Check Point Blog

Blog Post April 8, 2019

Check Point ZoneAlarm Extreme Security earns Best+++ Award from AVLab Test

By Lloyd Tanaka, Product Marketing Manager, Threat Prevention, April 8th 2019   In February of this year, AVLab performed comprehensive tests to determine which of 27 Windows 10 security solutions could best defend against a…

Read More
Cloud April 5, 2019

Secure your Serverless Infrastructure with CloudGuard Dome9

By Marina Segal, Product Manager, Cloudguard Dome9, published April 5th, 2019   In a previous blog, we had discussed how serverless security requires a security-centric approach. To recap, serverless security requires a holistic approach, where…

Read More
Android April 4, 2019

Xiaomi Vulnerability: When Security Is Not What it Seems

Smartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect, however, is for a preinstalled app to be an actual…

Read More
Blog Post April 3, 2019

Momo Challenge: A scary hoax with a stern warning

By Lloyd Tanaka, Product Marketing Manager, April 3rd 2019   The Momo Challenge, a purported suicide game targeting children on Facebook or YouTube, reared its ugly head, yet again. This urban legend sent chills to…

Read More
Blog Post March 29, 2019

Xero Transforms Their Security Culture With CloudGuard IaaS

by Moti Sagey, March 25th 2019   As businesses continue to move their workflow into the cloud, the need for multi-layered protection is critical. The dynamic nature of cloud infrastructure introduces a variety of new…

Read More
Corporate Blog March 26, 2019

This March Madness, Don’t Get Upset by Cyber Criminals: Protect Your Organization from Cinderella Teams

With the first two rounds in the rear view mirror and the sweet sixteen coming up, we’re excited to announce that Check Point is sponsoring this year’s NCAA Division 1 Men’s Basketball Tournament – if…

Read More
Blog Post March 19, 2019

Check Point Forensic Files: A New Monero CryptoMiner Campaign

By Marcel Afrahim and Charles Bettan, Endpoint Security Researchers, March 19th 2019 Sand Blast Agent Forensics team have noticed a new variant of the Monero mining malware spreading throughout organizations worldwide. Interestingly, this malware showed…

Read More
Blog Post March 13, 2019

Mobile Supply Chain Attacks Are More Than Just an Annoyance

By Richard Clayton, Check Point Research Marketing   Mark Twain once wrote there are few things harder to put up with than the annoyance of a good example. He would have had a hard time…

Read More
Blog Post March 11, 2019

February 2019’s Most Wanted Malware: Coinhive Quits While Still at the Top

By Check Point’s Threat Intelligence team, published March 11th   In February 2019, Coinhive led the global threat index for the 15th successive month, having announced that it will cease operation on the 8th March…

Read More
Blog Post March 7, 2019

UltraHack: The Security Risks of Medical IoT

IoT devices make our lives easier. Smart home technology, for example, can help users improve energy efficiency by enabling them to turn appliances on and off with the tap of a touchscreen. Likewise, organizations across…

Read More