What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2019-12-18 13:00:12 CPX 360 Cyber Security Conference: Top Keynotes Planned (lien direct) Are you ready to tackle your cyber security strategy for 2020 and beyond? If so, we'd like to invite you to CPX 360, the industry's premier cyber security summit and expo-with events in Bangkok, New Orleans and Vienna. This conference is designed to help you solve your toughest cyber security challenges. We're busy putting the…
Checkpoint.webp 2019-12-16 16:53:00 Re:Invent re:Cap: A summary of the biggest cloud event of the year (lien direct) By Jonathan Maresky, Product Marketing Manager, CloudGuard IaaS, published December 16, 2019 It seems like only yesterday that I wrote blogs about five best practices for AWS re:Invent 2019 and 6 DevSecOps sessions you won't want to miss. Now AWS re:Invent 2019 is over, and it was a huge success. It ran mostly like clockwork,…
Checkpoint.webp 2019-12-13 13:00:23 The Urgent Need for Network Security (lien direct) Published December 13th, 2019 Have you been suffering from frequent and costly data breaches recently? You're not alone. The global cyber landscape has been plagued with ransomware and other attacks. In fact, as reported by the 2019 World Economic Forum, cyber attacks are one of the top 5 threats to global economic development. It's not… Ransomware
Checkpoint.webp 2019-12-12 13:00:19 Breaking the AutoIt packers – Check Point packs a punch (lien direct) Published December 12th, 2019 In our day to day work, we're constantly analyzing new executable files which have been seen in the wild in order to identify new threats for our customers. Why executable files out of all the file types? An attack can arrive through many different ways – a phishing email with a…
Checkpoint.webp 2019-12-11 13:00:01 November 2019\'s Most Wanted Malware: Researchers Warn of Fast-growing Mobile Threat While Emotet\'s Impact Declines (lien direct) Check Point's researchers report that the XHelper mobile trojan is spreading so fast, it has entered the overall top 10 malware list at #8 as well as being the biggest threat impacting mobiles Our latest Global Threat Index for November 2019 marks the first time in over three years that a mobile trojan has entered… Malware Threat
Checkpoint.webp 2019-12-10 15:30:39 Instant Observability into Cloud Threats with CloudGuard IaaS and Google Cloud Packet Mirroring (lien direct) By Jonathan Maresky, Product Marketing Manager, CloudGuard IaaS, published Dec 10, 2019 Check Point secures over 100,000 organizations of all sizes from threats to their network, IoT, cloud and mobile devices. In the field of cloud security, Check Point is a leader and a trusted security advisor to customers in their migration and journey to… Guideline
Checkpoint.webp 2019-12-10 13:00:12 Using the MITRE ATT&CK to investigate the RobbinHood Ransomware (lien direct) By Yaelle Harel, Threat Prevention Technical Product Manager, published December 10th, 2019 The city of Baltimore was held hostage by RobbinHood ransomware in May 2019. According to the BBC, the ransomware locked 10,000 city government computers, blocked government email accounts, and disabled online payments to city departments for weeks. The malware demands payment in exchange… Ransomware Malware Threat
Checkpoint.webp 2019-12-09 18:55:55 Protect yourself from “Hacker in the box” Devices with the IoT Security Risk Assessment (lien direct) By Dana Katz, Product Marketing Manager, published December 9th, 2019 According to IBM's research,[1] there are more than 60 variants of the notorious IoT botnet Mirai that are increasingly targeting IP enterprise IoT devices. Read more to learn how you can reduce your risk exposure in advance before you even purchase or connect IoT devices…
Checkpoint.webp 2019-12-06 13:00:09 Protect Your Network Edge with VMware SD-WAN and Check Point Security (lien direct) By Russ Schafer, Head of Product Marketing, Security Platforms, published December 6th, 2019 As enterprise branch offices expand their use of cloud applications, they are adopting software defined wide area networking (SD-WAN) to improve application performance by intelligently routing traffic directly to the Internet without passing it through the data center. Connecting branch offices directly… Prediction APT 39
Checkpoint.webp 2019-12-04 18:00:16 Check Point CloudGuard Log.ic and Amazon Detective – Better Together (lien direct) By Gui Alvarenga, Product Marketing Manager, published Dec 4, 2019 It's an exciting start of the week so far at AWS reinvent, especially with the announcement of Amazon's new incident investigation and threat hunting tool, Amazon Detective. But what's more exciting for me is Checkpoint's better-together story, with integration of CloudGuard Log.ic and Amazon Detective.… Threat
