The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control…
Read MoreCheck Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was…
Read MoreIf your enterprise is using Microsoft EMS and is looking to further secure mobile devices while ensuring employee’s privacy and productivity, you’d be happy to know that Check Point has teamed with Microsoft Intune to…
Read MoreFollowing the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are. What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But…
Read MoreCheck Point’s latest Global Threat Impact Index revealed more than one in four organizations globally was affected by the Fireball or Wannacry attacks during May– in the company’s latest Global Threat Impact Index. The…
Read MoreInfinity is boundless. Unfortunately so are your IT demands and security expectations. The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be…
Read MoreAt the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing campaigns were top of mind, and attendees were looking for solutions to prevent the latest threats from attacking their networks.…
Read MoreThe Client: The Galactic Empire The situation: Security researchers at Check Point have attributed an attack on the client to a hacking group calling itself the “Rebel Alliance.” Researchers have identified the motive driving…
Read MoreRecently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found…
Read MoreCan you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass…
Read More