Security April 27, 2022 Cracks forming in the ransomware ecosystem According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat ...
Security April 21, 2022 Largest Mobile Chipset Manufacturers used Vulnerable Audio Decoder, 2/3 of Android users’ Privacy around the World were at Risk Highlights: Check Point Research discovered vulnerabilities in the ALAC format that could have led an ...
Security April 19, 2022 Social Networks Most Likely to be Imitated by Criminal Groups, with LinkedIn Now Accounting for Half of all Phishing Attempts Worldwide Check Point Research issues its Q1 Brand Phishing Report, highlighting the brands that hackers most ...
Crypto April 14, 2022 Security Flaw in Rarible, the NFT Marketplace with over 2M Monthly Active Users, could have led to Theft of Crypto Wallets Check Point Research (CPR) identified a security flaw in Rarible, the NFT marketplace with over ...
Security April 13, 2022 Cybersecurity for banks – Simplifying compliance and the complexity of security operations By Alon Bar, Product Marketing Manager Managing a bank’s security operations is a complex undertaking ...
Security April 12, 2022 What Can The Health Sector Learn From 2021’s Threat Landscape? According to a recent study, approximately 30% of the world’s data is currently being generated ...
Security April 12, 2022 March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance Check Point Research reveals that Emotet remains the number one most prevalent malware, while Agent ...
Security April 7, 2022 Android banking stealer dubbed “Sharkbot” found disguised as legitimate anti-virus apps on the Google Play store Highlights: Check Point Research (CPR) found anti-virus apps on the Google Play store disguised as ...
Security April 5, 2022 Check Point + Armis Team Up to Protect Critical Vulnerabilities (TLStorm) Found in APC Smart-UPS Devices Written by: Shlomi Feldman (Check Point), Barak Hadad (Armis) Overview Earlier this month, Armis discovered ...
Security April 5, 2022 From SolarWinds to Log4j: The global impact of today’s cybersecurity vulnerabilities If the past year has taught businesses anything, it’s that the impact of targeted cyberattacks ...