Checkpoint.webp 2019-12-04 15:23:27 How is your Kubernetes Security Posture? (lien direct) By Rajeshwari (Raji) Rao Subbu, Product Management CloudGuard Dome9, published December 4th, 2019 Interesting Fact: 8: The numbers of characters between the “K” and the “S” in Kubernetes, leading to the developer shorthand, k8s. Kubernetes (k8s) is an open-source container-orchestration system that facilitate scaling of complex projects, simplify the release of new versions, making them… Guideline Uber
Checkpoint.webp 2019-12-03 19:48:57 CloudGuard IaaS Integrates with Amazon VPC Ingress Routing (lien direct) By Jonathan Maresky, Product Marketing Manager, CloudGuard IaaS, published Dec 3, 2019 One of the most impressive things about Amazon Web Services (AWS) is the customer-obsessed gene it inherited from its parent company. I learned this in person a few times in my earlier collaborations with AWS. On one occasion, I asked a general manager…
Checkpoint.webp 2019-11-27 13:00:30 5 Best Practices for AWS re:Invent 2019 (lien direct) By Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, published November 27, 2019 AWS re:Invent 2019, which takes place in Las Vegas next week from Dec 2-6, is undoubtedly the biggest annual cloud event. This is the 8th year of re:Invent and the number of attendees, learning sessions, number of Vegas locations, new product announcements and…
Checkpoint.webp 2019-11-26 13:00:05 Check Point\'s Partnership With World Economic Forum Aims to Improve Cyber Security Globally (lien direct) Cyber Security is affecting everyone. From banks, to schools to consumer products. This new reality requires globally-scaled defense strategies, with diverse and creative voices at the table – which is why we are proud to announce that Check Point Software Technologies will be partnering with the World Economic Forum to enhance and unite international cyber…
Checkpoint.webp 2019-11-26 10:00:05 November shopping – do it the smart way! (lien direct) Check Point's Threat Intelligence team highlights the spike in e-commerce threats during the shopping season, and shows how to stay safe Key findings: The amount of e-commerce related phishing websites accessed during the online shopping season has more than doubled since November 2018. Links to phishing websites are distributed via email, in the hope of… Threat
Checkpoint.webp 2019-11-25 13:00:30 Artificial Intelligence: Detecting “Agent Smith” (Part 2) (lien direct) By Yaelle Harel and Adeline Chan, Threat Prevention Marketing Managers, published November 25th, 2019 “Agent Smith” is a malware campaign discovered by Check Point's mobile threat researchers. The campaign infected approximately 30 million devices for financial gain. Disguised as a Google-related app, the core part of the malware exploits various known Android vulnerabilities and automatically… Malware Threat
Checkpoint.webp 2019-11-22 13:00:38 How Artificial Intelligence Enhances Cybersecurity (Part 1) (lien direct) By Yaelle Harel and Adeline Chan, Threat Prevention Marketing Managers, published November 22, 2019 Cyber attacks continue to evolve at an ever-increasing pace. Threats have become more sophisticated and dangerous compared to just a few years ago. The velocity of malware evolution, an increasing number of end-user devices, networks and technologies that need protection, and… Malware Threat
Checkpoint.webp 2019-11-21 13:00:47 Key takeaways from Gartner\'s 2019 Market Guide for Mobile Threat Defense (lien direct) Yael Macias, Threat Prevention Product Marketing Manager Two things are clear to us from Gartner's recent publication of its 2019 Market Guide for Mobile Threat Defense (MTD): mobile threats to the enterprise are on the rise, and that there is a growing number of use cases that MTD solutions address that UEM (MDM) solutions cannot.… Threat
Checkpoint.webp 2019-11-20 13:00:59 6 DevSecOps Sessions You Won\'t Want to Miss at AWS Re:Invent (lien direct) By Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, published November 20, 2019 If you're interested in expanding your knowledge about security at scale-and partying a little, or a lot-you'd better start packing your bags, 'cause we're going to Vegas! This year's AWS re:Invent, likely to draw in over 50,000 attendees, will be held December 2-6,…
Checkpoint.webp 2019-11-18 13:00:29 Protecting a nation\'s health through robust cyber security (lien direct) Data can save lives. This is not the opinion of a company in the data business, but the view of NHS England. Data from patient health and adult social care records helps improve individual care, speed up diagnosis, plan local services and research new treatments. NHS England is responsible for overseeing the budget, planning, delivery…
Checkpoint.webp 2019-11-12 13:00:16 Blueprint For Securing Industrial Control Systems (lien direct) In order to secure Critical Infrastructure environments, it is vital to keep a holistic view and look at every part of the network, both the IT and OT parts and investigate the systems and processes in each zone, analyze the attack vectors and risk and provide recommended security controls. In order to do so, we…
