-
Improvements of CloudGuard IaaS in the latest release of R80.40 Unified Security (Post)
Earlier this year, Check Point released the latest version of Unified Security, R80.40, which brings major improvements to CloudGuard IaaS.R80.40 helps improve the efficiency of cloud security engine ...
-
Password managers can make your network more secure – but mind the gaps (Post)
It seems odd to imagine that one piece of software, which doesn’t even require a network connection, can improve the safety of your online life. But password managers certainly appear to fall into ...
-
July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence (Post)
Since February 2020, Emotet’s activities, primarily sending waves of malspam campaigns started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when t ...
-
Facing down the myriad threats tied to COVID-19 (Post)
Unscrupulous marketers and cyber-criminals have seized upon concerns over the emergence of the COVID-19 global pandemic as bait for spam, phishing attacks and malware. In recent weeks, the use of “co ...
-
Microsoft 365 Phishing Attacks Masterfully Use Brand Name Sites to Establish Legitimacy (Post)
New voicemail phishing scam uses legitimate branded domains from companies like Samsung and Adobe to facilitate redirects to compromised websites intent on stealing credentials.It’s an age-old campai ...
-
July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot (Post)
Check Point Research reported that RAT Remcos rose four places due to trojanized installers, Anubis Mobile Malware Ousted SpinOk and Education/Research Still Hardest HitOur latest Global Threat Index ...
-
Automated attacks on web applications (Post)
Cybercrime has become big business, and scammers are increasingly turning to bots and automation to make their attacks more efficient and effective and help them avoid detection.In December, Bar ...
-
Securing Telecommuters with Expanded Endpoint Visibility and Control (Post)
If there is one thing that the ongoing pandemic has taught us, it’s that telecommuting could become the new normal. But IT executives must tread carefully, because expanding the bounds of the enterpr ...
-
Secure your Custom Applications with Forcepoint DLP App Data Security API (Post)
Easily integrate true data security into your organization’s in-house software Did you know that a majority of software applications (some estimates upward of 62% of all enterprise software applicati ...
-
Cybersecurity and Infrastructure Security Agency Warn of New VBA Attack Designed to Deploy KONNI Remote Administration Tool (Post)
A new alert from CISA outlines just how dangerous and intrusive the KONNI malware is in organizations that fall for phishing attacks using Word attachments with malicious VBA code.The latest warning ...
-
A Ransomware Victim Refuses to Pay (Post)
Video game studio CD Projekt Red, makers of The Witcher series and Cyberpunk 2077, have disclosed a ransomware attack, WIRED reports.The attackers claimed to have stolen source code for the company’s ...
-
LockFile: Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers (Post)
Previously unseen ransomware hit at least 10 organizations in ongoing campaign.UPDATE August 23: Third parties have identified a ProxyShell exploit as a potential vector for the PowerShell-relate ...