Check Point Blog

Check Point Software Blog

Latest articles

Check Point CloudGuard SaaS protects customers from a new attack vector exploiting SLK files to install malware

An internal security analysis revealed a new attack method, which bypasses default security (EOP) and advanced security (ATP) layers. This was detected when analysts noticed a suspicious increase in .slk files sent to some Office 365 accounts a couple of weeks ago. In the attack, cyber criminals send an email with an attachment in the… The post Check...

June‘s Most Wanted Malware: Notorious Phorpiex Botnet Rises Again, Doubling Its Global Impact On Organizations

Check Point Research finds sharp increase in attacks using the Phorpiex Botnet delivering new ‘Avaddon’ ransomware via malspam campaigns Our latest Global Threat Index for June 2020 has revealed that in the past month the Phorpiex botnet has been delivering Avaddon Ransomware,  a new Ransomware-as-a-Service (RaaS) variant that emerged in early June,...

Check Point Secures Aruba Branch Office SD-WAN Connections to the Cloud

By Russ Schafer, Head of Product Marketing, Security Platforms The coronavirus pandemic has led enterprises to quickly enable their employees to work remotely from home. This increase in remote workers is similar to the transition happening in enterprise Wide Area Networks (WAN). Enterprises are turning away from traditional WAN architectures and are...

Major Aerospace Company optimizes Secure Growth with Check Point Maestro

By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point I recently met with a major aerospace company and their IT security manager to explore how the organization protects its corporate and national security assets, while maintaining the ability to support and scale highly burstable traffic loads across a global network....

How to Secure Cloud Workloads in Healthcare

By: Trisha Paine, Head of Cloud Marketing Programs The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud. While one appreciates all of the benefits the cloud offers, their first priority is safeguarding patient private data and records. However, this is balanced with...

Check Point and Partners Give Back

By, Abigail Maines, Head of Channel Sales, Americas Whether you are working from home for the first time, adjusting to the social distancing regulations, or balancing a job while teaching your children, the coronavirus outbreak has demanded unprecedented lifestyle changes from our community. It was, and still is, a new challenge for all of us… The...

Protecting IoT devices and OT Networks from Cyber Attacks

By Russ Schafer, Head of Product Marketing, Security Platforms Cyber criminals have taken advantage of the remote work required by the coronavirus by stepping up their attacks on medical, enterprise, and industrial IoT devices and critical infrastructure. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations...

Nexus Zeta – From Suspicious Alerts to Conviction

Two years ago, we shared the interesting story of Nexus Zeta: How a newbie hacker managed to create a monster botnet. The attacker created an impressive attack chain that comprised of several stages, from leveraging a 0-day vulnerability (CVE-2017-17215) found in the UPnP (Universal Plug and Play) mechanism in Huawei HG532 Home Routers to creating…...

Increased Remote Workers + Global Pandemic = Need for Hyperscale Network Security

What is Hyperscale Network Security you ask? An architecture offering secure flexibility and ease-of-use as business and technical requirements change. This is exactly what Check Point Maestro can do. Our business operations and technical requirements have never been under so much stress as they are now against the increase of traffic we are experiencing...

Hole-y Guacamole! Fixing critical vulnerabilities in Apache’s popular remote desktop gateway

Overview Just a few short months ago, for most of us the daily working routine involved going to the office and working on the corporate computers, or plugging our laptops directly into the corporate network. Once in a while, we’d need special access to the network while working remotely, either via a VPN or using… The post Hole-y Guacamole! Fixing...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!