Security August 12, 2022 Vulnerabilities on Xiaomi’s mobile payment mechanism which could allow forged transactions : A Check Point Research analysis Highlights: Check Point Research (CPR) analyzed the payment system built into Xiaomi smartphones powered by ...
Security August 10, 2022 July 2022’s Most Wanted Malware: Emotet Takes Summer Vacation but Definitely Not ‘Out-of-Office’ Our latest Global Threat Index for July 2022 reveals that Emotet continues its reign as ...
Security August 10, 2022 From zero to hero in blockchain security – A CP workshop at DEF CON 30 DEF CON is one of the world’s largest and most notable cyber conventions, held annually in Las Vegas, Nevada. ...
Security August 9, 2022 Check Point Research: Education sector experiencing more than double monthly attacks, compared to other industries Highlights: Education/Research sector worldwide experienced the highest volumes of attacks every month in 2022 and ...
Security August 8, 2022 Live Public Preview: Check Point supports Eventarc for Google Cloud By: Mark Brindley, Head of Cloud Security Alliance Last year, Google Cloud launched Eventarc, a ...
Security August 5, 2022 What can we learn from Apple’s new Lockdown mode about the mobile security landscape? By Noa Goldstein, Product Marketing Manager and Guy Lev, Harmony Mobile Product Lead Apple has ...
Security August 4, 2022 IDC Survey Shows 70% Experienced Attack: How Secure is your Hybrid Data Center? 5-minute Data Center Security Assessment for data center, network, cloud, apps Cyber attacks are become ...
Security August 3, 2022 Github “Supply Chain” Attack Just this morning, a significant software “supply chain” attack was discovered in Github, and while ...
Security August 3, 2022 Check Point Software’s Mid-Year Security Report Reveals 42% Global Increase in Cyber Attacks with Ransomware the Number One Threat Cyber Attack Trends: 2022 Mid-Year Report takes a closer look at how cyberattacks have intensified ...
Security August 2, 2022 Cybersecurity for banks – Securing bank IoT network & devices against attacks By Alon Bar, Product Marketing Manager It’s no secret that leveraging Internet of Things (IoT) ...