Security August 9, 2023 July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot Check Point Research reported that RAT Remcos rose four places due to trojanized installers, Anubis ...
Research August 8, 2023 US Hospitals Under Increasing Threat of Ransomware According to Check Point Research (CPR): on average, 1 in 29 healthcare organizations in ...
Security August 7, 2023 Don’t Miss Check Point’s Black Hat Demos & Sessions Black Hat USA is just around the corner, the Check Point team has a full ...
Security August 4, 2023 Meet Cloud Girls 2023 Trailblazer Trisha Paine ***This content was originally published on Cloud Girls. Trisha Paine, Head of Global Marketing of Cloud ...
Security July 24, 2023 Is Your Peloton Attracting Security Threats? A Deep Dive Into the Vulnerabilities Found In America’s Largest Internet-Connected Exercise-as-a-Service Company. Highlights: Check ...
Security July 19, 2023 Facebook Flooded with Ads and Pages for Fake ChatGPT, Google Bard and other AI services, Tricking Users into downloading Malware Highlights Cyber criminals are using Facebook to impersonate popular generative AI brands, including ChatGPT, Google ...
Security July 18, 2023 Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023 Our latest Brand Phishing Report for Q2 2023 highlights the brands that were most frequently ...
Email Security July 17, 2023 Check Point Software is recognized for its impressive security products in CRN’s 2023 Tech Innovator Award We are proud to announce that Check Point Software has been named as a finalist ...
Artificial Intelligence July 17, 2023 Brand Spoofing Prevention – Check Point Software Technologies’ AI-Powered Pre-emptive Zero Phishing Prevents Local and Global Brand Impersonation Attacks Highlights: Check Point Software Technologies’ Zero-Phishing AI Engine now scaled and improved to identify and ...
Security July 13, 2023 Check Point Software Prevents Potential ChatGPT and Bard data breaches Preventing leakage of sensitive and confidential data when using Generative AI apps Security Risk Assessment ...