Healthcare June 16, 2023 Preventing Cyber Attacks is Critical to Improve Healthcare Outcomes It’s become painfully obvious that cybersecurity is critical to enabling clinicians to provide quality care ...
Securing the Cloud June 16, 2023 PyPI Suspends New Registrations After Malicious Python Script Attack PyPI, the official repository for Python packages, has recently announced that it has suspended new ...
Security June 15, 2023 Massive global scale phishing campaign using malicious PDFs, identified and blocked by new ThreatCloud AI engine Highlights: Check Point has recently identified and blocked a massive global scale phishing campaign leveraged ...
Security June 14, 2023 MOVEit Vulnerability Weaponized in Ransomware Attack What is MOVEit? MOVEit is a managed file transfer (MFT) software solution developed by Progress ...
Security June 9, 2023 May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads Check Point Research reported on a new version of shellcode-based downloader GuLoader featuring fully encrypted ...
Security June 9, 2023 Unified Security from Code to Cloud at AWS re:Inforce In the last year, Check Point and AWS have strengthened their partnership by leaps and ...
Securing the Cloud June 8, 2023 Getting started: Deploy Azure Virtual WAN security in just a few minutes Introduction Many organizations are transitioning to Azure Virtual WAN as their preferred networking service. Their ...
Security June 8, 2023 Check Point Research Warns of New Backdoor used in Targeted Espionage Attacks in North Africa Highlights: Check Point Research identified a backdoor used for highly targeted espionage attacks in Libya. ...
Security June 7, 2023 Beware of Summer Scams: Vacation-Related Online Scams are on the rise, Warns Check Point Research Highlights: Check Point Research (CPR) warns about online phishing scams related to summer vacations 1 ...
Security June 6, 2023 Lessons from Denmark: Why knowledge sharing is the most important weapon against cyber threats Most business and cybersecurity leaders believe that geopolitical instability will lead to a catastrophic cyber ...