Checkpoint

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks

A sophisticated new malware/trojan attack is designed to steal login credentials and credit card information from payment systems, banks and crypto exchanges. This attack tricks legitimate business applications into running compromised but innocent-looking dynamic link library (DLL) files — making it very difficult to detect and block. DLL sideloading is a technique used by cybercriminals […]

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks Read More »

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security

Artificial Intelligence and Machine Learning (AI and ML) are recognized as important parts of the future of cyber security and cloud security. But how integrated are these technologies in cyber security functions currently? A recent survey by Check Point and Cybersecurity Insiders […] Click here to view original web page at www.checkpoint.com

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security Read More »

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities

For years, Check Point has been a top strategic partner for Amazon Web Services with multiple competencies including Security Software and Networking Software. As a global leader in security, Check Point allows customers to do more on AWS—the solutions are truly better together. In 2024, Check Point continues to expand AWS support. Our customer wins

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities Read More »

Connect the Security Dots by CloudGuard Effective Risk Management

Connect the Security Dots by CloudGuard Effective Risk Management

Countless of services we use in our daily life are backed by Cloud computing, thanks to its agility and global presence from many cloud service providers nowadays. Although we tend not to realize about their cloud dependency until such services stop functioning or involve in an “unfortunate” event where a cybersecurity breach result in data

Connect the Security Dots by CloudGuard Effective Risk Management Read More »

Securing the Financial Sector with Check Point Infinity Global Services

Securing the Financial Sector with Check Point Infinity Global Services

The digital transformation has significantly enhanced efficiency within the financial sector, but not without elevating the cyber risk landscape. Recent findings by the International Monetary Fund (IMF) reveal a stark reality: cyberattacks have more than doubled since the pandemic, spotlighting the financial sector’s vulnerability due to its handling of sensitive data and transactions. Companies have faced enormous

Securing the Financial Sector with Check Point Infinity Global Services Read More »

Intersection Cyber Security Software Repositories impact open-source software Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF

Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF

As the impact of the open-source software (OSS) community continues to expand, comprehending the interplay between OSS practices and cyber security standards has become paramount. Recentlythe Open Source Security Foundation (OpenSSF) and the National Institute of Standards and Technology (NIST)  established the roadmap for collective efforts toward enhancing open-source software security. This blog will explore the forward strides

Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF Read More »

Protecting the weakest link: how human errors can put a company in risk

Protecting the weakest link: how human errors can put a company in risk

In today’s digital age, cybersecurity has become a priority for businesses, as cyber attacks can damage their economy and reputation. According to Check Point, 71% of businesses were victims of ransomware attacks in 2023, with an average payout of $4.35 million. Employees are the first link in the cybersecurity chain and the most vulnerable entry

Protecting the weakest link: how human errors can put a company in risk Read More »

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally

The realm of cyber security is an ever-evolving battlefield. As we step into 2024, the shadows of 2023’s massive cyber threats still loomed, setting a precedent for what was to come. The first quarter of 2024 has seen an intriguing shift in the landscape of cyber attacks, both in frequency and in the nature of

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally Read More »