On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue…
Tag: Check Point Blog
January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats
Researchers uncovered a large cyber threat distributor known as VexTrio, which serves as a major traffic broker for cybercriminals to distribute malicious content. Meanwhile, LockBit3 topped the list of active ransomware groups and Education was the most impacted industry worldwide …
MalDocs in Word and Excel: A Persistent Cybersecurity Challenge
Highlights · Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802. · Widespread Use by Cybercriminals:…
Spoofing Temu for Credential Harvesting
Introduction Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distributors. Launched in 2022 and owned by Pindouduo, it has attracted a large audience, with 40% of its downloads…
Raspberry Robin: Evolving Cyber Threat with Advanced Exploits and Stealth Tactics
Key Highlights: · Rapid Exploit Development: Raspberry Robin leverages new 1-day Local Privilege Escalation (LPE) exploits developed ahead of public knowledge, hinting at either an in-house development capability or access to a sophisticated exploit market. · Innovative Delivery and…
Fake Voicemail as Credential Harvesting Lure
Introduction Hackers will try just about anything to get you to click on a malicious link. The key is to make the overall email seem as believable as possible. The more legitimate it seems, the better. The more believable it…
Generative AI is the Pride of Cybercrime Services
Cybercriminals Officially Utilize Generative AI for Spam Campaigns, Social Media Impersonation and Verification Services Highlights: – Generative AI as a Cybercrime Tool: Cybercriminals are increasingly using generative AI for sophisticated cybercrimes, including social media impersonation, spam campaigns, and KYC verification services.…
Navigating the Cyber security Maze for Small and Medium Business: How Quantum Spark 1900 & 2000 are Reshaping Security for SMBs and MSPs
Innovative Next-Generation Firewalls Deliver Enhanced AI Threat Prevention up to 5 Gbps with a 99.8% block rate against zero-day malware, phishing, and ransomware In an era where cyber threats are becoming increasingly complex, small and medium-sized businesses (SMBs) are finding…
Check Point Software Unveils the Infinity Platform: Pioneering the Future of AI-Powered, Cloud-Delivered Cyber Security
At Check Point Software Technologies, we are always at the forefront of innovative cyber security solutions. Today, we are excited to announce a significant evolution in cyber security technology – the launch of our redefined Check Point Infinity Platform. This…
Singapore’s National Research and Education Network (SingAREN) Protects Vital Research with Check Point Software
SingAREN is Singapore’s national research and community network. One of its main duties is to connect Singapore’s research and educational organizations to research centers across Asia, Australia, Europe, the Middle East and the United States. Researchers rely on SingAREN’s networks…