By, Ori Abramovsky Highlights: Check Point CloudGuard Spectralops detected a malicious phishing account on PyPI, the leading Python package index. Users installing the account packages were exposed to a malicious actor, probably a PII stealer.…
Read MoreBy Benny Zemmour – Group Manager Cloud Security Why Modern Development Demands Agentless Workload Protection In the age of fast-paced software development cycles and complex applications, security must be automated. As such, agentless security solutions…
Read MoreCloudGuard AppSec, Check Point’s next gen WAAP solution, is distinguished for its patented Preemptive AI that blocks sophisticated zero-day attacks and it’s robust and comprehensive feature set. In today’s hyper-connected world, enterprise applications are readily…
Read MoreHighlights: Check Point Research (CPR) found security vulnerabilities on the chess.com platform that could allow users to manipulate the game’s results. According to the findings, our researchers were able to: Extract successful chess moves to…
Read MoreMarch 15th, 2023 06pm EST Highlights: Check Point Research (CPR) releases an initial analysis of ChatGPT4, surfacing five scenarios that can allow threat actors to streamline malicious efforts and preparations faster and with more precision.…
Read MoreBy Mor Ahuvia, Product Marketing Manager Malware is a go-to tactic and essential tool for attackers. According to Check Point Research’s 2023 Cyber Security Report, 32% of cyber attacks globally are based on multipurpose…
Read MoreHighlights: CPR alerts on an Android Trojan named “FakeCalls”, a voice phishing malware Malware can masquerade incoming calls as coming form known legitimate financial organizations, aiming to gain the victim’s trust and extract personal and…
Read MoreBy Kristin Owens, Head of Functional Marketing & Executive Engagement, Check Point We at Check Point are proud to share that our products have been ranked as leading solutions in 19 categories of security software…
Read MoreResearchers report that Remcos Trojan was used by threat actors to target Ukrainian government entities through phishing attacks as part of wider cyberespionage operations. Meanwhile, Formbook and Emotet returned to the top three most prevalent…
Read MoreSecure all your organization’s devices in a few clicks. By Antoine Korulski and Adi Goldshtein Harel CISOs face major challenges in 2023 when defending against threats coming from unmanaged devices, used by third-party service providers,…
Read More