Check Point

Zero-day patched by Microsoft has been exploited by attackers for over a year (CVE-2024-38112)

Zero-day patched by Microsoft has been exploited by attackers for over a year (CVE-2024-38112) 2024-07-10 at 15:46 By Zeljka Zorz CVE-2024-38112, a spoofing vulnerability in Windows MSHTML Platform for which Microsoft has released a fix on Tuesday, has likely been exploited by attackers in the wild for over a year, Check Point researcher Haifei Li […]

React to this headline:

Loading spinner

Zero-day patched by Microsoft has been exploited by attackers for over a year (CVE-2024-38112) Read More »

Find out which cybersecurity threats organizations fear the most

Find out which cybersecurity threats organizations fear the most 2024-06-19 at 06:31 By Help Net Security This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam | 2024 Ransomware Trends Report | June 2024 Ransomware remains

React to this headline:

Loading spinner

Find out which cybersecurity threats organizations fear the most Read More »

Exploitation of Recent Check Point VPN Zero-Day Soars

Exploitation of Recent Check Point VPN Zero-Day Soars 2024-06-06 at 16:46 By Ionut Arghire GreyNoise has observed a rapid increase in the number of exploitation attempts targeting a recent Check Point VPN zero-day. The post Exploitation of Recent Check Point VPN Zero-Day Soars appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Exploitation of Recent Check Point VPN Zero-Day Soars Read More »

Find out which cyber threats you should be concerned about

Find out which cyber threats you should be concerned about 2024-06-05 at 06:01 By Help Net Security This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024

React to this headline:

Loading spinner

Find out which cyber threats you should be concerned about Read More »

PoC Published for Exploited Check Point VPN Vulnerability

PoC Published for Exploited Check Point VPN Vulnerability 2024-06-03 at 15:46 By Ionut Arghire PoC code targeting a recent Check Point VPN zero-day has been released as Censys identifies 14,000 internet-accessible appliances. The post PoC Published for Exploited Check Point VPN Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

PoC Published for Exploited Check Point VPN Vulnerability Read More »

Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919)

Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919) 2024-05-31 at 14:32 By Zeljka Zorz Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for local accounts, which they then used to move laterally in the target organizations’ network. “The vulnerability is particularly critical

React to this headline:

Loading spinner

Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919) Read More »

Check Point VPN Attacks Involve Zero-Day Exploited Since April

Check Point VPN Attacks Involve Zero-Day Exploited Since April 2024-05-30 at 12:46 By Eduard Kovacs The recently disclosed Check Point VPN attacks involve the zero-day vulnerability CVE-2024-24919, which allows hackers to obtain passwords. The post Check Point VPN Attacks Involve Zero-Day Exploited Since April appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Check Point VPN Attacks Involve Zero-Day Exploited Since April Read More »

Attackers are probing Check Point Remote Access VPN devices

Attackers are probing Check Point Remote Access VPN devices 2024-05-28 at 12:46 By Zeljka Zorz Attackers are trying to gain access to Check Point VPN devices via local accounts protected only by passwords, the company has warned on Monday. Their ultimate goal is to use that access to discover and pivot to other enterprise assets

React to this headline:

Loading spinner

Attackers are probing Check Point Remote Access VPN devices Read More »

Check Point VPN Targeted for Initial Access in Enterprise Attacks

Check Point VPN Targeted for Initial Access in Enterprise Attacks 2024-05-28 at 12:31 By Eduard Kovacs Check Point is warning customers that threat actors are targeting insecure VPN instances for initial access to enterprise networks.  The post Check Point VPN Targeted for Initial Access in Enterprise Attacks appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Check Point VPN Targeted for Initial Access in Enterprise Attacks Read More »

Cloud security incidents make organizations turn to AI-powered prevention

Cloud security incidents make organizations turn to AI-powered prevention 2024-05-16 at 06:31 By Help Net Security Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a significant increase from 24% the year before, according to Check Point. This trend underscores the escalating risk landscape in

React to this headline:

Loading spinner

Cloud security incidents make organizations turn to AI-powered prevention Read More »