Checkpoint.webp 2019-11-12 10:00:43 October 2019\'s Most Wanted Malware: the Decline of Cryptominers Continues, as Emotet Botnet Expands Rapidly (lien direct) In October, the research team has reported that for the first time in almost two years, cryptomining malware no longer tops the 'most wanted' list. Cryptominers' usage has been declining steadily since peaking in early 2018.  In January and February of 2018, over 50% of organizations globally were impacted by cryptominers, falling to 30% of… Malware
Checkpoint.webp 2019-11-11 18:37:29 First BlueKeep Attacks Begin: Checkpoint Customers Remain Protected (lien direct) By Adeline Chan, Threat Prevention Product Marketing Manager, published November 11, 2019 After months of warning, the first BlueKeep attacks finally happened. BlueKeep, a critical vulnerability found in older versions of Microsoft Windows, was discovered in the wild as part of a new hacking campaign. Security researchers detected the campaign via the use of honeypots, a… Vulnerability Threat
Checkpoint.webp 2019-11-07 17:20:32 (Déjà vu) How Malware Detected at India\'s Nuclear Power Plant Could Have Been Prevented (lien direct) By Adeline Chan, Threat Prevention Product Marketing Manager The Nuclear Power Corporation of India Limited (NPCIL) recently confirmed that there was a cyberattack on the Kudankulam Nuclear Power Plant (KKNPP) in Tamil Nadu, India, in September. The nuclear power plant's administrative network was breached in the attack, however the malware did not reach its critical internal network used… Malware Threat
Checkpoint.webp 2019-11-06 15:30:32 How Malware Detected at India\'s Nuclear Power Plant Could Have Been Prevented? (lien direct) By Adeline Chan, Threat Prevention Product Marketing Manager The Nuclear Power Corporation of India Limited (NPCIL) recently confirmed that there was a cyberattack on the Kudankulam Nuclear Power Plant (KKNPP) in Tamil Nadu, India, in September. The nuclear power plant's administrative network was breached in the attack, however the malware did not reach its critical internal network used… Malware Threat
Checkpoint.webp 2019-11-05 19:13:49 Check Point Protects Branch Office Microsoft Azure Internet Connections and SaaS Applications from Cyber Attacks (lien direct) By Russ Schafer, Head of Product Marketing, Security Platforms, published November 5, 2019 Enterprises are moving their applications, workloads and services out of the data center into the cloud. As enterprises become more distributed, organizations need flexible solutions that deliver secure and predictable application performance across a global footprint. Companies need to securely connect their… Prediction APT 39
Checkpoint.webp 2019-11-04 13:00:49 Higher Scalability, Enhanced Productivity (lien direct) By Michael A. Greenberg, Product Marketing Manager, Security Platforms SECURITY AS DYNAMIC AND SCALABLE AS THE CLOUD There are many reasons why an organization might adopt Hyperscale computing. Hyperscale may offer the best or only way to realize a specific business goal like providing cloud computing services. Generally, though, Hyperscale solutions deliver the most cost-effective…
Checkpoint.webp 2019-10-31 10:00:24 New research – how European companies are tackling GDPR (lien direct) By Rafi Kretchmer, Head of Product Marketing I don't blame you for looking upon GDPR with a heavy dose of scepticism initially. You weren't the only one. When it was revealed, the IT community collectively breathed out a forlorn sigh. Because they knew what it probably meant – upheaval, confusion, burden and frustration (directed at…
Checkpoint.webp 2019-10-24 13:43:16 2020 Vision: Check Point\'s cyber-security predictions for the coming year (lien direct) Published October 24th, 2019 Hindsight is 20/20 vision, as the old saying goes:  it's always easy to know what the right course of action was after something has happened, but much harder to predict the future.  However, by looking at security developments over the past couple of years, it's possible to forecast what's likely to…
Checkpoint.webp 2019-10-22 13:15:55 Welcome to the Future of Cybersecurity with Check Point at Microsoft Ignite 2019 (lien direct) By Jonathan Maresky, Product Marketing Manager, published October 22, 2019 Microsoft Ignite 2019 kicks off in less than two weeks at the Orange County Convention Center in Orlando from November 4-8. Ignite is Microsoft's biggest annual event and an exciting opportunity to: Meet and interact with Microsoft subject matter experts and executives Become more familiar…
