Check Point Blog
Corporate Blog September 13, 2022

Introducing Check Point Horizon – the prevention-first SOC management platform

By Rafi Kretchmer, VP Product Marketing September 13, 2022 How many products are you using to try to stop critical attacks on your networks, endpoints, mobiles, cloud environments, IoT devices and emails? I’m going to…

Read More
Corporate Blog September 8, 2022

Weaponized cybercrime: What organizations can learn from the conflict in Ukraine

On February 24th, 2022, Russia launched a full-scale military invasion of Ukraine with attacks on land, sea, air.  What has been less visible but nonetheless a critical element of the conflict is the battle being…

Read More
Corporate Blog September 6, 2022

In the mighty Savanna: Check Point Research reveals a 2-year campaign targeting large financial institutions in French-Speaking African countries

Highlights: Dubbed ‘DangerousSavanna’- Check Point Research (CPR) uncovers a malicious campaign, targeting multiple major financial groups in French-speaking Africa, for the past two years Attackers used Spear-phishing as initial infection, sending malicious attachment emails to…

Read More
Cloud August 23, 2022

SE2 Automates Cloud Security with Check Point CloudGuard Security Posture Management

By Amit Sharon, Head of Global Customer Experience, Check Point SE2 is an insurance technology and services firm that helps clients quickly build and launch products that support digital transformation. Read how SE2 automated governance…

Read More
Corporate Blog August 18, 2022

Share Your Check Point Certification Badges Using Blockchain Technology

Check Point Certification earners can now share their Credly digital credentials to the Blockchain. Publishing your badge to Blockchain is another way for viewers to securely verify or validate your badge.   Blockchain technology creates…

Read More
Cloud August 17, 2022

GCP, therefore IAM

Google Cloud Platform (GCP) Permissions Handling By: Eyal Levy- CloudGuard, Research Team Introduction Managing access authorization for your cloud assets is a challenging task. Certainly, when dealing with multiple public/private resources, environments, services, providers, and…

Read More
Corporate Blog August 12, 2022

Vulnerabilities on Xiaomi’s mobile payment mechanism which could allow forged transactions : A Check Point Research analysis

 Highlights: Check Point Research (CPR) analyzed the payment system built into Xiaomi smartphones powered by MediaTek chips CPR found vulnerabilities that could allow forging of payment and disabling the payment system directly, from an unprivileged…

Read More
Corporate Blog August 10, 2022

July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’

Our latest Global Threat Index for July 2022 reveals that Emotet continues its reign as the most widely used malware, despite a 50% reduction in its global impact compared to the previous month. After a…

Read More
Corporate Blog

From zero to hero in blockchain security – A CP workshop at DEF CON 30

DEF CON is one of the world’s largest and most notable cyber conventions, held annually in Las Vegas, Nevada. DEF CON first took place in June 1993 and today, attendees include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with…

Read More
Corporate Blog August 9, 2022

Check Point Research: Education sector experiencing more than double monthly attacks, compared to other industries

Highlights: Education/Research sector worldwide experienced the highest volumes of attacks every month in 2022 and in 2021. In July 2022, the Education/Research sector shows more than double the number of weekly cyberattacks compared to the…

Read More