Check Point Blog

Corporate Blog April 15, 2021

Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q1 2021

Check Point Research issues Q1 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people into giving up personal data Our latest Brand Phishing Report for Q1 2021 highlights the…

Read More
Cloud Security April 14, 2021

AWS Marketplace offerings explained: CloudGuard adds AWS GWLB

By Jonathan Maresky, CloudGuard Product Manager, published April 14, 2021 Too much choice is often confusing. Think about all the different types of cereal, perfume, or even political parties in some countries. However, often the…

Read More
Corporate Blog April 13, 2021

March 2021’s Most Wanted Malware: IcedID Banking Trojan Enters Top 10 Following Covid-Related Campaign

Check Point Research reports that IcedID has entered the global malware index for the first time, taking second place, after exploiting the Covid-19 pandemic to lure new victims Check Point Research’s (CPR) latest Global Threat…

Read More
Corporate Blog

Cloudified Data Centers are the New Normal

By Michael A. Greenberg, Product Marketing Manager, Security Platforms Ready to begin your data center transformation? Join the Webinar It is no secret, our networks and data centers have changed as we know it, moving…

Read More
Corporate Blog April 12, 2021

Check Point’s Mobile Security Report 2021: Almost Every Organization Experienced a Mobile-related Attack in 2020

By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In 2020, 97% of organizations faced mobile threats that used various attack vectors.  46% of organizations had at least one employee download a malicious mobile application. These…

Read More
Cloud Security April 9, 2021

“The WAF Is Dead” (and we know who did it)

TJ Gonen, Head of Cloud Security Products, Check Point The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of security kit. Any organization with a web application (which…

Read More
Corporate Blog April 8, 2021

Deliver Security and Trust to IoT, with this IoT Security Guide by IDC

Highlights As organizations seek to deliver security and trust to the IoT, they must focus on the following architectural components: Connectivity, including service enablement Hardware, including IoT module/sensors, security, servers, storage, and other hardware Software,…

Read More
Corporate Blog April 7, 2021

Autoreply attack! New Android malware found in Google Play Store spreads via malicious auto-replies to WhatsApp messages

Research by: Aviran Hazum, Bodgan Melnykov & Israel Wenik   Highlights Disguised as a Netflix content enabler app named “FlixOnline,” threat actors distributed newly-discovered Android malware Malware distributed via malicious auto-replies to incoming WhatsApp messages, using…

Read More
Corporate Blog April 5, 2021

Supply chain attacks: what we know about the SolarWinds ‘Sunburst’ exploit, and why it still matters

The word ‘unprecedented’ has been used a lot over the past year, and with good reason given the huge impact of COVID-19 on societies and businesses around the world.  Alongside the global pandemic, there was…

Read More
Cloud Security March 31, 2021

Check Point Software and HashiCorp partner to help organizations automate firewall operations while maintaining security posture and compliance.

By, John Guo, Cloud Alliance Architect, Check Point Software Technologies Firewalls can be the main bottleneck when it comes to publishing new applications because they cannot keep up with the dynamic nature of modern applications…

Read More