Check Point Blog

Corporate Blog December 10, 2020

Aligning Secure Remote Access to NIST Guidelines

With 80% of security professionals scaling up their remote access infrastructure, per Check Point research, certain controls should be applied to ensure that security is not compromised. Below are key guidelines recommended by the National…

Read More
Corporate Blog

Game over? Vulnerabilities on Valve’s Steam put hundreds of thousands gamers at risk

Highlights: CP<R> found four major vulnerabilities in the popular Valve games networking library. All vulnerabilities were acknowledged and received CVE’s. If exploited, an attacker could take over hundreds of thousands of computers without needing gamers…

Read More
Corporate Blog December 9, 2020

November 2020’s Most Wanted Malware: Notorious Phorpiex Botnet Returns As Most Impactful Infection

Check Point Research reports new surge in attacks using the Phorpiex Botnet delivering the Avaddon ransomware in malicious spam campaigns Our latest Global Threat Index for November 2020 has revealed that there has been a…

Read More
Corporate Blog December 8, 2020

The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organizations’ Security Priorities for 2021 and Beyond

As 2020 draws to a close, we are approaching a milestone on the pathway through the Covid-19 pandemic.  While cases and deaths continue to rise globally and economic disruption deepens, there has also been positive…

Read More
Corporate Blog December 7, 2020

Living in a Post-quantum Cryptography World

By, Julia Rabinovich, Architect, Network Security Products Michael A. Greenberg, Product Marketing Manager, Security Platforms Today, it is pretty expected from what we can see in the way hackers go after their victims. Whether through…

Read More
Corporate Blog

AWS Instance Metadata Service (IMDS) Best Practices

Omer Shliva Cloud Guard Dome9 Research Introduction Metadata is “data that provides information about other data” (Wikipedia). In other words, Metadata is “data about data”. In AWS, Instance Metadata Service (IMDS) provides “data about your…

Read More
Corporate Blog December 4, 2020

40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?

By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention These days you use your smartphone to do your job more than ever before. You might be as careful as one can be, but what if your…

Read More
Corporate Blog

ARSAT Migrates to Check Point Software in Record Time

By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Empresa Argentina de Soluciones Satelitales Sociedad Anónima (ARSAT) is one of the largest ISPs and data center companies in Argentina, the company…

Read More
Corporate Blog December 3, 2020

Check Point IoT Protect Firmware

A complete end-to-end solution for all your IoT firmware security needs. By Mor Ahuvia, Product Marketing Manager and Bob Bent, Technical Marketing Manager To build connected devices that are ‘secure by design’ out-of-the-box, IoT manufacturers…

Read More
Corporate Blog

Widespread android applications still exposed to vulnerability on google play core library

High profile android apps still exposed to a CVE reported in August, patched in April If exploited, attacker can grab credentials, steal 2FA codes, gain access to corporate resources and spy using location access Apps…

Read More