What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2023-04-12 11:00:44 Disponibilité générale du point de contrôle Sécurité du réseau CloudGuard avec l'équilibreur de chargement de passerelle Azure
General Availability of Check Point CloudGuard Network Security with Azure Gateway Load Balancer
(lien direct)
> Nous sommes heureux d'annoncer la disponibilité générale de la sécurité du réseau CloudGuard avec l'équilibreur de charge de passerelle Azure.Cette intégration améliore la sécurité Azure avec la solution de prévention des menaces avancées de Check Point \\.Avec CloudGuard, les clients peuvent désormais protéger leurs données, applications et services contre les menaces potentielles dans le cloud avec une plus grande efficacité de sécurité, et l'intégration simplifie et améliore la conception de déploiements Azure sécurisés.Introduction et expérience que les organisations du monde entier migrent leurs charges de travail vers le cloud, l'importance de la sécurité du cloud devient de plus en plus critique, car elle donne aux clients la confiance que leurs données et applications sont [& # 8230;]
>We are pleased to announce the general availability of CloudGuard Network Security with Azure Gateway Load Balancer. This integration enhances Azure security with Check Point\'s industry-leading advanced threat prevention solution. With CloudGuard, customers can now protect their data, applications and services from potential threats in the cloud with greater security efficacy, and the integration simplifies and improves the design of secure Azure deployments. Introduction and Background As organizations around the world are migrating their workloads to the cloud, the importance of cloud security is becoming increasingly critical, because it provides customers with the confidence that their data and applications are […]
Threat Cloud ★★
Checkpoint.webp 2023-04-11 17:00:48 (Déjà vu) Attention!Vulnérabilité RCE non autorisée critique dans le service MSMQ
Watch out! Critical Unauthorized RCE Vulnerability in MSMQ Service
(lien direct)
> Recherche par: Haifei Li Résumé de l'exécutif Contrôle Point Research a récemment découvert trois vulnérabilités dans la file d'attente de Microsoft Message & # 8221;Service, communément appelé MSMQ.Ces vulnérabilités ont été divulguées à Microsoft et corrigées lors de la mise à jour du mardi avril.Le plus grave d'entre eux, surnommé queueJumper par la RCR (CVE-2023-21554), est une vulnérabilité critique qui pourrait permettre aux attaquants non autorisés d'exécuter à distance le code arbitraire dans le contexte du processus de service Windows MQSVC.EXE.Check Point Research (RCR) publie ce blog après la mise en œuvre du correctif pour sensibiliser à cette vulnérabilité critique et fournir des idées de défense et des recommandations d'atténuation pour les utilisateurs de Windows.[& # 8230;]
>Research by: Haifei Li Executive Summary Check Point Research recently discovered three vulnerabilities in the “Microsoft Message Queuing” service, commonly known as MSMQ. These vulnerabilities were disclosed to Microsoft and patched in the April Patch Tuesday update. The most severe of these, dubbed QueueJumper by CPR (CVE-2023-21554), is a critical vulnerability that could allow unauthorized attackers to remotely execute arbitrary code in the context of the Windows service process mqsvc.exe. Check Point Research (CPR) is releasing this blog after the patch was implemented to raise awareness of this critical vulnerability and provide defense insights and mitigation recommendations for Windows users. […]
Vulnerability ★★★
Checkpoint.webp 2023-04-11 11:00:02 Le point de basculement: explorer la surtension dans les cyberattaques IoT dans le monde entier
The Tipping Point: Exploring the Surge in IoT Cyberattacks Globally
(lien direct)
> La recherche sur le point de contrôle des ponctuations a une forte augmentation des cyberattaques ciblant les dispositifs IoT Sights: les deux premiers mois de 2023 ont connu une augmentation de 41% du nombre moyen d'attaques hebdomadaires par organisation ciblant les dispositifs IoT, par rapport à 2022. En moyenne,Chaque semaine, 54% des organisations souffrent de tentatives de cyberattaques ciblant les appareils IoT, les appareils IoT dans les organisations européennes sont les plus ciblées, suivis par ceux des organisations APAC et basées sur l'Amérique latine.L'Internet des objets (IoT) est devenu une partie intégrante de notre vie quotidienne.Cependant, avec l'utilisation croissante des appareils IoT, il y a eu une augmentation de [& # 8230;]
