Check Point Blog

Check Point Software Blog

Latest articles

“The WAF Is Dead” (and we know who did it)

TJ Gonen, Head of Cloud Security Products, Check Point The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of security kit. Any organization with a web application (which includes most large businesses) has a WAF installed to protect their data and assets from being breached. Best practice for… The post...

Deliver Security and Trust to IoT, with this IoT Security Guide by IDC

Highlights As organizations seek to deliver security and trust to the IoT, they must focus on the following architectural components: Connectivity, including service enablement Hardware, including IoT module/sensors, security, servers, storage, and other hardware Software, including analytics, applications, IoT purpose-built platforms, and security...

Autoreply attack! New Android malware found in Google Play Store spreads via malicious auto-replies to WhatsApp messages

Research by: Aviran Hazum, Bodgan Melnykov & Israel Wenik   Highlights Disguised as a Netflix content enabler app named “FlixOnline,” threat actors distributed newly-discovered Android malware Malware distributed via malicious auto-replies to incoming WhatsApp messages, using payloads received from a remote command & control (C&C) server...

Supply chain attacks: what we know about the SolarWinds ‘Sunburst’ exploit, and why it still matters

The word ‘unprecedented’ has been used a lot over the past year, and with good reason given the huge impact of COVID-19 on societies and businesses around the world.  Alongside the global pandemic, there was the volatile and bitter U.S. election and Britain’s departure from the EU:  and to add to the disruption, 2020 also… The post Supply chain attacks:...

Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance.

By, John Guo, Cloud Alliance Architect, Check Point Software Technologies Firewalls can be the main bottleneck when it comes to publishing new applications because they cannot keep up with the dynamic nature of modern applications and DevOps teams. In this blog, we will share how Check Point and HashiCorp partnered together to help customers keep… ...

Unfair exchange: ransomware attacks surge globally amid Microsoft Exchange Server vulnerabilities

Over the past year, hospitals and the healthcare industry have been under tremendous pressure during the COVID-19 pandemic, not only dealing with surges in patient numbers, but also with shameless ransomware attacks launched by cybercriminals who see the sector as a soft target. However, it now seems that criminals are shifting their attention to new…...

Hackers Gained Access to 150,000 IP Cameras Inside Hospitals, Police Departments, Prisons, Schools, and Companies like Tesla & Equinox

Highlights In March 2021, a group of hackers breached a large group of IoT security cameras via a Silicon Valley startup called Verkada. Hackers gained access to live surveillance camera feeds exposing data and intellectual property at enterprises like Tesla, schools and prisons. IoT devices are built with little or no security enabling hackers to…...

The Advantages of a Unified Approach to Cloud Data Security

By, Amit Sharon, Head of Customer Community Cloud computing is disrupting security models, leaving organizations struggling to figure out the most effective and efficient ways to mitigate risks to cloud-based digital assets. IT Central has put together the best Cloud Security Companies that offer a unified approach to cloud data security and provide...

Check Point CloudGuard Network Security now integrates with Oracle Cloud Infrastructure’s new Flexible Network Load Balancer

Jeff Engel Cloud Alliance Engineering Check Point is thrilled to announce support for Oracle Cloud Infrastructure’s new Flexible Network Load Balancer with CloudGuard Network Security.  The Flexible Network Load Balancer allows organizations to create a flexible, scalable, and redundant security architecture within OCI that supports all ports and protocols....

A passport to freedom? Fake COVID-19 test results and vaccination certificates offered on Darknet and hacking forums

Check Point Research highlights new trend of forged negative COVID-19 test results and fake vaccine certificates offered on the Darknet and various hacking forums for people seeking to board flights, cross borders, attend events or start new jobs. **Updated March 30th 2021 On March 23rd, only one day after Check Point Research’s latest report about…...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!