Guide to Safeguarding Sensitive Information in Software Development Software development teams face numerous challenges daily, with few as critical as managing sensitive information, including credentials and API keys. Effective secret management, a cornerstone of robust cyber threat defense, is vital…
Category: Check Point Blog
Check Point – ISC2 Partnership Cross the 4,000 Hours of Training Milestone
Education and collaboration are important pillars of advancement and resilience in cybersecurity. Reflecting on the journey since 2020, the partnership between Check Point MIND and ISC2 under the CISO Academy program, part of Check Point’s Infinity Global Services (or “IGS”),…
CVE-2024-6387 – regreSSHion Remote Code Execution vulnerability seen in OpenSSH
Earlier this week, on Monday, July 1st, a security regression (CVE-2006-5051) was published in OpenSSH’s server (sshd). Basically, there is a race condition that can lead sshd to handle some signals in an unsafe manner. The worry is that an…
Amazon Prime Day 2024: Cyber criminals Are Ready – Are You?
Highlights: New Domains: Over 1,230 new domains associated with Amazon emerged in June 2024, with 85% flagged as malicious or suspicious Amazon Prime Domains: 1 out of every 80 new Amazon-related domains identified as malicious or suspicious contains the phrase…
Harnessing the Power of Managed CNAPP by Check Point
A Holistic Approach to Protecting Your Cloud Assets In today’s fast-paced digital landscape, organizations are increasingly turning to cloud-native solutions to drive their business forward. However, with the growing reliance on cloud infrastructure comes a heightened need for robust security…
DeepBrand Clustering – an Evolution in Brand Spoofing Prevention
Phishing remains a significant component of the cyber threat landscape due to its simplicity, effectiveness, and adaptability. It is a deceptive practice in which threat actors pose as legitimate entities in an effort to extract sensitive information from unsuspecting individuals.…
Data: The Final(?) Security Frontier
Navigating the digital realm without robust data security is like sailing stormy seas without a compass. A staggering 69% of organizations battled cyber attacks last year, and in a world rife with evolving cyber threats, playing catch-up isn’t an option.…
Strengthening Digital Defenses: Cyber Security Challenges and Top Tips for MSMEs
Micro, Small, and Medium-Sized Enterprises (MSMEs) form the backbone of global economies, contributing significantly to employment and GDP growth. According to the International Finance Corporation (IFC) this subgroup of businesses accounts for 70% of total employment on average, and 50%…
Check Point SecureAcademy Launches Special Program Offering Content and Services Valued Up to $60K to Help Close the Global Cyber Security Skills Gap
In a time when cyber threats are on the rise and the shortage of skilled cybersecurity professionals is becoming more acute, Check Point Infinity Global Services SecureAcademy is pleased to introduce a new grant initiative. This initiative is designed to…
A Step-by-Step Guide to Spotting and Preventing Frame Injections
Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cyber criminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for…