Observing Ransomware’s Evolution in Delivery Tactics Written by Check Point’s Incident Response Team Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the…
Read MoreSeven Straight Years of a Leader in Gartner’s UTM Magic Quadrant Small and medium sized businesses have a target on their backs – cyber criminals have hacked over half of all small and medium…
Read MoreCheck Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that operates without an active web browser session Check Point recently published its monthly Global Threat Index, revealing a surge…
Read MoreWhat the Philadelphia Eagles Can Teach Us About Cyber-Security Imagine your founding CTO resigning … right before your company’s biggest annual conference. How do you adapt, maintain momentum, and bring home wins? The…
Read MoreCheck Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…
Read MoreThe smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as…
Read MoreThe second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world’s spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based…
Read MoreThe IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control…
Read MoreIn today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after…
Read MoreCyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…
Read More