Check Point
Orca Cloud Visibility Platform delivers full stack IaaS and PaaS cloud security visibility
Israeli startup Orca Security, founded by former Check Point executives Avi Shua and Gil Geron, announced $6.5 million in seed funding led by YL Ventures for its mission to …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
BlueKeep RDP flaw: Nearly a million Internet-facing systems are vulnerable
Two weeks have passed since Microsoft released security fixes and mitigation advice to defang exploits taking advantage of CVE-2019-0708 (aka BlueKeep), a wormable …
![Infocyte HUNT](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094254/infocyte_hunt-400x200.jpg)
Infocyte HUNT Cloud for AWS: Detection and IR for high-growth cloud environments
Infocyte today announced the availability of Infocyte HUNT Cloud for AWS, a solution combining detection and IR for high-growth cloud environments, unlike traditional endpoint …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100133/shark-400x200.jpg)
Coinhive stops digging, but cryptomining still dominates
While cryptomining services such as Coinhive have closed down, cryptominers are still the most prevalent malware aimed at organizations globally, according to the Check Point …
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094657/xiaomi-400x200.jpg)
Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app
Check Point Research discovered a vulnerability in one of the preinstalled apps on devices manufactured by one of the world’s biggest mobile vendors, Xiaomi. The vulnerability …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102836/google-play-fake-crypto-400x200.jpg)
Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads
Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Researchers unveil February 2019’s most wanted malware
Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112208/windows-400x200.jpg)
Windows Servers in danger of being compromised via WDS bug
Checkpoint has released more details about CVE-2018-8476, a critical remote code execution vulnerability affecting all Windows Servers since 2008 SP2. The bug was responsibly …
![WinRar](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095152/winrar-400x200.jpg)
500 million WinRAR users open to compromise via a 19-year-old flaw
A vulnerability affecting all versions of WinRAR, the popular file archiver utility for Windows, could be exploited by attackers to deliver malware via specially crafted ACE …
![Ryuk](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095220/ryuk-400x200.jpg)
Ryuk: What does the helpdesk tell us?
Cybercrime is the only criminal channel that provides a helpdesk. An amusing side note in the world of digital crime, and whilst considerable efforts have been taken to …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095230/biohazard-400x200.jpg)
Most wanted malware in January 2019: A new threat speaks up
Check Point’s Global Threat Index for January 2019 reveals a new backdoor Trojan affecting Linux servers, which is distributing the XMRig crypto-miner. The new malware, …
Check Point and Ericom Software join forces to tackle browser-based attacks
Ericom Software unveiled the integration of Ericom Shield Remote Browser Isolation (RBI) solution with Check Point Software Technologies Advanced Network Threat Prevention. …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD