As cyber threats continue to grow in scale and sophistication, continuous cyber security training is crucial for enterprises looking to build resilient defenses. Recent data from Check Point Research (CPR) reveals a 30% increase in cyberattacks in Q2 2024 alone—the…
Tag: Check Point Blog
Check Point Further Enhances Cyber Security Training for IGS Customers with OffSec’s Learn Enterprise
In an era of rapidly evolving cyber threats, the need for continuous cyber security training is more critical than ever. Check Point Research (CPR) even highlights a 30% increase in cyber attacks in Q2 2024 – the highest surge in…
The Evolution of Transparent Tribe’s New Malware
Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…
AI’s Impact in 2024 Elections and What Voters Can Do to Protect Themselves from Disinformation
2024 is perhaps the biggest election year the world has ever seen, with more than 60 countries holding national elections that will impact nearly half the world’s population, per Statista. 2024 is also the year the world became more comfortable…
Ransomware’s Evolving Threat: The Rise of RansomHub, Decline of Lockbit, and the New Era of Data Extortion
1.Introduction The ransomware landscape is witnessing significant changes, with new actors like RansomHub rising to prominence, while previously dominant groups such as Lockbit experience a sharp decline. Ransomware remains the most pervasive cyber threat, with financially motivated criminal groups deploying…
Halloween Frights of the Digital Age: Cyber Threats Haunting Us in 2024
Halloween is a time for haunted houses, spooky costumes, and trick-or-treating, but in today’s digital landscape, there are scarier things lurking just beneath the surface. The rise in global cyber threats paints a chilling picture—cyber attacks have surged by an…
7,500 Phishing Emails Use Interesting Obfuscation Method to Target Student Loan Holders
According to the Education Data Initiative, nearly 43 million Americans are saddled with the burden of student loan debt, with an average individual debt burden of $37,000. In 2022, President Biden announced a three-part plan to cancel thousands of dollars…
2025 Cyber Security Predictions – The Rise of AI-Driven Attacks, Quantum Threats, and Social Media Exploitation
As we move into 2025, the cyber security landscape will become more complex, with new challenges emerging as rapidly as the technologies that drive them. From artificial intelligence (AI)-enhanced malware to looming quantum computing threats, the forecast from Check Point…
Cloud Risk Management: The DevOps Guide
For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify,…
Get it Done Faster with AI Copilot for Harmony SASE
Managing network security can be a daunting task, even for the most seasoned IT professionals. Harmony SASE users now have a new tool at their disposal to streamline these challenges: the Infinity AI Copilot for Harmony SASE, currently in preview.…