By Dotan Nahum Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting pressure on DevOps teams to detect and resolve vulnerabilities in their…
Read MoreBy: Oded Vanunu- Head Of Products Vulnerability Research & Roman Zaikin – Security Expert Bitcoin Day is around the corner and a huge topic of interest in our modern era. As bitcoin becomes the…
Read MoreKey findings: Check Point Research (CPR) unveils a targeted campaign against at least two research institutes in Russia, which are part of the Rostec corporation, a state-owned defense conglomerate. This campaign is a continuation of…
Read MoreThe industry’s leading mobile security solution can now block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations By Noa Goldstein, Product Marketing Manager and Guy Lev, Harmony Mobile Product…
Read MoreBy Mark Brindley, Head of Cloud Alliance Part I of this blogpost discussed the advantages of migrating to the AWS cloud and five of the biggest cloud migration security challenges. Part II addresses how Check…
Read MoreHighlights Effectively, one out of every 60 organizations globally have been impacted by attempted ransomware attacks every week, so far in in the first four months of 2022 A 14% increase of attempted ransomware attacks…
Read MoreFrom WannaCry to Conti: A 5-Year Perspective Five years ago, on May 12, 2017, the world fell victim to a major ransomware attack known as ‘WannaCry’. The attack had an unprecedented scale, and spread…
Read MoreCheck Point Research reports that April has seen a lot of activity from Formbook to Lokibot. This month also saw Spring4Shell make headlines, but it is not yet one of the most exploited vulnerabilities Our…
Read MoreIntroduction: It started with a seemingly benign email, dealing with the purchase of a vehicle, and ended in a reveal of a months’ long campaign targeting German organizations. Most of the targets are related to…
Read MoreBy Noa Goldstein, Product Marketing Manager and Bar Yassure, Product Manager. Is it time for a new endpoint security strategy? The recent years have proved endpoint security to be more important than ever, with the…
Read More