By: Diana Polansky, Cloud Security Product Marketing Manager, and Sergio Silva, Product Incubation Manager When we started to plan our goals for the new year, we took the time to think about your goals as well – and we don’t mean your personal New Year’s goals. We mean your application security goals. You may know… The post 11 Questions to Ask When...
2h
Andrew Samusenko, Director, Cloud Workload Protection Platform (CWPP) The earlier you catch security vulnerabilities, the less likely they are to cause damage to your organization and incur costs for repairing them later. Most companies have security policies that are designed to detect security vulnerabilities even before they are deployed, particularly...
6d
Summary Following a significant phishing campaign in the previous quarter, Yahoo became the top brand impersonated in phishing attacks in Q4 2022, climbing 23 spots in the ranking from the previous quarter. DHL dropped from the lead in Q3 2022 to 2nd place in the last quarter of the year, followed by Microsoft which also… The post Brand Phishing report...
2w
Launching into a zero trust network access (ZTNA) implementation? Don’t be nervous. We’ve already anticipated—and handled—the most challenging parts of ZTNA deployment for you. In just minutes, you can protect any asset, such as cloud or premises-based data centers, applications, and resources with least privileged access, data protection and threat...
2w
NoName057(16) is a Russian-affiliated hacktivist group that has been active since March 2022. They have been known to target Ukrainian and pro-Ukrainian organizations, businesses, and governments, with the targets shifting according to geopolitical developments. In recent months, the group has focused on various countries in the European Union that...
2w
Reprinted with permission from the World Economic Forum AI is a disruptor technology, with the potential to improve our lives drastically, but also carries potential for abuse and global harm The world saw a 38% increase in cyberattacks in 2022 and we could now see an exponential rise due to generative AI models Davos offers… The post It’s up to us...
2w
Highlights: Check Point Research (CPR) examines Cloud-based networks and finds a significant growth of 48% in the number of attacks per organization, experienced in 2022 compared to 2021 Attempted attacks on cloud-based networks, specifically to Vulnerability Exploits, sees a higher usage of newer CVE’s Major CVE’s had higher impact on cloud-based networks...
2w
Check Point Research (CPR) is seeing attempts by Russian cybercriminals to bypass OpenAI’s restrictions, in order to use ChatGPT for malicious purposes. In underground hacking forums, hackers are discussing how to circumvent IP addresses, payment cards and phone numbers controls – all of which are needed to gain access to ChatGPT from Russia. CPR shares…...
3w
Check Point Research reports that Glupteba has returned to the top ten list for the first time since July 2022. Qbot overtook Emotet as the most prevalent malware in December, while android malware Hiddad made a comeback Our latest Global Threat Index for December 2022 saw Glupteba Malware, an ambitious blockchain-enabled Trojan botnet, return to… The...
3w
By Amardip Deshpande – CloudGuard, Research Team, published January 13, 2023 Although we’re in the cloud age and almost all companies have their workloads in the cloud and are aware of how cyber-attacks and cyber-crimes are increasing day by day, not all these organizations are able to cope up with information security and privacy. On… The post Are...
3w
Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader