Tag: Check Point

Here you will find all the articles with the tag: Check Point.

Check Point finds ten malicious Python packages in PyPi

Check Point finds ten malicious Python packages in PyPi

Hackers increasingly target Python repositories. Security experts from Check Point recently discovered ten malware packages in PyPi, a popular Python repository. Malware in Python repositories is typically distributed in familiar-looking packages and highly dangerous. Developers that fall victim... Read more

date2 months ago
‘Ransomware strikes one out of 40 organizations per week’

‘Ransomware strikes one out of 40 organizations per week’

According to Check Point, ransomware strikes one out of 40 organizations per week. In its latest report, the organization states that ransomware incidents increased 59 percent year-over-year in the second quarter of 2022. CPR attributes the rise to increased remote working, geopolitical tension... Read more

date2 months ago
Check Point launches Quantum Lightspeed firewalls for data centers

Check Point launches Quantum Lightspeed firewalls for data centers

Check Point Software introduces Quantum Lightspeed, a series of new firewalls for data centers. The firewalls perform well above average: custom Nvidia chips provide a maximum throughput of 800Gbps per gateway. The Quantum Lightspeed series consists of four firewalls: QLS250, QLS450, QLS650 and ... Read more

date8 months ago
Adobe Partners with startup Bolt for one-click e-commerce checkouts

Adobe Partners with startup Bolt for one-click e-commerce checkouts

Adobe has announced a partnership with Bolt for creating one-click checkout solutions for people using the firm’s software. Adobe was once only known as an imaging software developer. However, it has recently created many e-commerce and digital marketing tools. In addition, Adobe now targets r... Read more

date10 months ago
What are the current cyber security threats? An overview

What are the current cyber security threats? An overview

Cybersecurity is in a state of constant change. The attack surfaces on which cybercriminals capitalize are as versatile as the overall development of information technology. Insight into both attackers and this attack surface is essential. Only by knowing what a threat looks like can we defend ours... Read more

date11 months ago
Stolen passwords could be found via Google

Stolen passwords could be found via Google

Log-in data of victims of phishing attacks were available on various hacked WordPress websites. These websites, and therefore the stolen login data, were indexed by Google. Check Point Research writes about the findings in a blog post. The attackers first managed to hack existing WordPress websi... Read more

date2 years ago
Android phones in danger due to hackable Qualcomm chip

Android phones in danger due to hackable Qualcomm chip

Qualcomm chips are present in more than 40 percent of the smartphones, and those chips have a major vulnerability that enables hackers to gain access to the smartphone. This is a significant threat to Android phones (Apple uses other chips) all over the world. Hackers can spy on smartphone users an... Read more

date2 years ago
New variant Android ransomware claims to be from the FBI

New variant Android ransomware claims to be from the FBI

A modified version of the Black Rose Lucy malware has surfaced on Android devices with the hackers impersonating the FBI. When affected users pay a fine, they supposedly could regain access to their encrypted files. At the end of 2018, Check Point's security researchers identified a new variant ... Read more

date2 years ago
Check Point acquires IoT security specialist Cymplify

Check Point acquires IoT security specialist Cymplify

Security company Check Point Software Technologies has acquired Cymplify for an unknown amount. Cymplify is a company that specialises in security for the Internet of Things (IoT). Cymplify is developing a firmware analysis engine for IoT security that provides highly detailed cybersecurity pos... Read more

date3 years ago
Security researcher installs ransomware on Canon camera

Security researcher installs ransomware on Canon camera

A security researcher from Check Point Software Technologies has demonstrated a technique that makes it possible to install ransomware on a Canon DSLR. The demonstration can be seen in a video. The security researcher, Eyal Itkin, specifically infects a Canon EOS 80D. In the digital camera there app... Read more

date3 years ago
1 2 3