The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Preventing multi-stage attacks with Check Point SandBlast Threat Emulation
A multi-stage attack typically includes an initial dropper file, a main payload component of the malware, and additional modules delivered over a period of days, weeks, or more. The initial dropper is typically a benign file downloaded or attached to an email, with a sole purpose of downloading another file from the Internet.
Attacks targeting healthcare organizations spike globally as COVID-19 cases rise again
Unfortunately, that cybercrime threat has worsened over the past two months. Since the start of November, there has been a further 45% increase in attacks targeting healthcare organizations globally. This is more than double the overall increase in cyber-attacks across all industry sectors worldwide seen during the same time.
December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat
SAN CARLOS, CA — Thu, 07 Jan 2021
Our New Year’s Resolution for You: Protect Your IoT Networks and Devices!
Can 2020 just be over yet?! I mean, come on. Not only have we been struck with one of the most sophisticated and severe attacks seen to date (which of course is the Generation V SolarWinds Sunburst Attack), but cyber criminals are even taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices.
SolarWinds Sunburst Attack: What Do You Need to Know and How Can You Remain Protected
On the week of December 13th , US government offices exposed they were targeted by a series of mega cyber attacks, allegedly related to state-sponsored threat organizations. Those attacks targeted government and technology organizations worldwide. This series of attacks was made possible when hackers were able to embed a backdoor into SolarWinds software updates. Over 18,000 companies and government offices downloaded what seemed to be a regular software update on their computers, but was actually a Trojan horse. By leveraging a common IT practice of software updates, the attackers utilized the backdoor to compromise the organization’s assets, both cloud and on premise, enabling them to spy on the organization and access its data.
10 Must-have Cyber Security Resources as You Plan for 2021
Combatting this past year’s cyber threats proved challenging, and the hackers are already mapping out new avenues of attack for 2021. As you recalibrate your cyber security strategy and plan for the year ahead, explore resources that can help inform your security decisions.
Beware of WAPDropper, the mobile malware that subscribes users to Premium Rate Services
This type of scam is known as International Revenue Share Fraud (IRSF) and it’s big business, generating an estimated $4 to $6 billion per year for fraudsters. Check Point Research recently discovered a new IRSF campaign which uses an insidious new mobile malware variant to quietly sign users up to premium-rate services.
Who’s Calling? How to Avoid Being Hooked by Vishing – the New Old-School Phone Scam
To do this, some hackers have gone beyond the usual email scams and revived the old-school technique of vishing (voice phishing by phone), in which they target individuals and attempt to get them to divulge login details or other sensitive credentials during a call. These hackers have also updated this old-school scam with some new tricks to help them overcome suspicion and improve their chances of success.
Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant
We believe, Gartner’s recently published 2020 Magic Quadrant for Network Firewalls report lauds Check Point for its consolidated architecture, complete cloud security offering and its strong product vision.
Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch
Cloud security is not a trivial practice of “click-and-deploy”, “one-size-fits-all” or even “my cloud vendor is responsible for cloud security”. The shared responsibility model is a critical component of a cloud user’s ability to protect their organization’s cloud assets in the long term and perhaps even before then.