Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and…
Tag: Check Point Blog
Protecting Hospitals from IoT Threats with Check Point
In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security…
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
Check Point Software’s latest threat index highlights that FakeUpdates continues to pose a significant threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. A recent investigation by security researchers revealed that an affiliate of RansomHub utilized…
A Safer Digital Future: Stopping AI-Fueled Cyber Scams for a more Secure Tomorrow
With Safer Internet Day this week, it’s hard not to feel a little extra concern about our kids’ online safety. Today, our children and young adults are living and breathing a digital world that’s evolving faster than ever—one where scammers…
Service Levels for MSSPs: Elevating Security-Specific Services
Introduction: The Critical Role of Service Levels in Managed Security Today’s managed service providers (MSPs) play a crucial role in safeguarding businesses against cyber threats. As the complexity and frequency of these threats increase exponentially, it’s becoming critical for MSPs…
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new Valentine’s/love-related websites, marking a 5% increase compared to the previous month. Of these, 1 in 72 newly registered websites were identified as malicious or risky. Specifically focusing on Valentine’s-related websites,…
Breaking (Fire)Walls & Glass Ceilings: Women Leading Digital Revolution and Cyber Security’s Next Frontier
Cyber security is at the heart of today’s digital revolution, yet it remains one of the most male-dominated sectors in science and technology. Data from Zippia shows that while women hold 48% of roles in the broader workforce, they represent…
How Electric AI Strengthened Its Cloud Security with AI-Powered Solutions
Electric AI, a New York-based IT platform provider serving nearly 1,000 customers and over 55,000 end-users, faced the critical challenge of securing not only their own infrastructure but also protecting sensitive data across multiple industries. As a managed security provider…
Check Point Helps Gentera Secure the Financial Future of Millions
Gentera is built on the vision of eradicating financial exclusion and serves over 3.2 million clients across its subsidiaries in Mexico, Guatemala, and Peru. To help empower those with fewer financial resources, Gentera provides counseling and services around credit, insurance,…
New Facebook Copyright Infringement Phishing Campaign
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign…