Check Point threat Intelligence sensors have picked up a stealth campaign that traditional anti-virus solutions are having a hard time detecting. On July 17th SandBlast Zero-Day Protection started showing a massive email campaign which was…
Read MoreFollowing the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are. What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But…
Read MoreGoogle published its annual security report yesterday for the Android ecosystem. The report includes many commendable efforts by Google to improve the security of users, and fight back against the raging surge of malware. One…
Read MoreAt the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing campaigns were top of mind, and attendees were looking for solutions to prevent the latest threats from attacking their networks.…
Read MoreRansomware attacks continued to rise worldwide during November, according to the latest monthly Global Threat Index from Check Point’s Threat Intelligence Research Team. Ransomware attacks using the Locky and Cryptowall variants both increased by 10%…
Read MoreData center virtualization has come a long way – from concept to a reality in a few short years. The latest evolution, virtualizing the network, lets data center operators treat the underlying infrastructure as a…
Read MorevBulletin is a commercial forum and blog platform developed by vBulletin Solutions, Inc. It was created over 10 years ago and is written in PHP. It is the world’s most popular forum platform, powering ~78%…
Read MoreThe healthcare industry has taken a major beating in terms of cyber security attacks. In the past two years, there has been a myriad of breaches, compromising the personal health information (PHI) of millions. According…
Read MoreAttackers most commonly enter organizations through everyday means such as an emailed file. While these documents look innocuous, they can easily contain malicious content delivered in the form of macros, embedded Java script and even…
Read MoreCyber threats are continuing to evolve, and hackers are finding new ways to hide malware inside emailed documents, on websites as “drive by” exploits or in downloadable content. Many attacks begin by exploiting known vulnerabilities…
Read More