Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for implementing robust cybersecurity measures in the domains of Operational Technology (OT) and Industrial Control Systems (ICS). Considering the growing convergence of IT and OT, the…
Tag: Check Point Blog
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat
90% of children over 8 years old are already using Internet. Only 40% of parents are aware that their children have faced cyber threats. Education is the cornerstone of our culture, as it allows us to progress as a society…
Conditional QR Code Routing Attacks
Over the summer, we saw a somewhat unexpected rise in QR-code based phishing attacks. These attacks were all fairly similar. The main goal was to induce the end-user to scan the QR Code, where they would be redirected to a…
A Step-by-Step Guide to Spotting and Preventing Frame Injections
Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cybercriminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for phishing…
Check Point Research Unfolds: Navigating the Deceptive Waters: Unmasking A Sophisticated Ongoing NFT Airdrop Scam
By: Oded Vanunu, Dikla Barda, Roman Zaikin Main Highlights: 1. Sophisticated Scam Targeting Token Holders: Over 100 popular projects’ token holders targeted with fake NFT airdrops appearing from reputable sources. 2. Multi-Stage Deception Uncovered: The ongoing Scam involves enticing victims…
Shifting Paradigms: Cloud Security in the Post-Pandemic Era
‘The new normal.’ It began as a buzzword after COVID-19 hit the world in 2020. The new normal referred to a culture that adapted to the pandemic and changed our day-to-day lives. One significant outcome of the lockdown was digital…
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations
A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each experienced over 60,000…
Is Open Source More Risk than Reward?
Open source has become an indispensable aspect of modern software development. From the Linux operating system to the ubiquitous Apache web server, open source projects have sparked innovation, fostered collaboration, and disrupted traditional business models. However, as the open source…
ThreatCloud AI Wins 2024 BIG Innovation Award
The Business Intelligence Group awarded ThreatCloud AI with a 2024 BIG Innovation award. ThreatCloud AI powers Check Point’s entire security portfolio – from edge to cloud to network and beyond. It makes two billion security decisions daily – ensuring that…
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security
As we enter 2024, your organization may have unused MACC or Azure commit-to-consume (CtC) credits as your annual renewal date draws near. These credits are “use them or lose them”—but the good news is that you can now transform those…