Check Point Blog - RSS Feed

Check Point Software Blog

Latest articles

11 Questions to Ask When Choosing an Application Security Vendor

By: Diana Polansky, Cloud Security Product Marketing Manager, and Sergio Silva, Product Incubation Manager When we started to plan our goals for the new year, we took the time to think about your goals as well – and we don’t mean your personal New Year’s goals. We mean your application security goals. You may know… The post 11 Questions to Ask When...

Registry Vulnerability Scanning: Early Prevention for Max Efficiency

Andrew Samusenko, Director, Cloud Workload Protection Platform (CWPP) The earlier you catch security vulnerabilities, the less likely they are to cause damage to your organization and incur costs for repairing them later. Most companies have security policies that are designed to detect security vulnerabilities even before they are deployed, particularly...

Brand Phishing report – Q4 2022

Summary Following a significant phishing campaign in the previous quarter, Yahoo became the top brand impersonated in phishing attacks in Q4 2022, climbing 23 spots in the ranking from the previous quarter. DHL dropped from the lead in Q3 2022 to 2nd place in the last quarter of the year, followed by Microsoft which also… The post Brand Phishing report...

12 Ways to make ZTNA deployments effortless

Launching into a zero trust network access (ZTNA) implementation? Don’t be nervous. We’ve already anticipated—and handled—the most challenging parts of ZTNA deployment for you. In just minutes, you can protect any asset, such as cloud or premises-based data centers, applications, and resources with least privileged access, data protection and threat...

Russia Affiliated NoName057(16) Hacktivist Group Puts 2023 Czech Presidential Election on the Spot

NoName057(16) is a Russian-affiliated hacktivist group that has been active since March 2022. They have been known to target Ukrainian and pro-Ukrainian organizations, businesses, and governments, with the targets shifting according to geopolitical developments. In recent months, the group has focused on various countries in the European Union that...

It’s up to us to determine if generative AI helps or harms our world

Reprinted with permission from the World Economic Forum AI is a disruptor technology, with the potential to improve our lives drastically, but also carries potential for abuse and global harm The world saw a 38% increase in cyberattacks in 2022 and we could now see an exponential rise due to generative AI models Davos offers… The post It’s up to us...

Check Point Research flags a 48% growth in cloud-based networks attacks in 2022, compared to 2021

Highlights: Check Point Research (CPR) examines Cloud-based networks and finds a significant growth of 48% in the number of attacks per organization, experienced in 2022 compared to 2021 Attempted attacks on cloud-based networks, specifically to Vulnerability Exploits, sees a higher usage of newer CVE’s Major CVE’s had higher impact on cloud-based networks...

Russian Hackers Attempt to Bypass OpenAI’s Restrictions for Malicious Use of ChatGPT

Check Point Research (CPR) is seeing attempts by Russian cybercriminals to bypass OpenAI’s restrictions, in order to use ChatGPT for malicious purposes. In underground hacking forums, hackers are discussing how to circumvent IP addresses, payment cards and phone numbers controls – all of which are needed to gain access to ChatGPT from Russia. CPR shares…...

December 2022’s Most Wanted Malware: Glupteba Entering Top Ten and Qbot in First Place

Check Point Research reports that Glupteba has returned to the top ten list for the first time since July 2022. Qbot overtook Emotet as the most prevalent malware in December, while android malware Hiddad made a comeback Our latest Global Threat Index for December 2022 saw Glupteba Malware, an ambitious blockchain-enabled Trojan botnet, return to… The...

Are you National Institute of Standards and Technology (NIST) 800-53 compliant?

By Amardip Deshpande – CloudGuard, Research Team, published January 13, 2023 Although we’re in the cloud age and almost all companies have their workloads in the cloud and are aware of how cyber-attacks and cyber-crimes are increasing day by day, not all these organizations are able to cope up with information security and privacy. On… The post Are...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!