Check Point Blog Blog
- Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection by rohann@checkpoint.com on February 21, 2025 at 5:57 pm
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware. No new vulnerability was exploited—only the previously disclosed and patched one. Customers who have not yet implemented the patch should follow the instructions here. This will prevent attackers from getting VPN credentials, which is the first step in the infection chain. The campaign targeted various organizations, mainly in Europe, Africa, and the Americas. The most targeted sector was manufacturing. Check The post Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection appeared first on Check Point Blog.
- Cyber Criminals Using URL Tricks to Deceive Usersby rohann@checkpoint.com on February 21, 2025 at 1:00 pm
Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically, 75% of these emails have been distributed in the US, while 17% were distributed in the EMEA region, and 5% were distributed in Canada. Why it matters: The cyber criminals behind this campaign aim to compromise as many organizations and individuals as possible. The hackers do not appear to target specific industries, rendering a wide spectrum of enterprises vulnerable to The post Cyber Criminals Using URL Tricks to Deceive Users appeared first on Check Point Blog.
- The Future of Sustainability | Bacteria, Meet the Internet of Thingsby rohann@checkpoint.com on February 20, 2025 at 1:00 pm
In an era of pressing ecological crises, innovative technologies are emerging to address challenges that traditional methods have struggled to solve. One of the new frontiers in this quest is microbial IoT, a revolutionary fusion of microbiology and IoT. With the usage of natural capabilities of microorganisms, this technology holds immense promise for transforming how we monitor and protect our environment. Biotech meets IoT, the science behind microbial IoT Microbial IoT integrates smart, IoT-connected devices with microorganisms that serve as natural biosensors. Bacteria, for example, can be genetically engineered to detect specific environmental triggers; think of toxic chemicals, pH changes, The post The Future of Sustainability | Bacteria, Meet the Internet of Things appeared first on Check Point Blog.
- Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winnersby rohann@checkpoint.com on February 19, 2025 at 1:00 pm
At Check Point Software, our partners are at the core of our mission to deliver cutting-edge cyber security solutions worldwide. As cyber threats continue to evolve in complexity and frequency, our partners play a vital role in safeguarding businesses and individuals alike. The Check Point Americas 2024 Partner of the Year Awards recognize the outstanding achievements of our channel partners, who have demonstrated resilience, innovation, and dedication in securing the digital world. These awards celebrate their hard work and success in driving cyber security excellence, ensuring customers receive top-tier protection and strategic guidance amidst an ever-changing threat landscape. We proudly The post Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners appeared first on Check Point Blog.
- Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluruby rohann@checkpoint.com on February 18, 2025 at 4:02 pm
Check Point has announced its plans to establish its first Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India, with a goal to drive innovation in cyber security solutions and strengthen global product development and talent growth. This strategic expansion, unveiled during Check Point’s annual CPX Bangkok 2025 conference, underscores the company’s commitment to advancing cyber security innovation while leveraging India’s dynamic tech talent ecosystem. “India is a global technology powerhouse, and our new R&D Centre in Bengaluru reflects our deep commitment to harnessing top-tier cyber security talent from the region,” said Ruma Balasubramanian, President of APAC & Japan, Check The post Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluru appeared first on Check Point Blog.
- Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platformby rohann@checkpoint.com on February 18, 2025 at 3:44 pm
Check Point today unveiled its strategic vision for securing the hyper-connected world at CPX 2025 Bangkok, its premier annual cyber security event. With nearly 1,650 employees, customers and partners from across APAC in attendance, Check Point showcased how AI-driven security innovations and its hybrid mesh security strategy are transforming cyber defense, ensuring organizations stay ahead of evolving threats. With the global surge in sophisticated cyber attacks fueled by ransomware, hacktivism, and AI-driven cyber crime, organizations in APAC faced an average of 2,915 attacks per week over the last six months—significantly higher than the global average of 1,843 attacks per week, The post Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform appeared first on Check Point Blog.
- Strengthening Authentication in the AI Era: How Harmony SASE Aligns with CISA’s Secure by Design Pledgeby rohann@checkpoint.com on February 18, 2025 at 1:00 pm
For the modern threat environment, strong authentication is a must. Malicious actors are leveraging traditional credential harvesting tactics more than ever, as well as using AI to enhance them. Organizations must reinforce their defenses and deploy multi-factor authentication (MFA) to protect access to sensitive data and applications. Recognizing this fact, Check Point is joining the Cybersecurity and Infrastructure Security Agency’s (CISA’s) Secure by Design pledge. This decision underscores our commitment to cyber security best practices like MFA, and further aligns Check Point with industry-leading standards to ensure robust security for our customers. What is MFA? MFA enhances authentication by requiring The post Strengthening Authentication in the AI Era: How Harmony SASE Aligns with CISA’s Secure by Design Pledge appeared first on Check Point Blog.
- Check Point’s SASE Tops Scores for Threat Preventionby rohann@checkpoint.com on February 17, 2025 at 1:00 pm
Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and SSE environments—especially when it matters most. Check Point’s Harmony SASE blocks 99% of malware including Zero+1 Day threats, according to a recent Miercom report. Other vendors in the report left significant gaps, with some blocking as little as 74% of threats during testing. Even a 90% block rate leaves the door open to hundreds of costly attacks, leading to data The post Check Point’s SASE Tops Scores for Threat Prevention appeared first on Check Point Blog.
- Protecting Hospitals from IoT Threats with Check Pointby rohann@checkpoint.com on February 14, 2025 at 1:00 pm
In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security Agency (CISA), which warns that Contec CMS8000 devices, widely used for patient monitoring, contain a backdoor that sends patient data to a remote IP address and could download and execute files on the device. Technical details aside, human safety is always paramount. Addressing this type of vulnerability ensures that clinicians make care decisions on accurate data, thereby ensuring patients get The post Protecting Hospitals from IoT Threats with Check Point appeared first on Check Point Blog.
- January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominateby rohann@checkpoint.com on February 13, 2025 at 1:00 pm
Check Point Software’s latest threat index highlights that FakeUpdates continues to pose a significant threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. A recent investigation by security researchers revealed that an affiliate of RansomHub utilized a Python-based backdoor to maintain persistent access and deploy ransomware across various networks. Installed shortly after FakeUpdates gained initial access, this backdoor demonstrated advanced obfuscation techniques along with AI-assisted coding patterns. The attack involved lateral movement through remote desktop protocol (RDP) and established ongoing access by creating scheduled tasks. The advanced techniques highlight an increasing reality: cyber criminals are evolving The post January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate appeared first on Check Point Blog.