Security May 12, 2022 Ransomware cyber-attacks in Costa Rica and Peru drives national response Highlights Effectively, one out of every 60 organizations globally have been impacted by attempted ransomware ...
Security May 11, 2022 How the evolution of ransomware has changed the threat landscape From WannaCry to Conti: A 5-Year Perspective Five years ago, on May 12, 2017, ...
Security May 11, 2022 April 2022’s Most Wanted Malware: A Shake Up in the Index but Emotet is Still on Top Check Point Research reports that April has seen a lot of activity from Formbook to ...
Security May 10, 2022 Info-stealer Campaign targets German Car Dealerships and Manufacturers Introduction: It started with a seemingly benign email, dealing with the purchase of a vehicle, ...
Security May 8, 2022 Considering Replacing Your Endpoint Security Solution? 5 Questions Worth Asking By Noa Goldstein, Product Marketing Manager and Bar Yassure, Product Manager. Is it time for ...
Security May 5, 2022 Check Point Software Outlines Five Must-Haves for Creating a Secure Password To protect ourselves from cybercriminals, it is essential to use a combination of characters when ...
Security May 4, 2022 Cybersecurity for banks – Securing advanced e-Banking services By Alon Bar, Product Marketing Manager A bank’s applications drive the business. And as they ...
Security May 3, 2022 CISA’s 2021 Top-15 routinely exploited Vulnerabilities – Check Point customers remain fully protected 03/05/2022 Background In a joint advisory published On April 27, the Cybersecurity & Infrastructure Security ...
Security May 2, 2022 Check Point’s Quantum IoT Protect Identified Hacked IoT Devices & Protects a Customer from a Cyber-Attack IoT is everywhere. From smart light bulbs to IP cameras, wearables, and even smart kitchen ...
Security April 27, 2022 Cracks forming in the ransomware ecosystem According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat ...