What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2019-09-20 13:00:36 Check Point Cyber Security Conference – CPX 360 Event Highlights (lien direct) Get ready for the most educational cyber security conference of 2020, CPX 360. This is the one event where Check Point shares the stage with other industry experts to deliver the latest in cyber Innovation and news in security. You'll hear industry leaders sharing insights, research and strategies to help stay ahead of evolving cyber… Guideline
Checkpoint.webp 2019-06-13 13:00:03 May 2019\'s Most Wanted Malware: Patch Now to Avoid the BlueKeep Blues (lien direct) In May, the most significant event in the threat landscape was not a new type of malware:  it was a serious vulnerability in older versions of Windows operating systems that – if exploited by criminals – could lead to the type of mega-scale ransomware attacks we saw in 2017 with WannaCry and NotPetya.   The… Ransomware Vulnerability Threat Guideline NotPetya Wannacry ★★★
Checkpoint.webp 2019-06-12 14:00:02 How Well Does CloudGuard IaaS Support Azure Security? (lien direct) By Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, published June 12th, 2019   Check Point CloudGuard IaaS provides support for Microsoft Azure and hybrid cloud deployments, and thereby improves Azure security. This isn't surprising, considering that Azure is a leading public cloud vendor and is trusted by 95% of Fortune 500 companies, most of which… Guideline
Checkpoint.webp 2019-04-09 13:00:03 March 2019\'s Most Wanted Malware: Cryptomining Still Dominates Despite Coinhive Closure (lien direct) Check Point's latest Global Threat Index sees cryptominers continuing to lead the top malware list despite Coinhive ceasing operation   By Check Point’s Threat Intelligence Team, published April 9th 2019   In March 2019, Coinhive dropped from the top position of the global threat index for the first time since December 2017. Despite closing its… Malware Threat Guideline
Checkpoint.webp 2019-02-27 20:34:04 Protecting Against WinRAR Vulnerabilities (lien direct) A 19 year old, yet major, vulnerability was recently found by Check Point Research in the popular web application, WinRAR, that could potentially put over 500 million users at risk. The exploit works by simply extracting an archive from an innocent looking ACE file which could lead to a remote code execution. Following the discovery,… Vulnerability Guideline ★★★★★
Checkpoint.webp 2019-02-14 02:39:02 Docker Security Hole Revealed: Mitigate CVE-2019-5736 (lien direct) by Marina Segal – Lead Product Manager, CloudGuard Dome9, Check Point and Amir Kaushansky – Product Manager, Cloud Security, Check Point  How it was Discovered: On February 11th, a critical vulnerability in runC binary was released. According to Aleksa Sarai, a SUSE container senior software engineer and a runC maintainer, security researchers Adam Iwaniuk and Borys Popławski discovered… Vulnerability Guideline
Checkpoint.webp 2019-01-31 14:00:01 Hackers Exposed: CPX 360 Cyber Security Summit and Expo 2019 in Las Vegas (lien direct) By Peter Alexander, Chief Marketing Officer   We are all highly anticipating a phenomenal 2019 CPX 360 Cybersecurity Summit and Expo at Mandalay Bay Resort and Casino, Feb. 4-6 in Las Vegas. As one of the world's greatest gatherings of cyber security visionaries and leaders, customers, partners press and analysts, we will be unveiling ground… Guideline
Checkpoint.webp 2018-11-29 14:00:03 Check Point Partners With World Economic Forum on Global Cyber Security (lien direct) “What happens to the rule of law when rule of law cannot be enforced?” asked Troels Oerting Jorgensen, to a room full of cybersecurity leaders.   Over 140 experts – from diverse fields such as government, business, academia and law enforcement – gathered in Geneva, Switzerland for the inaugural Annual Gathering of the World Economic… Guideline
Checkpoint.webp 2018-11-26 13:55:02 Check Point CloudGuard Dome9 at AWS re:invent: See You In Vegas! (lien direct) Let's team up in securing your cloud this week at AWS re:Invent 2018 in Las Vegas. Check Point Software Technologies showcases its industry leading cloud security, compliance and governance solutions in booths 1901 and 2605.   While at AWS re:Invent, we would like an opportunity to share with you why our customers have chosen Check… Guideline
Checkpoint.webp 2018-10-08 14:55:01 Check Point Named Leader in Gartner Magic Quadrant for Enterprise Network Firewalls (lien direct) With the average data breach costing businesses $3.8 million, enterprises need to secure their network with nothing short of the best of the best.   Check Point is proud to announce, that for the sixteenth time in the company's history, Gartner's Magic Quadrant has listed Check Point as a leader in the enterprise network firewall… Data Breach Guideline
Checkpoint.webp 2018-10-02 12:42:00 AV-TEST Rates Check Point\'s SandBlast Agent as a Top Product in Corporate Endpoint Protection (lien direct) Check Point is pleased to announce its SandBlast Agent solution passed AV-TEST Institute's lab tests with excellent results and has been named a “Top Product” by the independent IT security organization. This announcement comes on the heels of Check Point being named a leader in the Forrester Wave™ Endpoint Security Suites, Q2 2018 report. The… Guideline
Checkpoint.webp 2018-09-24 15:21:02 Protecting Small Businesses from Massive Attacks: Check Point Infinity Recognized by Gartner (lien direct) Seven Straight Years of a Leader in Gartner's UTM Magic Quadrant   Small and medium sized businesses have a target on their backs – cyber criminals have hacked over half of all small and medium sized businesses' websites, as the average SMB's website, on average, faces 44 attempted attacks every day.   Meanwhile, the vast… Guideline
Checkpoint.webp 2018-08-16 12:30:00 Who You Gonna Call? Stories From the Front Line of Cyber Defense (lien direct) By Check Point's Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after… Guideline
Checkpoint.webp 2018-06-21 07:00:03 (Déjà vu) Forrester Research names Check Point Software a Leader in Endpoint Security Suites (lien direct) SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in its newly published report, “The Forrester Wave™: Endpoint Security Suites, Q2 2018”.   “Check Point offers a fully featured, traditional… Malware Guideline
Checkpoint.webp 2018-06-21 07:00:03 (Déjà vu) Check Point Software Named a Leader in Endpoint Security Suites by Independent Research Firm (lien direct) SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in its newly published report, “The Forrester Wave™: Endpoint Security Suites, Q2 2018”.   “Check Point offers a fully featured, traditional… Malware Guideline
Checkpoint.webp 2017-10-23 22:16:24 Crypto Miners Part 2 (lien direct) >As mentioned in our previous blog post, the trend of online cryptocurrency mining is gaining momentum. The potential to mine cryptocurrency on anyone's' browser with ease and anonymity attracts website owners as well as threat actors — joining the fruitful mining pool of leading cryptocurrencies.   Machines all over the world mine cryptocurrencies and get […] Guideline
Checkpoint.webp 2017-08-15 13:00:38 Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies (lien direct)     Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud.  Many of these companies are leading international names in industries such as oil & gas, manufacturing, banking and construction industries – and some have had their defenses […] Guideline
Checkpoint.webp 2017-08-15 12:30:49 ZoneAlarm Anti-Ransomware Earns “Editor\'s Choice” from PC magazine (lien direct) A recent review in PC magazine by Lead Analyst, Neil J. Rubenking approaches one of cyber security's latest growing concerns, ransomware. Various comparison tests of anti-ransomware products were conducted while specifically focusing on Check Point's consumer anti-ransomware product, ZoneAlarm. ZoneAlarm by Check Point is based on the same technology of its enterprise grade product, SandBlast […] Guideline
Checkpoint.webp 2017-08-02 13:00:30 (Déjà vu) CSO Gives SandBlast Mobile a Rave Review (lien direct) I was delighted to read David Strom's extremely favorable product review of Check Point SandBlast Mobile in CSO magazine a few weeks ago. Strom really puts SandBlast Mobile through the paces in the review, and in the process provides security and IT leaders facing the challenge of securing mobility in their organizations with a great […] Guideline
Checkpoint.webp 2017-02-08 19:45:57 Hummingbad Overtaken as Leading Mobile Malware in January\'s Global Threat Impact Index (lien direct)  Hummingbad has been overtaken as the leading mobile malware for the first time since February 2016, according to the new January Global Threat Impact Index from our Threat Intelligence Research Team. Hummingbad was replaced at the top of the 'most wanted mobile malware' by Triada, a modular backdoor for Android which grants super-user privileges to […] Guideline
Checkpoint.webp 2016-11-02 13:00:32 Beware! Malware Targeting Endpoints on the Rise Ahead (lien direct) All you need to do is listen to the news and you know that the cyber threat landscape in 2016 has gotten much worse. But what types of threats are driving companies to take action? And what actions are they taking? To answer these questions, and more, we turned to SANS Institute, the leading organization […] Guideline
Checkpoint.webp 2016-10-05 17:16:32 The Cloud: Rethinking IT Security Roles (lien direct) Whether you lead a team of IT professionals-or are the team-tasks like swapping power supplies and tinkering with the datacenter's air conditioning are quickly transitioning to people in cloud-computing centers. Cisco estimates 83 percent of data center traffic will become cloud traffic by 2019.[i] Moving to the cloud is a significant change from static hardware-based […] Guideline
Checkpoint.webp 2016-06-27 13:00:27 The Malware-as-a-Service Industry (lien direct) Several recent developments have brought the malware infrastructure-as-a-service industry into the spotlight, reminding everyone how prominent it is in the cybercrime arena. The infrastructures that create malware exploit kits are so immense that the global threat landscape can be completely altered when one of them is downed. According to Kafeine, a leading exploit kit researcher, […] Guideline
Checkpoint.webp 2016-05-06 18:24:23 (Déjà vu) In The Wild: Mobile Malware Follows in the Steps of its PC Cousins (lien direct) Mobile Security Observations from the Check Point Research Team Mobile malware is still a growing phenomenon and, in many cases, follows the lead set by predecessors in the PC world. This week the Check Point research team encountered different mobile malware that adopted techniques previously known only in the PC world. This is not a […] Guideline
Checkpoint.webp 2016-03-29 14:00:48 Unsecure Routers Pose a Serious Risk to Small Businesses (lien direct) Today, business cannot operate without an internet connection. Business leaders are more empowered than ever with the resources attainable with the internet, and by keeping security in mind, businesses can make the most of the internet while knowing their data is secure. For many small businesses their survival is dependent on the internet, making it […] Guideline
