Exposure Management May 11, 2026 Q1 2026 Ransomware Report: Fewer Groups, Higher Impact Ransomware activity remained elevated in Q1 2026, continuing the trend established over the past year. According to ...
Email Security May 7, 2026 World Password Day 2026: Why “Strong Passwords” Can’t Save You from AI, Infostealers, and the Telegram Underground As we recognize World Password Day in 2026, the traditional advice to “use a complex ...
Research April 28, 2026 VECT Ransomware: Why Paying Won’t Get Your Files Back Do not pay the ransom. VECT permanently destroys large files rather than locking them. Even the attackers cannot ...
Research April 16, 2026 The Phishing Paradox: The World’s Most Trusted Brands Are Cyber Criminals’ Entry Point of Choice In Q1 2026, Microsoft continued to be the most impersonated brand in phishing attacks, accounting ...
Mobile November 24, 2025 GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts ...
Artificial Intelligence November 12, 2025 Payroll Pirates: One Network, Hundreds of Targets Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since ...
Workspace Security August 13, 2025 GitHub Abuse Engine: Stay One Step Ahead In the dynamic world of cyber security, staying ahead of malicious actors is paramount. We ...
Workspace Security June 25, 2025 Frost & Sullivan Report Validates Value of Consolidated Security The endpoint security landscape is evolving faster than many security teams can keep up. While ...
Securing the Network June 24, 2025 PDFguard: AI Engine Against Growing Threats in PDFs In recent years, PDFs emerged as a primary vector for attack chains, with threat actors ...
Mobile June 16, 2025 Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users In February 2025, our detection engines identified a SpyLoan application on a victim’s device. The ...