Executive Summary: PDFs have become the dominant vector for malicious attachments, accounting for nearly 3/4th of all malicious files in the last month This marks a staggering rise from 2023, when it accounted for 20% Healthcare is hit the hardest,…
Category: Check Point Blog
Empowering Women Through Mentoring: Meet Cordelia Allway
Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…
Foxit PDF Reader “Flawed Design” : Hidden Dangers Lurking in Common Tools
Heightened vulnerability: Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit PDF Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands, exploiting human psychology to…
Check Point Infinity ThreatCloud AI Featured on Fast Company’s 2024 World Changing Ideas List
Check Point is proud to be included in Fast Company’s 2024 World Changing Ideas list for Infinity ThreatCloud AI! As the brains behind the Infinity Platform, ThreatCloud AI was chosen due to its game-changing technology that leverages 50+ AI engines…
CRN Recognizes three Check Point Channel Stars in its 2024 Women of the Channel list
CRN has recognized Check Point’s Head of Americas Channel Sales, Nisha Holt, for her outstanding achievements as one of the Women of the Channel Power 100. Furthermore, Rebecca James and Lauren Ventura have also earned a spot on the esteemed…
How to Maintain Your Cyber Security Hygiene for a Vulnerability-free Environment
We practice daily routines like brushing our teeth and washing our hands to maintain our physical health. Similarly, the digital landscape has become a breeding ground for sophisticated cyber threats, each requiring specific ‘sanitization’ strategies. Your Organization Must Scrub…
April 2024’s Most Wanted Malware: Surge in Androxgh0st Attacks and the Decline of LockBit3
Researchers recently identified a spike in Androxgh0st attacks, a Trojan that targets Windows, Mac and Linux platforms, which saw it jump straight into second place in the top malware list. Meanwhile, LockBit3 narrowly remains the top ransomware group, despite a…
Five business use cases for evaluating Azure Virtual WAN security solutions
Are you using Microsoft Azure Virtual WAN, or considering using it? If so, what is the best way to secure your Virtual WAN deployments? This is not a trivial question, because not all firewalls are equal or even similar in…
Stop Chasing Breaches: Build a Resilient Security Architecture
You assume your security architecture is secure, it’s not always the case Cyber security vendors play a critical role in protecting the digital landscape. However, security products, too, are not immune from targeted exploits by bad actors. Cyberattacks can happen…
Check Point Protects Enterprises by Accelerating Security for Networks and AI Cloud Infrastructure, in Collaboration with NVIDIA
As cyber threats expand rapidly, enterprises can trust Check Point to deliver accelerated network and cloud security solutions, in collaboration with NVIDIA. By combining Check Point’s experience in advanced threat prevention with NVIDIA’s cutting-edge accelerated computing platforms, enterprises can get…