Security May 31, 2022 “Follina”- Zero-day vulnerability in Microsoft Office: Check Point Customers remain protected *Last updated June 1st 7.42 EST The vulnerability On May 30th researchers revealed a zero-day ...
Security May 30, 2022 Check Point Software Technologies protects against malicious Chrome extensions By Yael Cinamon, Product Manager, and Moishi Marelus, Malware Analyst Recently, Check Point’s Infinity XDR, ...
Security May 27, 2022 Trofi Security Defends U.S. Memorial Museum’s Priceless Assets with Check Point By Amit Sharon, Head of Customer Experience, Check Point Both private- and public-sector organizations are ...
Security May 26, 2022 Country Extortion: Ransomware expands business to include the government sector Currently Conti is conducting a wide extortion operation against two governments in Latin America – ...
Security May 25, 2022 Cybersecurity for banks – How Global Banks enable the secure remote workforce By Alon Bar, Product Marketing Manager With remote users connecting to corporate applications more than ...
Security May 20, 2022 5 Essential Ways to Improve SDLC Security By Dotan Nahum Vulnerabilities found in application platforms and third-party libraries have drawn growing attention ...
Security May 20, 2022 From Bitcoin to the Metaverse: The current evolution is a revolution By: Oded Vanunu- Head Of Products Vulnerability Research & Roman Zaikin – Security Expert ...
Security May 19, 2022 Twisted Panda: Check Point Research unveils a Chinese APT espionage campaign against Russian state-owned defense institutes Key findings: Check Point Research (CPR) unveils a targeted campaign against at least two research ...
Security May 18, 2022 Check Point Harmony Mobile Introduces Malicious File Protection The industry’s leading mobile security solution can now block the download of malicious files to ...
Security May 13, 2022 Secure Your Migration to AWS, Part II: The Road to Success By Mark Brindley, Head of Cloud Alliance Part I of this blogpost discussed the advantages ...