Check Point Blog
Corporate Blog October 11, 2022

Three Key Takeaways from Microsoft Ignite

By, Russell Tal, Partner Marketing Manager, Microsoft This year, Microsoft’s Ignite conference is different. With both in-person and virtual options, Microsoft promises a new kind of Ignite, with an emphasis on “Do more with less…

Read More
Cloud Security October 10, 2022

Protecting your assets in the cloud

By Jon Harlow, published Oct, 2022 Securing your business domain needs to be as natural as locking the door and switching on the alarm when you leave. That used to be the basis of security,…

Read More
Corporate Blog October 4, 2022

What’s the Story Around Cyber Attackers and IP Cameras?

By Miri Ofir, R&D Director, Quantum IoT Protect, Check Point  Internet-connected security cameras are everywhere these days – public spaces, organizations, and even private homes. The market is estimated at around $50B for 2021 and…

Read More
Corporate Blog October 3, 2022

New Hacktivism Model Trends Worldwide

Check Point Research outlines a new model of hacktivism now trending worldwide. Five characteristics mark today’s form of hacktivism, according to researchers: political ideology, leadership hierarchy, formal recruiting, advanced tools and public relations. CPR gives…

Read More
Corporate Blog September 29, 2022

Check Point MIND Announces new partnership with training vendor Monnappa K.A.

Customers can now learn Malware Analysis and Threat Hunting using Memory Forensics from the author of the best selling book and the Black Hat Trainer Monnappa K.A MIND – Check Point Software’s learning & Training…

Read More
Corporate Blog September 28, 2022

Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran

Check Point Research (CPR) sees multiple hacker groups using Telegram, Signal and the darkweb to aid anti-government protestors in Iran bypass regime restrictions. Key activities are data leaking and selling, including officials’ phone numbers and…

Read More
Android September 22, 2022

CPR analyzes A 7-year mobile surveillance campaign targeting largest minority in China

Highlights: Check Point Research (CPR) examines a long running mobile surveillance campaign, targeting the largest minority in China- the Uyghurs. The campaign is attributed to the Scarlet Mimic hacking group, which has used more than…

Read More
Corporate Blog September 19, 2022

Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level

A common cyber security problem faced by many organizations  Everywhere you look, the impact of menacing cyberattacks has become headline news. Check Point’s Mid-Year Report recently revealed a 42 percent global increase in cyberattacks and…

Read More
Corporate Blog September 15, 2022

The mobile malware landscape in 2022 – Of Spyware, Zero-Click attacks, Smishing and Store Security

Cyberattacks are increasing in number all the time. Indeed, our 2022 Mid-Year Report revealed a 42% global year-on-year increase in attacks. And according to the World Economic Forum’s 2022 Global Risk Report, 95% of cybersecurity…

Read More
Corporate Blog September 14, 2022

August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index

Check Point Research reports that FormBook is the most prevalent malware, while the Android spyware Joker takes third place in the mobile index. Apache Log4j Remote Code Execution also returns to first place as the…

Read More