Check Point Blog

Corporate Blog May 20, 2022

5 Essential Ways to Improve SDLC Security

By Dotan Nahum Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting pressure on DevOps teams to detect and resolve vulnerabilities in their…

Read More
Corporate Blog

From Bitcoin to the Metaverse: The current evolution is a revolution

By: Oded Vanunu- Head Of Products Vulnerability Research & Roman Zaikin – Security Expert   Bitcoin Day is around the corner and a huge topic of interest in our modern era. As bitcoin becomes the…

Read More
Corporate Blog May 19, 2022

Twisted Panda: Check Point Research unveils a Chinese APT espionage campaign against Russian state-owned defense institutes

Key findings: Check Point Research (CPR) unveils a targeted campaign against at least two research institutes in Russia, which are part of the Rostec corporation, a state-owned defense conglomerate. This campaign is a continuation of…

Read More
Corporate Blog May 18, 2022

Check Point Harmony Mobile Introduces Malicious File Protection

The industry’s leading mobile security solution can now block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations By Noa Goldstein, Product Marketing Manager and Guy Lev, Harmony Mobile Product…

Read More
Corporate Blog May 13, 2022

Secure Your Migration to AWS, Part II: The Road to Success

By Mark Brindley, Head of Cloud Alliance Part I of this blogpost discussed the advantages of migrating to the AWS cloud and five of the biggest cloud migration security challenges. Part II addresses how Check…

Read More
Corporate Blog May 12, 2022

Ransomware cyber-attacks in Costa Rica and Peru drives national response

Highlights Effectively, one out of every 60 organizations globally have been impacted by attempted ransomware attacks every week, so far in in the first four months of 2022 A 14% increase of attempted ransomware attacks…

Read More
Corporate Blog May 11, 2022

How the evolution of ransomware has changed the threat landscape

From WannaCry to Conti: A 5-Year Perspective   Five years ago, on May 12, 2017, the world fell victim to a major ransomware attack known as ‘WannaCry’. The attack had an unprecedented scale, and spread…

Read More
Corporate Blog

April 2022’s Most Wanted Malware: A Shake Up in the Index but Emotet is Still on Top

Check Point Research reports that April has seen a lot of activity from Formbook to Lokibot. This month also saw Spring4Shell make headlines, but it is not yet one of the most exploited vulnerabilities Our…

Read More
Corporate Blog May 10, 2022

Info-stealer Campaign targets German Car Dealerships and Manufacturers

Introduction: It started with a seemingly benign email, dealing with the purchase of a vehicle, and ended in a reveal of a months’ long campaign targeting German organizations. Most of the targets are related to…

Read More
Corporate Blog May 8, 2022

Considering Replacing Your Endpoint Security Solution? 5 Questions Worth Asking

By Noa Goldstein, Product Marketing Manager and Bar Yassure, Product Manager. Is it time for a new endpoint security strategy? The recent years have proved endpoint security to be more important than ever, with the…

Read More