A critical CVE or Common Vulnerability and Exposure is identified every day. Security teams need to plan the measures (mitigation strategies) taken to reduce the harmful effects of a CVE, to ensure that the applications they are managing remain secure…
Tag: Check Point Blog
Empower Cyber Security Defenses with Horizon IOC
Cyber security threats move fast, so having a robust and centralized solution for managing Indicators of Compromise (IOCs) is crucial. Check Point introduces Horizon IOC, an innovative platform designed to streamline IOC management across the enterprise. Centralized IOC Management for…
Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000%
By Oded Vanunu, Dikla Barda, Roman Zaikin Unmasking Deceptive Tactics: A recent investigation by Check Point Research exposes a troubling trend in the cryptocurrency landscape. Deceptive actors are manipulating pool liquidity, sending token prices soaring by a shocking 22,000%. $80,000…
How the Denver Broncos Intercepts Cyber Threats with Check Point
The Denver Broncos, a professional football club in the National Football League, depend on Check Point’s cyber security portfolio to protect Empower Field at Mile High, the team and staff. With a combination of Check Point CloudGuard, Quantum and Harmony,…
Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced
Highlights · Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks. ·…
Check Point Secures Broncos Country
The Denver Broncos, a professional football club in the National Football League, depend on Check Point’s cyber security portfolio to protect Empower Field at Mile High, the team and staff. With a combination of Check Point CloudGuard, Quantum and Harmony,…
Check Point Research Report: Iranian Hacktivist Proxies Escalate Activities Beyond Israel
Highlights: · Expanded Cyber Frontline: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with a…
Check Point Research Report: Shift in Cyber Warfare Tactics – Iranian Hacktivist Proxies Extend Activities Beyond Israel
Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets in other countries, with…
AWS Security Hub and 4 Ways to Enhance Security
Securing software engineering and operational processes has become increasingly challenging over the past decade. The majority of workloads have been migrated to the cloud, and a larger number of engineers are now working remotely. If your organization employs a cloud-native…
Information is power, but misinformation is just as powerful
The disinformation and manipulation techniques employed by cybercriminals are becoming increasingly sophisticated due to the implementation of Artificial Intelligence in their systems The post-truth era has reached new heights with the advent of artificial intelligence (AI). With the increasing popularity…