Part 1: Five guiding principles for choosing the optimal endpoint security solution By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention With the sudden and massive shift to remote work, organizations and their endpoints have never been more vulnerable. Malicious actors are taking advantage of this situation, exploiting an unprecedented...
17h
Recently, Check Point Research (CPR) encountered several attacks that are exploiting multiple vulnerabilities, including some recently discovered flaws. These ongoing attacks involve a new malware variant, called ‘FreakOut.’ The goal behind these attacks is to create an IRC botnet (a collection of machines infected with malware that can be controlled...
1d
The world is now facing what appears to be a new wave of multi-vector cyber-attacks, the latest being the Solarwinds Sunburst, with clear characteristics of an upcoming cyber pandemic. Over 18,000 companies and government offices downloaded what seemed to be a regular software update on their computers but was actually a Trojan horse. To help… The...
2d
Check Point has teamed up with SensePost (ethical hacking team within Orange Cyberdefense) to deliver one of their leading offensive courses, giving participants the opportunity to understand how to think like a hacker. The WIFI hacking course is offered to anyone who wants to understand how to attack and defend Wi-Fi networks. It’s an offensive… The...
5d
Summary According to Check Point Research´s (CPR) analysis, Microsoft still lead the top ten-brand phishing in the last quarter of 2020, with many websites trying to impersonate Microsoft login screens and steal user credentials. Shipping and retail, mainly led by email phishing on DHL and Amazon, are up to the top 3 brand industries for… The post...
6d
By Maya Levine, Technical Marketing Engineer, and Lior Sonntag, Security Analyst A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge of many techniques. In this latest installation of the Cloud Threat Hunting: Attack and Investigation Series, we present the most involved...
1w
Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the world around us. There are over 3.5 billion smartphone users worldwide, and it is estimated that over 85% of those devices – around 3 billion – run the Android OS. So it’s no surprise that… The post Going Rogue – a Mastermind Behind Android Malware...
2w
Our latest Global Threat Index for December 2020 has revealed that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top… The post December...
2w
At the end of October 2020, we reported that hospitals and healthcare organizations had been targeted by a rising wave of ransomware attacks, with the majority of attacks using the infamous Ryuk ransomware. This followed a Joint Cybersecurity Advisory issued by the CISA, FBI and HHS, which warned of an increased and imminent cybercrime threat to… The...
3w
By, Mitch Muro, Product Marketing Manager Can 2020 just be over yet?! I mean, come on. Not only have we been struck with one of the most sophisticated and severe attacks seen to date (which of course is the Generation V SolarWinds Sunburst Attack), but cyber criminals are even taking advantage of the increase in… The post Our New Year’s Resolution...
3w
Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader