Check Point Blog

Blog Post May 20, 2019

Critical Vulnerability in Windows OS – Learn How To Protect Yourself

UPDATED 5/21   We have released an IPS protection for CVE-2019-0708 as an immediate response and it is added to our previous recommendations to patch vulnerable systems and disable RDP if not needed.   In Brief   In the…

Read More
Blog Post May 15, 2019

Check Point Releases R80.30 with 100 New Features Delivering More Protection against Malicious Downloads and Websites

R80.30 Features First Web Threat Extraction and Patent Pending Advanced SSL/TLS Security   by Michael A. Greenberg, Product Marketing Manager, Security Platforms, published May 15th 2019   R80.30 ushers in a new era of security…

Read More
Blog Post May 14, 2019

Lessons learned from the latest WhatsApp hack

by Brian Gleeson, Head of Threat Prevention Marketing, published May 14th 2019   We were once again reminded that mobile devices, the one thing most of us never leave home without, are vulnerable to attacks.…

Read More
Blog Post

April 2019’s Most Wanted Malware: Cybercriminals up to Old ‘TrickBots’ Again

Check Point’s latest Global Threat Index sees banking trojan Trickbot return to top ten list after 2 year absence   In April 2019, banking trojan Trickbot re-appeared in the top ten most wanted malware list…

Read More
Blog Post May 8, 2019

Private Cloud Security: CloudGuard IaaS supports VMware’s new NSX-T 2.4 release

Published by Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, May 8th, 2019   VMware has been taking real action to back up CEO Pat Gelsinger’s assertion that hybrid-cloud is the new norm, most recently through…

Read More
Corporate Blog April 17, 2019

Department of Homeland Security issues security warning for VPN applications — Check Point VPNs not affected

by Lloyd Tanaka, Threat Prevention Product Marketing Manager, published April 17th 2019   On Friday April 12, The CERT Coordination Center (CERT/CC) with the US Department of Homeland Security (DHS), issued a warning of a…

Read More
Corporate Blog April 16, 2019

Game of Thrones Phishing Scams and How to Avoid Them

Research by: Oren Koren and Hadar Waldman   The long night has finally ended. Game of Thrones fans can finally come in from the cold and, like a starving dragon, start devouring the latest and…

Read More
Blog Post April 11, 2019

Check Point Partners with Google’s Cloud Identity to Improve Zero Trust Cloud Access

With enterprises migrating to the cloud, the traditional network perimeter concept is fading. A new approach is needed to ensure more secure access to cloud resources.   by Ran Schwartz, Product Manager, Threat Prevention, published…

Read More
Blog Post

Protect Your Business by Managing Network Security from the Palm of Your Hand

by Russ Schafer, Head of Product Marketing, Security Platforms, published April 11th 2019     Next generation cyber security attacks can happen at any time to any size business, so you need to be prepared…

Read More
Blog Post April 9, 2019

March 2019’s Most Wanted Malware: Cryptomining Still Dominates Despite Coinhive Closure

Check Point’s latest Global Threat Index sees cryptominers continuing to lead the top malware list despite Coinhive ceasing operation   By Check Point’s Threat Intelligence Team, published April 9th 2019   In March 2019, Coinhive…

Read More