Checkpoint.webp 2016-03-28 14:00:51 Security Management Innovation in Financial Services (lien direct) The financial industry is one of the leaders in adopting new technology to service and protect its customers, and recent developments in technology have given the industry countless opportunities to do so even more. Digital systems are now the beating heart of many areas of the financial services business, opening up new communication links across […] Guideline
Checkpoint.webp 2015-12-03 14:00:57 Check Point Names Julie Parrish as Chief Marketing Officer (lien direct) Check Point today announced the appointment of Julie Parrish as the company's Chief Marketing Officer. As the newest member of our executive team, Parrish will lead the company’s global marketing organization, overseeing strategic initiatives to drive awareness and demand for the Check Point's expanding portfolio of industry-leading security solutions. Prior to joining Check Point, Parrish […] Guideline
Checkpoint.webp 2015-11-19 19:06:06 Check Point Threat Alert: Web Shells (lien direct) Web shells can be used to obtain unauthorized access and can lead to wider network compromise. Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to a significant number of cyber incidents. This alert describes the frequent use of web shells as an exploitation vector and Check Point's IPS […] Guideline
Checkpoint.webp 2015-11-19 18:30:26 CyberDay 2015 Recap: A Day of Ideas and Insights (lien direct) CyberDay 2015 Recap: A Day of Ideas and Insights When CSO and Check Point partnered up to create a security thought leadership event for c-level executives, we had high hopes. Yesterday, November 18, those hopes were exceeded as about 200 people gathered in New York City. The purpose: to help today's security leaders share the […] Guideline
Checkpoint.webp 2015-09-15 15:27:27 (Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part III – Ultimatum (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS attacks on […] Guideline
Checkpoint.webp 2015-09-10 21:25:27 Check Point IPS Protects Against Zero-Day Vulnerability in FireEye Appliances (lien direct) On September 6th, researcher Kristian Erik Hermansen publically disclosed a zero-day vulnerability in FireEye appliances. This vulnerability impacts customers running HX 2.1.x and DMZ 2.1.x versions of the FireEye HX endpoint security platform, and appears to be concentrated in a PHP script on the appliance itself. If exploited, this vulnerability could lead to unauthorized remote […] Guideline
Checkpoint.webp 2015-08-11 18:46:37 (Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part II – Supremacy (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […] Guideline
Checkpoint.webp 2015-08-04 13:30:05 Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part I (lien direct) In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […] Guideline
Checkpoint.webp 2015-07-07 14:00:18 Who Really Controls Your Online Store? (lien direct) Check Point researchers Avi Gimpel, Liad Mizrachi and Oded Vanunu recently discovered critical vulnerabilities in the osCommerce platform. These vulnerabilities can lead to a full system compromise, with an outside agent gaining control over the osCommerce administration panel and access to the data of the platform stores' members and customers. These vulnerabilities affect over 260,000 […] Guideline
Checkpoint.webp 2015-04-20 13:59:47 Analyzing the Magento Vulnerability (Updated) (lien direct) Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento web e-commerce platform that can lead to the complete compromise of any Magento-based store, including credit card information as well as other financial and personal data, affecting nearly two hundred thousand online shops.   Check Point privately disclosed the vulnerabilities together […] Guideline
Checkpoint.webp 2014-11-20 17:34:49 New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition (lien direct) If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the performance of five security products. They specifically focused on products claiming superior performance for Advanced Threat Detection to determine the […] Guideline
Checkpoint.webp 2014-07-12 22:41:57 Mobile Security Weekly – Have we seen the last of KNOX? (Update – 20th July) (lien direct) Android takes the lead in mobile security news this week. With major decisions being made regarding how Google views the future of Android security, they've received another big wakeup call - between 60-70% of Android devices are vulnerable to a substantial vulnerability. iOS users also discovered another blow to their security this week. Several months ago, our researchers at Lacoon Security discovered a vulnerability in the Gmail iOS app which enables a threat actor to perform a Man-in-the-Middle attack - and by doing so, view, and even modify, encrypted communications. Guideline ★★★★
Checkpoint.webp 2014-02-10 15:00:45 The Spy in Your Pocket, Part 1: An Overview of Mobile Remote Access Trojans (mRATs) (lien direct) We're excited to present at the upcoming RSA 2014 at the end of the month. Our talk “Practical Attacks against MDM Solutions (and What You Can Do About It)” is going to focus on various threats to mobile devices and how mobile Remote Access Trojans (mRATs) are able to bypass current detection solutions. Leading up to the conference, we'd like to provide you with this short series overviewing mRATs. Guideline ★★
Last update at: 2024-05-16 10:08:07
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter