Tag: Check Point Blog

New Facebook Copyright Infringement Phishing Campaign

Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign…

AI-Powered Security Management for the Hyperconnected World

Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several…

WAF Security Test Results – How Does Your Vendor Rate?

With cyber threats on the rise, organizations are increasingly concerned about their security posture. One area of prime concern is web applications and APIs that power key business processes. To protect mission-critical applications, efficient web application firewalls (WAFs) are required…