By Check Point’s Incident Response Team In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are…
Read MoreThe rise of software-defined WAN (SD-WAN) has enabled public cloud adoption by extending connectivity from on-premise to cloud applications. A recent CSO article discusses how security is a key inhibitor towards rapid migration to the…
Read MoreIn today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after…
Read MoreSan Francisco’s Municipal Railway (MUNI) riders got to ride for free over the last weekend (Nov 25th-26th), after what appears as a ransomware hit the agency’s payment system. The alleged attack sought $73,000 in ransom…
Read MoreToday’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and highly mobile workforces put a ton of pressure on security teams to keep networks and data protected. At the same…
Read MoreThe Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However as the threat landscape continues to evolve and grow in sophistication, NGFW solutions should prove effective at protecting against new…
Read MoreIt’s January 2016 and my New Years’ resolution is still fresh in my mind. In addition to visiting the gym more frequently and losing some of my “holiday” weight, I am also resolute that this…
Read MoreIn recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. TeslaCrypt is a relatively new ransomware, first reported in the beginning of 2015. Although it is not the most sophisticated…
Read MoreDuring the period August 27-30, 2015, Check Point sensors recorded a large amount of logs generated by the IPS protection “PHP Print Remote Shell Command Execution.” This was an interesting anomaly, as we do not…
Read MoreDefense in depth is a concept that is hard to argue with; put as many security mechanisms in place to make it difficult if not impossible for the bad guys to gain access to your…
Read More