Securing the modern enterprise network is more complex than ever. Company data is migrating to the cloud, Software as a Service (SaaS) applications are the norm, and the workforce is increasingly working remotely. Securing these dynamic environments requires a new…
Category: Check Point Blog
Cyber predators target vulnerable victims: Hackers blackmail hospitals, trade patient data and find partners through darknet ads
In a world of crime, expect no mercy. Cybercrime goes hard after its goal, which is most often financial gain. Hackers choose their victims accordingly, where they are most likely to succeed and where the most valuable data is located.…
Hispanic Heritage Month Spotlight: Bill Diaz
In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point honors the history, traditions, and cultural diversity of the Hispanic and Latino community. We’re kicking off by spotlighting Bill Diaz, Vice President of Vertical Solutions…
5 Steps to Building a Robust Cyber Resilience Framework
The reality of cyber security is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the focus from preventing attacks to ensuring readiness, mitigating impact, and driving a swift…
Check Point’s Quantum Leap: Integrating NIST PQC Standards
In our previous blog, “Living in a Post Quantum World,” we discussed the role cryptographic algorithms play in withstanding threats that may arise from the advanced computational abilities of quantum computers. As quantum technology evolves, it poses a significant threat…
The Unraveling of an Iranian Cyber Attack Against the Iraqi Government
Check Point Research discovered an elaborate cyber-attack against Iraqi governmental networks The installer used to deploy the malware bore the logo of the Iraqi General Secretariat of the Council of Ministers, while the domains of compromised servers were related to…
August 2024’s Most Wanted Malware: RansomHub Reigns Supreme While Meow Ransomware Surges
Check Point’s latest threat index reveals RansomHub’s continued dominance and Meow ransomware’s rise with novel tactics and significant impact. Check Point’s Global Threat Index for August 2024 revealed ransomware remains a dominant force, with RansomHub sustaining its position as the…
Check Point Software Celebrates Partner Success at the Asia Pacific Partner Conference 2024
Check Point Software has recognized the top partners across the Asia Pacific region, during this year’s Check Point Asia Pacific Partner Conference 2024. Held in Phuket, Thailand from 2nd – 5th September 2024, this yearly conference saw attendance of 240…
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
In recent weeks, a new hacktivist campaign has emerged to demand the release of Telegram CEO Pavel Durov, after his arrest by French authorities. In this report, Check Point Research explores the most prominent and dominant hacking groups involved in…
Check Point Celebrates International Women in Cyber Day 2024
September 1st is International Women in Cyber Day. The technology industry has come a long way over the last thirty years and at Check Point, the story is the same. We have several senior leadership and engineering roles filled by…