
Check Point Software Technologies
-

By: Sadiq Iqbal, Evangelist & Cyber security Advisor, Check Point Software Technologies, Australia/New Zealand Deepfakes have surged into the consumer and commercial consciousness alike owing to their growing sophistication. The ability to mimic a human at a higher quality than is now much more possible than ever before. That’s because access to the AI tools…
-

Check Point Research issues a warning on a sophisticated NFT scam targeting over 100 popular token projects. The scam involves deceptive airdrops leading to fraudulent websites, tricking victims into connecting their wallets and giving attackers access to funds. What you should know The intricate nature of the exposed NFT airdrop scam emphasizes the critical need…
-

By: Marco Eggerling, Global CISO, Check Point Software Technologies Regarding ransomware, there’s a big misconception in the industry. The conventional wisdom is that ransomware threats will escalate and that we’ll continue to battle them in perpetuity. However, while millions of ransomware attacks continue to occur annually, last year, ransomware threats actually declined by several percentage…
-

By Muhammad Yahya Patel, Lead Security Engineer at Check Point Software Technologies Smart cities are becoming a reality rather than a concept and integrating technology into everyday infrastructure has become the norm. They present local authorities with a vast number of opportunities, including data-driven decision making, enhanced engagement between citizens and government, and a reduced…
-

By: Marco Eggerling, Field CISO, EMEA, Check Point Software Technologies As an information security professional, you’ve likely heard the term ‘monoculture’ in relation to agriculture. In that context, a single type of crop, – take sweet corn for example – has a monopoly on a field. A sudden crop killer (virus or destructive insects) can…
-

By Antoine Korulski and Adi Goldshtein Harel, Check Point Software Technologies Enterprises, like citadels, fortify their networks and data with sturdy walls (firewalls), vigilant guards (agents on endpoints), and advanced defence systems (cloud and IoT security). However, there is one vulnerability that has remained untouchable – the enemy infiltrators disguised as allies: Unmanaged devices which…
-

Comments by: Lotem Finkelstein, Head of Threat Intelligence and Research for Check Point Software Technologies Reports that a young German hacker, David Colombo has been able to hack into a number of Tesla cars is sending shockwaves through the automotive industry and taps into our worst fears like our vehicle being taken over by a…
-

Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…
-

By: Gary Gardiner, Head of Security Engineering, APAC & Japan, Check Point Software Technologies Cyberattacks linked to pandemic-related developments worldwide continued to impact organisations in 2021. Cybercriminals doubled down on their attacks, taking advantage of countries experiencing new COVID-19 strain waves or entering various stages of reopening their borders, with spikes in fake vaccine certificate…
-

Comments by: Gary Gardiner, Head of Security Engineering, APAC & Japan, Check Point Software Technologies Socially engineered attacks are becoming more mainstream. In these cyber attacks, hackers use human interactions to carry out their malicious activities, psychologically manipulating people into making security mistakes or giving away sensitive information. The information leaked here is sensitive and…

You must be logged in to post a comment.