
Check Point Software Technologies
-

Singapore organisations faced a 22% surge in cyberattacks in March 2026, bucking a global decline, as Check Point Research flags rising GenAI data leakage risks and persistent ransomware activity.
-

Check Point Software and MyRepublic have launched MR Email Guard as a Service, an AI-powered managed email security solution designed to protect Singapore SMEs from phishing and BEC attacks.
-

By: Sadiq Iqbal, Evangelist & Cyber security Advisor, Check Point Software Technologies, Australia/New Zealand Deepfakes have surged into the consumer and commercial consciousness alike owing to their growing sophistication. The ability to mimic a human at a higher quality than is now much more possible than ever before. That’s because access to the AI tools…
-

Check Point Research issues a warning on a sophisticated NFT scam targeting over 100 popular token projects. The scam involves deceptive airdrops leading to fraudulent websites, tricking victims into connecting their wallets and giving attackers access to funds. What you should know The intricate nature of the exposed NFT airdrop scam emphasizes the critical need…
-

By: Marco Eggerling, Global CISO, Check Point Software Technologies Regarding ransomware, there’s a big misconception in the industry. The conventional wisdom is that ransomware threats will escalate and that we’ll continue to battle them in perpetuity. However, while millions of ransomware attacks continue to occur annually, last year, ransomware threats actually declined by several percentage…
-

By Muhammad Yahya Patel, Lead Security Engineer at Check Point Software Technologies Smart cities are becoming a reality rather than a concept and integrating technology into everyday infrastructure has become the norm. They present local authorities with a vast number of opportunities, including data-driven decision making, enhanced engagement between citizens and government, and a reduced…
-

By: Marco Eggerling, Field CISO, EMEA, Check Point Software Technologies As an information security professional, you’ve likely heard the term ‘monoculture’ in relation to agriculture. In that context, a single type of crop, – take sweet corn for example – has a monopoly on a field. A sudden crop killer (virus or destructive insects) can…
-

By Antoine Korulski and Adi Goldshtein Harel, Check Point Software Technologies Enterprises, like citadels, fortify their networks and data with sturdy walls (firewalls), vigilant guards (agents on endpoints), and advanced defence systems (cloud and IoT security). However, there is one vulnerability that has remained untouchable – the enemy infiltrators disguised as allies: Unmanaged devices which…
-

Comments by: Lotem Finkelstein, Head of Threat Intelligence and Research for Check Point Software Technologies Reports that a young German hacker, David Colombo has been able to hack into a number of Tesla cars is sending shockwaves through the automotive industry and taps into our worst fears like our vehicle being taken over by a…
-

Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…

You must be logged in to post a comment.