Check Point Blog
Corporate Blog April 19, 2022

Social Networks Most Likely to be Imitated by Criminal Groups, with LinkedIn Now Accounting for Half of all Phishing Attempts Worldwide

Check Point Research issues its Q1 Brand Phishing Report, highlighting the brands that hackers most often imitate to lure people into giving up their personal data Our latest Brand Phishing Report for Q1 2022 highlights…

Read More
Cloud Security April 18, 2022

The Biggest Cloud Security Challenges in 2022 | Check Point Software

Cloud Adoption Grown Rapidly Cloud adoption has grown rapidly in recent years. While many organizations were already moving to the cloud, the COVID-19 pandemic accelerated this transition. With the normalization of remote work, companies needed…

Read More
Corporate Blog April 14, 2022

Security Flaw in Rarible, the NFT Marketplace with over 2M Monthly Active Users, could have led to Theft of Crypto Wallets

Check Point Research (CPR) identified a security flaw in Rarible, the NFT marketplace with over two million active users. If exploited, the vulnerability would have enabled a threat actor to steal a user’s NFTs and…

Read More
Corporate Blog April 13, 2022

Cybersecurity for banks – Simplifying compliance and the complexity of security operations

By Alon Bar, Product Marketing Manager Managing a bank’s security operations is a complex undertaking entailing many tasks for keeping up with ever-changing security needs: Integration with existing IT infrastructure and security tools Translating demanding…

Read More
Corporate Blog April 12, 2022

What Can The Health Sector Learn From 2021’s Threat Landscape?

According to a recent study, approximately 30% of the world’s data is currently being generated by the health sector. By 2025, it’s expected that the compound annual growth rate of collected data for the health…

Read More
Corporate Blog

March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance

Check Point Research reveals that Emotet remains the number one most prevalent malware, while Agent Tesla moves from fourth to second place after several mal-spam campaigns Our latest Global Threat Index for March 2022 reveals…

Read More
Cloud Security April 8, 2022

Code Review Checklist: 8 steps to improved productivity

By Dotan Nahum Code review is the best way to maintain a high level of code quality. The code review acts not only as a gatekeeper for bad code but also as an incentive for…

Read More
Corporate Blog April 7, 2022

Android banking stealer dubbed “Sharkbot” found disguised as legitimate anti-virus apps on the Google Play store

Highlights: Check Point Research (CPR) found anti-virus apps on the Google Play store disguised as legitimate which downloaded and installed android malware At least six different apps with over 15,000 total downloads were spreading the…

Read More
Cloud Security April 6, 2022

Day-1 Protection against Java Spring Framework Vulnerability with Check Point CloudGuard Workload Security Container Runtime Protection

As mentioned in the previous Check Point blog regarding Check Point CloudGuard AppSec’s preemptive protection against Spring4Shell cyber-attacks, several vulnerabilities have been identified affecting the popular Java Spring Framework and related software components. So, we got you…

Read More
Corporate Blog April 5, 2022

Check Point + Armis Team Up to Protect Critical Vulnerabilities (TLStorm) Found in APC Smart-UPS Devices

Written by: Shlomi Feldman (Check Point), Barak Hadad (Armis) Overview Earlier this month, Armis discovered three critical vulnerabilities in APC Smart-UPS devices that allow attackers to remotely manipulate the power of millions of network-connected devices.…

Read More