Check Point Research issues its Q1 Brand Phishing Report, highlighting the brands that hackers most often imitate to lure people into giving up their personal data Our latest Brand Phishing Report for Q1 2022 highlights…
Read MoreCloud Adoption Grown Rapidly Cloud adoption has grown rapidly in recent years. While many organizations were already moving to the cloud, the COVID-19 pandemic accelerated this transition. With the normalization of remote work, companies needed…
Read MoreCheck Point Research (CPR) identified a security flaw in Rarible, the NFT marketplace with over two million active users. If exploited, the vulnerability would have enabled a threat actor to steal a user’s NFTs and…
Read MoreBy Alon Bar, Product Marketing Manager Managing a bank’s security operations is a complex undertaking entailing many tasks for keeping up with ever-changing security needs: Integration with existing IT infrastructure and security tools Translating demanding…
Read MoreAccording to a recent study, approximately 30% of the world’s data is currently being generated by the health sector. By 2025, it’s expected that the compound annual growth rate of collected data for the health…
Read MoreCheck Point Research reveals that Emotet remains the number one most prevalent malware, while Agent Tesla moves from fourth to second place after several mal-spam campaigns Our latest Global Threat Index for March 2022 reveals…
Read MoreBy Dotan Nahum Code review is the best way to maintain a high level of code quality. The code review acts not only as a gatekeeper for bad code but also as an incentive for…
Read MoreHighlights: Check Point Research (CPR) found anti-virus apps on the Google Play store disguised as legitimate which downloaded and installed android malware At least six different apps with over 15,000 total downloads were spreading the…
Read MoreAs mentioned in the previous Check Point blog regarding Check Point CloudGuard AppSec’s preemptive protection against Spring4Shell cyber-attacks, several vulnerabilities have been identified affecting the popular Java Spring Framework and related software components. So, we got you…
Read MoreWritten by: Shlomi Feldman (Check Point), Barak Hadad (Armis) Overview Earlier this month, Armis discovered three critical vulnerabilities in APC Smart-UPS devices that allow attackers to remotely manipulate the power of millions of network-connected devices.…
Read More