Check Point Blog

Corporate Blog September 16, 2019

Celebrating the Best of Check Point CheckMates – 2019

Check Point CheckMates is our online community for all Check Point customers, partners, and security experts. The community platform provides a user-friendly space for members to benefit from all of the activities and insightful content…

Read More
Corporate Blog September 12, 2019

August 2019’s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices

In August, the research team saw an increase in a new variant of the Mirai IoT Botnet, Echobot, which has launched widespread attacks against a range of IoT devices. First seen in May 2019, Echobot…

Read More
Corporate Blog September 11, 2019

BlueKeep exploit is weaponized: Check Point customers remain protected

The notorious BlueKeep vulnerability has been escalated from a theoretical, critical vulnerability, to an immediate, critical threat. First reported in May 2019, Bluekeep (CVE-2019-070) was reported as a critical security vulnerability by Microsoft. The vulnerability…

Read More
Corporate Blog

We hit snooze on Ransomware in 2017. Guess what? There’s a 2019 wakeup call!

Two weeks ago a ransomware attack hit 22 Texas towns, authorities say. Computer systems in Texas were hacked, seized and held for ransom in a sophisticated, coordinated cyberattack that prompted a federal investigation, according to…

Read More
Corporate Blog September 10, 2019

Miercom Designates SandBlast Mobile Certified Secure in Mobile Threat Defense Industry Test

By Yael Macias, Threat Prevention Product Marketing We have some exciting news to share! SandBlast Mobile earned Miercom’s Certified Secure award following its Mobile Threat Defense Industry Assessment, in which eight vendors’ solutions were tested…

Read More
Corporate Blog September 5, 2019

Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks

By Yael Macias, Threat Prevention Product Marketing Research By: Artyom Skrobov, Slava Makkaveev Check Point researchers recently discovered a vulnerability to advanced phishing attacks in a wide variety of Android phones, including models by Samsung,…

Read More
Corporate Blog

Check Point, VMware and Silver Peak Transform Branch Office SD-WAN with Cloud Security Services

By Russ Schafer, Head of Product Marketing, Security Platforms Enterprise security solutions enable branch offices to connect safely and reliably to the data center, the Internet and cloud applications. In the past, branches relied on…

Read More
Corporate Blog August 26, 2019

Visit Us at VMworld to Learn How Check Point and VMware Secure your Digital Workspace

By Yael Macias, Threat Prevention Product Marketing Come meet us at VMworld this week at Booth 1527, where we’ll show you how Check Point and VMware are enabling organizations to secure the mobile workforce. Check…

Read More
Corporate Blog August 22, 2019

Where should a CISO live?

By  Edwin Doyle, Global Security Strategist, published August 22nd 2019 Charles Darwin said, “It is not the strongest of the species that survives, nor the most intelligent. It is the one most adaptable to change.”…

Read More
Cloud Security August 20, 2019

To Bot or not to Bot your PCI Compliance

By Marina Segal and Aditya Gupta – Product Management CloudGuard Dome9   Building cloud environments and systems that need to be compliant with PCI requirements is a common task for many companies. PCI compliance is…

Read More