You’re doing all you can to build a hardened cybersecurity fortress around your digital assets. But are you leaving a backdoor open to attackers without realizing it? Mobile devices are central to how we all work today, but they’re also…
Category: Check Point Blog
A Hole in the (fire) Wall: Check Point Research reveals technique allowing attackers to bypass Firewall rules designed to stop NTLM credential thefts, and provides protection methods
Highlights: Check Point Research (CPR) reveals a technique abusing Microsoft Access’s feature (Part of the Office suite) that might allow attackers to bypass Firewall rules designed to stop NTLM (NetNTLM) credential theft. Attacks against NTLM vary between brute force attacks…
October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign
Check Point Research reported that NJRat climbed four places into second spot last month. Meanwhile a new mal-spam campaign was discovered involving AgentTesla, the sixth most used malware, being delivered via corrupted file attachments Our latest Global Threat Index for…
Elevating Cybersecurity Prevention: Check Point Software’s Innovative MSSP Program Redefines Security Collaboration
Simplified, Scalable, and Forward-Thinking Advancements for Managed Security Services Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has enhanced its MSSP Partner Program. This move addresses the critical workforce shortage in cybersecurity and…
Cloud Security in Action: Meet Check Point CloudGuard
Digital transformation and the widespread adoption of cloud technologies are creating mega-shifts across all industries. The adoption of cloud is far from straightforward and linear, as companies navigate their cloud adoption journey in phases. Moreover, the range of technologies employed…
Check Point Recognized on the 2023 CRN Edge Computing 100 List
Today, accelerated cloud adoption and hybrid work require security to expand beyond the traditional network perimeter, making edge security a paramount focus. CRN’s fourth-annual Edge Computing 100 list honors trailblazing vendors leading the channel with next-generation technology that helps build…
Getting to Know Zehra Hussain
Zehra Hussain is an Incident Response Analyst based in Sydney, Australia. Her role involves responding to security incidents and ensuring the protection of sensitive data and systems. With a background in digital forensics and satellite engineering, Zehra brings unique expertise…
“The Big Bully : Importance of detecting and preventing cyberbullying”
Check Point Software highlights the growth of cyberbullying among young people and the need to take measures to reduce it. In the United States, nearly 50% of teenagers between the ages of 13 and 17 had experienced cyberbullying. Our society…
Why OSS Packages Can’t Scale without New Security Measures
In the vibrant arena of software development, open-source software (OSS) has emerged as a vital catalyst for spurring innovation, nurturing collaboration, and boosting cost efficiency. OSS projects have seen explosive growth, with millions of dedicated developers contributing to a jaw-dropping…
Unraveling the Scarred Manticore Saga: A Riveting Epic of High-Stakes Espionage Unfolding in the Heart of the Middle East
Highlights: 1. Silent Intruders: Scarred Manticore, an Iranian cyber threat group linked to MOIS (Ministry of Intelligence & Security), is quietly running a stealthy sophisticated spying operation in the Middle East. Using their latest malware tools framework, LIONTAIL, they have…