Checkpoint.webp 2019-10-21 13:00:57 Avianca Unifies Cyber Protection with In-Cloud Security from Check Point (lien direct) By Moti Sagey, Head of Strategic Marketing, published October 21st 2019 Avianca has embarked on a digital transformation of its operations. I met with Ms. Zully Romero, Avianca’s Security Architect, to hear more about the company’s strategy of defending against sophisticated threats as it moves many of its workloads from the premises to the cloud.…
Checkpoint.webp 2019-10-18 13:00:01 SMB Freedom: Releasing the constraints of security complexity (lien direct) By Michael A. Greenberg, Product Marketing Manager, Security Platforms, published October 18th 2019 Being a small to midsize business in today's world can be intimidating. With digital transformation affecting every business, there is just no getting away from the constant threat of cyber attacks. The real question hackers are asking themselves when it comes to… Threat
Checkpoint.webp 2019-10-17 13:00:41 How to Adopt a Threat Prevention Approach to Cybersecurity (lien direct) By Adeline Chan, Threat Prevention Product Marketing, published October 17th 2019 Hardly a week goes by without news of a breach or a cyber incident being reported. The cost and frequency of cyberattacks have increased compared to previous years, and where hackers formerly focused mainly on larger companies, small- and medium-sized firms are now equally… Threat
Checkpoint.webp 2019-10-10 13:00:23 September 2019\'s Most Wanted Malware: Emotet Botnet Starts Spreading Spam Campaigns Again After Three-Month Silence (lien direct) In September, the Emotet Botnet resumed activity again after a three-month break. We first reported the notorious botnet taking a break in June 2019, and that the offensive infrastructure had become active again in August.  Some of the Emotet spam campaigns featured emails which contained a link to download a malicious Word file, and some… Spam
Checkpoint.webp 2019-10-10 12:59:04 Threat Extraction – A Preventive Method for Document-Based Malware (lien direct) By Shiran Yodev and Einat Ferber Threat Extraction proactively protects against known and unknown threats contained in documents by removing exploitable content. This method is also known as file sanitization or CDR (content disarm and reconstruction). The solution is unique because it doesn't rely on detection like most security solutions. Instead, it facilitates true zero-day… Malware Threat
Checkpoint.webp 2019-10-07 13:00:28 Zero Trust Networks: Best Practices To “Divide and Rule” Your Network (lien direct) By Dana Katz, Product Marketing Manager Zero Trust security is no longer just a concept. It has become an essential security strategy that helps organizations protect their valuable data in a “perimeter-everywhere” world. Implementing Zero Trust Networks, the key principle of the Zero Trust security model, is crucial in preventing malicious lateral movement within the…
Checkpoint.webp 2019-10-02 13:00:01 SandBlast Mobile now blocks malicious app downloads and prevents credential theft (lien direct) By Ran Schwartz, Product Manager, Threat Prevention, and Yael Macias, Threat Prevention Product Marketing Manager Mobile Security has never looked better. SandBlast Mobile has just added two new capabilities to its market-leading mobile threat defense solution: Download Prevention, which blocks malicious apps and profiles from being downloaded, and Zero-Phishing which prevent credential theft. We've been… Threat Guideline
Checkpoint.webp 2019-10-01 15:00:44 Check Point and VMware Partner to Secure Branch Office SD-WAN Connections to the Cloud (lien direct) By Russ Schafer, Head of Product Marketing, Security Platforms As more applications move from the datacenter to the cloud, enterprise users rely on these applications to do their daily jobs.  These SaaS applications range from productivity software like Office 365 to virtual meeting and collaboration tools like Zoom and Slack.  Applications that include voice and… Prediction APT 39
Checkpoint.webp 2019-09-30 13:00:45 Desert Research Institute Standardizes Network Security and Cyber Security Management Across a Dynamic Threat Ecosystem (lien direct) By Moti Sagey, Head of Strategic Marketing, Check Point This research institute has grown in leaps and bounds. With government contracts and strict client security requirements to protect, learn how it uses Check Point to secure a global attack surface. READ MORE > The Desert Research Institute (DRI) leads global efforts to investigate environmental changes… Threat Guideline
Checkpoint.webp 2019-09-25 13:00:44 Why not prevention? (lien direct) By, Edwin Doyle, Global Security Strategist. Let's reminisce about the good old days. Remember when simple computer viruses sparked laughter, not outrage? A college campus computer virus would enter your system, coopt your mouse cursor, and send a set of googly eyes bouncing around the screen. I remember years ago, when my hacker friends remotely…
