When it comes to mobile devices, Android is the most popular and used operating system with over 3.9 billion active users in over 190 countries. Three-quarters of all mobile devices run on Android. However, with its widespread adoption and open…
Category: Check Point Blog
Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security
91% view the adoption of artificial intelligence as a priority, highlighting vulnerability assessment and threat detection as key benefits Nevertheless, only 61% of respondents acknowledged that their organization is in the planning or development phases of adopting AI and ML…
Why Hybrid Cloud Security is the Future
The cloud is a fantastic way to deliver a multitude of services, but it’s equally important to recognize when a purely cloud approach can be sub-optimal. That’s why Harmony SASE takes a hybrid route. Our secure Internet Access offering provides…
Protect Yourself from Summer Vacation Scams: Stay Cyber Aware During Your Vacation
Highlights: Check Point Research (CPR) warns about online phishing scams related to summer vacations 1 in every 33 new summer vacation related domain registered in the previous month of May was malicious or suspicious CPR provides examples of vacation-related scams…
How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks
A sophisticated new malware/trojan attack is designed to steal login credentials and credit card information from payment systems, banks and crypto exchanges. This attack tricks legitimate business applications into running compromised but innocent-looking dynamic link library (DLL) files — making…
The Evolution of QR Code Phishing: ASCII-Based QR Codes
Introduction Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code attacks. It started with standard MFA authentication requests. It then evolved…
CloudGuard Network Security integrates with AWS Cloud WAN Service Insertion at launch to improve the operational efficiency of cloud security teams
In the ever-evolving landscape of cloud security, staying ahead of threats is the top priority for IT security teams. However, for many organizations experiencing a shortage in security engineers and an overload of security tasks, it is often as important…
May 2024’s Most Wanted Malware: Phorpiex Botnet Unleashes Phishing Frenzy While LockBit3 Dominates Once Again
Researchers uncovered a campaign with Phorpiex botnet being used to spread ransomware through millions of phishing emails. Meanwhile, the Lockbit3 Ransomware group has rebounded after a short hiatus accounting for one-third of published ransomware attacks Our latest Global Threat Index…
Emergency Response: A Harmony SASE Rapid Deployment Story
One of the main advantages of Check Point Harmony SASE is our focus on providing fast deployment that allows our customers to establish a secure cloud network and onboard users in less than an hour. Of course, fast deployment is…
Important Security Update – Stay Protected Against VPN Information Disclosure (CVE-2024-24919)
Updated: May 28, 2024 at 1PM PT Yesterday (May 27, 2024) we delivered a solution that addresses attempts we saw on a small number of customers’ VPN remote access networks as referenced below. Today, we found the root cause for…