A New Paradigm for Sales Motions Managed Security Service Providers (MSSPs) know that the Quarterly Business Review (QBR) with clients often masquerades as an opportunity to pitch new services, upsell existing ones, and raise bottom line. However, as the cybersecurity…
Category: Check Point Blog
Check Point Recognized as a Leader in Forrester Wave for Mobile Threat Defense Solutions
In today’s mobile-first world, the security of mobile devices is paramount for organizations of all sizes. Check Point is a pioneer in this space, having developed its Mobile Threat Defense (MTD) solution, Harmony Mobile, which has been safeguarding organizations for…
Check Point Research Reports Highest Increase of Global Cyber Attacks seen in last two years – a 30% Increase in Q2 2024 Global Cyber Attacks
Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry and geography. These cyber attack numbers were driven by a variety of reasons, ranging from the continued increase in…
Celebrating World Youth Skills Day: The Vital Role of Cyber Security in Early Career Development
Check Point Software Technologies, a leading AI-powered, cloud-delivered cyber security platform provider, advocates the importance of equipping today’s youth with cyber security skills in emerging technologies like AI, ML, IoT and even Quantum Computing. This will ensure future job roles…
MuddyWater Threat Group Deploys New BugSleep Backdoor
Check Point Research (CPR) warns that Iranian threat group MuddyWater has significantly increased its activities against Israel and is deploying a new, previously undocumented backdoor campaign. Key Findings MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and…
GigaOm names CloudGuard WAF as leader and fast mover for a second year in a row
The landscape of Web Application and API Security is undergoing a rapid evolution, demanding WAF services to be better equipped to handle modern development tools and keep up with the pace. These services must be easily manageable, automated, precise, and…
Harnessing the Power of Advanced MDR for SIEM Platforms
Enhance Your Cybersecurity with Check Point Infinity Global Services and Microsoft Sentinel In the fast-paced world of cyber security, organizations need state-of-the-art solutions to outpace emerging threats. Advanced Managed Detection and Response (MDR) is a game-changer, offering robust protection by…
June 2024’s Most Wanted Malware: RansomHub Takes Top Spot as Most Prevalent Ransomware Group in Wake of LockBit3 Decline
Check Point’s Threat Index highlights a shift in the Ransomware-as-a-Service (RaaS) landscape, with RansomHub surpassing LockBit3 to take top stop as the most prevalent group. Meanwhile, researchers identified a BadSpace Windows backdoor campaign spread via fake browser updates Our latest…
CPR Warns Threat Actors are Leveraging Internet Explorer in New Zero-Day Spoofing Attack (CVE-2024-38112)
Check Point Research (CPR) warns of a new spoofing attack from threat actors using Internet Explorer shortcut files to lure Windows 10/11 users for remote code execution. CPR recommends Microsoft customers patch immediately. Key Findings Threat actors are luring Windows…
Protecting Your Codebase: Best Practices for Secure Secret Management
Guide to Safeguarding Sensitive Information in Software Development Software development teams face numerous challenges daily, with few as critical as managing sensitive information, including credentials and API keys. Effective secret management, a cornerstone of robust cyber threat defense, is vital…