Check Point Blog Blog
- Quantum Firewall Software R82: AI-Powered Security for Zero-Day Threatsby gmcdouga on November 20, 2024 at 1:00 pm
Security needs to constantly evolve, as organizations must protect against the latest threats while meeting changing business needs. Check Point’s newest security software for Quantum Firewalls and Cloud Guard Network is designed for the future: to deliver protection against unknown threats and enable nimble, adaptive security that can rapidly meet operational needs. As security becomes increasingly complicated due to hybrid environments, operational agility is more important than ever. R82 is designed to simplify management and scale security across segmented security postures. These operational advancements are combined with powerful new threat prevention engines for unprecedented security. R82 introduces over 50 new The post Quantum Firewall Software R82: AI-Powered Security for Zero-Day Threats appeared first on Check Point Blog.
- Navigating the Evolving Threat Landscape Ahead of Black Fridayby gmcdouga on November 19, 2024 at 6:35 pm
As Thanksgiving and Black Friday approach, so do the risks of fraudulent shopping scams. Cyber criminals take advantage of shoppers eager to benefit from the exceptional sales available on Black Friday. In preparation for this shopping season, Check Point Research has examined the activities of these cyber criminals. They found a significant increase in malicious websites related to Black Friday. Additionally, researchers noted that phishing emails have remained consistent, indicating that it is easy for cyber attackers to recreate these scams. In this blog, we will explore the new websites and phishing emails that appear ahead of Black Friday. New The post Navigating the Evolving Threat Landscape Ahead of Black Friday appeared first on Check Point Blog.
- Check Point Partners with Georgia to Strengthen Cyber Security Across the Peach Stateby gmcdouga on November 19, 2024 at 1:00 pm
Check Point has been selected as the official cyber security partner for the State of Georgia through the Department of Administrative Services (DOAS) state-wide contract. This partnership marks a major step in our commitment to helping state, higher education, local governments and K-12 school districts enhance their cyber security posture and protect critical infrastructure against the ever-evolving landscape of cyber threats. “At Check Point, we are deeply committed to working with local and state governments so they can focus on providing critical services to their constituents without disruption. We are proud to grow our partnership with the State of Georgia The post Check Point Partners with Georgia to Strengthen Cyber Security Across the Peach State appeared first on Check Point Blog.
- Unlocking Productivity with RDP Enhancementsby gmcdouga on November 19, 2024 at 1:00 pm
Many organizations today rely on Remote Desktop Protocol (RDP) to help keep their hybrid and remote teams productive and connected. RDP enables access to applications and office computers from anywhere, ensuring that employees can carry on with their work, whether at home or while traveling. While RDP is an essential tool, however, it often requires enhancements to improve functionality and reduce the management burden on IT teams. Let’s take a look at a couple of examples that show how Check Point’s Harmony SASE makes RDP work better for users and makes life easier for administrators. Overcoming Browser-Based Limitations Browser-based RDP The post Unlocking Productivity with RDP Enhancements appeared first on Check Point Blog.
- Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Frameworkby gmcdouga on November 18, 2024 at 1:00 pm
Introduction The cyber security landscape is evolving at breakneck speed, rendering traditional defense mechanisms inadequate. Advanced cyber threats now move laterally within networks with alarming ease, exploiting vulnerabilities that traditional perimeter defenses cannot fully address. The rise of remote work and increased mobility has dissolved the traditional network boundary, necessitating security measures that function effectively regardless of location. Simultaneously, the widespread adoption of cloud services has dispersed resources beyond the reach of conventional perimeter-based security, creating new challenges for data protection. Moreover, the threat landscape is further complicated by: Insider risks, both malicious and accidental, which demand stricter access controls The post Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework appeared first on Check Point Blog.
- 5G network AI models: Threats and Mitigationsby gmcdouga on November 15, 2024 at 1:00 pm
Modern communications networks are increasingly reliant on the use of AI models for enhancing the performance, reliability and security of their offerings. 5G networks especially, with a landscape of service-based architecture, increasingly use AI models for real-time data processing, predictive maintenance and traffic optimization. Large volumes of network data, user behavior data and device interactions are analyzed more thoroughly and quickly than can ever be possible without AI. AI-driven traffic management models dynamically allocate resources based on demand, reducing latency and improving user experience. AI can also be used to enhance Defense communications infrastructure, coordinating non-terrestrial networks with air/ground/sea assets The post 5G network AI models: Threats and Mitigations appeared first on Check Point Blog.
- Spotlight on Iranian Cyber Group Emennet Pasargad’s Malwareby gmcdouga on November 14, 2024 at 3:52 pm
Executive Summary On October 21, 2024, multiple emails impersonating the Israeli National Cyber Directorate (INCD) were sent to various Israeli organizations from the fraudulent address. These emails warned recipients of the urgent necessity to update their Chrome browser. In a joint Cyber Security Advisory, the FBI, the U.S. Department of the Treasury, and the Israeli National Cybersecurity Directorate (INCD) attributed the malware, dubbed WezRat by Check Point Research, used in the campaign to the Iranian cyber group Emennet Pasargad. This group is responsible for several different cyber operations conducted in the United States, France, Sweden, and Israel. Check Point Research The post Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware appeared first on Check Point Blog.
- Empowering Employees in the Age of AI: Strengthening Cyber Security through Training and Awarenessby gmcdouga on November 13, 2024 at 1:00 pm
In today’s rapidly evolving digital landscape, cyber security has emerged as a paramount concern for organizations across all sectors. As cyber threats become more sophisticated, the role of employees in safeguarding organizational assets has never been more critical. Employees serve as both the first line of defense and a potential vulnerability in the cyber security framework, necessitating a strategic focus on comprehensive training programs. The Dual Role of Employees in Cyber Defense A significant portion of cybersecurity breaches can be traced back to human error or manipulation. Incidents such as phishing attacks, which exploit social engineering tactics, are particularly prevalent. The post Empowering Employees in the Age of AI: Strengthening Cyber Security through Training and Awareness appeared first on Check Point Blog.
- Hamas-linked Threat Group Expands Espionage and Destructive Operationsby gmcdouga on November 12, 2024 at 5:37 pm
Check Point Research has been monitoring the ongoing activities of the WIRTE threat actor, which is previously linked to the Hamas-associated group Gaza Cybergang, despite the ongoing conflict in the region. The conflict has not disrupted the group’s activities, and WIRTE uses lures related to recent events in the region for its espionage operations, likely targeting the Palestinian Authority, Jordan, Egypt, Iraq, and Saudi Arabia. Check Point Research reveals that the group has expanded its operations beyond espionage to conduct disruptive attacks. We present clear ties between the custom malware used by the group and SameCoin, a wiper malware targeting The post Hamas-linked Threat Group Expands Espionage and Destructive Operations appeared first on Check Point Blog.
- October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectorsby anap on November 11, 2024 at 1:03 pm
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cyber criminals across the globe. Check Point’s Global Threat Index for October 2024 reveals a concerning trend in the cyber security landscape: the rise of infostealers and the increasing sophistication of attack methods employed by cyber criminals. Last month researchers discovered an infection chain where fake CAPTCHA pages are being utilized to distribute Lumma Stealer malware, which has climbed to 4th place in the Monthly Top Malware rankings. The post October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors appeared first on Check Point Blog.