>Check Point Research flags a sharp increase in cyberattacks targeting IoT Devices Highlights: The first two months of 2023 have seen a 41% increase in the average number of weekly attacks per organization targeting IoT devices, compared to 2022. On average, every week 54% of organizations suffer from attempted cyber attacks targeting IoT devices IoT devices in European organizations are the most targeted, followed by those in APAC and Latin America-based organizations. The Internet of Things (IoT) has become an integral part of our daily lives. However, with the growing use of IoT devices, there has been an increase in […]
★★★
Checkpoint.webp 2023-04-10 11:00:11 March 2023\'s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files (lien direct) > Vérifier les rapports de recherche sur les points selon lesquels Emotet Trojan a lancé une nouvelle campagne le mois dernier pour échapper au bloc macro de Microsoft \\, envoyant des e-mails de spam contenant des fichiers Onenote malveillants.Pendant ce temps, Ahmyth était le logiciel malveillant mobile le plus répandu et Log4j a de nouveau pris la première place comme la vulnérabilité la plus exploitée que notre dernier indice de menace mondial pour mars 2023 a vu les chercheurs découvrir une nouvelle campagne de logiciels malveillants d'Emotet Trojan, qui a augmenté.Comme indiqué plus tôt cette année, les attaquants d'Emotet ont exploré d'autres moyens de distribuer des fichiers malveillants depuis que Microsoft a annoncé qu'ils bloqueraient les macros des fichiers de bureau.[& # 8230;]
>Check Point Research reports that Emotet Trojan launched a new campaign last month to evade Microsoft\'s macro block, sending spam emails containing malicious OneNote files. Meanwhile Ahmyth was the most prevalent mobile malware and Log4j took top spot once again as the most exploited vulnerability Our latest Global Threat Index for March 2023 saw researchers uncover a new malware campaign from Emotet Trojan, which rose to become the second most prevalent malware last month. As reported earlier this year, Emotet attackers have been exploring alternative ways to distribute malicious files since Microsoft announced they will block macros from office files. […]
Spam Malware Vulnerability Threat ★★
Checkpoint.webp 2023-04-04 14:29:35 Tous les fournisseurs de CNApp ne s'empare pas: Vérifier le point CloudGuard reconnu en tant que fournisseur représentatif dans Gartner CNApp Market Guide
Not all CNAPP Vendors Stack Up: Check Point CloudGuard Recognized as Representative Vendor in Gartner CNAPP Market Guide
(lien direct)
> Les pirates d'arrière-plan intensifient leurs efforts car la surface d'attaque pousse des fi gurations erronées sur l'infrastructure cloud (réseau, calcul, stockage, identités et autorisations), API et la chaîne d'approvisionnement du logiciel lui-même.Selon Gartner Research Reports, cela stimule un pourcentage de croissance du marché estimé d'environ 25%.Les fournisseurs de sécurité cloud prennent note et fusionnent plus de solutions CWPP, CSPM et CIEM dans une offre CNApp pour les clients.Gartner, dans leur guide du marché 2023 pour les plates-formes de protection des applications natives cloud, prévoit qu'en 2025, 60% de toutes les entreprises se procureront leurs solutions CWPP et CSPM d'un fournisseur.Mais plus que le [& # 8230;]
>Background Hackers are intensifying their efforts as the attack surface grows-targeting misconfigurations on the cloud infrastructure (network, compute, storage, identities, and permissions), APIs, and the software supply chain itself. According to Gartner research reports, this is driving an estimated market growth percentage of approximately 25%. Cloud security providers are taking note and merging more CWPP, CSPM, and CIEM solutions into a CNAPP offering for customers. Gartner, in their 2023 Market Guide for Cloud Native Application Protection Platforms, predicts that by 2025, 60% of all enterprises will be procuring their CWPP and CSPM solutions from one vendor. But more than the […]
Cloud ★★
Checkpoint.webp 2023-04-04 07:09:13 Travels en toute sécurité?La recherche sur les points de chèque met en lumière un marché souterrain croissant en vendant des points de vol, des récompenses de l'hôtel et des diplômes volés des comptes de compagnies aériennes
Safe Travels? Check Point Research puts a spotlight on a growing underground market selling flight points, hotel rewards and stolen credential of airline accounts
(lien direct)
