By Noa Goldstein, Product Marketing Manager, Shlomi Gvili, Senior Product Manager and Gal Carmeli, Harmony Endpoint R&D Group Manager. Learn how Harmony Endpoint prevents log4j related attacks and accelerate detection and investigation of breaches. On…
Read MoreTo get immediate support from our incident response team on Log4j CLICK HERE 30 Days Free AppSec & Free Lifetime Protection Against Log4j Exploits GET IT NOW Initially published: Tuesday, December 14, 2021 at 02:45…
Read MoreTo get immediate support from our incident response team on Log4j CLICK HERE 30 Days Free AppSec & Free Lifetime Protection Against Log4j Exploits GET IT NOW On December 9th, an acute remote code execution…
Read MoreCyber-warfare and espionage have long been common weapons in the arsenal of governments, armies, and intelligence agencies around the world. The Islamic Republic of Iran is no exception to this trend. With new discoveries made…
Read MoreToday’s kids and kids-at-heart are arguably more addicted to computer games than ever before, and some of the most popular are sports themed. But for cyber criminals the only sport they are addicted to is…
Read MoreResearch by: Kobi Eisenkraft, Moshe Hayun, published June 19th 2019 Introduction During the first week of June 2019, Check Point researchers encountered a new, large-scale phishing campaign targeting German companies across all industries.…
Read MoreA single drop of blood contains billions of strands of DNA, carrying genetic instructions for the development, functioning, growth, and reproduction of all known organisms. DNA holds the building blocks of life. Similarly, the lines of malware code make…
Read MoreBy Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, published June 12th, 2019 Check Point CloudGuard IaaS provides support for Microsoft Azure and hybrid cloud deployments, and thereby improves Azure security. This isn’t surprising, considering…
Read MoreBy Moti Sagey, Head of Strategic Marketing, Check Point Moti Sagey is the Head of Strategic Marketing & Intelligence at Check Point Software. Moti is responsible for strategically transforming intelligence and information into a…
Read MoreOver the month of March, nearly one million people in the United States had their medical files exposed in data breaches, according to HIPAA Journal. And after a ransomware attack forced a medical center in Michigan to…
Read More