Check Point finds ten malicious Python packages in PyPi
Hackers increasingly target Python repositories. Security experts from Check Point recently discovered ten malware packages in PyPi, a popular Python repository.
Malware in Python repositories is typically distributed in familiar-looking packages and highly dangerous. Developers that fall victim... Read more
‘Ransomware strikes one out of 40 organizations per week’
According to Check Point, ransomware strikes one out of 40 organizations per week. In its latest report, the organization states that ransomware incidents increased 59 percent year-over-year in the second quarter of 2022.
CPR attributes the rise to increased remote working, geopolitical tension... Read more
Check Point launches Quantum Lightspeed firewalls for data centers
Check Point Software introduces Quantum Lightspeed, a series of new firewalls for data centers. The firewalls perform well above average: custom Nvidia chips provide a maximum throughput of 800Gbps per gateway.
The Quantum Lightspeed series consists of four firewalls: QLS250, QLS450, QLS650 and ... Read more
Adobe Partners with startup Bolt for one-click e-commerce checkouts
Adobe has announced a partnership with Bolt for creating one-click checkout solutions for people using the firm’s software.
Adobe was once only known as an imaging software developer. However, it has recently created many e-commerce and digital marketing tools. In addition, Adobe now targets r... Read more
What are the current cyber security threats? An overview
Cybersecurity is in a state of constant change. The attack surfaces on which cybercriminals capitalize are as versatile as the overall development of information technology. Insight into both attackers and this attack surface is essential. Only by knowing what a threat looks like can we defend ours... Read more
Stolen passwords could be found via Google
Log-in data of victims of phishing attacks were available on various hacked WordPress websites. These websites, and therefore the stolen login data, were indexed by Google.
Check Point Research writes about the findings in a blog post. The attackers first managed to hack existing WordPress websi... Read more
Android phones in danger due to hackable Qualcomm chip
Qualcomm chips are present in more than 40 percent of the smartphones, and those chips have a major vulnerability that enables hackers to gain access to the smartphone. This is a significant threat to Android phones (Apple uses other chips) all over the world. Hackers can spy on smartphone users an... Read more
New variant Android ransomware claims to be from the FBI
A modified version of the Black Rose Lucy malware has surfaced on Android devices with the hackers impersonating the FBI. When affected users pay a fine, they supposedly could regain access to their encrypted files.
At the end of 2018, Check Point's security researchers identified a new variant ... Read more
Check Point acquires IoT security specialist Cymplify
Security company Check Point Software Technologies has acquired Cymplify for an unknown amount. Cymplify is a company that specialises in security for the Internet of Things (IoT).
Cymplify is developing a firmware analysis engine for IoT security that provides highly detailed cybersecurity pos... Read more
Security researcher installs ransomware on Canon camera
A security researcher from Check Point Software Technologies has demonstrated a technique that makes it possible to install ransomware on a Canon DSLR. The demonstration can be seen in a video.
The security researcher, Eyal Itkin, specifically infects a Canon EOS 80D.
In the digital camera there app... Read more