> Faits saillants: Check Point Research (RCR) révèle une industrie croissante qui vend des informations d'identification aux comptes de hôtels et de compagnies aériennes volés.L'objectif final est d'avoir accès aux comptes avec des points de récompense et de le vendre.La RCR fournit des exemples comprenant un outil de forçage brute dédié utilisé pour voler des comptes, des informations d'identification volées en vente et des «agents de voyage» vendant des vols à prix réduits récupérés à l'aide de comptes de compagnies aériennes / hôtelières volées.Contexte avec les prix des compagnies aériennes en flèche de nos jours, au milieu de l'inflation mondiale, les gens recherchent toujours des ventes de dernière minute, des offres spéciales et seront généralement tentées de suivre toute offre lucrative qui diminuera les prix lourds dont nous avons tous besoin pour [& # 8230;]
>Highlights: Check Point Research (CPR) reveals a growing industry selling credentials to stolen hotel and airline accounts. End goal is to get access to accounts with reward points and sell it. CPR provides examples including dedicated brute forcing tool used to steal accounts, stolen credentials on sale and “travel agents” selling discounted flights retrieved using stolen airline / hotel accounts. Background With airline prices skyrocketing these days, amidst the global inflation, people are always seeking last minute sales, special offers and will usually be tempted to follow any lucrative offer that will decrease the heavy prices we all need to […]
Tool ★★
Checkpoint.webp 2023-04-03 22:39:09 Que vous disent les coups d'encre?Les chercheurs de point de contrôle dévoilent «Rorschach», auparavant invisible et le plus rapide jamais ransomware
What do the inkblots tell you? Check Point Researchers Unveil “Rorschach,” previously unseen, fastest ever Ransomware
(lien direct)
> Faits saillants: Check Point Research (RCR) et l'équipe de réponse aux incidents de point de contrôle (CPIRT) ont détecté une souche de ransomware auparavant anonyme, désormais surnommée «Rorschach», déployée contre une société américaine.Homage personnalisable avec des fonctionnalités techniquement uniques auparavant invisibles dans les ransomwares, Rorschach est l'un des ransomwares les plus rapides jamais observés.Le ransomware a été déployé à l'aide de DLL à chargement latéral de Cortex XDR de Palo Alto Network \\, un produit de sécurité commercial signé, dans une méthode de chargement non couramment utilisée pour charger des ransomwares.Les informations ont été correctement divulguées aux réseaux Palo Alto.& # 160;Tout le monde voit quelque chose de différent & # 160;Vérifier la recherche sur les points (RCR) est toujours sur le plan de la nouvelle et émergente [& # 8230;]
>Highlights: Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) detected a previously unnamed ransomware strain, now dubbed “Rorschach,” deployed against a US-based company. Highly customizable with technically unique features previously unseen in ransomware, Rorschach is one of the fastest ransomware ever observed. The ransomware was deployed using DLL side-loading of Palo Alto Network\'s Cortex XDR, a signed commercial security product, in a loading method not commonly used to load ransomware. The information was properly disclosed to Palo Alto Networks.   Everyone sees something different   Check Point Research (CPR) is always on guard for new and emerging […]
Ransomware ★★★
Checkpoint.webp 2023-04-03 11:27:28 Les moteurs d'apprentissage en profondeur AI Quantum Titan détectent et bloquent les attaques de phishing zéro-jour en temps réel
Quantum Titan\\'s AI Deep Learning Engines Detect and Block Zero-Day Phishing Attacks in Real Time
(lien direct)
par Shiri Yaakobson et Ori Noga Depuis son lancement en décembre 2022, la technologie brevetée en ligne \\ 'zéro \' a empêché des dizaines de campagnes de phishing zéro-jour.Dans cet article de blog, nous visons à partager trois cas mis en évidence que nos moteurs ont empêchés au cours du dernier mois.NOUVEAUX MOTEURS AI DE PHISSION ZERO & # 8211;X4 Plus de pages de phishing détectées, 40% & # 8230;
By Shiri Yaakobson and Ori Noga Since its launch in December 2022, Check Point\'s patented inline \'Zero Phishing\' technology has prevented dozens of zero-day phishing campaigns. In this blog post we aim to share three highlighted cases our engines prevented over the past month. New Zero-Phishing AI Engines – X4 more phishing pages detected, 40%…
General Information ★★
Checkpoint.webp 2023-03-30 11:00:10 Top vulnérabilités en 2023 et comment les bloquer [Top Vulnerabilities in 2023 and How to Block Them] (lien direct) > par Mor Ahuvia, directeur du marketing de produit avant que les cyberattaquants puissent mener des campagnes de logiciels malveillants ou de ransomwares réussies, ils doivent accéder à leurs environnements cibles.En 2022, la moitié de l'équipe de réponse aux incidents de point de contrôle, les cas de 8217;Au moment où les activités malveillantes ransomwares, les e-mails ou les e-mails forgés, les logiciels malveillants & # 8230;
