Tim Otis, Head of Incident Response (IR) and Managed Detection and Response (MDR), brings 28 years of cyber security expertise to Check Point, where he has dedicated the past 17 years. His extensive experience spans roles in help desk, systems…
Category: Check Point Blog
Over 20,000 Ubiquiti Cameras and Routers are Vulnerable to Amplification Attacks and Privacy Risks
Check Point Research (CPR) assessed the popular Ubiquiti G4 Instant Camera, a compact, wide-angle, WiFi-connected camera with two-way audio, along with the accompanying Cloud Key+ device that supports the application. Key Highlights CPR conducted an attack surface assessment, discovering two…
Are You Getting the Most Value from Your Existing CNAPP Solution?
As many organizations feel overwhelmed by increasing cloud complexity, Cloud Native Application Protection Platforms (CNAPPs) have emerged as a resource to ensure comprehensive and streamlined security. However, a robust CNAPP solution like Check Point CloudGuard offers so many features and…
Protecting Your Cloud Application Against Unknown Risks
Cloud native security measures are primarily focused on safeguarding against identifiable threats, employing innovative technologies like big data and AI to monitor and preempt potential attacks. Despite these efforts, however, no system can ever be completely impervious to threats. Even…
Check Point Research Reveals Q2 2024 Brand Phishing Trends: Microsoft Tops List While New Entries Signal Shifting Threat Landscape
Check Point Research ranks Microsoft as primary target in phishing attacks and notes the introduction of Adidas, WhatsApp and Instagram into the Top 10 Phishing attacks remain one of the most pervasive cyber threats and are often the entry point…
The Hidden Menace of Phantom Attackers on GitHub by Stargazers Ghost Network
Key Summary Never Seen Before Discovery: Check Point Research has uncovered the Stargazers Ghost Network, a sophisticated operation of ghost accounts on GitHub distributing malware through phishing repositories, marking the first time such an operation has been identified on this…
Why MSSPs Should Transition from Fear-Based Sales Strategies to a Value-Centric Approach
Shifting the Cyber security Sales Paradigm In cyber security sales, fear has long been the go-to approach. From warnings of impending cyber threats to fearmongering predictions of catastrophic breaches, the industry has often relied on fear-based ‘boogieman’ tactics to drive…
Empowering Women Through Mentoring: Meet Laura Hidalgo
Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…
Transforming MSSPs into Thought Leaders
A New Paradigm for Sales Motions Managed Security Service Providers (MSSPs) know that the Quarterly Business Review (QBR) with clients often masquerades as an opportunity to pitch new services, upsell existing ones, and raise bottom line. However, as the cybersecurity…
CrowdStrike Disruptions – Ensuring Business Continuity
In the last few hours, major disruptions on CrowdStrike’s Falcon platform causing significant productivity impacts due to inaccessible documents have been reported. The CrowdStrike Falcon update has led to a “blue screen of death” globally, severely impacting business operations dependent…