How attackers deliver malware to Foxit PDF Reader users

How attackers deliver malware to Foxit PDF Reader users 2024-05-15 at 16:31 By Zeljka Zorz Threat actors are taking advantage of the flawed design of Foxit PDF Reader’s alerts to deliver malware via booby-trapped PDF documents, Check Point researchers have warned. Exploiting the issue The researchers have analyzed several campaigns using malicious PDF files that

React to this headline:

Loading spinner

How attackers deliver malware to Foxit PDF Reader users Read More »

Check Point boosts security in Harmony Email & Collaboration

Check Point boosts security in Harmony Email & Collaboration 2024-04-12 at 13:01 By Industry News Check Point announced new email security features that enhance its Check Point Harmony Email & Collaboration portfolio: Patented unified quarantine, DMARC monitoring, archiving, and Smart Banners. Since 2023, Check Point has released over 75 new features for Harmony Email &

React to this headline:

Loading spinner

Check Point boosts security in Harmony Email & Collaboration Read More »

Infosec products of the month: March 2024

Infosec products of the month: March 2024 2024-04-01 at 05:46 By Help Net Security Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado Security, Check Point, CyberArk, Cynerio, DataDome, Delinea, Drata, Exabeam, GitGuardian, GitHub, GlobalSign, Legato Security, Legit Security, Malwarebytes, Ordr, Pentera, Portnox, Regula,

React to this headline:

Loading spinner

Infosec products of the month: March 2024 Read More »

Hackers leverage 1-day vulnerabilities to deliver custom Linux malware

Hackers leverage 1-day vulnerabilities to deliver custom Linux malware 2024-03-12 at 11:01 By Helga Labus A financially motivated threat actor is using known vulnerabilities to target public-facing services and deliver custom malware to unpatched Windows and Linux systems. Among the exploited vulnerabilities are also two recently discovered Ivanti Connect Secure VPN flaws that are widely

React to this headline:

Loading spinner

Hackers leverage 1-day vulnerabilities to deliver custom Linux malware Read More »

New infosec products of the week: March 8, 2024

New infosec products of the week: March 8, 2024 2024-03-08 at 06:07 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Check Point, Delinea, Pentera, and Sentra. Delinea Privilege Control for Servers enforces least privilege principles on critical systems In Privilege Control for Servers, session

React to this headline:

Loading spinner

New infosec products of the week: March 8, 2024 Read More »

Check Point introduces Harmony SaaS for automated threat prevention

Check Point introduces Harmony SaaS for automated threat prevention 2024-03-06 at 18:16 By Industry News Check Point has introduced Harmony SaaS, which offers protection by seamlessly integrating into customers’ existing infrastructure and providing real-time threat prevention. “With the exponential rise in SaaS adoption, organizations face unprecedented challenges in maintaining robust security and regulatory compliance. Check

React to this headline:

Loading spinner

Check Point introduces Harmony SaaS for automated threat prevention Read More »

ManageEngine partners with Check Point to help organizations tackle mobile threats

ManageEngine partners with Check Point to help organizations tackle mobile threats 2024-02-28 at 12:04 By Industry News ManageEngine announced the integration between Endpoint Central, its flagship unified endpoint management solution, and Check Point‘s Harmony Mobile, a mobile threat defense solution, to help IT security teams automate the remediation of mobile threats. The expanding mobile workforce

React to this headline:

Loading spinner

ManageEngine partners with Check Point to help organizations tackle mobile threats Read More »

Check Point introduces Quantum Force, series of AI-powered firewalls

Check Point introduces Quantum Force, series of AI-powered firewalls 2024-02-21 at 15:01 By Industry News Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and businesses of all dimensions. Powered by the advanced Check Point

React to this headline:

Loading spinner

Check Point introduces Quantum Force, series of AI-powered firewalls Read More »

Decryptor for Rhysida ransomware is available!

Decryptor for Rhysida ransomware is available! 2024-02-12 at 13:46 By Zeljka Zorz Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged to create a decryptor. About Rhysida Rhysida is a relatively new ransomware-as-a-service gang that engages in double extortion. First observed in May 2023,

React to this headline:

Loading spinner

Decryptor for Rhysida ransomware is available! Read More »

Scroll to Top