>By Mor Ahuvia, Product Marketing Manager Before cyber attackers can wage successful malware or ransomware campaigns, they have to gain access to their target environments. In 2022, half of the Check Point Incident Response Team’s cases resulted from attackers gaining access by exploiting known vulnerabilities. By the time malicious activities-ransomware, spoofed or forged emails, malware…
Ransomware Malware ★★★
Checkpoint.webp 2023-03-30 07:31:13 L'application 3CXDesktop trojanize dans une attaque de chaîne d'approvisionnement: les clients de point de contrôle restent protégés [3CXDesktop App Trojanizes in A Supply Chain Attack: Check Point Customers Remain Protected] (lien direct) > 30/3/2023 03:35 est Qu'est-ce que l'application 3CXDesktop?3CXDESKTOPAPP est un client de bureau du système de voix sur IP (VoIP).L'application permet aux utilisateurs de communiquer à l'intérieur et à l'extérieur de l'organisation via leur bureau ou leur ordinateur portable.L'application peut enregistrer les appels et faciliter la vidéoconférence et peut être utilisée sur les systèmes d'exploitation Windows, macOS et Linux. & # 8230;
>30/3/2023  03:35 EST What is 3CXDesktop App? 3CXDesktopApp is a desktop client of 3CX voice over IP (VoIP) system. The application allows users to communicate within and outside the organization through their desktop or laptops. The app can record calls and facilitate video conferencing and can be used on Windows, macOS, and Linux operating systems.…
Vulnerability ★★
Checkpoint.webp 2023-03-29 11:00:57 Un aperçu de la révolution quantique dans l'informatique [An Overview of the Quantum Revolution in Computing] (lien direct) > Auteur: Julia Rabinovich Network Security Products mars 2023 chez Check Point Software Technologies, nous sommes passionnés par la fourniture de la meilleure sécurité à nos clients du monde entier.Pour ce faire, nous devons rester en avance sur les cybercriminels en innovant et en considérant continuellement de nouvelles approches pour la cybersécurité.L'une des technologies émergentes que nous suivons & # 8230;
>Author: Julia Rabinovich Network Security Products March 2023 At Check Point Software Technologies, we are passionate about delivering the best security to our customers around the world. To accomplish this, we must stay ahead of cyber criminals by continuously innovating and considering new approaches for cybersecurity. One of the emerging technologies that we are following…
★★
Checkpoint.webp 2023-03-27 11:00:23 Félicitations à nos lauréats du prix du CPX 360 2023 en EMEA [Congratulations to Our 2023 CPX 360 Award Winners in EMEA] (lien direct) > Par Kristin Owens, directeur, Fonctional Marketing & # 38;Engagement exécutif, point de contrôle Le point de contrôle Point CPX 360 Customer Awards démontre les façons créatives dont les clients du point de contrôle sécurissent tout, des points de terminaison aux actifs basés sur le cloud et aux initiatives de transformation numérique entières.Rencontrez cette année les gagnants de la région EMEA.Nos clients nous étonnent toujours avec leur & # 8230;
>By Kristin Owens, Director, Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation initiatives. Meet this year’s winners from the EMEA region. Our customers always amaze us with their…
★★
Checkpoint.webp 2023-03-24 11:00:07 Connectivité SD-WAN fiable avec la sécurité de qualité d'entreprise - le meilleur des deux mondes [Reliable SD-WAN Connectivity with Enterprise-Grade Security-The Best of Both Worlds] (lien direct) > La prévision de Gartner SD-WAN prévoit que d'ici 2025, 65% des entreprises auront mis en œuvre SD-WAN-UP à partir de 30% en 2020 [1].Les SD-WANS permettent aux organisations de connecter les emplacements des succursales au centre de données principal, les uns aux autres et au cloud plus facilement et plus facilement qu'en étendant les réseaux MPLS traditionnels.Les utilisateurs des succursales peuvent accéder au cloud & # 8230;
>The Gartner SD-WAN forecast predicts that by 2025, 65% of enterprises will have implemented SD-WAN-up from 30% in 2020[1]. SD-WANs enable organizations to connect branch locations to the main data center, to each other, and to the cloud more easily and cost-effectively than by extending traditional MPLS networks. Users in branch locations can access cloud…
Cloud ★★
Checkpoint.webp 2023-03-23 11:00:14 Méfiez-vous de Phishing Scams 3.0- l'e-mail que vous recevez peut ne pas être de qui vous pensez qu'il s'agit [Beware of Phishing Scams 3.0- The email you receive might not be from who you think it is] (lien direct) > Faits saillants: Avanan Une société de points de contrôle voit un pic dans les e-mails qui se font l'identité de sociétés et services légitimes au cours des 2 derniers mois de février et mars 2023 Paypal et Google sont les services les plus usurpés dans ces attaques, les utilisateurs sont invités à rester prudents et à être conscients des liensDans tout e-mail, y compris ceux qui viennent de & # 8230;
