Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
On November 16, 2020 Check Point Research (CPR) uncovered chained vulnerabilities that together can be used to take over an account and control Atlassian apps. → Read More
Check Point Software’s Incident Response Team's guide for enterprises on how to prevent and deal with ransomware attacks. → Read More
VPNs might be the most common way of creating network security for remote work but Zero Trust Network Access might be a better designed alternative for you. → Read More
Microsoft Office is one of the most commonly used forms of productivity software. The Checkopint has tried to fuzz one part of Office to see how it affects it. → Read More
Ransomware is becoming more common and with it comes new threats. Triple Extortion Ransomware is a new form of attack that threatens companies across the world. → Read More
The Snapdragon System on a Chip is a convenient solution for many phone manufacturers when it comes to hardware. However, it comes with its own security risks. → Read More
Ransomware attacks have affected organisations from missile developers to Manchester United. Protecting yourself from them is an important part of security → Read More
Remote working and developer infrastructure in the cloud have both served to change the way developer operations work and have new cybersecurity requirements. → Read More
The AWS Marketplace is a vast and complicated online storefront that has plenty of choice for you to augment your business. Here is a basic explainer. → Read More
Android Malware has started spreading by creating auto-replies to messages in WhatsApp. It's hidden cleverly in dubious apps that are surprisingly good. → Read More
Web Application Firewalls have been a key part of cybersecurity that are facing obsolencence thanks to the significant labour costs associated with WAFs. → Read More
Check Point Research did an investigation about the fake COVID-19 tests out in the Darknet and hacking forums that were sold to help people falsify their status → Read More
A unified approach to clould data security has significant advantages to cybersecurity relative to conventional methods of cybersecurity and may be helpful. → Read More
In this post, we will cover five key areas that are very relevant to most financial services businesses—five topics an organization must “get right”. → Read More
Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. → Read More
When it comes to security in the cloud, companies face constant, daily threats. This situation has only been exacerbated by the COVID-19 pandemic. → Read More
To help security professionals assess their options, we’ve listed five guiding principles for choosing optimal endpoint security solution in our previous blog. → Read More
Emotet, which was once a Banking Trojan and became a full-blown botnet was the most successful and prevalent malware of 2020 by a long way. → Read More
Multi-cloud gives you much more flexibility because it allows you to find the perfect solution for each of your business requirements. → Read More
Attackers initiated a phishing campaign with emails that masqueraded as Xerox scan notifications, prompting users to open a malicious HTML attachment. → Read More