Check Point Software, Hacker Noon

Check Point Software

Hacker Noon

San Carlos, CA, United States

Contact Check

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Hacker Noon

Past articles by Check:

How a Supply-Chain Breach Put at Risk Atlassian Accounts

On November 16, 2020 Check Point Research (CPR) uncovered chained vulnerabilities that together can be used to take over an account and control Atlassian apps. → Read More

How Can Enterprises Prevent and Deal With Ransomware Attacks

Check Point Software’s Incident Response Team's guide for enterprises on how to prevent and deal with ransomware attacks. → Read More

How the Security of Remote Work Has Evolved With the Rise of Zero Trust

VPNs might be the most common way of creating network security for remote work but Zero Trust Network Access might be a better designed alternative for you. → Read More

How we Fuzz Tested the Microsoft Office Ecosystem

Microsoft Office is one of the most commonly used forms of productivity software. The Checkopint has tried to fuzz one part of Office to see how it affects it. → Read More

What Is Triple Extortion Ransomware and How to Prevent It

Ransomware is becoming more common and with it comes new threats. Triple Extortion Ransomware is a new form of attack that threatens companies across the world. → Read More

Uncovering the Vulnerabilities of Qualcomm DSP

The Snapdragon System on a Chip is a convenient solution for many phone manufacturers when it comes to hardware. However, it comes with its own security risks. → Read More

How to Protect Your Organization from Double Extortion Ransomware

Ransomware attacks have affected organisations from missile developers to Manchester United. Protecting yourself from them is an important part of security → Read More

Securing Engineer Access to Cloud Environments with Zero Trust

Remote working and developer infrastructure in the cloud have both served to change the way developer operations work and have new cybersecurity requirements. → Read More

CloudGuard added AWS GWLB: What that Means for AWS Marketplace Offerings

The AWS Marketplace is a vast and complicated online storefront that has plenty of choice for you to augment your business. Here is a basic explainer. → Read More

How a Wormable Android Malware Used to Spread Using WhatsApp Auto-Replies

Android Malware has started spreading by creating auto-replies to messages in WhatsApp. It's hidden cleverly in dubious apps that are surprisingly good. → Read More

How DevOps Killed WAF

Web Application Firewalls have been a key part of cybersecurity that are facing obsolencence thanks to the significant labour costs associated with WAFs. → Read More

What's it Like to Obtain a COVID-19 Vaccination Certificate on Darknet

Check Point Research did an investigation about the fake COVID-19 tests out in the Darknet and hacking forums that were sold to help people falsify their status → Read More

How a Unified Approach to Cloud Data Security Can Come To Your Aid

A unified approach to clould data security has significant advantages to cybersecurity relative to conventional methods of cybersecurity and may be helpful. → Read More

Essential Aspects of Cloud Compliance for Financial Services

In this post, we will cover five key areas that are very relevant to most financial services businesses—five topics an organization must “get right”. → Read More

The Rise and Fall of APTR1 Exploit Jian

Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. → Read More

Cloud Sourcing as a Crucial Component in Threat Prevention

When it comes to security in the cloud, companies face constant, daily threats. This situation has only been exacerbated by the COVID-19 pandemic. → Read More

Endpoint Security Series: Top 5 Crucial Layers of Protection

To help security professionals assess their options, we’ve listed five guiding principles for choosing optimal endpoint security solution in our previous blog. → Read More

The Disruption of Emotet and What we Know About it

Emotet, which was once a Banking Trojan and became a full-blown botnet was the most successful and prevalent malware of 2020 by a long way. → Read More

What Poses a Challenge to Security in a Multi-Cloud Environment

Multi-cloud gives you much more flexibility because it allows you to find the perfect solution for each of your business requirements. → Read More

How a Team of Hackers left Stolen Phishing Credentials up for Grabs

Attackers initiated a phishing campaign with emails that masqueraded as Xerox scan notifications, prompting users to open a malicious HTML attachment. → Read More