>Highlights: Avanan a Check Point Company sees a spike in emails impersonating legitimate firms and services in the past 2 months of February and March 2023 PayPal and Google are the most impersonated services in these attacks Users are advised to remain cautious and be aware of links within any email, including those coming from…
Studies ★★★
Checkpoint.webp 2023-03-20 11:00:44 Detecting Malicious Packages on PyPI: Malicious package on PyPI use phishing techniques to hide its malicious intent (lien direct) >By, Ori Abramovsky Highlights: Check Point CloudGuard Spectralops detected a malicious phishing account on PyPI, the leading Python package index. Users installing the account packages were exposed to a malicious actor, probably a PII stealer. Once detected, we alerted PyPI on these packages. Soon after the packages were removed by the PyPI team. Intro PyPI… Guideline
Checkpoint.webp 2023-03-17 11:00:13 CNAPP in a Snap - How Agentless Workload Posture Improves Security Velocity (lien direct) >By Benny Zemmour – Group Manager Cloud Security Why Modern Development Demands an Agentless Workload Protection Solution What can you do when your security tools are holding you back? Are the solutions that keep you safe also inhibiting innovation? When your developers are creating something new and amazing, you don't put anything in their way.… General Information Cloud ★★
Checkpoint.webp 2023-03-16 11:00:24 GigaOm Recognizes CloudGuard AppSec as a Leader in Innovation and Feature Play in its 2023 Radar Report for Application and API Security (lien direct) >CloudGuard AppSec, Check Point's next gen WAAP solution, is distinguished for its patented Preemptive AI that blocks sophisticated zero-day attacks and it's robust and comprehensive feature set. In today's hyper-connected world, enterprise applications are readily available and connected to the cloud, putting sensitive information and critical services at risk for potential security breaches. The need… ★★
Checkpoint.webp 2023-03-16 11:00:14 Checkmate: Check Point Research exposes security vulnerabilities on Chess.com (lien direct) >Highlights: Check Point Research (CPR) found security vulnerabilities on the chess.com platform that could allow users to manipulate the game's results. According to the findings, our researchers were able to: Extract successful chess moves to solve online puzzle challenges and win puzzle ratings accordingly. Decrease an opponent's time and win games accordingly. Check Point Research… ★★
Checkpoint.webp 2023-03-16 00:49:59 Check Point Research conducts Initial Security Analysis of ChatGPT4, Highlighting Potential Scenarios For Accelerated Cybercrime (lien direct) >Highlights: Check Point Research (CPR) releases an initial analysis of ChatGPT4, surfacing five scenarios that can allow threat actors to streamline malicious efforts and preparations faster and with more precision. In some instances, even non-technical actors can create harmful tools. The five scenarios provided span impersonations of banks, reverse shells, C++ malware and more. Despite… Malware Threat ChatGPT ★★
Checkpoint.webp 2023-03-15 11:00:34 Can your SASE solution block these top malware? (lien direct) >Malware is a go-to tactic and essential tool for attackers. According to Check Point Research’s 2023 Cyber Security Report, 32% of cyber attacks globally are based on multipurpose malware with email as the attack vector in 86% of those attacks. The most vicious malware are wipers, whose only purpose is to cause irreversible damage and… Malware Tool ★★
Checkpoint.webp 2023-03-14 17:39:15 Beware of Fake Calls! It\'s not really your bank calling. Check Point Research draws attention to a new Android Malware (lien direct) >Highlights: CPR alerts on an Android Trojan named “FakeCalls”, a voice phishing malware Malware can masquerade incoming calls as coming form known legitimate financial organizations, aiming to gain the victim's trust and extract personal and financial data “FakeCalls” malware targets the South Korean market, faking calls from over 20 leading financial organizations Background When malware… Malware Guideline ★★★
Checkpoint.webp 2023-03-13 11:00:02 Check Point Software Technologies Earns Top Spots in 19 G2 Leadership Grids (lien direct) >By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point We at Check Point are proud to share that our products have been ranked as leading solutions in 19 categories of security software on G2. From firewalls to cloud, endpoint, and mobile security solutions-we’re pleased to be so popular! Check Point customers are… Guideline ★★
