What we have learned and the steps to protect your enterprise Highlights MGM Resorts was hit by a major ransomware attack that took systems offline in locations across Las Vegas Prolific ransomware group ALPHV claimed responsibility in a post…
Tag: Check Point Blog
Check Point Infinity Global Services Saved Financial Services Organization up to 80% on Insurance Costs
In an inspiring success story, a leading financial institution achieved remarkable results by embracing Check Point Infinity Global Services (IGS) Managed Detection and Response (MDR) with Incident Response (MDR+IR) service. This strategic move not only strengthened their cybersecurity, but also…
Check Point Research reports a large-scale phishing attack targeting over 40 Colombian based companies
Highlights: A new phishing campaign has been discovered by Check Point researchers in the last two months. This campaign targeted over 40 prominent companies in various industries within Colombia. The attackers behind the phishing campaign aimed to install the “Remcos”…
MemDive AI Engine Prevents Malicious Payloads from Evading Security Measures
By Asaf Avisar, Arie Olshtein and Shiri Yaakobson Highlights: In recent months, MemDive allowed our Threat Emulation engine to prevent various attempts of a shellcode-based packer, aiming to execute STOP ransomware and the RedLine Stealer. Check Point customers using Quantum…
August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI
Check Point Research reported on a new ChromeLoader campaign named “Shampoo” which targets Chrome browser users with malware-loaded fake ads. Meanwhile, the communications sector jumped up the list to the second most impacted industry over healthcare Our latest Global…
Getting to Know: Grant Asplund
For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his…
Phishing via Google Looker Studio
A burgeoning attack involving Google Looker Studio is making the rounds. In the last few weeks, we’ve seen over a hundred of these attacks. Google Looker Studio is a tool that converts information—slideshows, spreadsheets, etc—into visualized data, such as charts…
Addressing the Rising Threat of Web DDoS Tsunami Attacks in 2023
The first half of 2023 has seen a massive surge in Distributed Denial of Service (DDoS) attacks, unveiling a new level of sophistication, frequency, and size that organizations must confront. This rising threat is particularly exemplified by the popularity in…
Allowing cybercriminals to drive your car: 5 Tips for Keeping Your Electric Vehicle Secure
Cyberattacks to electric cars have increased by 380%, with a methodology focused on disrupting the proper functioning of their charging stations and the functions of the vehicle itself, as well as stealing data stored in them. Remote vehicle hijacking, potential…