Check Point Blog

Corporate Blog May 6, 2021

Android users’ privacy at risk as Check Point Research identifies vulnerability on Qualcomm’s mobile station modems

Check Point Research (CPR) found a security vulnerability in Qualcomm’s mobile station modem (MSM), the chip responsible for cellular communication in nearly 40% of the world’s phones. If exploited, the vulnerability would have allowed an…

Read More
Cloud Security May 5, 2021

Check Your Privilege – the Risks of Privilege Escalation In the Cloud

Facebook founder and CEO Mark Zuckerberg’s famous motto, ‘move fast and break things’ is believed to be one of the drivers behind the company’s innovations and growth.  However, moving faster than you’d planned isn’t always…

Read More
Cloud Security May 4, 2021

Enhance Application Security with Nutanix Flow and Check Point CloudGuard

By Daniel Mirkin, CloudGuard Project Manager, and Abhishek Tiwari, Senior Director, Product Management, Nutanix Flow, published May 4, 2021 Nutanix provides a “web-scale, hyperconverged infrastructure solution purpose-built for virtualization and both containerized and private cloud…

Read More
Corporate Blog May 3, 2021

Application Control in the World of Cloud and Shadow IT

By, Mor Naim Reinshtein, Oren Koren,  Avraham Bechor and Adi Ikan Cloud solutions are proliferating rapidly. Sometimes it seems like the pace is too fast, and is coming at the expense of security considerations. Sensitive…

Read More
Corporate Blog April 30, 2021

Check Point Software is a finalist for two Microsoft Security 20/20 awards

By Russell Tal, Alliance Marketing Manager Last year, the first annual Microsoft Security 20/20 awards were given only three weeks before the whole world shut down for COVID-19. In many places around the world, the…

Read More
Corporate Blog April 28, 2021

Double Trouble – the Threat of Double Extortion Ransomware and How Your Organization Can Protect Itself

By the time you have finished reading this sentence, an organization somewhere in the world will have fallen victim to a ransomware attack and had at least some of its corporate data encrypted.  On average,…

Read More
Corporate Blog April 26, 2021

How to Secure Engineer Access to Cloud Workloads with Zero Trust

DevOps Access Challenges in the Era of Cloud and Remote Now that remote work and developer infrastructure-in-the-cloud have become the new normal, securing engineer access to cloud workloads is more challenging than ever. With DevOps…

Read More
Corporate Blog April 23, 2021

Moving Targets – the Growing Threat to Enterprise Mobiles

Wherever legitimate business goes, criminals invariably follow to try and exploit those new opportunities.  And that was certainly true in 2020.  The COVID-enforced shift to remote working meant huge numbers of corporate employees were suddenly…

Read More
Corporate Blog April 22, 2021

Turning Telegram toxic: ‘ToxicEye’ RAT is the latest to use Telegram for command & control

Remote access trojan exploits Telegram communications to steal data from victims and update itself to perform additional malicious activities Research by: Omer Hofman Telegram, the cloud-based IM platform has enjoyed a surge in popularity this…

Read More
Corporate Blog April 21, 2021

Verizon Mobile Security Index 2021 with Threat Insights from Check Point Software

By Dana Katz, Head of Product Marketing, Threat Prevention Verizon recently released its fourth annual Mobile Security Index (MSI) to provide IT leaders with an essential perspective on the fast-evolving mobile threat landscape. We are…

Read More