Checkpoint.webp 2023-03-09 11:00:28 February 2023\'s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government (lien direct) >Researchers report that Remcos Trojan was used by threat actors to target Ukrainian government entities through phishing attacks as part of wider cyberespionage operations. Meanwhile, Formbook and Emotet returned to the top three most prevalent malware families, and Education/Research remained the most targeted industry Our latest Global Threat Index for February 2023 saw Remcos Trojan… Malware Threat ★★★
Checkpoint.webp 2023-03-09 11:00:18 Is your security team concerned with unmanaged devices? (lien direct) >Secure all your organization's devices in a few clicks. By Antoine Korulski and Adi Goldshtein Harel CISOs face major challenges in 2023 when defending against threats coming from unmanaged devices, used by third-party service providers, or employee personal devices (BYOD) to access SaaS or corporate web applications. Those attacks have many faces, including stealing sensitive… Cloud ★★★
Checkpoint.webp 2023-03-08 11:00:53 International Women\'s Day: Achieving Gender Parity in the C-Suite and Advancing Equity in the Cybersecurity Industry (lien direct) >Industry analysts often highlight how gender parity is making headway in the business world, but is this true? In the alleged glass-ceiling world of the C-Suite where the comparison between male and female C-level leaders is still highly skewed in favor of men, it is common to read that women are generally under-represented. During this… Guideline ★★
Checkpoint.webp 2023-03-07 14:00:24 Getting to Know Francisco Criado, Check Point\'s New VP, Global Partner Ecosystem Organization (lien direct) >As Vice President of the Global Partner Ecosystem Organization, Francisco Criado leads all strategy and program deployment with Check Point's partners around the world. He brings nearly two decades of experience in the industry, including leadership roles at Avnet, Tech Data and TD SYNNEX North America. What was your dream job in kindergarten and what… Guideline
Checkpoint.webp 2023-03-07 10:58:36 “Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities (lien direct) >Highlights: CPR continues tracking Sharp Panda, a long-running Chinese cyber-espionage operation, targeting Southeast Asian government entities In late 2022, a campaign with an initial infection vector similar to previous Sharp Panda operations targeted a high-profile government entity in the Asian region. CPR zoomes in on the malware used in this campaign, dubbed “the Soul modular… Malware ★★★
Checkpoint.webp 2023-03-06 11:00:06 Prevention-focused SASE Solution is Here: Check Point leads the way, per new Miercom Report (lien direct) >Which is better-detecting a threat and not knowing how long it’s been in your network, or preventing it from getting in? It’s not a trick question. Threats of all kinds have become increasingly sophisticated and aggressive. As global unrest in 2022 was accompanied by intensified cyber warfare campaigns, more destructive malware, particularly wipers, were used… Threat ★★
Checkpoint.webp 2023-03-02 11:00:41 (Déjà vu) Winning Combinations: Check Point Customers and Their Advanced Security Solutions (lien direct) >By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation initiatives. Meet this year’s Asia Pacific winners. Our customers always amaze us with their unique…
Checkpoint.webp 2023-03-01 11:00:04 How To Reduce Security Risks Posed by Cloud Identities? (lien direct) >By Andrei Dankevich – Product Marketing Manager Cloud Security The history of cloud computing goes all the way back to the1950s when the world was introduced to shared and distributed architectures with technologies like mainframe computing, for example, the IBM 701 Defense Calculator. In the subsequent years, computer scientists innovated and introduced utility computing, grid… Cloud ★★
Checkpoint.webp 2023-02-23 11:00:51 Winning Combinations: Check Point 2023 CPX Americas Customer Awards (lien direct) >By Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point The Check Point CPX 360 Customer Awards demonstrate the creative ways in which Check Point customers are securing everything from endpoints to cloud-based assets and entire digital transformation initiatives. Meet this year’s winners in the Americas. Our customers always amaze us with their… ★★
Checkpoint.webp 2023-02-21 15:41:52 The Russian-Ukrainian War, One Year Later (lien direct) >Highlights: One year after the Russian Ukrainian War, Check Point Research (CPR) highlights that September 2022 was a turning point in the cyberattacks related to the conflict. Comparing March – September 2022 vs. October 2022 – February 2023: CPR identifies a decrease of 44% in average number of weekly attacks per organization against Ukraine, from… ★★★
Checkpoint.webp 2023-02-20 16:42:15 Cloud Security Buyers Club (lien direct) >By Jon Harlow We're living through an information security revolution, where staying ahead of the bad guys is significant to your company reputation and ultimately it's bottom line. We'll continue to see dramatic growth in cyber security publicity, not only because the growing level of threat is more sophisticated than in the past, but due… Threat ★★
Checkpoint.webp 2023-02-16 11:00:11 New Course Alert: Gateway Performance Optimization Course by Author, Timothy C. Hall (lien direct) >Check Point Mind is pleased to announce the availability of a special new advanced-level training course – Gateway Performance Optimization. Developed and instructed exclusively by Timothy C. Hall, CheckMates Champion and author of the infamous book Max Power 2020: Check Point Firewall Performance Optimization, this course provides everything you need to know about optimizing your… ★★
Checkpoint.webp 2023-02-16 10:57:13 Check Point Research uncovers a malicious campaign targeting Armenian based targets (lien direct) >Highlights: Amid rising tensions between Azerbaijan and Armenia, Check Point Research identified a malicious campaign against entities in Armenia Malware used in the campaign aims to remotely control compromised machines and carry out surveillance operations CPR analysis shows clear indication of these attackers targeting corporate environments of Armenian targets Rising tension between Azerbaijan and Armenia… Malware ★★
Checkpoint.webp 2023-02-15 11:00:15 Unlocking the Potential: Check Point\'s Infinity Spark Offers Unmatched Benefits for Managed Service Providers (MSPs) (lien direct) Delivering a complete enterprise-grade security suite for their SMB customers and a user-friendly multi-tenant MSP dashboard with flexible, easy-to-understand pricing models A report published by Devolutions in October 2022 found that 46% of small and medium-sized businesses (SMBs) plan on increasing their IT security spending in the next 12 months. While it is encouraging to… ★★
Checkpoint.webp 2023-02-14 11:00:03 Check Point CloudGuard Spectral detects malicious crypto-mining packages on NPM – The leading registry for JavaScript Open-Source packages (lien direct) >Highlights: CloudGuard Spectral detected 16 malicious packages on NPM, the world's leading JavaScript package index Installing these packages enabled Cryptojacking: hijacking a machine to mine cryptocurrencies without the user's consent   Check Point Researchers disclosed these findings to NPM which immediately removed the packages Introduction NPM is the leading registry for JavaScript Open-Source packages. It… Guideline ★★
Checkpoint.webp 2023-02-13 16:36:00 Love Bites: Valentine\'s Day shoppers advised to be aware of targeted online scams (lien direct) >Highlights: Since January 2023, Check Point Research (CPR) sees a 54% increase in new Valentine's Day related domains, compared to previous months  One out of every 10 new domains containing the term “love” or “Valentine” found to be potentially risky, since the beginning of February 2023 One out of 1000 Valentine's Day related emails found… ★★
Checkpoint.webp 2023-02-13 11:00:23 January 2023\'s Most Wanted Malware: Infostealer Vidar Makes a Return while Earth Bogle njRAT Malware Campaign Strikes (lien direct) >Check Point Research reports that infostealer Vidar made its return to the top ten list in January, reaching seventh place, while major campaign dubbed Earth Bogle delivered njRAT malware to targets across the Middle East and North Africa   Our latest Global Threat Index for January 2023 saw infostealer Vidar return to the top ten… Malware Threat ★★
Checkpoint.webp 2023-02-09 16:11:27 Available Now: Check Point Quantum SD-WAN delivers the Best Security with Optimized Connectivity (lien direct) >Check Point is proud to announce Quantum SD-WAN, a new software blade available in Quantum Gateways that unifies the best network security with optimized internet and network connectivity. Download the eBook Trying to balance fast connections with effective security? Thanks to Quantum SD-WAN, you can leave that circus stunt behind. Your offices and remote sites…
Checkpoint.webp 2023-02-08 17:00:12 Announcing Check Point Software\'s Americas Partner Winners at CPX 360 New York (lien direct) >At Check Point Software, we are a 100% channel driven company. Together with our partners, we deliver industry-leading cybersecurity solutions to hundreds of thousands of organizations of all sizes, around the world. Each year at our global conference, CPX 360, Check Point comes together with our partners and customers to celebrate our wins and prepare… Guideline ★★
