With the normalization of remote work, companies needed to be able to support and provide critical services to their off-site workforce, Check Point advises in this...
The partnership between Check Point and TD Africa will enable more small and medium businesses (SMBs) in the region to benefit from protection and defense against...
Check Point Research reports that the Dridex trojan, which is often used in the initial stages of ransomware attacks, is the most prevalent malware for the...
Valentines is around the corner. But with global pandemic restrictions has seen an increase in online shopping. In the article below, Check Point shares information on...
Today’s cyber-landscape is tough for small to midsize businesses (SMBs). Criminals and hackers have stepped up their attacks dramatically over the past year: the FBI stated that cybercrime...
Global survey shows securing remote workers and protecting cloud deployments are some of the leading challenges for next two years, as majority of organizations believe security...
. Check Point Research issues Q3 Brand Phishing Report, highlighting the brands that hackers imitated the most to lure people into giving up personal data
Check Point researchers developed a technique to recognize the ‘handwriting’ of exploit developers, enabling them to discover two leading authors of zero-day exploits for Windows
Acquisition of clientless, cloud-delivered secure remote access technology to integrate with Check Point’s Infinity architecture, making it the easiest and most secure solution in the market for enterprises´ remote...
Researchers demonstrate how hackers could remove/install skills on a victim’s Alexa account, access voice histories, and personal information Check Point Research, the Threat Intelligence arm of Check...