Category: Check Point Blog

Getting to Know Muhammad Yahya Patel

Muhammad (Mo) Yahya Patel is a lead security engineer and a member of Check Point’s Office of the CTO. Before joining Check Point, Mo worked as a security consultant, designing and implementing security solutions for private and public sector organisations…

Get to Know Check Point Harmony SASE

Check Point’s new Secure Access Service Edge (SASE) offering is now called Harmony SASE. The world has changed in the last few years, and the old way of securing a standard on-premises network, with its notions of inside and outside…

Are People Problems Blocking Your Secure Cloud Migration?

Jonathan Maresky, Cloud Security Product Marketing Manager What gets in the way of successful and secure cloud migrations? Ask most CIOs, cloud architects or IT engineers that question, and their minds will probably first go to technological hurdles – like…

MalDocs in Word and Excel: A Persistent Cybersecurity Challenge

Highlights ·        Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802. ·        Widespread Use by Cybercriminals:…

Spoofing Temu for Credential Harvesting

Introduction Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distributors. Launched in 2022 and owned by Pindouduo, it has attracted a large audience, with 40% of its downloads…