Checkpoint.webp 2023-02-08 11:09:54 (Déjà vu) Check Point 2023 Security Report: Cyberattacks reach an all-time high in response to geo-political conflict, and the rise of \'disruption and destruction\' malware (lien direct) >The 2023 Security Report is reflecting on a chaotic year in cybersecurity. The report looks back on a tumultuous 2022, which saw cyberattacks reach an all-time high in response to the Russo-Ukrainian war. Education and Research remains the most targeted sector, but attacks on the healthcare sector registered a 74% increase year-on-year. According to the… Malware ★★
Checkpoint.webp 2023-02-07 15:19:08 Cybercriminals Bypass ChatGPT Restrictions to Generate Malicious Content (lien direct) >There have been many discussions and research on how cybercriminals are leveraging the OpenAI platform, specifically ChatGPT, to generate malicious content such as phishing emails and malware. In Check Point Research's (CPR) previous blog, we described how ChatGPT successfully conducted a full infection flow, from creating a convincing spear-phishing email to running a reverse shell, which… ChatGPT ★★
Checkpoint.webp 2023-02-06 14:26:54 Massive Ransomware attack Targets VMware ESXi Servers (lien direct) >VMware servers around the world suffer an extensive targeted ransomware attack, largest non-windows ransomware cyberattack on record. Here's what you need to know and do What happened? French Computer Emergency Response Team and Italy's national cybersecurity authority (ACN) officially warned organizations worldwide against a ransomware attack targeting thousands of VMware ESXI servers, exploiting a known… Ransomware ★★
Checkpoint.webp 2023-02-06 11:00:03 In A Cloud Speed World, Is It Time To Leave It To The Machines? (lien direct) >By Yuval Shchory, Head Of Product Management, Cloud Security The cloud has completely revolutionized how businesses work. Where once both web presence and internal applications were essentially static, with changes only made after much deliberation and via pre-planned upgrades, the enterprise and its public face is now entirely dynamic and seemingly in a constant state… ★★
Checkpoint.webp 2023-02-03 11:00:57 Learn More About Check Point\'s Prevention-First CNAPP (lien direct) >By Geert De Ron – Cloud Security Architect, published February 3, 2023 Cloud-Native Application Protection Platforms (CNAPP) have become essential tools for organizations to secure their cloud environments. In this article we will cover why cloud security operations are looking for a platform approach to cloud security and how CloudGuard CNAPP introduces new features and… ★★
Checkpoint.webp 2023-02-02 18:58:04 Dingo Token ranking is #774, with a live market cap of $10,941,525 USD is a SCAM! (lien direct) >The Dingo Token, currently ranked #774 with a market capitalization of $10,941,525 USD, has been flagged as a potential scam by Check Point Research (CPR). The project’s owner reportedly used the “setTaxFeePercent” function to manipulate the buying and selling fees to an alarming 99%, potentially putting investors at risk of losing all their funds. These… ★★
Checkpoint.webp 2023-02-02 00:00:24 Check Point Software Join Forces with Samsung to Elevate Mobile Security (lien direct) >The move to mass remote working saw the mobile attack surface expand dramatically, resulting in 97% of organizations facing mobile threats from several attack vectors. With 60% of workers forecasted to be mobile by 2024, mobile security needs to be a priority for all organizations. Given this mobile threat landscape, we're delighted to announce that… Threat ★★
Checkpoint.webp 2023-02-01 11:00:21 The Rise of the Code Package Threat (lien direct) >Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, aiming to distribute malware The malicious code packages, Python-drgn and Bloxflip, distributed by Threat actors leveraging package repositories as a reliable and scalable malware distribution channel Due to significant rise in supply chain attacks Check Point provides recommendations for developers… Malware Threat ★★
Checkpoint.webp 2023-02-01 00:00:29 Check Point Software takes 1st Place in Independent Test of Top Network Firewalls Miercom NGFW Benchmark 2023 (lien direct) >Download the Report After all the data sheets, trade show presentations, and product websites, how do you validate that your network firewall is the most effective at blocking malware, phishing and other attacks, versus other brands? One of the best ways is to have your firewall tested alongside multiple other top enterprise firewalls using exactly… ★★★
Last update at: 2024-05-19 17:08:07
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter