tool Log4j could be used for remote code execution? And… The...

How SASE protects from Log4j

By Mor Ahuvia, Product Marketing Manager and Bob Bent, Partner Solutions Engineer LOG4J lessons – How SASE protects from 0-day exploits Log4J shows why the quality of threat prevention is so important in a SASE solution. In the case of Apache Log4J vulnerability, Check Point Harmony Connect (SASE) customers had an IPS protection within hours… The...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!