Checkpoint.webp 2019-09-24 13:00:57 Security Automation and Orchestration with Check Point and Ansible (lien direct) Targeted advanced persistent threats place high demands on security staff who have to remediate the effects of those threats. While researching this piece I watched Massimo Ferrari's recorded presentation on the Red Hat EMEA YouTube channel. It was an eye opener. Imagine the number of events that are missed when the average security team typically…
Checkpoint.webp 2019-09-23 09:00:50 Forrester names Check Point a Leader in Endpoint Security Suites (lien direct) We are pleased to announce that Forrester Research recognized Check Point's SandBlast Agent as an endpoint security leader in its newly published report Today's modern IT infrastructure enables us to work freely outside our offices and network perimeter. We routinely use our endpoint devices to access the corporate email, corporate SaaS applications, and to download… Guideline
Checkpoint.webp 2019-09-20 16:58:16 Celebrating 20 years of Recognition by Gartner as Leader in Network Firewall MQ (lien direct) By Michael A. Greenberg, Product Marketing Manager, Security Platforms Check Point is proud to announce, that for the 20th time in the company's history, Gartner's Magic Quadrant has positioned Check Point as a Leader in the network firewall category. Year after year, we put our technologies and solutions to the test showing our dedication to… Guideline
Checkpoint.webp 2019-09-20 13:00:36 Check Point Cyber Security Conference – CPX 360 Event Highlights (lien direct) Get ready for the most educational cyber security conference of 2020, CPX 360. This is the one event where Check Point shares the stage with other industry experts to deliver the latest in cyber Innovation and news in security. You'll hear industry leaders sharing insights, research and strategies to help stay ahead of evolving cyber… Guideline
Checkpoint.webp 2019-09-16 15:15:42 Celebrating the Best of Check Point CheckMates – 2019 (lien direct) Check Point CheckMates is our online community for all Check Point customers, partners, and security experts. The community platform provides a user-friendly space for members to benefit from all of the activities and insightful content that CheckMates has to offer. In a short time frame, 100,000 security professionals from over 150 countries gathered on CheckMates…
Checkpoint.webp 2019-09-12 13:00:01 August 2019\'s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices (lien direct) In August, the research team saw an increase in a new variant of the Mirai IoT Botnet, Echobot, which has launched widespread attacks against a range of IoT devices. First seen in May 2019, Echobot has exploited over 50 different vulnerabilities, causing a sharp rise in the 'Command Injection Over HTTP' vulnerability which has impacted… Vulnerability
Checkpoint.webp 2019-09-11 13:00:05 BlueKeep exploit is weaponized: Check Point customers remain protected (lien direct) The notorious BlueKeep vulnerability has been escalated from a theoretical, critical vulnerability, to an immediate, critical threat. First reported in May 2019, Bluekeep (CVE-2019-070) was reported as a critical security vulnerability by Microsoft. The vulnerability exists in the Remote Desktop Protocol (RDP) and allows for Remote Code Execution (RCE). Check Point, recognizing the criticality of… Vulnerability
Checkpoint.webp 2019-09-11 13:00:02 We hit snooze on Ransomware in 2017. Guess what? There\'s a 2019 wakeup call! (lien direct) Two weeks ago a ransomware attack hit 22 Texas towns, authorities say. Computer systems in Texas were hacked, seized and held for ransom in a sophisticated, coordinated cyberattack that prompted a federal investigation, according to state officials. Detailed information about the attack has yet to be released, but we do know that the attackers used… Ransomware
Checkpoint.webp 2019-09-10 15:30:01 Miercom Designates SandBlast Mobile Certified Secure in Mobile Threat Defense Industry Test (lien direct) By Yael Macias, Threat Prevention Product Marketing We have some exciting news to share! SandBlast Mobile earned Miercom's Certified Secure award following its Mobile Threat Defense Industry Assessment, in which eight vendors' solutions were tested and evaluated. SandBlast Mobile scored 99% security efficacy (vs. 63.8% average industry score) in this competitive test. “No matter how… Threat
Checkpoint.webp 2019-09-05 16:07:02 Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks (lien direct) By Yael Macias, Threat Prevention Product Marketing Research By: Artyom Skrobov, Slava Makkaveev Check Point researchers recently discovered a vulnerability to advanced phishing attacks in a wide variety of Android phones, including models by Samsung, Huawei, LG and Sony, which account for more than 50 percent of the Android market). In these attacks, a remote… Vulnerability Threat
Last update at: 2024-05-09 10:08:08
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter