Check Point Blog

Corporate Blog August 12, 2022

Vulnerabilities on Xiaomi’s mobile payment mechanism which could allow forged transactions : A Check Point Research analysis

 Highlights: Check Point Research (CPR) analyzed the payment system built into Xiaomi smartphones powered by MediaTek chips CPR found vulnerabilities that could allow forging of payment and disabling the payment system directly, from an unprivileged…

Read More
Corporate Blog August 10, 2022

July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’

Our latest Global Threat Index for July 2022 reveals that Emotet continues its reign as the most widely used malware, despite a 50% reduction in its global impact compared to the previous month. After a…

Read More
Corporate Blog

From zero to hero in blockchain security – A CP workshop at DEF CON 30

DEF CON is one of the world’s largest and most notable cyber conventions, held annually in Las Vegas, Nevada. DEF CON first took place in June 1993 and today, attendees include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with…

Read More
Corporate Blog August 9, 2022

Check Point Research: Education sector experiencing more than double monthly attacks, compared to other industries

Highlights: Education/Research sector worldwide experienced the highest volumes of attacks every month in 2022 and in 2021. In July 2022, the Education/Research sector shows more than double the number of weekly cyberattacks compared to the…

Read More
Corporate Blog August 8, 2022

Live Public Preview: Check Point supports Eventarc for Google Cloud

By: Mark Brindley, Head of Cloud Security Alliance Last year, Google Cloud launched Eventarc, a unified platform to build event-driven applications in the cloud. This week, Google announced the public preview of third-party sources in…

Read More
Corporate Blog August 5, 2022

What can we learn from Apple’s new Lockdown mode about the mobile security landscape?

By Noa Goldstein, Product Marketing Manager and Guy Lev, Harmony Mobile Product Lead Apple has recently announced a new feature, Lockdown Mode, which secures iOS users who might be personally targeted by sophisticated cyber threats.…

Read More
Corporate Blog August 4, 2022

IDC Survey Shows 70% Experienced Attack: How Secure is your Hybrid Data Center?

5-minute Data Center Security Assessment for data center, network, cloud, apps Cyber attacks are become more sophisticated and more frequent. Every enterprise data center is vulnerable. An IDC survey of nearly 500 enterprises showed that…

Read More
Corporate Blog August 3, 2022

Github “Supply Chain” Attack

Just this morning, a significant software “supply chain” attack was discovered in Github, and while the attack was prevented from spreading further, the ramifications of “supply chain” attacks are clear and intimidating. This recent attack…

Read More
Corporate Blog

Check Point Software’s Mid-Year Security Report Reveals 42% Global Increase in Cyber Attacks with Ransomware the Number One Threat

Cyber Attack Trends: 2022 Mid-Year Report takes a closer look at how cyberattacks have intensified and been elevated as state – level weapon with hacktivism flourishing in the first half of this year with key…

Read More
Cloud Security August 2, 2022

Check Point announces its Azure Virtual WAN security solution

By Hezi Bahry, Cloud Network Security Product Manager, published August 1, 2022 Azure Virtual WAN, a Microsoft Network-as-a-Service, is already generating significant interest because of its operational improvements and advanced feature sets. Organizations using Azure…

Read More