So what is Infrastructure-as-Code (IaC) anyway? IaC is a process that automates the provisioning and management of cloud resources.
Web Application Firewalls have been a key part of cybersecurity that are facing obsolencence thanks to the significant labour costs associated with WAFs.
Threat actors are becoming more and more sophisticated in their ability to exploit vulnerabilities, breach organizations’ IT infrastructures, and hack into data
Emotet, which was once a Banking Trojan and became a full-blown botnet was the most successful and prevalent malware of 2020 by a long way.
A misconception of users had led to over five million records containing personal identifying information to be left on an AWS service, a serious leak.
Unlock the potential of every QR Code! Autonix trackable Link and QR Code Generator lets businesses collect and analyze visitor data for informed decisions.
When it comes to security in the cloud, companies face constant, daily threats. This situation has only been exacerbated by the COVID-19 pandemic.
Remote working and developer infrastructure in the cloud have both served to change the way developer operations work and have new cybersecurity requirements.
Ransomware attacks have affected organisations from missile developers to Manchester United. Protecting yourself from them is an important part of security
A unified approach to clould data security has significant advantages to cybersecurity relative to conventional methods of cybersecurity and may be helpful.
To help security professionals assess their options, we’ve listed five guiding principles for choosing optimal endpoint security solution in our previous blog.
Mobile App Development is a hugely useful tool but it does come with significant security risks, as the Checkpoint found out when researching threats.
With Ransomware attacks increasing rapidly, it ahs become more important for companies to ensure that their network infrastructure is protected from attacks.
The CDC (The Centers for Disease Control and Prevention) classified “shopping at crowded stores just before, on or after Thanksgiving” on its list
Ransomware is becoming more common and with it comes new threats. Triple Extortion Ransomware is a new form of attack that threatens companies across the world.
The Sunburst attacks relied on the Cloud model to work successfully. Experts believe that Dark Halo, the group responsible, used priviledges to do it.
Cyber-warfare and espionage have long been common weapons in the arsenal of governments, armies, and intelligence agencies around the world.
The AWS Marketplace is a vast and complicated online storefront that has plenty of choice for you to augment your business. Here is a basic explainer.
Android Malware has started spreading by creating auto-replies to messages in WhatsApp. It's hidden cleverly in dubious apps that are surprisingly good.
What is the most involved attack flow yet? We will break down all of the steps a threat actor took to successfully exfiltrate data out of an AWS account.
In this post, we will cover five key areas that are very relevant to most financial services businesses—five topics an organization must “get right”.
VPNs might be the most common way of creating network security for remote work but Zero Trust Network Access might be a better designed alternative for you.
A Chinese threat group managed to hack into a Southeast Asian government by using disguised files to take advantage of a backdoor in the computer infrastructure
Multi-cloud gives you much more flexibility because it allows you to find the perfect solution for each of your business requirements.
With Cybersecurity constantly evolving, each month has its own malware that poses the greatest threat. These are the malware threats that were most concerning.
Attackers initiated a phishing campaign with emails that masqueraded as Xerox scan notifications, prompting users to open a malicious HTML attachment.
With the revelation of four zero-day vulnerabilities currently affecting Microsoft Exchange Server, Check Point Research (CPR) shares its findings on exploits
The Solarwinds Sunburst exploit was a devastating cyber attack that opened up thousands of companies to hackers. There's a lot to learn and understand about it.
Check Point Research did an investigation about the fake COVID-19 tests out in the Darknet and hacking forums that were sold to help people falsify their status
Ckeckout some significant enhancements to CloudGuard’s integration with new and existing Google Cloud features to benefit from it.
Check Point Software’s Incident Response Team's guide for enterprises on how to prevent and deal with ransomware attacks.
Even the greatest cybersecurity arrangements can be vunerable to simple mistakes such as a tiny setting being misconfigured, compromising the entire system.
Microsoft Office is one of the most commonly used forms of productivity software. The Checkopint has tried to fuzz one part of Office to see how it affects it.
Security for the “Internet of Things” (or IoT) is still relatively new to a majority of organizations.
The Snapdragon System on a Chip is a convenient solution for many phone manufacturers when it comes to hardware. However, it comes with its own security risks.
In the past month, we noticed that a dark net search for Covid-19 vaccines returns multiple pages of results, amounting to hundreds of advertisements.
The Uyghurs, an ethnic minority in China have been targeted by fake human rights documents and websites intended to take advantage of their persecution in China
The attack combines a one-on-one phone call with credible-looking phishing sites where the user is required to fill in their credentials and their MFA codes.
On November 16, 2020 Check Point Research (CPR) uncovered chained vulnerabilities that together can be used to take over an account and control Atlassian apps.
Check Point Research encountered several attacks that exploited multiple vulnerabilities, including some that were only recently published, to inject OS command
Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the world around us. There are over 3.5 billion smartphone users
In this research, we were able to find four new vulnerabilities in Valve’s game networking library by taking advantage of two of C++’s language quirks.
Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email.
Recently, Check Point Research encountered a series of worldwide attacks relevant to VoIP, specifically to Session initiation Protocol (SIP) servers
As with any security incident, security practitioners would initially focus on identifying signs of potential Sunburst activities in their networks and systems.
When analyzing a complicated attack against one of our customers, we noticed a very small 64-bit executable that was executed by the malware.
Intuitively, some people believe that “cloud” storage means your data is being held in the air somehow, but this isn’t really the case.
Visit the /Learn Repo to find the most read stories about any technology.