Crypto March 17, 2022 Crypto fundraising for Ukraine found on the Darknet, used by cyber criminals for fraud According to the founder of Kiev-based crypto exchange Kina, over $26 million in crypto has ...
Security March 16, 2022 Cloud Services Under Attack: Closing the Virtual Open Doors to Cyber Crime With the new hybrid-working model we see organizations increasingly moving more of their workload settings ...
Security March 15, 2022 Stop Neglecting Your Cloud Security Features Check Point Research Found Thousands of Open Cloud Databases Exposing Data in the Wild Highlights ...
Security March 14, 2022 Cyber Attacks on Government Organizations beyond Ukraine Surge by 21% Check Point Research (CPR) provides an update on cyber attacks observed throughout the Russia-Ukraine target. ...
Securing the Cloud March 14, 2022 Cloud vs. “Traditional” IT Compliance Author: Kristin Manogue, Global Programs When technology is advancing day by day, companies tend to ...
Security March 11, 2022 Cybersecurity for banks – Securing growing data centers and high-frequency trading platforms By Alon Bar, Product Marketing Manager Banks need network security that performs at the speed ...
Security March 10, 2022 Check Point Research Reveals Leaks of Conti Ransomware Group Conti’s Inside Operations Revealed: Employees think they are Working for a Legal High-Tech Company After ...
Security March 9, 2022 February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index Check Point Research (CPR) reveals that Emotet is again the most prevalent malware, while Trickbot ...
Security March 8, 2022 Empowering Women in Cybersecurity with Check Point’s Majority-Female Senior Leadership Team Check Point Software has a high-performance mentoring program to develop women’s careers and another focused ...
Securing the Cloud March 8, 2022 8 Top Git Security Issues & What To Do About Them By Eyal Katz Git is the most popular software version control (SVC) standard used by developers ...